hook.dll
Description:
Authors:
Version:
Architecture: 64-bit
Operating System:
SHA256: 4e90172d7ab9dbe18aad604998311980
File Size: 20.0 KB
Uploaded At: April 1, 2026, 3:09 a.m.
Views: 6
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: OpenProcess, WriteProcessMemory
Exported Functions
- ApplyPatches (Ordinal: 1, Address: 0x1648)
- dc_reject (Ordinal: 2, Address: 0x1284)
- hp_cutoff (Ordinal: 3, Address: 0x1248)
Imported DLLs & Functions
api-ms-win-crt-heap-l1-1-0.dll
- _callnewh (Address: 0x180004200)
- free (Address: 0x180004208)
- malloc (Address: 0x180004210)
api-ms-win-crt-runtime-l1-1-0.dll
- _cexit (Address: 0x180004220)
- _configure_narrow_argv (Address: 0x180004250)
- _crt_atexit (Address: 0x180004228)
- _execute_onexit_table (Address: 0x180004270)
- _initialize_narrow_environment (Address: 0x180004248)
- _initialize_onexit_table (Address: 0x180004240)
- _initterm (Address: 0x180004260)
- _initterm_e (Address: 0x180004230)
- _invoke_watson (Address: 0x180004268)
- _register_onexit_function (Address: 0x180004238)
- _seh_filter_dll (Address: 0x180004258)
api-ms-win-crt-string-l1-1-0.dll
- strcmp (Address: 0x180004280)
AVRT.dll
- AvSetMmThreadCharacteristicsW (Address: 0x180004000)
- AvSetMmThreadPriority (Address: 0x180004008)
KERNEL32.dll
- CreateThread (Address: 0x180004078)
- CreateToolhelp32Snapshot (Address: 0x180004048)
- FlushInstructionCache (Address: 0x180004100)
- GetCurrentProcess (Address: 0x180004020)
- GetCurrentProcessId (Address: 0x1800040d8)
- GetCurrentThread (Address: 0x180004060)
- GetCurrentThreadId (Address: 0x1800040e0)
- GetLastError (Address: 0x180004058)
- GetModuleHandleA (Address: 0x180004038)
- GetSystemTimeAsFileTime (Address: 0x1800040e8)
- InitializeSListHead (Address: 0x1800040f0)
- IsDebuggerPresent (Address: 0x1800040c8)
- IsProcessorFeaturePresent (Address: 0x1800040c0)
- K32EnumProcessModules (Address: 0x180004090)
- K32GetModuleBaseNameA (Address: 0x180004070)
- OpenProcess (Address: 0x180004040)
- Process32Next (Address: 0x180004068)
- QueryPerformanceCounter (Address: 0x1800040d0)
- RtlCaptureContext (Address: 0x180004110)
- RtlLookupFunctionEntry (Address: 0x180004098)
- RtlVirtualUnwind (Address: 0x1800040a0)
- SetPriorityClass (Address: 0x180004018)
- SetThreadInformation (Address: 0x180004088)
- SetThreadPriority (Address: 0x180004030)
- SetUnhandledExceptionFilter (Address: 0x1800040b0)
- Sleep (Address: 0x180004050)
- TerminateProcess (Address: 0x1800040b8)
- UnhandledExceptionFilter (Address: 0x1800040a8)
- VirtualAlloc (Address: 0x180004028)
- VirtualProtect (Address: 0x1800040f8)
- VirtualProtectEx (Address: 0x180004080)
- WriteProcessMemory (Address: 0x180004108)
MSVCP140.dll
- ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ (Address: 0x180004168)
- ?_Xlength_error@std@@YAXPEBD@Z (Address: 0x180004160)
- ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@I@Z (Address: 0x180004138)
- ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@K@Z (Address: 0x180004120)
- ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z (Address: 0x180004140)
- ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@PEBX@Z (Address: 0x180004130)
- ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A (Address: 0x180004150)
- ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ (Address: 0x180004148)
- ?good@ios_base@std@@QEBA_NXZ (Address: 0x180004128)
- ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z (Address: 0x180004190)
- ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z (Address: 0x180004170)
- ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z (Address: 0x180004180)
- ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z (Address: 0x180004188)
- ?uncaught_exception@std@@YA_NXZ (Address: 0x180004158)
- ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z (Address: 0x180004178)
VCRUNTIME140_1.dll
- __CxxFrameHandler4 (Address: 0x1800041f0)
VCRUNTIME140.dll
- __C_specific_handler (Address: 0x1800041c0)
- __std_exception_copy (Address: 0x1800041d0)
- __std_exception_destroy (Address: 0x1800041d8)
- __std_terminate (Address: 0x1800041c8)
- __std_type_info_destroy_list (Address: 0x1800041b0)
- _CxxThrowException (Address: 0x1800041b8)
- memcpy (Address: 0x1800041a0)
- memmove (Address: 0x1800041a8)
- memset (Address: 0x1800041e0)