EditBufferTestHook.dll

Description: "EditBufferTestHook.DYNLINK"

Authors: © Microsoft Corporation. All rights reserved.

Version: 10.0.19041.6456

Architecture: 64-bit

Operating System: Windows NT

SHA256: 89b813f6e7a3221fe9fa7133cece59eb

File Size: 86.5 KB

Uploaded At: Dec. 1, 2025, 7:27 a.m.

Views: 7

Exported Functions

  • CreateEditBufferTestHook (Ordinal: 1, Address: 0x3680)
  • CreateEditBufferTestHookClient (Ordinal: 2, Address: 0x8a40)
  • EnableTestHook (Ordinal: 3, Address: 0x8bb0)
  • GetTestHookEnabled (Ordinal: 4, Address: 0x8cc0)

Imported DLLs & Functions

api-ms-win-core-debug-l1-1-0.dll
  • DebugBreak (Address: 0x14ef10070)
  • IsDebuggerPresent (Address: 0x14ef10060)
  • OutputDebugStringW (Address: 0x14ef10068)
api-ms-win-core-errorhandling-l1-1-0.dll
  • GetLastError (Address: 0x14ef10090)
  • SetLastError (Address: 0x14ef10088)
  • SetUnhandledExceptionFilter (Address: 0x14ef10098)
  • UnhandledExceptionFilter (Address: 0x14ef10080)
api-ms-win-core-errorhandling-l1-1-2.dll
  • RaiseFailFastException (Address: 0x14ef100a8)
api-ms-win-core-handle-l1-1-0.dll
  • CloseHandle (Address: 0x14ef100b8)
api-ms-win-core-heap-l1-1-0.dll
  • GetProcessHeap (Address: 0x14ef100c8)
  • HeapAlloc (Address: 0x14ef100d0)
  • HeapFree (Address: 0x14ef100d8)
api-ms-win-core-heap-l2-1-0.dll
  • LocalFree (Address: 0x14ef100e8)
api-ms-win-core-libraryloader-l1-2-0.dll
  • GetModuleFileNameA (Address: 0x14ef10108)
  • GetModuleHandleExW (Address: 0x14ef10110)
  • GetModuleHandleW (Address: 0x14ef10100)
  • GetProcAddress (Address: 0x14ef100f8)
api-ms-win-core-localization-l1-2-0.dll
  • FormatMessageW (Address: 0x14ef10120)
api-ms-win-core-processthreads-l1-1-0.dll
  • GetCurrentProcess (Address: 0x14ef10130)
  • GetCurrentProcessId (Address: 0x14ef10138)
  • GetCurrentThreadId (Address: 0x14ef10148)
  • TerminateProcess (Address: 0x14ef10140)
api-ms-win-core-profile-l1-1-0.dll
  • QueryPerformanceCounter (Address: 0x14ef10158)
api-ms-win-core-registry-l1-1-0.dll
  • RegCloseKey (Address: 0x14ef10178)
  • RegOpenKeyExW (Address: 0x14ef10168)
  • RegQueryValueExW (Address: 0x14ef10180)
  • RegSetValueExW (Address: 0x14ef10170)
api-ms-win-core-rtlsupport-l1-1-0.dll
  • RtlCaptureContext (Address: 0x14ef101a0)
  • RtlLookupFunctionEntry (Address: 0x14ef10198)
  • RtlVirtualUnwind (Address: 0x14ef10190)
api-ms-win-core-string-l1-1-0.dll
  • GetStringTypeW (Address: 0x14ef101c0)
  • MultiByteToWideChar (Address: 0x14ef101b8)
  • WideCharToMultiByte (Address: 0x14ef101b0)
api-ms-win-core-synch-l1-1-0.dll
  • CreateEventW (Address: 0x14ef10210)
  • CreateMutexExW (Address: 0x14ef101d8)
  • CreateSemaphoreExW (Address: 0x14ef10220)
  • DeleteCriticalSection (Address: 0x14ef10230)
  • EnterCriticalSection (Address: 0x14ef101e8)
  • InitializeCriticalSectionEx (Address: 0x14ef101d0)
  • LeaveCriticalSection (Address: 0x14ef101e0)
  • OpenSemaphoreW (Address: 0x14ef101f0)
  • ReleaseMutex (Address: 0x14ef10218)
  • ReleaseSemaphore (Address: 0x14ef10228)
