Should I block it?

No, this file is 100% safe to run.

VersionsAdditional versions

7.6.0.0 50.00%
7.6.0.0 50.00%
(Note, ZTE CORPORATION publishes each variation of this file with the same version, but the hashes are unique.)

Relationships


PE structurePE file structure

Show functions
Import table
advapi32.dll
RegQueryValueA, RegOpenKeyA, RegEnumKeyA, RegQueryValueExA, RegNotifyChangeKeyValue, RegQueryInfoKeyA, RegSetValueExA, RegEnumKeyExA, RegOpenKeyExA, RegCreateKeyExA, RegCloseKey, RegDeleteValueA, RegDeleteKeyA
gdi32.dll
EnumFontFamiliesExA, ScaleWindowExtEx, SetWindowExtEx, Escape, ScaleViewportExtEx, SetViewportExtEx, OffsetViewportOrgEx, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, BitBlt, DeleteDC, ExtTextOutA, TextOutA, RectVisible, PtVisible, SetMapMode, RestoreDC, SaveDC, CreateBitmap, SetBkColor, SetTextColor, GetClipBox, GetStockObject, GetObjectA, GetDeviceCaps, CreateSolidBrush, DeleteObject, SetViewportOrgEx
kernel32.dll
GetLocaleInfoW, GetLocaleInfoA, GetUserDefaultLCID, EnumSystemLocalesA, IsValidLocale, LCMapStringA, LCMapStringW, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, FlushFileBuffers, CompareStringA, InterlockedCompareExchange, LocalFree, FormatMessageA, FreeResource, GetVersionExA, lstrcmpW, GlobalDeleteAtom, GlobalFindAtomA, GlobalAddAtomA, GlobalGetAtomNameA, EnumResourceLanguagesA, ConvertDefaultLocale, InterlockedExchange, LocalAlloc, GlobalReAlloc, LocalReAlloc, FindResourceExA, GlobalFlags, WritePrivateProfileStringA, IsProcessorFeaturePresent, GetProcessHeap, InitializeCriticalSectionAndSpinCount, GetConsoleMode, GetConsoleCP, SetFilePointer, GetSystemTimeAsFileTime, GetCurrentProcessId, GetTickCount, QueryPerformanceCounter, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetEnvironmentStrings, FreeEnvironmentStringsA, GetStartupInfoA, GetFileType, SetHandleCount, GetStringTypeW, GetStringTypeA, IsValidCodePage, GetOEMCP, GetACP, GetCPInfo, HeapSize, GetCurrentThread, TlsFree, TlsSetValue, TlsAlloc, TlsGetValue, GetStdHandle, ExitProcess, Sleep, HeapReAlloc, VirtualFree, HeapDestroy, HeapCreate, GetCommandLineA, VirtualQuery, GetSystemInfo, VirtualAlloc, VirtualProtect, IsDebuggerPresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, TerminateProcess, RtlUnwind, HeapAlloc, HeapFree, GetModuleHandleW, GetThreadLocale, SetThreadLocale, GlobalHandle, GlobalFree, ResetEvent, WaitForMultipleObjects, SetEvent, CreateMutexA, GetCurrentThreadId, SetLastError, GetCurrentProcess, FlushInstructionCache, MulDiv, lstrcmpA, ReleaseMutex, WaitForSingleObject, InterlockedDecrement, InterlockedIncrement, LockResource, GlobalAlloc, GlobalLock, GlobalUnlock, RaiseException, LoadLibraryA, GetProcAddress, GetLocalTime, IsDBCSLeadByte, lstrcmpiA, LoadLibraryExA, FindResourceA, LoadResource, SizeofResource, FreeLibrary, WideCharToMultiByte, lstrlenW, MultiByteToWideChar, GetModuleFileNameA, lstrlenA, GetModuleHandleA, DeviceIoControl, EnterCriticalSection, LeaveCriticalSection, WriteFile, CreateEventA, ReadFile, GetOverlappedResult, CreateThread, CancelIo, GetLastError, CreateFileA, CloseHandle, DeleteCriticalSection, InitializeCriticalSection
ole32.dll
StringFromGUID2, CoCreateInstance, CLSIDFromString, CLSIDFromProgID, CoGetClassObject, OleInitialize, OleUninitialize, CreateStreamOnHGlobal, CoTaskMemRealloc, CoTaskMemAlloc, CoTaskMemFree, OleLockRunning
setupapi.dll
SetupDiGetClassDevsA, SetupDiEnumDeviceInfo, SetupDiGetDeviceRegistryPropertyA, SetupDiDestroyDeviceInfoList
shlwapi.dll
PathFindExtensionA
user32.dll
DestroyMenu, GrayStringA, DrawTextExA, DrawTextA, TabbedTextOutA, GetSysColorBrush, UnregisterClassA, SetCursor, GetMessageA, TranslateMessage, GetCursorPos, ValidateRect, PostQuitMessage, GetWindowThreadProcessId, IsDialogMessageA, SetMenuItemBitmaps, GetMenuCheckMarkDimensions, LoadBitmapA, ModifyMenuA, EnableMenuItem, CheckMenuItem, LoadIconA, WinHelpA, SetWindowsHookExA, CallNextHookEx, GetClassLongA, GetForegroundWindow, GetLastActivePopup, DispatchMessageA, GetTopWindow, GetMessageTime, PeekMessageA, MapWindowPoints, GetKeyState, SetMenu, SetForegroundWindow, IsWindowVisible, UpdateWindow, MessageBoxA, GetClassInfoA, RegisterClassA, AdjustWindowRectEx, CopyRect, PtInRect, GetDlgCtrlID, GetMenu, SystemParametersInfoA, IsIconic, GetWindowPlacement, GetSystemMetrics, GetNextDlgTabItem, EndDialog, SetPropA, GetCapture, GetActiveWindow, SetActiveWindow, GetPropA, CharNextA, ShowWindow, PostMessageA, GetWindow, RemovePropA, GetAsyncKeyState, GetWindowRect, IsWindowEnabled, UnhookWindowsHookEx, GetMenuState, GetMenuItemID, GetMenuItemCount, GetSubMenu, CharNextW, EnableWindow, CreateDialogIndirectParamA, GetMessagePos, SetWindowPos, SetWindowContextHelpId, MapDialogRect, SendDlgItemMessageA, CreateWindowExA, RegisterClassExA, LoadCursorA, GetClassInfoExA, RegisterWindowMessageA, DefWindowProcA, SetWindowLongA, GetWindowLongA, SetWindowTextA, GetWindowTextA, GetWindowTextLengthA, DestroyAcceleratorTable, GetSysColor, GetFocus, SetFocus, IsChild, EndPaint, FillRect, BeginPaint, GetClientRect, IsWindow, RedrawWindow, GetClassNameA, CallWindowProcA, DestroyWindow, GetDlgItem, SendMessageA, InvalidateRgn, InvalidateRect, SetCapture, ReleaseCapture, ScreenToClient, ClientToScreen, MoveWindow, CreateAcceleratorTableA, GetDC, ReleaseDC, GetDesktopWindow, GetParent
winspool.drv
DocumentPropertiesA, OpenPrinterA, ClosePrinter
Export table
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer

