Should I block it?

No, this file is 100% safe to run.

VersionsAdditional versions

7.6.0.0 50.00%
7.6.0.0 50.00%
(Note, ZTE CORPORATION publishes each variation of this file with the same version, but the hashes are unique.)

Relationships


PE structurePE file structure

Show functions
Import table
advapi32.dll
RegQueryValueA, RegOpenKeyA, RegEnumKeyA, RegQueryValueExA, RegNotifyChangeKeyValue, RegQueryInfoKeyA, RegSetValueExA, RegEnumKeyExA, RegOpenKeyExA, RegCreateKeyExA, RegCloseKey, RegDeleteValueA, RegDeleteKeyA
gdi32.dll
EnumFontFamiliesExA, ScaleWindowExtEx, SetWindowExtEx, Escape, ScaleViewportExtEx, SetViewportExtEx, OffsetViewportOrgEx, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, BitBlt, DeleteDC, ExtTextOutA, TextOutA, RectVisible, PtVisible, SetMapMode, RestoreDC, SaveDC, CreateBitmap, SetBkColor, SetTextColor, GetClipBox, GetStockObject, GetObjectA, GetDeviceCaps, CreateSolidBrush, DeleteObject, SetViewportOrgEx
kernel32.dll
GetLocaleInfoW, GetLocaleInfoA, GetUserDefaultLCID, EnumSystemLocalesA, IsValidLocale, LCMapStringA, LCMapStringW, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, WriteConsoleW, FlushFileBuffers, CompareStringA, InterlockedCompareExchange, LocalFree, FormatMessageA, FreeResource, GetVersionExA, lstrcmpW, GlobalDeleteAtom, GlobalFindAtomA, GlobalAddAtomA, GlobalGetAtomNameA, EnumResourceLanguagesA, ConvertDefaultLocale, InterlockedExchange, LocalAlloc, GlobalReAlloc, LocalReAlloc, FindResourceExA, GlobalFlags, WritePrivateProfileStringA, IsProcessorFeaturePresent, GetProcessHeap, InitializeCriticalSectionAndSpinCount, GetConsoleMode, GetConsoleCP, SetFilePointer, GetSystemTimeAsFileTime, GetCurrentProcessId, GetTickCount, QueryPerformanceCounter, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetEnvironmentStrings, FreeEnvironmentStringsA, GetStartupInfoA, GetFileType, SetHandleCount, GetStringTypeW, GetStringTypeA, IsValidCodePage, GetOEMCP, GetACP, GetCPInfo, HeapSize, GetCurrentThread, TlsFree, TlsSetValue, TlsAlloc, TlsGetValue, GetStdHandle, ExitProcess, Sleep, HeapReAlloc, VirtualFree, HeapDestroy, HeapCreate, GetCommandLineA, VirtualQuery, GetSystemInfo, VirtualAlloc, VirtualProtect, IsDebuggerPresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, TerminateProcess, RtlUnwind, HeapAlloc, HeapFree, GetModuleHandleW, GetThreadLocale, SetThreadLocale, GlobalHandle, GlobalFree, ResetEvent, WaitForMultipleObjects, SetEvent, CreateMutexA, GetCurrentThreadId, SetLastError, GetCurrentProcess, FlushInstructionCache, MulDiv, lstrcmpA, ReleaseMutex, WaitForSingleObject, InterlockedDecrement, InterlockedIncrement, LockResource, GlobalAlloc, GlobalLock, GlobalUnlock, RaiseException, LoadLibraryA, GetProcAddress, GetLocalTime, IsDBCSLeadByte, lstrcmpiA, LoadLibraryExA, FindResourceA, LoadResource, SizeofResource, FreeLibrary, WideCharToMultiByte, lstrlenW, MultiByteToWideChar, GetModuleFileNameA, lstrlenA, GetModuleHandleA, DeviceIoControl, EnterCriticalSection, LeaveCriticalSection, WriteFile, CreateEventA, ReadFile, GetOverlappedResult, CreateThread, CancelIo, GetLastError, CreateFileA, CloseHandle, DeleteCriticalSection, InitializeCriticalSection
ole32.dll
StringFromGUID2, CoCreateInstance, CLSIDFromString, CLSIDFromProgID, CoGetClassObject, OleInitialize, OleUninitialize, CreateStreamOnHGlobal, CoTaskMemRealloc, CoTaskMemAlloc, CoTaskMemFree, OleLockRunning
setupapi.dll
SetupDiGetClassDevsA, SetupDiEnumDeviceInfo, SetupDiGetDeviceRegistryPropertyA, SetupDiDestroyDeviceInfoList
shlwapi.dll
PathFindExtensionA
user32.dll
DestroyMenu, GrayStringA, DrawTextExA, DrawTextA, TabbedTextOutA, GetSysColorBrush, UnregisterClassA, SetCursor, GetMessageA, TranslateMessage, GetCursorPos, ValidateRect, PostQuitMessage, GetWindowThreadProcessId, IsDialogMessageA, SetMenuItemBitmaps, GetMenuCheckMarkDimensions, LoadBitmapA, ModifyMenuA, EnableMenuItem, CheckMenuItem, LoadIconA, WinHelpA, SetWindowsHookExA, CallNextHookEx, GetClassLongA, GetForegroundWindow, GetLastActivePopup, DispatchMessageA, GetTopWindow, GetMessageTime, PeekMessageA, MapWindowPoints, GetKeyState, SetMenu, SetForegroundWindow, IsWindowVisible, UpdateWindow, MessageBoxA, GetClassInfoA, RegisterClassA, AdjustWindowRectEx, CopyRect, PtInRect, GetDlgCtrlID, GetMenu, SystemParametersInfoA, IsIconic, GetWindowPlacement, GetSystemMetrics, GetNextDlgTabItem, EndDialog, SetPropA, GetCapture, GetActiveWindow, SetActiveWindow, GetPropA, CharNextA, ShowWindow, PostMessageA, GetWindow, RemovePropA, GetAsyncKeyState, GetWindowRect, IsWindowEnabled, UnhookWindowsHookEx, GetMenuState, GetMenuItemID, GetMenuItemCount, GetSubMenu, CharNextW, EnableWindow, CreateDialogIndirectParamA, GetMessagePos, SetWindowPos, SetWindowContextHelpId, MapDialogRect, SendDlgItemMessageA, CreateWindowExA, RegisterClassExA, LoadCursorA, GetClassInfoExA, RegisterWindowMessageA, DefWindowProcA, SetWindowLongA, GetWindowLongA, SetWindowTextA, GetWindowTextA, GetWindowTextLengthA, DestroyAcceleratorTable, GetSysColor, GetFocus, SetFocus, IsChild, EndPaint, FillRect, BeginPaint, GetClientRect, IsWindow, RedrawWindow, GetClassNameA, CallWindowProcA, DestroyWindow, GetDlgItem, SendMessageA, InvalidateRgn, InvalidateRect, SetCapture, ReleaseCapture, ScreenToClient, ClientToScreen, MoveWindow, CreateAcceleratorTableA, GetDC, ReleaseDC, GetDesktopWindow, GetParent
winspool.drv
DocumentPropertiesA, OpenPrinterA, ClosePrinter
Export table
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer

