microsoft.windows.softwarelogo.direct3d.tests.dll

Description: Tailored Application D3D Feature Level Support Certification Tests

Authors: © Microsoft Corporation. All rights reserved.

Version: 10.0.26100.4654

Architecture: 64-bit

Operating System: Windows NT

SHA256: e1486660c6f51163415f71430c21158b

File Size: 106.3 KB

Uploaded At: Dec. 3, 2025, 2:36 a.m.

Views: 7

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

No exported functions.

Imported DLLs & Functions

ADVAPI32.dll
  • AllocateAndInitializeSid (Address: 0x18000e278)
  • CloseTrace (Address: 0x18000e268)
  • ControlTraceW (Address: 0x18000e2d8)
  • CreateProcessWithTokenW (Address: 0x18000e290)
  • DuplicateTokenEx (Address: 0x18000e2e8)
  • EnableTrace (Address: 0x18000e240)
  • EnableTraceEx2 (Address: 0x18000e298)
  • FreeSid (Address: 0x18000e2b8)
  • InitializeSecurityDescriptor (Address: 0x18000e2c0)
  • OpenProcessToken (Address: 0x18000e2b0)
  • OpenTraceW (Address: 0x18000e238)
  • ProcessTrace (Address: 0x18000e260)
  • RegCloseKey (Address: 0x18000e258)
  • RegCreateKeyExW (Address: 0x18000e288)
  • RegDeleteKeyW (Address: 0x18000e270)
  • RegDeleteValueW (Address: 0x18000e2e0)
  • RegEnumKeyExW (Address: 0x18000e228)
  • RegGetValueW (Address: 0x18000e2d0)
  • RegOpenKeyExW (Address: 0x18000e2c8)
  • RegQueryValueExW (Address: 0x18000e230)
  • RegSetKeySecurity (Address: 0x18000e2a0)
  • RegSetValueExW (Address: 0x18000e2a8)
  • SetEntriesInAclW (Address: 0x18000e280)
  • SetSecurityDescriptorDacl (Address: 0x18000e248)
  • StartTraceW (Address: 0x18000e250)
d3d11.dll
  • D3D11CreateDevice (Address: 0x18000e5c8)
GDI32.dll
  • CreateDCW (Address: 0x18000e2f8)
  • DeleteDC (Address: 0x18000e300)
KERNEL32.dll
  • AddDllDirectory (Address: 0x18000e408)
  • CloseHandle (Address: 0x18000e368)
  • ClosePackageInfo (Address: 0x18000e458)
  • CompareStringEx (Address: 0x18000e370)
  • CreateEventW (Address: 0x18000e328)
  • CreateThread (Address: 0x18000e380)
  • DebugBreak (Address: 0x18000e3b0)
  • DeleteFileW (Address: 0x18000e360)
  • FreeLibrary (Address: 0x18000e448)
  • GetCurrentProcess (Address: 0x18000e470)
  • GetCurrentProcessId (Address: 0x18000e3c0)
  • GetCurrentThreadId (Address: 0x18000e3c8)
  • GetFileAttributesW (Address: 0x18000e428)
  • GetFullPathNameW (Address: 0x18000e460)
  • GetLastError (Address: 0x18000e438)
  • GetLongPathNameW (Address: 0x18000e468)
  • GetModuleHandleW (Address: 0x18000e398)
  • GetProcAddress (Address: 0x18000e440)
  • GetSystemTimeAsFileTime (Address: 0x18000e3d0)
  • GetTickCount (Address: 0x18000e3d8)
  • GetVersionExW (Address: 0x18000e320)
  • K32EnumProcesses (Address: 0x18000e388)
  • K32EnumProcessModulesEx (Address: 0x18000e310)
  • K32GetModuleBaseNameW (Address: 0x18000e350)
  • K32GetModuleFileNameExW (Address: 0x18000e410)
  • K32GetModuleInformation (Address: 0x18000e378)
  • LoadLibraryExW (Address: 0x18000e450)
  • LoadLibraryW (Address: 0x18000e420)
  • LocalAlloc (Address: 0x18000e330)
  • LocalFree (Address: 0x18000e390)
  • OpenPackageInfoByFullName (Address: 0x18000e3a0)
  • OpenProcess (Address: 0x18000e430)
  • QueryFullProcessImageNameW (Address: 0x18000e3a8)
  • QueryPerformanceCounter (Address: 0x18000e3b8)
  • ResumeThread (Address: 0x18000e318)
  • RtlCaptureContext (Address: 0x18000e3e0)
  • RtlLookupFunctionEntry (Address: 0x18000e3e8)
  • RtlVirtualUnwind (Address: 0x18000e3f0)
  • SetEvent (Address: 0x18000e358)
  • SetUnhandledExceptionFilter (Address: 0x18000e400)
  • Sleep (Address: 0x18000e340)
  • TerminateProcess (Address: 0x18000e418)
  • UnhandledExceptionFilter (Address: 0x18000e3f8)
  • WaitForSingleObject (Address: 0x18000e338)
  • Wow64DisableWow64FsRedirection (Address: 0x18000e478)
