ToolsInjectionWindowsHook64.dll
Description:
Authors:
Version:
Architecture: 64-bit
Operating System:
SHA256: bb3f4238b1e46d13adc757a71a4d252d
File Size: 81.5 KB
Uploaded At: Dec. 1, 2025, 2:54 p.m.
Views: 7
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: OpenProcess
Exported Functions
- QuadDWindowsHook (Ordinal: 1, Address: 0x3f00)
Imported DLLs & Functions
api-ms-win-crt-convert-l1-1-0.dll
- _wtoi (Address: 0x18000f2d0)
- strtol (Address: 0x18000f2c8)
api-ms-win-crt-environment-l1-1-0.dll
- _wgetenv (Address: 0x18000f2e0)
api-ms-win-crt-heap-l1-1-0.dll
- _callnewh (Address: 0x18000f2f8)
- free (Address: 0x18000f2f0)
- malloc (Address: 0x18000f300)
api-ms-win-crt-runtime-l1-1-0.dll
- _beginthreadex (Address: 0x18000f358)
- _cexit (Address: 0x18000f340)
- _configure_narrow_argv (Address: 0x18000f328)
- _crt_atexit (Address: 0x18000f318)
- _execute_onexit_table (Address: 0x18000f360)
- _initialize_narrow_environment (Address: 0x18000f320)
- _initialize_onexit_table (Address: 0x18000f368)
- _initterm (Address: 0x18000f348)
- _initterm_e (Address: 0x18000f350)
- _invalid_parameter_noinfo_noreturn (Address: 0x18000f338)
- _register_onexit_function (Address: 0x18000f310)
- _seh_filter_dll (Address: 0x18000f330)
api-ms-win-crt-stdio-l1-1-0.dll
- __acrt_iob_func (Address: 0x18000f380)
- __stdio_common_vfprintf (Address: 0x18000f390)
- __stdio_common_vsprintf (Address: 0x18000f3a8)
- _wfopen (Address: 0x18000f3b0)
- fclose (Address: 0x18000f378)
- feof (Address: 0x18000f398)
- fflush (Address: 0x18000f388)
- fgetc (Address: 0x18000f3a0)
api-ms-win-crt-string-l1-1-0.dll
- isspace (Address: 0x18000f3c0)
- strncmp (Address: 0x18000f3c8)
KERNEL32.dll
- CloseHandle (Address: 0x18000f000)
- CreateEventA (Address: 0x18000f168)
- CreateEventW (Address: 0x18000f0f0)
- CreateFileA (Address: 0x18000f0b8)
- DeleteCriticalSection (Address: 0x18000f0a0)
- DisableThreadLibraryCalls (Address: 0x18000f150)
- EnterCriticalSection (Address: 0x18000f090)
- FileTimeToSystemTime (Address: 0x18000f080)
- FormatMessageA (Address: 0x18000f0d0)
- GetCurrentProcess (Address: 0x18000f130)
- GetCurrentProcessId (Address: 0x18000f018)
- GetCurrentThreadId (Address: 0x18000f048)
- GetExitCodeProcess (Address: 0x18000f020)
- GetLastError (Address: 0x18000f008)
- GetModuleFileNameA (Address: 0x18000f068)
- GetModuleFileNameW (Address: 0x18000f0b0)
- GetModuleHandleExA (Address: 0x18000f070)
- GetModuleHandleW (Address: 0x18000f0f8)
- GetProcAddress (Address: 0x18000f030)
- GetProcessHeap (Address: 0x18000f160)
- GetSystemTimeAsFileTime (Address: 0x18000f060)
- HeapFree (Address: 0x18000f158)
- InitializeCriticalSection (Address: 0x18000f088)
- InitializeCriticalSectionAndSpinCount (Address: 0x18000f198)
- InitializeSListHead (Address: 0x18000f100)
- IsDebuggerPresent (Address: 0x18000f040)