QMI_Server.dll

By ZTE CORPORATION  (Signed)

Remove QMI_Server.dll
Version:   7.6.0.0
MD5:   155ec5233f311fac9e1f701ed8c9bbbd
SHA1:   025b4018d2a736982a36672bffd6063bac04defa
SHA256:   80715a5c268c1e574a54312fda25d0c60da9faa8dc7a9b8457e79e330b00e54c

Overview

qmi_server.dll is loaded as dynamic link library that runs in the context of a process. The file is digitally signed by ZTE CORPORATION which was issued by the VeriSign certificate authority (CA).

DetailsDetails

File name:qmi_server.dll
Description:QMI_Server.dll
Typical file path:C:\windows.0\system32\supportappxl\qmi_server.dll
File version:7.6.0.0
Size:1.34 MB (1,409,888 bytes)
Certificate
Issued to:ZTE CORPORATION
Authority (CA):VeriSign
Digital DNA
PE subsystem:Windows GUI
File packed:No
.NET CLR:No
More details

Windows OS versionsDistribution by Windows OS

OS versiondistribution
Windows 7 Ultimate 50.00%
Microsoft Windows XP 50.00%

Distribution by countryDistribution by country

Saudi Arabia installs about 50.00% of qmi_server.dll.

OEM distributionDistribution by PC manufacturer

PC Manufacturerdistribution
Hewlett-Packard 100.00%
Should I remove It? Clean your PC of unwanted adware, toolbars and bloatware.

Download it for FREE