  • SetEvent (Address: 0x14ef101f8)
  • WaitForSingleObject (Address: 0x14ef10200)
  • WaitForSingleObjectEx (Address: 0x14ef10208)
api-ms-win-core-synch-l1-2-0.dll
  • Sleep (Address: 0x14ef10240)
api-ms-win-core-sysinfo-l1-1-0.dll
  • GetSystemTimeAsFileTime (Address: 0x14ef10258)
  • GetTickCount (Address: 0x14ef10250)
api-ms-win-core-util-l1-1-0.dll
  • DecodePointer (Address: 0x14ef10268)
  • EncodePointer (Address: 0x14ef10270)
api-ms-win-eventing-provider-l1-1-0.dll
  • EventRegister (Address: 0x14ef10288)
  • EventSetInformation (Address: 0x14ef10290)
  • EventUnregister (Address: 0x14ef10280)
  • EventWriteTransfer (Address: 0x14ef10298)
api-ms-win-security-sddl-l1-1-0.dll
  • ConvertStringSecurityDescriptorToSecurityDescriptorW (Address: 0x14ef102a8)
CoreMessaging.dll
  • CoreUICreate (Address: 0x14ef10038)
CoreUIComponents.dll
  • CoreUIClientCreate (Address: 0x14ef10050)
  • CoreUIFactoryCreate (Address: 0x14ef10048)
msvcrt.dll
  • ___lc_codepage_func (Address: 0x14ef10368)
  • ___lc_handle_func (Address: 0x14ef10370)
  • ___mb_cur_max_func (Address: 0x14ef10350)
  • __C_specific_handler (Address: 0x14ef10300)
  • __crtLCMapStringW (Address: 0x14ef102c8)
  • __CxxFrameHandler3 (Address: 0x14ef10410)
  • __dllonexit (Address: 0x14ef10380)
  • __pctype_func (Address: 0x14ef10378)
  • __uncaught_exception (Address: 0x14ef10320)
  • _amsg_exit (Address: 0x14ef102d8)
  • _beginthreadex (Address: 0x14ef103b8)
  • _callnewh (Address: 0x14ef10338)
  • _CxxThrowException (Address: 0x14ef10398)
  • _errno (Address: 0x14ef10348)
  • _initterm (Address: 0x14ef102f8)
  • _ismbblead (Address: 0x14ef10340)
  • _lock (Address: 0x14ef103b0)
  • _onexit (Address: 0x14ef103c0)
  • _purecall (Address: 0x14ef103d0)
  • _unlock (Address: 0x14ef103a8)
  • _vsnprintf_s (Address: 0x14ef10310)
  • _vsnwprintf (Address: 0x14ef10308)
  • _wcsdup (Address: 0x14ef102e0)
  • _wsetlocale (Address: 0x14ef102c0)
  • _XcptFilter (Address: 0x14ef102d0)
  • ??_V@YAXPEAX@Z (Address: 0x14ef10438)
  • ??0bad_cast@@QEAA@AEBV0@@Z (Address: 0x14ef103e0)
  • ??0bad_cast@@QEAA@PEBD@Z (Address: 0x14ef103e8)
  • ??0exception@@QEAA@AEBQEBD@Z (Address: 0x14ef10430)
  • ??0exception@@QEAA@AEBQEBDH@Z (Address: 0x14ef10328)
  • ??0exception@@QEAA@AEBV0@@Z (Address: 0x14ef10418)
  • ??0exception@@QEAA@XZ (Address: 0x14ef10330)
  • ??1bad_cast@@UEAA@XZ (Address: 0x14ef103d8)
  • ??1exception@@UEAA@XZ (Address: 0x14ef10428)
  • ??1type_info@@UEAA@XZ (Address: 0x14ef10360)
  • ??3@YAXPEAX@Z (Address: 0x14ef10440)
  • ?terminate@@YAXXZ (Address: 0x14ef10318)
  • ?what@exception@@UEBAPEBDXZ (Address: 0x14ef103c8)
  • abort (Address: 0x14ef102f0)
  • calloc (Address: 0x14ef10358)
  • free (Address: 0x14ef10420)
  • localeconv (Address: 0x14ef10408)
  • malloc (Address: 0x14ef103f8)
  • memcpy (Address: 0x14ef10390)
  • memcpy_s (Address: 0x14ef102b8)
  • memmove (Address: 0x14ef10388)
  • memset (Address: 0x14ef102e8)
  • setlocale (Address: 0x14ef103a0)
  • sprintf_s (Address: 0x14ef10400)
  • strcspn (Address: 0x14ef103f0)