microsoft.windows.softwarelogo.direct3d.tests.dll
Description: Tailored Application D3D Feature Level Support Certification Tests
Authors: © Microsoft Corporation. All rights reserved.
Version: 10.0.26100.4654
Architecture: 64-bit
Operating System: Windows NT
SHA256: e1486660c6f51163415f71430c21158b
File Size: 106.3 KB
Uploaded At: Dec. 3, 2025, 2:36 a.m.
Views: 7
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: OpenProcess
Exported Functions
No exported functions.
Imported DLLs & Functions
ADVAPI32.dll
- AllocateAndInitializeSid (Address: 0x18000e278)
- CloseTrace (Address: 0x18000e268)
- ControlTraceW (Address: 0x18000e2d8)
- CreateProcessWithTokenW (Address: 0x18000e290)
- DuplicateTokenEx (Address: 0x18000e2e8)
- EnableTrace (Address: 0x18000e240)
- EnableTraceEx2 (Address: 0x18000e298)
- FreeSid (Address: 0x18000e2b8)
- InitializeSecurityDescriptor (Address: 0x18000e2c0)
- OpenProcessToken (Address: 0x18000e2b0)
- OpenTraceW (Address: 0x18000e238)
- ProcessTrace (Address: 0x18000e260)
- RegCloseKey (Address: 0x18000e258)
- RegCreateKeyExW (Address: 0x18000e288)
- RegDeleteKeyW (Address: 0x18000e270)
- RegDeleteValueW (Address: 0x18000e2e0)
- RegEnumKeyExW (Address: 0x18000e228)
- RegGetValueW (Address: 0x18000e2d0)
- RegOpenKeyExW (Address: 0x18000e2c8)
- RegQueryValueExW (Address: 0x18000e230)
- RegSetKeySecurity (Address: 0x18000e2a0)
- RegSetValueExW (Address: 0x18000e2a8)
- SetEntriesInAclW (Address: 0x18000e280)
- SetSecurityDescriptorDacl (Address: 0x18000e248)
- StartTraceW (Address: 0x18000e250)
d3d11.dll
- D3D11CreateDevice (Address: 0x18000e5c8)
GDI32.dll
- CreateDCW (Address: 0x18000e2f8)
- DeleteDC (Address: 0x18000e300)
KERNEL32.dll
- AddDllDirectory (Address: 0x18000e408)
- CloseHandle (Address: 0x18000e368)
- ClosePackageInfo (Address: 0x18000e458)
- CompareStringEx (Address: 0x18000e370)
- CreateEventW (Address: 0x18000e328)
- CreateThread (Address: 0x18000e380)
- DebugBreak (Address: 0x18000e3b0)
- DeleteFileW (Address: 0x18000e360)
- FreeLibrary (Address: 0x18000e448)
- GetCurrentProcess (Address: 0x18000e470)
- GetCurrentProcessId (Address: 0x18000e3c0)
- GetCurrentThreadId (Address: 0x18000e3c8)
- GetFileAttributesW (Address: 0x18000e428)
- GetFullPathNameW (Address: 0x18000e460)
- GetLastError (Address: 0x18000e438)
- GetLongPathNameW (Address: 0x18000e468)
- GetModuleHandleW (Address: 0x18000e398)
- GetProcAddress (Address: 0x18000e440)
- GetSystemTimeAsFileTime (Address: 0x18000e3d0)
- GetTickCount (Address: 0x18000e3d8)
- GetVersionExW (Address: 0x18000e320)
- K32EnumProcesses (Address: 0x18000e388)
- K32EnumProcessModulesEx (Address: 0x18000e310)
- K32GetModuleBaseNameW (Address: 0x18000e350)
- K32GetModuleFileNameExW (Address: 0x18000e410)
- K32GetModuleInformation (Address: 0x18000e378)
- LoadLibraryExW (Address: 0x18000e450)
- LoadLibraryW (Address: 0x18000e420)
- LocalAlloc (Address: 0x18000e330)
- LocalFree (Address: 0x18000e390)
- OpenPackageInfoByFullName (Address: 0x18000e3a0)
- OpenProcess (Address: 0x18000e430)
- QueryFullProcessImageNameW (Address: 0x18000e3a8)
- QueryPerformanceCounter (Address: 0x18000e3b8)
- ResumeThread (Address: 0x18000e318)
- RtlCaptureContext (Address: 0x18000e3e0)
- RtlLookupFunctionEntry (Address: 0x18000e3e8)
- RtlVirtualUnwind (Address: 0x18000e3f0)
- SetEvent (Address: 0x18000e358)
- SetUnhandledExceptionFilter (Address: 0x18000e400)
- Sleep (Address: 0x18000e340)
- TerminateProcess (Address: 0x18000e418)
- UnhandledExceptionFilter (Address: 0x18000e3f8)
- WaitForSingleObject (Address: 0x18000e338)
