DSETUP.dll

Description: Direct driver preloader

Authors: Copyright (c) Microsoft Corporation. All rights reserved.

Version: 4.9.0.904

Architecture: 32-bit

Operating System: DOS Windows 16

SHA256: 9ad6f392a736ba7e137ac7a49bc454e1

File Size: 91.8 KB

Uploaded At: Dec. 3, 2025, 2:34 a.m.

Views: 6

Exported Functions

  • DirectXDeviceDriverSetupA (Ordinal: 1, Address: 0x41d4)
  • DirectXDeviceDriverSetupW (Ordinal: 2, Address: 0x4288)
  • DirectXRegisterApplicationA (Ordinal: 3, Address: 0x5283)
  • DirectXRegisterApplicationW (Ordinal: 4, Address: 0x5887)
  • DirectXSetupA (Ordinal: 5, Address: 0x506d)
  • DirectXSetupIsJapan (Ordinal: 6, Address: 0x473e)
  • DirectXSetupIsJapanNec (Ordinal: 7, Address: 0x5dfb)
  • DirectXSetupW (Ordinal: 8, Address: 0x512a)
  • DirectXUnRegisterApplication (Ordinal: 9, Address: 0x433c)
  • DirectXSetupSetCallback (Ordinal: 10, Address: 0x41ac)
  • DirectXSetupGetVersion (Ordinal: 11, Address: 0x3ce8)
  • DirectXSetupCallback (Ordinal: 12, Address: 0x3dad)
  • DirectXSetupGetFileVersion (Ordinal: 13, Address: 0x3f16)
  • DirectXLoadString (Ordinal: 14, Address: 0x4e24)
  • DirectXSetupIsEng (Ordinal: 15, Address: 0x476d)
  • DirectXSetupShowEULA (Ordinal: 16, Address: 0x4e6b)
  • DirectXSetupGetEULAA (Ordinal: 17, Address: 0x4eb2)
  • DirectXSetupGetEULAW (Ordinal: 18, Address: 0x4efc)

