ToolsInjectionWindowsHook64.dll

Description:

Authors:

Version:

Architecture: 64-bit

Operating System:

SHA256: bb3f4238b1e46d13adc757a71a4d252d

File Size: 81.5 KB

Uploaded At: Dec. 1, 2025, 2:54 p.m.

Views: 7

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • QuadDWindowsHook (Ordinal: 1, Address: 0x3f00)

Imported DLLs & Functions

api-ms-win-crt-convert-l1-1-0.dll
  • _wtoi (Address: 0x18000f2d0)
  • strtol (Address: 0x18000f2c8)
api-ms-win-crt-environment-l1-1-0.dll
  • _wgetenv (Address: 0x18000f2e0)
api-ms-win-crt-heap-l1-1-0.dll
  • _callnewh (Address: 0x18000f2f8)
  • free (Address: 0x18000f2f0)
  • malloc (Address: 0x18000f300)
api-ms-win-crt-runtime-l1-1-0.dll
  • _beginthreadex (Address: 0x18000f358)
  • _cexit (Address: 0x18000f340)
  • _configure_narrow_argv (Address: 0x18000f328)
  • _crt_atexit (Address: 0x18000f318)
  • _execute_onexit_table (Address: 0x18000f360)
  • _initialize_narrow_environment (Address: 0x18000f320)
  • _initialize_onexit_table (Address: 0x18000f368)
  • _initterm (Address: 0x18000f348)
  • _initterm_e (Address: 0x18000f350)
  • _invalid_parameter_noinfo_noreturn (Address: 0x18000f338)
  • _register_onexit_function (Address: 0x18000f310)
  • _seh_filter_dll (Address: 0x18000f330)
api-ms-win-crt-stdio-l1-1-0.dll
  • __acrt_iob_func (Address: 0x18000f380)
  • __stdio_common_vfprintf (Address: 0x18000f390)
  • __stdio_common_vsprintf (Address: 0x18000f3a8)
  • _wfopen (Address: 0x18000f3b0)
  • fclose (Address: 0x18000f378)
  • feof (Address: 0x18000f398)
  • fflush (Address: 0x18000f388)
  • fgetc (Address: 0x18000f3a0)
api-ms-win-crt-string-l1-1-0.dll
  • isspace (Address: 0x18000f3c0)
  • strncmp (Address: 0x18000f3c8)
KERNEL32.dll
  • CloseHandle (Address: 0x18000f000)
  • CreateEventA (Address: 0x18000f168)
  • CreateEventW (Address: 0x18000f0f0)
  • CreateFileA (Address: 0x18000f0b8)
  • DeleteCriticalSection (Address: 0x18000f0a0)
  • DisableThreadLibraryCalls (Address: 0x18000f150)
  • EnterCriticalSection (Address: 0x18000f090)
  • FileTimeToSystemTime (Address: 0x18000f080)
  • FormatMessageA (Address: 0x18000f0d0)
  • GetCurrentProcess (Address: 0x18000f130)
  • GetCurrentProcessId (Address: 0x18000f018)
  • GetCurrentThreadId (Address: 0x18000f048)
  • GetExitCodeProcess (Address: 0x18000f020)
  • GetLastError (Address: 0x18000f008)
  • GetModuleFileNameA (Address: 0x18000f068)
  • GetModuleFileNameW (Address: 0x18000f0b0)
  • GetModuleHandleExA (Address: 0x18000f070)
  • GetModuleHandleW (Address: 0x18000f0f8)
  • GetProcAddress (Address: 0x18000f030)
  • GetProcessHeap (Address: 0x18000f160)
  • GetSystemTimeAsFileTime (Address: 0x18000f060)
  • HeapFree (Address: 0x18000f158)
  • InitializeCriticalSection (Address: 0x18000f088)
  • InitializeCriticalSectionAndSpinCount (Address: 0x18000f198)
  • InitializeSListHead (Address: 0x18000f100)
  • IsDebuggerPresent (Address: 0x18000f040)
  • IsProcessorFeaturePresent (Address: 0x18000f140)
