svcm.dll
Description:
Authors:
Version:
Architecture: 64-bit
Operating System:
SHA256: 7133f8cb9be59267e811c036eb890851
File Size: 268.9 KB
Uploaded At: Jan. 15, 2026, 9:55 a.m.
Views: 15
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: OpenProcess, WriteProcessMemory
Exported Functions
- ServiceMain (Ordinal: 1, Address: 0x21e80)
Imported DLLs & Functions
KERNEL32.dll
- CloseHandle (Address: 0x180032028)
- CreateFileW (Address: 0x1800320f0)
- CreateToolhelp32Snapshot (Address: 0x180032010)
- DeleteCriticalSection (Address: 0x1800320d8)
- EncodePointer (Address: 0x1800321a0)
- EnterCriticalSection (Address: 0x180032090)
- ExitProcess (Address: 0x1800321e0)
- FindClose (Address: 0x180032208)
- FindFirstFileExW (Address: 0x180032210)
- FindNextFileW (Address: 0x180032218)
- FlsAlloc (Address: 0x180032270)
- FlsFree (Address: 0x180032288)
- FlsGetValue (Address: 0x180032278)
- FlsSetValue (Address: 0x180032280)
- FlushFileBuffers (Address: 0x1800322d8)
- FreeEnvironmentStringsW (Address: 0x180032268)
- FreeLibrary (Address: 0x1800321d0)
- GetACP (Address: 0x180032228)
- GetCommandLineA (Address: 0x180032240)
- GetCommandLineW (Address: 0x180032248)
- GetConsoleMode (Address: 0x1800322f0)
- GetConsoleOutputCP (Address: 0x1800322e8)
- GetCPInfo (Address: 0x180032238)
- GetCurrentProcess (Address: 0x180032138)
- GetCurrentProcessId (Address: 0x180032058)
- GetCurrentThreadId (Address: 0x1800320b8)
- GetEnvironmentStringsW (Address: 0x180032260)
- GetFileType (Address: 0x1800322b0)
- GetLastError (Address: 0x180032198)
- GetModuleFileNameW (Address: 0x1800321f0)
- GetModuleHandleExW (Address: 0x1800321e8)
- GetModuleHandleW (Address: 0x180032060)
- GetOEMCP (Address: 0x180032230)
- GetProcAddress (Address: 0x180032050)
- GetProcessHeap (Address: 0x1800322a0)
- GetStartupInfoW (Address: 0x180032158)
- GetStdHandle (Address: 0x1800322a8)
- GetStringTypeW (Address: 0x1800322b8)
- GetSystemInfo (Address: 0x180032030)
- GetSystemTimeAsFileTime (Address: 0x180032168)
- GetSystemWindowsDirectoryA (Address: 0x180032000)
- GetThreadContext (Address: 0x1800320d0)
- HeapAlloc (Address: 0x1800321f8)
- HeapFree (Address: 0x180032200)
- HeapReAlloc (Address: 0x1800322c8)
- HeapSize (Address: 0x1800322c0)
- InitializeCriticalSection (Address: 0x1800320a8)
- InitializeCriticalSectionAndSpinCount (Address: 0x1800321a8)
- InitializeCriticalSectionEx (Address: 0x180032290)
- InitializeSListHead (Address: 0x180032170)
- InterlockedFlushSList (Address: 0x180032190)
- IsDebuggerPresent (Address: 0x180032150)
- IsProcessorFeaturePresent (Address: 0x180032148)
- IsValidCodePage (Address: 0x180032220)
- LCMapStringW (Address: 0x180032298)
- LeaveCriticalSection (Address: 0x1800320a0)
- LoadLibraryExW (Address: 0x1800321d8)
- LoadLibraryW (Address: 0x180032038)
- Module32FirstW (Address: 0x180032040)
- Module32NextW (Address: 0x180032100)
- MultiByteToWideChar (Address: 0x180032250)
- OpenProcess (Address: 0x180032008)
- OpenThread (Address: 0x1800320e8)
- Process32FirstW (Address: 0x180032020)
- Process32NextW (Address: 0x180032018)
- QueryPerformanceCounter (Address: 0x180032160)
- RaiseException (Address: 0x180032188)
- ResumeThread (Address: 0x1800320c8)
- RtlCaptureContext (Address: 0x180032110)
- RtlLookupFunctionEntry (Address: 0x180032118)
- RtlPcToFileHeader (Address: 0x180032180)
- RtlUnwindEx (Address: 0x180032178)
- RtlVirtualUnwind (Address: 0x180032120)
- SetFilePointerEx (Address: 0x1800322f8)
- SetLastError (Address: 0x180032108)
- SetStdHandle (Address: 0x1800322d0)
- SetThreadContext (Address: 0x1800320e0)
- SetUnhandledExceptionFilter (Address: 0x180032130)
- SuspendThread (Address: 0x1800320c0)
- TerminateProcess (Address: 0x180032140)
- Thread32First (Address: 0x1800320b0)
- Thread32Next (Address: 0x180032098)
- TlsAlloc (Address: 0x1800321b0)
- TlsFree (Address: 0x1800321c8)
- TlsGetValue (Address: 0x1800321b8)
- TlsSetValue (Address: 0x1800321c0)
- UnhandledExceptionFilter (Address: 0x180032128)
- VirtualAlloc (Address: 0x180032080)
- VirtualFree (Address: 0x180032078)
- VirtualProtect (Address: 0x180032070)
- VirtualProtectEx (Address: 0x180032048)
- VirtualQuery (Address: 0x180032088)
- WideCharToMultiByte (Address: 0x180032258)
- WriteConsoleW (Address: 0x1800320f8)
- WriteFile (Address: 0x1800322e0)
- WriteProcessMemory (Address: 0x180032068)
VERSION.dll
- GetFileVersionInfoA (Address: 0x180032308)
- GetFileVersionInfoSizeA (Address: 0x180032318)
- VerQueryValueA (Address: 0x180032310)