QMI_Server.dll

By ZTE CORPORATION  (Signed)

Remove QMI_Server.dll
Version:   7.6.0.0
MD5:   cb3cf354b19d02161e914153cb3ef811
SHA1:   59bce985cf98adf254ddae56b37273a0df7f99ea
SHA256:   2ad279229b03dae7edaa2d4dc13d87156625a6f3947901c5df84935a1db8bba4

Overview

qmi_server.dll is loaded as dynamic link library that runs in the context of a process. The file is digitally signed by ZTE CORPORATION which was issued by the VeriSign certificate authority (CA).

DetailsDetails

File name:qmi_server.dll
Description:QMI_Server.dll
Typical file path:C:\windows.0\system32\supportappxl\qmi_server.dll
File version:7.6.0.0
Size:1.35 MB (1,410,384 bytes)
Certificate
Issued to:ZTE CORPORATION
Authority (CA):VeriSign
Digital DNA
PE subsystem:Windows GUI
File packed:No
.NET CLR:No
More details

Windows OS versionsDistribution by Windows OS

OS versiondistribution
Windows 7 Ultimate 50.00%
Microsoft Windows XP 50.00%

Distribution by countryDistribution by country

Saudi Arabia installs about 50.00% of qmi_server.dll.

OEM distributionDistribution by PC manufacturer

PC Manufacturerdistribution
Hewlett-Packard 100.00%
Should I remove It? Clean your PC of unwanted adware, toolbars and bloatware.

Download it for FREE