  • LeaveCriticalSection (Address: 0x18000f098)
  • LoadLibraryW (Address: 0x18000f038)
  • LocalFree (Address: 0x18000f0c8)
  • OpenEventA (Address: 0x18000f170)
  • OpenProcess (Address: 0x18000f028)
  • OutputDebugStringA (Address: 0x18000f0a8)
  • QueryPerformanceCounter (Address: 0x18000f148)
  • ResetEvent (Address: 0x18000f0e0)
  • RtlCaptureContext (Address: 0x18000f108)
  • RtlLookupFunctionEntry (Address: 0x18000f110)
  • RtlVirtualUnwind (Address: 0x18000f118)
  • SetEvent (Address: 0x18000f0d8)
  • SetLastError (Address: 0x18000f010)
  • SetUnhandledExceptionFilter (Address: 0x18000f128)
  • Sleep (Address: 0x18000f050)
  • SystemTimeToTzSpecificLocalTime (Address: 0x18000f078)
  • TerminateProcess (Address: 0x18000f138)
  • TlsAlloc (Address: 0x18000f178)
  • TlsFree (Address: 0x18000f190)
  • TlsGetValue (Address: 0x18000f180)
  • TlsSetValue (Address: 0x18000f188)
  • UnhandledExceptionFilter (Address: 0x18000f120)
  • WaitForSingleObject (Address: 0x18000f058)
  • WaitForSingleObjectEx (Address: 0x18000f0e8)
  • WriteFile (Address: 0x18000f0c0)
MSVCP140.dll
  • _Mtx_destroy_in_situ (Address: 0x18000f1d0)
  • _Mtx_init_in_situ (Address: 0x18000f1c8)
  • _Mtx_lock (Address: 0x18000f1d8)
  • _Mtx_unlock (Address: 0x18000f1e0)
  • ?_Decref@facet@locale@std@@UEAAPEAV_Facet_base@3@XZ (Address: 0x18000f1a8)
  • ?_Incref@facet@locale@std@@UEAAXXZ (Address: 0x18000f1b0)
  • ?_Init@locale@std@@CAPEAV_Locimp@12@_N@Z (Address: 0x18000f220)
  • ?_Locimp_Addfac@_Locimp@locale@std@@CAXPEAV123@PEAVfacet@23@_K@Z (Address: 0x18000f228)
  • ?_New_Locimp@_Locimp@locale@std@@CAPEAV123@AEBV123@@Z (Address: 0x18000f200)
  • ?_Throw_C_error@std@@YAXH@Z (Address: 0x18000f1e8)
  • ?_Xlength_error@std@@YAXPEBD@Z (Address: 0x18000f1c0)
  • ??0?$codecvt@_WDU_Mbstatet@@@std@@QEAA@_K@Z (Address: 0x18000f210)
  • ??1?$codecvt@_WDU_Mbstatet@@@std@@MEAA@XZ (Address: 0x18000f208)
  • ??4?$_Yarn@D@std@@QEAAAEAV01@PEBD@Z (Address: 0x18000f1f0)
  • ??Bid@locale@std@@QEAA_KXZ (Address: 0x18000f1f8)
  • ?id@?$codecvt@_WDU_Mbstatet@@@std@@2V0locale@2@A (Address: 0x18000f1b8)
  • ?out@?$codecvt@_WDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEB_W1AEAPEB_WPEAD3AEAPEAD@Z (Address: 0x18000f218)
USER32.dll
  • CallNextHookEx (Address: 0x18000f238)
  • MessageBoxA (Address: 0x18000f240)
VCRUNTIME140_1.dll
  • __CxxFrameHandler4 (Address: 0x18000f2b8)
VCRUNTIME140.dll
  • __C_specific_handler (Address: 0x18000f268)
  • __std_exception_copy (Address: 0x18000f280)
  • __std_exception_destroy (Address: 0x18000f278)
  • __std_terminate (Address: 0x18000f288)
  • __std_type_info_compare (Address: 0x18000f270)
  • __std_type_info_destroy_list (Address: 0x18000f2a0)
  • _CxxThrowException (Address: 0x18000f2a8)
  • _purecall (Address: 0x18000f290)
  • memcmp (Address: 0x18000f260)
  • memcpy (Address: 0x18000f258)
  • memmove (Address: 0x18000f250)
  • memset (Address: 0x18000f298)