- IsProcessorFeaturePresent (Address: 0x18000f140)
- LeaveCriticalSection (Address: 0x18000f098)
- LoadLibraryW (Address: 0x18000f038)
- LocalFree (Address: 0x18000f0c8)
- OpenEventA (Address: 0x18000f170)
- OpenProcess (Address: 0x18000f028)
- OutputDebugStringA (Address: 0x18000f0a8)
- QueryPerformanceCounter (Address: 0x18000f148)
- ResetEvent (Address: 0x18000f0e0)
- RtlCaptureContext (Address: 0x18000f108)
- RtlLookupFunctionEntry (Address: 0x18000f110)
- RtlVirtualUnwind (Address: 0x18000f118)
- SetEvent (Address: 0x18000f0d8)
- SetLastError (Address: 0x18000f010)
- SetUnhandledExceptionFilter (Address: 0x18000f128)
- Sleep (Address: 0x18000f050)
- SystemTimeToTzSpecificLocalTime (Address: 0x18000f078)
- TerminateProcess (Address: 0x18000f138)
- TlsAlloc (Address: 0x18000f178)
- TlsFree (Address: 0x18000f190)
- TlsGetValue (Address: 0x18000f180)
- TlsSetValue (Address: 0x18000f188)
- UnhandledExceptionFilter (Address: 0x18000f120)
- WaitForSingleObject (Address: 0x18000f058)
- WaitForSingleObjectEx (Address: 0x18000f0e8)
- WriteFile (Address: 0x18000f0c0)
MSVCP140.dll
- _Mtx_destroy_in_situ (Address: 0x18000f1d0)
- _Mtx_init_in_situ (Address: 0x18000f1c8)
- _Mtx_lock (Address: 0x18000f1d8)
- _Mtx_unlock (Address: 0x18000f1e0)
- ?_Decref@facet@locale@std@@UEAAPEAV_Facet_base@3@XZ (Address: 0x18000f1a8)
- ?_Incref@facet@locale@std@@UEAAXXZ (Address: 0x18000f1b0)
- ?_Init@locale@std@@CAPEAV_Locimp@12@_N@Z (Address: 0x18000f220)
- ?_Locimp_Addfac@_Locimp@locale@std@@CAXPEAV123@PEAVfacet@23@_K@Z (Address: 0x18000f228)
- ?_New_Locimp@_Locimp@locale@std@@CAPEAV123@AEBV123@@Z (Address: 0x18000f200)
- ?_Throw_C_error@std@@YAXH@Z (Address: 0x18000f1e8)
- ?_Xlength_error@std@@YAXPEBD@Z (Address: 0x18000f1c0)
- ??0?$codecvt@_WDU_Mbstatet@@@std@@QEAA@_K@Z (Address: 0x18000f210)
- ??1?$codecvt@_WDU_Mbstatet@@@std@@MEAA@XZ (Address: 0x18000f208)
- ??4?$_Yarn@D@std@@QEAAAEAV01@PEBD@Z (Address: 0x18000f1f0)
- ??Bid@locale@std@@QEAA_KXZ (Address: 0x18000f1f8)
- ?id@?$codecvt@_WDU_Mbstatet@@@std@@2V0locale@2@A (Address: 0x18000f1b8)
- ?out@?$codecvt@_WDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEB_W1AEAPEB_WPEAD3AEAPEAD@Z (Address: 0x18000f218)
USER32.dll
- CallNextHookEx (Address: 0x18000f238)
- MessageBoxA (Address: 0x18000f240)
VCRUNTIME140_1.dll
- __CxxFrameHandler4 (Address: 0x18000f2b8)
VCRUNTIME140.dll
- __C_specific_handler (Address: 0x18000f268)
- __std_exception_copy (Address: 0x18000f280)
- __std_exception_destroy (Address: 0x18000f278)
- __std_terminate (Address: 0x18000f288)
- __std_type_info_compare (Address: 0x18000f270)
- __std_type_info_destroy_list (Address: 0x18000f2a0)
- _CxxThrowException (Address: 0x18000f2a8)
- _purecall (Address: 0x18000f290)
- memcmp (Address: 0x18000f260)
- memcpy (Address: 0x18000f258)
- memmove (Address: 0x18000f250)
- memset (Address: 0x18000f298)