Imported DLLs & Functions

ADVAPI32.dll
  • RegCloseKey (Address: 0x401000)
  • RegCreateKeyExA (Address: 0x401018)
  • RegCreateKeyExW (Address: 0x401020)
  • RegDeleteKeyA (Address: 0x401008)
  • RegEnumKeyExA (Address: 0x40100c)
  • RegOpenKeyExA (Address: 0x401004)
  • RegQueryInfoKeyA (Address: 0x401010)
  • RegQueryValueExA (Address: 0x401024)
  • RegSetValueExA (Address: 0x401014)
  • RegSetValueExW (Address: 0x40101c)
KERNEL32.dll
  • CloseHandle (Address: 0x401188)
  • CompareStringA (Address: 0x401054)
  • CreateDirectoryA (Address: 0x401058)
  • CreateFileA (Address: 0x40112c)
  • CreateMutexA (Address: 0x401180)
  • DeleteCriticalSection (Address: 0x4010ac)
  • EnterCriticalSection (Address: 0x4010f0)
  • ExitProcess (Address: 0x40107c)
  • FlushFileBuffers (Address: 0x401128)
  • FormatMessageA (Address: 0x401060)
  • FreeEnvironmentStringsA (Address: 0x4010b0)
  • FreeEnvironmentStringsW (Address: 0x4010b8)
  • FreeLibrary (Address: 0x401190)
  • GetACP (Address: 0x40110c)
  • GetCommandLineA (Address: 0x401064)
  • GetConsoleCP (Address: 0x40111c)
  • GetConsoleMode (Address: 0x401120)
  • GetConsoleOutputCP (Address: 0x401148)
  • GetCPInfo (Address: 0x401108)
  • GetCurrentDirectoryA (Address: 0x4010dc)
  • GetCurrentProcess (Address: 0x4010e0)
  • GetCurrentProcessId (Address: 0x4010d4)
  • GetCurrentThreadId (Address: 0x401098)
  • GetEnvironmentStrings (Address: 0x4010b4)
  • GetEnvironmentStringsW (Address: 0x4010bc)
  • GetFileType (Address: 0x4010a4)
  • GetLastError (Address: 0x401184)
  • GetLocaleInfoA (Address: 0x401130)
  • GetLocalTime (Address: 0x401074)
  • GetModuleFileNameA (Address: 0x401040)
  • GetModuleHandleA (Address: 0x401078)
  • GetModuleHandleW (Address: 0x401104)
  • GetOEMCP (Address: 0x401110)
  • GetProcAddress (Address: 0x401178)
  • GetProcessHeap (Address: 0x401154)
  • GetStartupInfoA (Address: 0x4010a8)
  • GetStdHandle (Address: 0x4010a0)
  • GetStringTypeA (Address: 0x401134)
  • GetStringTypeW (Address: 0x401138)
  • GetSystemDefaultLCID (Address: 0x40103c)
  • GetSystemDirectoryA (Address: 0x401168)
  • GetSystemInfo (Address: 0x401160)
  • GetSystemTimeAsFileTime (Address: 0x4010d8)
  • GetTickCount (Address: 0x4010d0)
  • GetVersionExA (Address: 0x401170)
  • GetWindowsDirectoryA (Address: 0x40105c)
  • HeapAlloc (Address: 0x40106c)
  • HeapCreate (Address: 0x4010c4)
  • HeapDestroy (Address: 0x4010c0)
  • HeapFree (Address: 0x401068)
  • HeapReAlloc (Address: 0x401070)
  • InitializeCriticalSection (Address: 0x401100)
  • InterlockedDecrement (Address: 0x401094)
  • InterlockedIncrement (Address: 0x401090)
  • LCMapStringA (Address: 0x40113c)
  • LCMapStringW (Address: 0x401140)
  • LeaveCriticalSection (Address: 0x4010ec)
  • LoadLibraryA (Address: 0x401174)
  • LocalAlloc (Address: 0x401030)
  • LocalFree (Address: 0x40102c)
  • lstrcmpA (Address: 0x401034)
  • lstrlenA (Address: 0x40104c)
  • lstrlenW (Address: 0x401050)
  • MultiByteToWideChar (Address: 0x401048)
  • OutputDebugStringA (Address: 0x40117c)
  • QueryPerformanceCounter (Address: 0x4010cc)
  • ReadFile (Address: 0x401158)
  • RtlUnwind (Address: 0x4010fc)
  • SetCurrentDirectoryA (Address: 0x40116c)
  • SetEndOfFile (Address: 0x401150)
  • SetFilePointer (Address: 0x401118)
  • SetHandleCount (Address: 0x40109c)
  • SetLastError (Address: 0x401044)
  • SetStdHandle (Address: 0x401124)
  • SetUnhandledExceptionFilter (Address: 0x4010e8)
  • Sleep (Address: 0x401114)
  • TerminateProcess (Address: 0x40118c)
  • TlsAlloc (Address: 0x401084)
  • TlsFree (Address: 0x40108c)
  • TlsGetValue (Address: 0x401080)
  • TlsSetValue (Address: 0x401088)
  • UnhandledExceptionFilter (Address: 0x4010e4)
  • VirtualAlloc (Address: 0x4010f4)
  • VirtualFree (Address: 0x4010c8)
  • VirtualProtect (Address: 0x40115c)
  • VirtualQuery (Address: 0x401164)
  • WideCharToMultiByte (Address: 0x401038)
  • WriteConsoleA (Address: 0x401144)
  • WriteConsoleW (Address: 0x40114c)
  • WriteFile (Address: 0x4010f8)
ole32.dll
  • StringFromGUID2 (Address: 0x4011e8)
USER32.dll
  • CreateDialogParamA (Address: 0x4011a4)
  • DestroyWindow (Address: 0x40119c)
  • DispatchMessageA (Address: 0x4011bc)
  • GetKeyboardType (Address: 0x401198)
  • GetMessageA (Address: 0x4011b4)
  • MessageBoxA (Address: 0x4011ac)
  • PeekMessageA (Address: 0x4011b0)
  • SetDlgItemTextA (Address: 0x4011a8)
  • SetFocus (Address: 0x4011a0)
  • TranslateMessage (Address: 0x4011b8)
VERSION.dll
  • GetFileVersionInfoA (Address: 0x4011cc)
  • GetFileVersionInfoSizeA (Address: 0x4011c8)
  • VerQueryValueA (Address: 0x4011c4)
WINMM.dll
  • mmioClose (Address: 0x4011dc)
  • mmioDescend (Address: 0x4011d8)
  • mmioOpenA (Address: 0x4011e0)
  • mmioRead (Address: 0x4011d4)