sbe.dll

Description: DirectShow Stream Buffer Filter.

Authors: © Microsoft Corporation. All rights reserved.

Version: 10.0.19041.1

Architecture: 64-bit

Operating System: Windows NT

SHA256: 4e377499e69dc87a7ca725d937655066

File Size: 941.5 KB

Uploaded At: Dec. 1, 2025, 7:38 a.m.

Views: 5

Exported Functions

  • DllCanUnloadNow (Ordinal: 1, Address: 0x1490)
  • DllGetClassObject (Ordinal: 2, Address: 0x1350)
  • DllRegisterServer (Ordinal: 3, Address: 0x12a0)
  • DllUnregisterServer (Ordinal: 4, Address: 0x1300)

Imported DLLs & Functions

ADVAPI32.dll
  • AddAccessAllowedAce (Address: 0x11ffcca78)
  • AddAccessAllowedAceEx (Address: 0x11ffccad8)
  • AddAce (Address: 0x11ffccae8)
  • AllocateAndInitializeSid (Address: 0x11ffcca08)
  • BuildTrusteeWithSidW (Address: 0x11ffccaa8)
  • CopySid (Address: 0x11ffccaf0)
  • CreateWellKnownSid (Address: 0x11ffcca68)
  • EqualSid (Address: 0x11ffcca98)
  • FreeSid (Address: 0x11ffcca18)
  • GetAce (Address: 0x11ffcca90)
  • GetAclInformation (Address: 0x11ffcca88)
  • GetLengthSid (Address: 0x11ffcca20)
  • GetNamedSecurityInfoW (Address: 0x11ffccac8)
  • GetSidSubAuthority (Address: 0x11ffcca60)
  • GetSidSubAuthorityCount (Address: 0x11ffcca58)
  • GetTokenInformation (Address: 0x11ffcca80)
  • InitializeAcl (Address: 0x11ffccae0)
  • InitializeSecurityDescriptor (Address: 0x11ffccab0)
  • IsValidSid (Address: 0x11ffcca10)
  • OpenProcessToken (Address: 0x11ffcca70)
  • RegCloseKey (Address: 0x11ffcca48)
  • RegCreateKeyExW (Address: 0x11ffcca30)
  • RegDeleteKeyW (Address: 0x11ffcca38)
  • RegEnumKeyExW (Address: 0x11ffcca40)
  • RegOpenKeyExW (Address: 0x11ffcca50)
  • RegQueryValueExW (Address: 0x11ffccaa0)
  • RegSetValueExW (Address: 0x11ffcca28)
  • SetEntriesInAclW (Address: 0x11ffccab8)
  • SetNamedSecurityInfoW (Address: 0x11ffccad0)
  • SetSecurityDescriptorDacl (Address: 0x11ffccac0)
api-ms-win-core-path-l1-1-0.dll
  • PathCchAppend (Address: 0x11ffccff0)
  • PathCchCombine (Address: 0x11ffccfe8)
gdiplus.dll
  • GdipAlloc (Address: 0x11ffcd030)
  • GdipCloneImage (Address: 0x11ffcd020)
  • GdipCreateBitmapFromScan0 (Address: 0x11ffcd070)
  • GdipCreateBitmapFromStream (Address: 0x11ffcd028)
  • GdipCreateHBITMAPFromBitmap (Address: 0x11ffcd048)
  • GdipDeleteGraphics (Address: 0x11ffcd060)
  • GdipDisposeImage (Address: 0x11ffcd040)
  • GdipDrawImageRectI (Address: 0x11ffcd038)
  • GdipFree (Address: 0x11ffcd050)
  • GdipGetImageDimension (Address: 0x11ffcd018)
  • GdipGetImageEncoders (Address: 0x11ffcd010)
  • GdipGetImageEncodersSize (Address: 0x11ffcd078)
  • GdipGetImageGraphicsContext (Address: 0x11ffcd058)
  • GdiplusShutdown (Address: 0x11ffcd008)
  • GdiplusStartup (Address: 0x11ffcd000)
  • GdipSaveImageToStream (Address: 0x11ffcd068)
KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x11ffccea0)
  • CloseHandle (Address: 0x11ffccb10)
  • CompareStringA (Address: 0x11ffccce0)
  • CompareStringW (Address: 0x11ffcccc0)
  • CreateDirectoryW (Address: 0x11ffccca0)
  • CreateEventExW (Address: 0x11ffcce30)
  • CreateEventW (Address: 0x11ffccb18)
  • CreateFileMappingW (Address: 0x11ffccce8)
  • CreateFileW (Address: 0x11ffccc08)
  • CreateHardLinkW (Address: 0x11ffccd20)
  • CreateIoCompletionPort (Address: 0x11ffccd88)
  • CreateMutexW (Address: 0x11ffcccf8)
  • CreateSemaphoreW (Address: 0x11ffccec0)
