EditBufferTestHook.dll
Description: "EditBufferTestHook.DYNLINK"
Authors: © Microsoft Corporation. All rights reserved.
Version: 10.0.19041.6456
Architecture: 64-bit
Operating System: Windows NT
SHA256: 89b813f6e7a3221fe9fa7133cece59eb
File Size: 86.5 KB
Uploaded At: Dec. 1, 2025, 7:27 a.m.
Views: 7
Exported Functions
- CreateEditBufferTestHook (Ordinal: 1, Address: 0x3680)
- CreateEditBufferTestHookClient (Ordinal: 2, Address: 0x8a40)
- EnableTestHook (Ordinal: 3, Address: 0x8bb0)
- GetTestHookEnabled (Ordinal: 4, Address: 0x8cc0)
Imported DLLs & Functions
api-ms-win-core-debug-l1-1-0.dll
- DebugBreak (Address: 0x14ef10070)
- IsDebuggerPresent (Address: 0x14ef10060)
- OutputDebugStringW (Address: 0x14ef10068)
api-ms-win-core-errorhandling-l1-1-0.dll
- GetLastError (Address: 0x14ef10090)
- SetLastError (Address: 0x14ef10088)
- SetUnhandledExceptionFilter (Address: 0x14ef10098)
- UnhandledExceptionFilter (Address: 0x14ef10080)
api-ms-win-core-errorhandling-l1-1-2.dll
- RaiseFailFastException (Address: 0x14ef100a8)
api-ms-win-core-handle-l1-1-0.dll
- CloseHandle (Address: 0x14ef100b8)
api-ms-win-core-heap-l1-1-0.dll
- GetProcessHeap (Address: 0x14ef100c8)
- HeapAlloc (Address: 0x14ef100d0)
- HeapFree (Address: 0x14ef100d8)
api-ms-win-core-heap-l2-1-0.dll
- LocalFree (Address: 0x14ef100e8)
api-ms-win-core-libraryloader-l1-2-0.dll
- GetModuleFileNameA (Address: 0x14ef10108)
- GetModuleHandleExW (Address: 0x14ef10110)
- GetModuleHandleW (Address: 0x14ef10100)
- GetProcAddress (Address: 0x14ef100f8)
api-ms-win-core-localization-l1-2-0.dll
- FormatMessageW (Address: 0x14ef10120)
api-ms-win-core-processthreads-l1-1-0.dll
- GetCurrentProcess (Address: 0x14ef10130)
- GetCurrentProcessId (Address: 0x14ef10138)
- GetCurrentThreadId (Address: 0x14ef10148)
- TerminateProcess (Address: 0x14ef10140)
api-ms-win-core-profile-l1-1-0.dll
- QueryPerformanceCounter (Address: 0x14ef10158)
api-ms-win-core-registry-l1-1-0.dll
- RegCloseKey (Address: 0x14ef10178)
- RegOpenKeyExW (Address: 0x14ef10168)
- RegQueryValueExW (Address: 0x14ef10180)
- RegSetValueExW (Address: 0x14ef10170)
api-ms-win-core-rtlsupport-l1-1-0.dll
- RtlCaptureContext (Address: 0x14ef101a0)
- RtlLookupFunctionEntry (Address: 0x14ef10198)
- RtlVirtualUnwind (Address: 0x14ef10190)
api-ms-win-core-string-l1-1-0.dll
- GetStringTypeW (Address: 0x14ef101c0)
- MultiByteToWideChar (Address: 0x14ef101b8)
- WideCharToMultiByte (Address: 0x14ef101b0)
api-ms-win-core-synch-l1-1-0.dll
- CreateEventW (Address: 0x14ef10210)
- CreateMutexExW (Address: 0x14ef101d8)
- CreateSemaphoreExW (Address: 0x14ef10220)
- DeleteCriticalSection (Address: 0x14ef10230)
- EnterCriticalSection (Address: 0x14ef101e8)
- InitializeCriticalSectionEx (Address: 0x14ef101d0)
- LeaveCriticalSection (Address: 0x14ef101e0)
- OpenSemaphoreW (Address: 0x14ef101f0)
- ReleaseMutex (Address: 0x14ef10218)
- ReleaseSemaphore (Address: 0x14ef10228)