- Wow64DisableWow64FsRedirection (Address: 0x18000e478)
- Wow64RevertWow64FsRedirection (Address: 0x18000e348)
msvcrt.dll
- __C_specific_handler (Address: 0x18000e6a0)
- __CxxFrameHandler3 (Address: 0x18000e688)
- __dllonexit (Address: 0x18000e6b8)
- _amsg_exit (Address: 0x18000e670)
- _callnewh (Address: 0x18000e638)
- _CxxThrowException (Address: 0x18000e640)
- _initterm (Address: 0x18000e680)
- _lock (Address: 0x18000e698)
- _onexit (Address: 0x18000e6c0)
- _purecall (Address: 0x18000e6d8)
- _unlock (Address: 0x18000e6b0)
- _vsnwprintf (Address: 0x18000e6a8)
- _wcsicmp (Address: 0x18000e5d8)
- _XcptFilter (Address: 0x18000e668)
- ??_V@YAXPEAX@Z (Address: 0x18000e6d0)
- ??0exception@@QEAA@AEBQEBD@Z (Address: 0x18000e5f8)
- ??0exception@@QEAA@AEBQEBDH@Z (Address: 0x18000e630)
- ??0exception@@QEAA@AEBV0@@Z (Address: 0x18000e600)
- ??1exception@@UEAA@XZ (Address: 0x18000e5f0)
- ??1type_info@@UEAA@XZ (Address: 0x18000e690)
- ??3@YAXPEAX@Z (Address: 0x18000e5e0)
- ?what@exception@@UEBAPEBDXZ (Address: 0x18000e5e8)
- free (Address: 0x18000e678)
- isspace (Address: 0x18000e618)
- malloc (Address: 0x18000e628)
- memcpy (Address: 0x18000e658)
- memcpy_s (Address: 0x18000e648)
- memmove (Address: 0x18000e660)
- memset (Address: 0x18000e6c8)
- strerror (Address: 0x18000e650)
- swprintf_s (Address: 0x18000e608)
- wcscmp (Address: 0x18000e6e0)
- wcsrchr (Address: 0x18000e620)
- wcsstr (Address: 0x18000e610)
ole32.dll
- CoCreateInstance (Address: 0x18000e6f0)
- CoInitialize (Address: 0x18000e710)
- CoQueryProxyBlanket (Address: 0x18000e708)
- CoSetProxyBlanket (Address: 0x18000e700)
- CoTaskMemFree (Address: 0x18000e6f8)
OLEAUT32.dll
- SysAllocString (Address: 0x18000e4a8)
- SysFreeString (Address: 0x18000e4a0)
- SysStringLen (Address: 0x18000e490)
- VariantClear (Address: 0x18000e488)
- VariantInit (Address: 0x18000e498)
SHELL32.dll
- ShellExecuteExW (Address: 0x18000e4b8)
- SHGetSpecialFolderPathW (Address: 0x18000e4c0)
SHLWAPI.dll
- PathIsPrefixW (Address: 0x18000e4d0)
- SHCreateStreamOnFileW (Address: 0x18000e4d8)
tdh.dll
- TdhFormatProperty (Address: 0x18000e740)
- TdhGetEventInformation (Address: 0x18000e728)
- TdhGetEventMapInformation (Address: 0x18000e730)
- TdhGetProperty (Address: 0x18000e738)
- TdhGetPropertySize (Address: 0x18000e720)
TE.Common.dll
- ?TryGetValue@?$RuntimeParameters@I@Private@TestExecution@WEX@@SAJPEBGAEAI@Z (Address: 0x18000e4e8)
- ?TryGetValue@?$RuntimeParameters@VString@Common@WEX@@@Private@TestExecution@WEX@@SAJPEBGAEAVString@Common@4@@Z (Address: 0x18000e4f0)
USER32.dll
- CloseDesktop (Address: 0x18000e520)
- EnumDisplayDevicesW (Address: 0x18000e530)
- GetShellWindow (Address: 0x18000e510)
- GetSystemMetrics (Address: 0x18000e508)
- GetWindowThreadProcessId (Address: 0x18000e500)
- LoadStringW (Address: 0x18000e518)
- OpenInputDesktop (Address: 0x18000e528)
Wex.Common.dll
- ??0String@Common@WEX@@QEAA@XZ (Address: 0x18000e578)
- ??1String@Common@WEX@@QEAA@XZ (Address: 0x18000e560)
- ??4String@Common@WEX@@QEAAAEBV012@PEBG@Z (Address: 0x18000e580)
- ??8Common@WEX@@YA_NAEBVString@01@PEBG@Z (Address: 0x18000e568)
- ??BString@Common@WEX@@QEBAPEBGXZ (Address: 0x18000e570)
- ?Message@Exception@Common@WEX@@QEBAPEBGXZ (Address: 0x18000e558)
Wex.Logger.dll
- DoNotDiscard (Address: 0x18000e5a0)
- Log_Trace (Address: 0x18000e5a8)
- TAEF_TryGetUtf8ByteCountForWCharStringValue (Address: 0x18000e590)
- TAEF_TryWriteUtf8ForWCharStringValue (Address: 0x18000e598)
WTSAPI32.dll
- WTSFreeMemory (Address: 0x18000e548)
- WTSQuerySessionInformationW (Address: 0x18000e540)
XmlLite.dll
- CreateXmlReader (Address: 0x18000e5b8)