dxgi.dll

Description: Topaz Labs runtime patcher

Authors: Copyright (C) 2026

Version: 1.0.0.0

Architecture: 64-bit

Operating System: Windows NT

SHA256: a18a038d23454a4e67e25d02937f8112

File Size: 38.5 KB

Uploaded At: March 7, 2026, 6:43 a.m.

Views: 27

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: WriteProcessMemory

Exported Functions

  • ApplyCompatResolutionQuirking (Ordinal: 1, Address: 0x5514)
  • CompatString (Ordinal: 2, Address: 0x55f0)
  • CompatValue (Ordinal: 3, Address: 0x5618)
  • DXGIDumpJournal (Ordinal: 4, Address: 0x562c)
  • PIXBeginCapture (Ordinal: 5, Address: 0x5640)
  • PIXEndCapture (Ordinal: 6, Address: 0x5654)
  • PIXGetCaptureState (Ordinal: 7, Address: 0x5668)
  • SetAppCompatStringPointer (Ordinal: 8, Address: 0x567c)
  • UpdateHMDEmulationStatus (Ordinal: 9, Address: 0x5690)
  • CreateDXGIFactory (Ordinal: 10, Address: 0x5528)
  • CreateDXGIFactory1 (Ordinal: 11, Address: 0x553c)
  • CreateDXGIFactory2 (Ordinal: 12, Address: 0x5550)
  • DXGID3D10CreateDevice (Ordinal: 13, Address: 0x5564)
  • DXGID3D10CreateLayeredDevice (Ordinal: 14, Address: 0x5578)
  • DXGID3D10GetLayeredDeviceSize (Ordinal: 15, Address: 0x558c)
  • DXGID3D10RegisterLayers (Ordinal: 16, Address: 0x55a0)
  • DXGIDeclareAdapterRemovalSupport (Ordinal: 17, Address: 0x55b4)
  • DXGIDisableVBlankVirtualization (Ordinal: 18, Address: 0x55c8)
  • DXGIGetDebugInterface1 (Ordinal: 19, Address: 0x55dc)
  • DXGIReportAdapterConfiguration (Ordinal: 20, Address: 0x5604)

Imported DLLs & Functions

ADVAPI32.dll
  • RegCloseKey (Address: 0x180007010)
  • RegOpenKeyExW (Address: 0x180007000)
  • RegQueryValueExW (Address: 0x180007008)
KERNEL32.dll
  • CloseHandle (Address: 0x180007098)
  • CompareStringA (Address: 0x180007108)
  • CreateActCtxW (Address: 0x1800070f8)
  • CreateFileW (Address: 0x1800070f0)
  • CreateMutexW (Address: 0x1800071b8)
  • CreateToolhelp32Snapshot (Address: 0x180007120)
  • DisableThreadLibraryCalls (Address: 0x1800071f8)
  • ExitProcess (Address: 0x180007070)
  • FlushInstructionCache (Address: 0x180007030)
  • FormatMessageA (Address: 0x1800071d8)
  • FormatMessageW (Address: 0x1800070a0)
  • GetCurrentProcess (Address: 0x180007060)
  • GetCurrentProcessId (Address: 0x180007068)
  • GetCurrentThreadId (Address: 0x180007170)
  • GetDateFormatW (Address: 0x180007118)
  • GetEnvironmentVariableW (Address: 0x1800070d8)
  • GetFileAttributesW (Address: 0x1800071e8)
  • GetLastError (Address: 0x180007078)
  • GetModuleFileNameW (Address: 0x1800070c8)
  • GetModuleHandleW (Address: 0x1800070d0)
  • GetProcAddress (Address: 0x1800071f0)
  • GetProcessHeap (Address: 0x180007058)
  • GetSystemDirectoryW (Address: 0x1800070e8)
  • GetSystemInfo (Address: 0x180007148)
  • GetSystemTime (Address: 0x1800071d0)
  • GetThreadContext (Address: 0x180007188)
  • GetThreadId (Address: 0x180007178)
  • GetTimeFormatW (Address: 0x180007110)
  • GetVersion (Address: 0x180007100)
  • HeapAlloc (Address: 0x180007048)
  • HeapCreate (Address: 0x180007158)
  • HeapDestroy (Address: 0x180007160)
  • HeapFree (Address: 0x180007050)
  • HeapReAlloc (Address: 0x180007168)
  • LoadLibraryW (Address: 0x1800070c0)
  • LocalAlloc (Address: 0x180007020)
  • LocalFree (Address: 0x180007028)
  • lstrcatW (Address: 0x1800070a8)
  • lstrcmpiW (Address: 0x1800071e0)
  • lstrlenA (Address: 0x1800070b0)
  • lstrlenW (Address: 0x1800070b8)
  • Module32FirstW (Address: 0x180007128)
  • Module32NextW (Address: 0x180007130)
  • OpenThread (Address: 0x180007180)
  • OutputDebugStringW (Address: 0x1800070e0)
  • ReleaseMutex (Address: 0x1800071a8)
  • ResumeThread (Address: 0x1800071a0)
  • RtlCompareMemory (Address: 0x180007208)
  • SetLastError (Address: 0x180007080)
  • SetThreadContext (Address: 0x180007190)
  • SuspendThread (Address: 0x180007198)
  • Thread32First (Address: 0x1800071c0)
  • Thread32Next (Address: 0x1800071c8)
  • VirtualAlloc (Address: 0x180007138)
  • VirtualFree (Address: 0x180007140)
  • VirtualProtect (Address: 0x180007150)
  • VirtualProtectEx (Address: 0x180007040)
  • VirtualQuery (Address: 0x180007038)
  • WaitForSingleObject (Address: 0x1800071b0)
  • WideCharToMultiByte (Address: 0x180007200)
  • WriteFile (Address: 0x180007090)
  • WriteProcessMemory (Address: 0x180007088)
SHELL32.dll
  • SHGetFolderPathW (Address: 0x180007218)