- SetEvent (Address: 0x14ef101f8)
- WaitForSingleObject (Address: 0x14ef10200)
- WaitForSingleObjectEx (Address: 0x14ef10208)
api-ms-win-core-synch-l1-2-0.dll
- Sleep (Address: 0x14ef10240)
api-ms-win-core-sysinfo-l1-1-0.dll
- GetSystemTimeAsFileTime (Address: 0x14ef10258)
- GetTickCount (Address: 0x14ef10250)
api-ms-win-core-util-l1-1-0.dll
- DecodePointer (Address: 0x14ef10268)
- EncodePointer (Address: 0x14ef10270)
api-ms-win-eventing-provider-l1-1-0.dll
- EventRegister (Address: 0x14ef10288)
- EventSetInformation (Address: 0x14ef10290)
- EventUnregister (Address: 0x14ef10280)
- EventWriteTransfer (Address: 0x14ef10298)
api-ms-win-security-sddl-l1-1-0.dll
- ConvertStringSecurityDescriptorToSecurityDescriptorW (Address: 0x14ef102a8)
CoreMessaging.dll
- CoreUICreate (Address: 0x14ef10038)
CoreUIComponents.dll
- CoreUIClientCreate (Address: 0x14ef10050)
- CoreUIFactoryCreate (Address: 0x14ef10048)
msvcrt.dll
- ___lc_codepage_func (Address: 0x14ef10368)
- ___lc_handle_func (Address: 0x14ef10370)
- ___mb_cur_max_func (Address: 0x14ef10350)
- __C_specific_handler (Address: 0x14ef10300)
- __crtLCMapStringW (Address: 0x14ef102c8)
- __CxxFrameHandler3 (Address: 0x14ef10410)
- __dllonexit (Address: 0x14ef10380)
- __pctype_func (Address: 0x14ef10378)
- __uncaught_exception (Address: 0x14ef10320)
- _amsg_exit (Address: 0x14ef102d8)
- _beginthreadex (Address: 0x14ef103b8)
- _callnewh (Address: 0x14ef10338)
- _CxxThrowException (Address: 0x14ef10398)
- _errno (Address: 0x14ef10348)
- _initterm (Address: 0x14ef102f8)
- _ismbblead (Address: 0x14ef10340)
- _lock (Address: 0x14ef103b0)
- _onexit (Address: 0x14ef103c0)
- _purecall (Address: 0x14ef103d0)
- _unlock (Address: 0x14ef103a8)
- _vsnprintf_s (Address: 0x14ef10310)
- _vsnwprintf (Address: 0x14ef10308)
- _wcsdup (Address: 0x14ef102e0)
- _wsetlocale (Address: 0x14ef102c0)
- _XcptFilter (Address: 0x14ef102d0)
- ??_V@YAXPEAX@Z (Address: 0x14ef10438)
- ??0bad_cast@@QEAA@AEBV0@@Z (Address: 0x14ef103e0)
- ??0bad_cast@@QEAA@PEBD@Z (Address: 0x14ef103e8)
- ??0exception@@QEAA@AEBQEBD@Z (Address: 0x14ef10430)
- ??0exception@@QEAA@AEBQEBDH@Z (Address: 0x14ef10328)
- ??0exception@@QEAA@AEBV0@@Z (Address: 0x14ef10418)
- ??0exception@@QEAA@XZ (Address: 0x14ef10330)
- ??1bad_cast@@UEAA@XZ (Address: 0x14ef103d8)
- ??1exception@@UEAA@XZ (Address: 0x14ef10428)
- ??1type_info@@UEAA@XZ (Address: 0x14ef10360)
- ??3@YAXPEAX@Z (Address: 0x14ef10440)
- ?terminate@@YAXXZ (Address: 0x14ef10318)
- ?what@exception@@UEBAPEBDXZ (Address: 0x14ef103c8)
- abort (Address: 0x14ef102f0)
- calloc (Address: 0x14ef10358)
- free (Address: 0x14ef10420)
- localeconv (Address: 0x14ef10408)
- malloc (Address: 0x14ef103f8)
- memcpy (Address: 0x14ef10390)
- memcpy_s (Address: 0x14ef102b8)
- memmove (Address: 0x14ef10388)
- memset (Address: 0x14ef102e8)
- setlocale (Address: 0x14ef103a0)
- sprintf_s (Address: 0x14ef10400)
- strcspn (Address: 0x14ef103f0)