dxgi.dll
Description: Topaz Labs runtime patcher
Authors: Copyright (C) 2026
Version: 1.0.0.0
Architecture: 64-bit
Operating System: Windows NT
SHA256: a18a038d23454a4e67e25d02937f8112
File Size: 38.5 KB
Uploaded At: March 7, 2026, 6:43 a.m.
Views: 27
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory
Exported Functions
- ApplyCompatResolutionQuirking (Ordinal: 1, Address: 0x5514)
- CompatString (Ordinal: 2, Address: 0x55f0)
- CompatValue (Ordinal: 3, Address: 0x5618)
- DXGIDumpJournal (Ordinal: 4, Address: 0x562c)
- PIXBeginCapture (Ordinal: 5, Address: 0x5640)
- PIXEndCapture (Ordinal: 6, Address: 0x5654)
- PIXGetCaptureState (Ordinal: 7, Address: 0x5668)
- SetAppCompatStringPointer (Ordinal: 8, Address: 0x567c)
- UpdateHMDEmulationStatus (Ordinal: 9, Address: 0x5690)
- CreateDXGIFactory (Ordinal: 10, Address: 0x5528)
- CreateDXGIFactory1 (Ordinal: 11, Address: 0x553c)
- CreateDXGIFactory2 (Ordinal: 12, Address: 0x5550)
- DXGID3D10CreateDevice (Ordinal: 13, Address: 0x5564)
- DXGID3D10CreateLayeredDevice (Ordinal: 14, Address: 0x5578)
- DXGID3D10GetLayeredDeviceSize (Ordinal: 15, Address: 0x558c)
- DXGID3D10RegisterLayers (Ordinal: 16, Address: 0x55a0)
- DXGIDeclareAdapterRemovalSupport (Ordinal: 17, Address: 0x55b4)
- DXGIDisableVBlankVirtualization (Ordinal: 18, Address: 0x55c8)
- DXGIGetDebugInterface1 (Ordinal: 19, Address: 0x55dc)
- DXGIReportAdapterConfiguration (Ordinal: 20, Address: 0x5604)
Imported DLLs & Functions
ADVAPI32.dll
- RegCloseKey (Address: 0x180007010)
- RegOpenKeyExW (Address: 0x180007000)
- RegQueryValueExW (Address: 0x180007008)
KERNEL32.dll
- CloseHandle (Address: 0x180007098)
- CompareStringA (Address: 0x180007108)
- CreateActCtxW (Address: 0x1800070f8)
- CreateFileW (Address: 0x1800070f0)
- CreateMutexW (Address: 0x1800071b8)
- CreateToolhelp32Snapshot (Address: 0x180007120)
- DisableThreadLibraryCalls (Address: 0x1800071f8)
- ExitProcess (Address: 0x180007070)
- FlushInstructionCache (Address: 0x180007030)
- FormatMessageA (Address: 0x1800071d8)
- FormatMessageW (Address: 0x1800070a0)
- GetCurrentProcess (Address: 0x180007060)
- GetCurrentProcessId (Address: 0x180007068)
- GetCurrentThreadId (Address: 0x180007170)
- GetDateFormatW (Address: 0x180007118)
- GetEnvironmentVariableW (Address: 0x1800070d8)
- GetFileAttributesW (Address: 0x1800071e8)
- GetLastError (Address: 0x180007078)
- GetModuleFileNameW (Address: 0x1800070c8)
- GetModuleHandleW (Address: 0x1800070d0)
- GetProcAddress (Address: 0x1800071f0)
- GetProcessHeap (Address: 0x180007058)
- GetSystemDirectoryW (Address: 0x1800070e8)
- GetSystemInfo (Address: 0x180007148)
- GetSystemTime (Address: 0x1800071d0)
- GetThreadContext (Address: 0x180007188)
- GetThreadId (Address: 0x180007178)
- GetTimeFormatW (Address: 0x180007110)
- GetVersion (Address: 0x180007100)
- HeapAlloc (Address: 0x180007048)
- HeapCreate (Address: 0x180007158)
- HeapDestroy (Address: 0x180007160)
- HeapFree (Address: 0x180007050)
- HeapReAlloc (Address: 0x180007168)
- LoadLibraryW (Address: 0x1800070c0)
- LocalAlloc (Address: 0x180007020)
- LocalFree (Address: 0x180007028)
- lstrcatW (Address: 0x1800070a8)
- lstrcmpiW (Address: 0x1800071e0)
- lstrlenA (Address: 0x1800070b0)
- lstrlenW (Address: 0x1800070b8)
- Module32FirstW (Address: 0x180007128)
- Module32NextW (Address: 0x180007130)
- OpenThread (Address: 0x180007180)
- OutputDebugStringW (Address: 0x1800070e0)
- ReleaseMutex (Address: 0x1800071a8)
- ResumeThread (Address: 0x1800071a0)
- RtlCompareMemory (Address: 0x180007208)
- SetLastError (Address: 0x180007080)
- SetThreadContext (Address: 0x180007190)
- SuspendThread (Address: 0x180007198)
- Thread32First (Address: 0x1800071c0)
- Thread32Next (Address: 0x1800071c8)
- VirtualAlloc (Address: 0x180007138)
- VirtualFree (Address: 0x180007140)
- VirtualProtect (Address: 0x180007150)
- VirtualProtectEx (Address: 0x180007040)
- VirtualQuery (Address: 0x180007038)
- WaitForSingleObject (Address: 0x1800071b0)
- WideCharToMultiByte (Address: 0x180007200)
- WriteFile (Address: 0x180007090)
- WriteProcessMemory (Address: 0x180007088)
SHELL32.dll
- SHGetFolderPathW (Address: 0x180007218)