LiteAvAudioHook.dll

Description: AudioHook Dynamic Link Library

Authors: Copyright (C) 2015-2017 Tencent. All Rights Reserved

Version: 1.0.0.1

Architecture: 32-bit

Operating System: Windows

SHA256: fdcf2e47bff7775a23131e811021ed12

File Size: 313.9 KB

Uploaded At: Dec. 4, 2025, 6:15 a.m.

Views: 12

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • HookPro (Ordinal: 1, Address: 0x2050)
  • InstallHookAudio (Ordinal: 2, Address: 0x2070)
  • RemoveHookAudio (Ordinal: 3, Address: 0x20e0)

Imported DLLs & Functions

ADVAPI32.dll
  • AddAccessAllowedAce (Address: 0x10032018)
  • AllocateAndInitializeSid (Address: 0x10032004)
  • FreeSid (Address: 0x10032008)
  • GetLengthSid (Address: 0x10032014)
  • InitializeAcl (Address: 0x10032010)
  • InitializeSecurityDescriptor (Address: 0x1003200c)
  • SetSecurityDescriptorDacl (Address: 0x10032000)
DSOUND.dll
  • (Address: 0x10032020)
KERNEL32.dll
  • CloseHandle (Address: 0x10032098)
  • CreateEventW (Address: 0x100320a0)
  • CreateFileMappingW (Address: 0x100320b8)
  • CreateFileW (Address: 0x100320fc)
  • CreateSemaphoreW (Address: 0x100320b4)
  • CreateThread (Address: 0x1003213c)
  • DecodePointer (Address: 0x10032050)
  • DeleteCriticalSection (Address: 0x1003211c)
  • DisableThreadLibraryCalls (Address: 0x10032110)
  • EncodePointer (Address: 0x10032158)
  • EnterCriticalSection (Address: 0x10032128)
  • ExitProcess (Address: 0x10032178)
  • FindClose (Address: 0x100321a0)
  • FindFirstFileExA (Address: 0x100321a4)
  • FindNextFileA (Address: 0x100321a8)
  • FlushFileBuffers (Address: 0x10032148)
  • FlushInstructionCache (Address: 0x10032074)
  • FreeEnvironmentStringsW (Address: 0x10032150)
  • FreeLibrary (Address: 0x100320b0)
  • FreeLibraryAndExitThread (Address: 0x10032118)
  • GetACP (Address: 0x10032180)
  • GetCommandLineA (Address: 0x100321b8)
  • GetCommandLineW (Address: 0x100321bc)
  • GetConsoleCP (Address: 0x10032194)
  • GetConsoleMode (Address: 0x10032198)
  • GetCPInfo (Address: 0x100321b4)
  • GetCurrentProcess (Address: 0x1003205c)
  • GetCurrentProcessId (Address: 0x10032130)
  • GetCurrentThread (Address: 0x10032034)
  • GetCurrentThreadId (Address: 0x10032064)
  • GetDiskFreeSpaceExW (Address: 0x100320c4)
  • GetEnvironmentStringsW (Address: 0x10032154)
  • GetFileType (Address: 0x10032188)
  • GetLastError (Address: 0x10032048)
  • GetModuleFileNameA (Address: 0x10032134)
  • GetModuleHandleExW (Address: 0x1003217c)
  • GetModuleHandleW (Address: 0x1003212c)
  • GetOEMCP (Address: 0x100321b0)
  • GetProcAddress (Address: 0x10032088)
  • GetProcessHeap (Address: 0x10032138)
  • GetStartupInfoW (Address: 0x100320e8)
  • GetStdHandle (Address: 0x10032184)
  • GetStringTypeW (Address: 0x10032104)
  • GetSystemTimeAsFileTime (Address: 0x100320f0)
  • GetThreadContext (Address: 0x10032070)
  • GetVersionExW (Address: 0x1003214c)
  • HeapAlloc (Address: 0x100320ac)
  • HeapFree (Address: 0x10032090)
  • HeapReAlloc (Address: 0x1003218c)
  • HeapSize (Address: 0x10032108)
  • InitializeCriticalSection (Address: 0x10032120)
  • InitializeCriticalSectionAndSpinCount (Address: 0x10032160)
  • InitializeCriticalSectionEx (Address: 0x10032044)
  • InitializeSListHead (Address: 0x100320f4)
  • InterlockedFlushSList (Address: 0x10032174)
  • IsDebuggerPresent (Address: 0x100320e4)
  • IsProcessorFeaturePresent (Address: 0x100320e0)
  • IsValidCodePage (Address: 0x100321ac)
  • LCMapStringW (Address: 0x1003219c)
  • LeaveCriticalSection (Address: 0x10032124)
  • LoadLibraryA (Address: 0x1003210c)
  • LoadLibraryExA (Address: 0x10032084)
  • LoadLibraryExW (Address: 0x1003208c)
  • MapViewOfFile (Address: 0x100320bc)
  • MultiByteToWideChar (Address: 0x100320a4)
  • OpenProcess (Address: 0x10032028)
  • OutputDebugStringA (Address: 0x100320c0)
  • OutputDebugStringW (Address: 0x100320f8)
  • QueryPerformanceCounter (Address: 0x100320ec)
  • RaiseException (Address: 0x1003204c)
  • ReleaseSemaphore (Address: 0x10032094)
  • ResetEvent (Address: 0x100320cc)
  • ResumeThread (Address: 0x1003206c)
  • RtlUnwind (Address: 0x1003215c)
  • SetEvent (Address: 0x100320a8)
  • SetFilePointerEx (Address: 0x10032140)
  • SetLastError (Address: 0x10032080)
  • SetStdHandle (Address: 0x10032100)
  • SetThreadContext (Address: 0x10032078)
  • SetThreadPriority (Address: 0x10032038)
  • SetUnhandledExceptionFilter (Address: 0x100320d8)
  • Sleep (Address: 0x10032114)
  • SuspendThread (Address: 0x10032068)
  • TerminateProcess (Address: 0x100320dc)
  • TerminateThread (Address: 0x10032040)
  • TlsAlloc (Address: 0x10032164)
  • TlsFree (Address: 0x10032170)
  • TlsGetValue (Address: 0x10032168)
  • TlsSetValue (Address: 0x1003216c)
  • UnhandledExceptionFilter (Address: 0x100320d4)
  • UnmapViewOfFile (Address: 0x1003209c)
  • VirtualAlloc (Address: 0x10032060)
  • VirtualFree (Address: 0x10032058)
  • VirtualProtect (Address: 0x10032054)
  • VirtualProtectEx (Address: 0x1003202c)
  • VirtualQuery (Address: 0x1003207c)
  • VirtualQueryEx (Address: 0x10032030)
  • WaitForSingleObject (Address: 0x1003203c)
  • WaitForSingleObjectEx (Address: 0x100320d0)
  • WideCharToMultiByte (Address: 0x100320c8)
  • WriteConsoleW (Address: 0x10032144)
  • WriteFile (Address: 0x10032190)
ole32.dll
  • CoInitializeEx (Address: 0x100321e4)
  • CoUninitialize (Address: 0x100321e8)
USER32.dll
  • CallNextHookEx (Address: 0x100321c8)
  • SetWindowsHookExW (Address: 0x100321c4)
  • UnhookWindowsHookEx (Address: 0x100321cc)
WINMM.dll
  • timeKillEvent (Address: 0x100321d8)
  • timeSetEvent (Address: 0x100321dc)
  • waveOutGetDevCapsW (Address: 0x100321d4)