  • Wow64RevertWow64FsRedirection (Address: 0x18000e348)
msvcrt.dll
  • __C_specific_handler (Address: 0x18000e6a0)
  • __CxxFrameHandler3 (Address: 0x18000e688)
  • __dllonexit (Address: 0x18000e6b8)
  • _amsg_exit (Address: 0x18000e670)
  • _callnewh (Address: 0x18000e638)
  • _CxxThrowException (Address: 0x18000e640)
  • _initterm (Address: 0x18000e680)
  • _lock (Address: 0x18000e698)
  • _onexit (Address: 0x18000e6c0)
  • _purecall (Address: 0x18000e6d8)
  • _unlock (Address: 0x18000e6b0)
  • _vsnwprintf (Address: 0x18000e6a8)
  • _wcsicmp (Address: 0x18000e5d8)
  • _XcptFilter (Address: 0x18000e668)
  • ??_V@YAXPEAX@Z (Address: 0x18000e6d0)
  • ??0exception@@QEAA@AEBQEBD@Z (Address: 0x18000e5f8)
  • ??0exception@@QEAA@AEBQEBDH@Z (Address: 0x18000e630)
  • ??0exception@@QEAA@AEBV0@@Z (Address: 0x18000e600)
  • ??1exception@@UEAA@XZ (Address: 0x18000e5f0)
  • ??1type_info@@UEAA@XZ (Address: 0x18000e690)
  • ??3@YAXPEAX@Z (Address: 0x18000e5e0)
  • ?what@exception@@UEBAPEBDXZ (Address: 0x18000e5e8)
  • free (Address: 0x18000e678)
  • isspace (Address: 0x18000e618)
  • malloc (Address: 0x18000e628)
  • memcpy (Address: 0x18000e658)
  • memcpy_s (Address: 0x18000e648)
  • memmove (Address: 0x18000e660)
  • memset (Address: 0x18000e6c8)
  • strerror (Address: 0x18000e650)
  • swprintf_s (Address: 0x18000e608)
  • wcscmp (Address: 0x18000e6e0)
  • wcsrchr (Address: 0x18000e620)
  • wcsstr (Address: 0x18000e610)
ole32.dll
  • CoCreateInstance (Address: 0x18000e6f0)
  • CoInitialize (Address: 0x18000e710)
  • CoQueryProxyBlanket (Address: 0x18000e708)
  • CoSetProxyBlanket (Address: 0x18000e700)
  • CoTaskMemFree (Address: 0x18000e6f8)
OLEAUT32.dll
  • SysAllocString (Address: 0x18000e4a8)
  • SysFreeString (Address: 0x18000e4a0)
  • SysStringLen (Address: 0x18000e490)
  • VariantClear (Address: 0x18000e488)
  • VariantInit (Address: 0x18000e498)
SHELL32.dll
  • ShellExecuteExW (Address: 0x18000e4b8)
  • SHGetSpecialFolderPathW (Address: 0x18000e4c0)
SHLWAPI.dll
  • PathIsPrefixW (Address: 0x18000e4d0)
  • SHCreateStreamOnFileW (Address: 0x18000e4d8)
tdh.dll
  • TdhFormatProperty (Address: 0x18000e740)
  • TdhGetEventInformation (Address: 0x18000e728)
  • TdhGetEventMapInformation (Address: 0x18000e730)
  • TdhGetProperty (Address: 0x18000e738)
  • TdhGetPropertySize (Address: 0x18000e720)
TE.Common.dll
  • ?TryGetValue@?$RuntimeParameters@I@Private@TestExecution@WEX@@SAJPEBGAEAI@Z (Address: 0x18000e4e8)
  • ?TryGetValue@?$RuntimeParameters@VString@Common@WEX@@@Private@TestExecution@WEX@@SAJPEBGAEAVString@Common@4@@Z (Address: 0x18000e4f0)
USER32.dll
  • CloseDesktop (Address: 0x18000e520)
  • EnumDisplayDevicesW (Address: 0x18000e530)
  • GetShellWindow (Address: 0x18000e510)
  • GetSystemMetrics (Address: 0x18000e508)
  • GetWindowThreadProcessId (Address: 0x18000e500)
  • LoadStringW (Address: 0x18000e518)
  • OpenInputDesktop (Address: 0x18000e528)
Wex.Common.dll
  • ??0String@Common@WEX@@QEAA@XZ (Address: 0x18000e578)
  • ??1String@Common@WEX@@QEAA@XZ (Address: 0x18000e560)
  • ??4String@Common@WEX@@QEAAAEBV012@PEBG@Z (Address: 0x18000e580)
  • ??8Common@WEX@@YA_NAEBVString@01@PEBG@Z (Address: 0x18000e568)
  • ??BString@Common@WEX@@QEBAPEBGXZ (Address: 0x18000e570)
  • ?Message@Exception@Common@WEX@@QEBAPEBGXZ (Address: 0x18000e558)
Wex.Logger.dll
  • DoNotDiscard (Address: 0x18000e5a0)
  • Log_Trace (Address: 0x18000e5a8)
  • TAEF_TryGetUtf8ByteCountForWCharStringValue (Address: 0x18000e590)
  • TAEF_TryWriteUtf8ForWCharStringValue (Address: 0x18000e598)
WTSAPI32.dll
  • WTSFreeMemory (Address: 0x18000e548)
  • WTSQuerySessionInformationW (Address: 0x18000e540)
XmlLite.dll
  • CreateXmlReader (Address: 0x18000e5b8)