  • CreateThread (Address: 0x11ffccb68)
  • DeleteCriticalSection (Address: 0x11ffccb08)
  • DeleteFileW (Address: 0x11ffccc18)
  • DeviceIoControl (Address: 0x11ffcce20)
  • DisableThreadLibraryCalls (Address: 0x11ffcce68)
  • DuplicateHandle (Address: 0x11ffccb30)
  • EnterCriticalSection (Address: 0x11ffcce28)
  • ExpandEnvironmentStringsW (Address: 0x11ffccc78)
  • FileTimeToSystemTime (Address: 0x11ffccc20)
  • FindClose (Address: 0x11ffccd28)
  • FindFirstFileW (Address: 0x11ffccd18)
  • FlushFileBuffers (Address: 0x11ffcce08)
  • FlushViewOfFile (Address: 0x11ffccd58)
  • FreeLibrary (Address: 0x11ffccc98)
  • FreeLibraryAndExitThread (Address: 0x11ffccdc0)
  • GetCurrentProcess (Address: 0x11ffcce80)
  • GetCurrentProcessId (Address: 0x11ffccba8)
  • GetCurrentThread (Address: 0x11ffccb88)
  • GetCurrentThreadId (Address: 0x11ffccb28)
  • GetDiskFreeSpaceExW (Address: 0x11ffcce10)
  • GetDiskFreeSpaceW (Address: 0x11ffcce18)
  • GetFileAttributesW (Address: 0x11ffccbd0)
  • GetFileInformationByHandle (Address: 0x11ffccd50)
  • GetFileInformationByHandleEx (Address: 0x11ffccda0)
  • GetFileSize (Address: 0x11ffcce38)
  • GetFileSizeEx (Address: 0x11ffccda8)
  • GetFinalPathNameByHandleW (Address: 0x11ffccd90)
  • GetFullPathNameW (Address: 0x11ffccc10)
  • GetLastError (Address: 0x11ffcce50)
  • GetModuleFileNameA (Address: 0x11ffcce58)
  • GetModuleHandleExW (Address: 0x11ffccdb0)
  • GetModuleHandleW (Address: 0x11ffccb70)
  • GetOverlappedResult (Address: 0x11ffccdd0)
  • GetProcAddress (Address: 0x11ffccb78)
  • GetProcessHeap (Address: 0x11ffccbf0)
  • GetQueuedCompletionStatus (Address: 0x11ffccd80)
  • GetSystemInfo (Address: 0x11ffccb50)
  • GetSystemTimeAsFileTime (Address: 0x11ffccbb0)
  • GetTempFileNameW (Address: 0x11ffccd68)
  • GetTempPathW (Address: 0x11ffcce70)
  • GetTickCount (Address: 0x11ffccb80)
  • GetTickCount64 (Address: 0x11ffccc68)
  • GetUserDefaultLangID (Address: 0x11ffccc58)
  • GetVersionExW (Address: 0x11ffcce40)
  • GlobalAlloc (Address: 0x11ffccc28)
  • GlobalFree (Address: 0x11ffccc30)
  • GlobalLock (Address: 0x11ffccc38)
  • GlobalUnlock (Address: 0x11ffccc48)
  • HeapAlloc (Address: 0x11ffccbe8)
  • HeapFree (Address: 0x11ffccbd8)
  • HeapReAlloc (Address: 0x11ffccbe0)
  • InitializeCriticalSection (Address: 0x11ffccb00)
  • InitializeSListHead (Address: 0x11ffccdf0)
  • InterlockedPopEntrySList (Address: 0x11ffccdf8)
  • InterlockedPushEntrySList (Address: 0x11ffccde0)
  • LeaveCriticalSection (Address: 0x11ffccc50)
  • LoadLibraryExA (Address: 0x11ffcceb0)
  • LoadLibraryW (Address: 0x11ffccc88)
  • LocalAlloc (Address: 0x11ffccc80)
  • LocalFree (Address: 0x11ffccc90)
  • lstrcmpiW (Address: 0x11ffccbf8)
  • lstrcmpW (Address: 0x11ffcce88)
  • lstrlenW (Address: 0x11ffccca8)
  • MapViewOfFile (Address: 0x11ffcccf0)
  • MulDiv (Address: 0x11ffccec8)
  • MultiByteToWideChar (Address: 0x11ffcce48)
  • OpenEventW (Address: 0x11ffccd40)
  • OpenFileMappingW (Address: 0x11ffccd48)
  • OpenMutexW (Address: 0x11ffccd08)
  • OutputDebugStringA (Address: 0x11ffcce78)
  • PostQueuedCompletionStatus (Address: 0x11ffccdc8)
  • QueryDepthSList (Address: 0x11ffcce00)
  • QueryFullProcessImageNameW (Address: 0x11ffcce60)
  • QueryPerformanceCounter (Address: 0x11ffccba0)
  • QueryPerformanceFrequency (Address: 0x11ffccc70)
  • QueueUserWorkItem (Address: 0x11ffccc60)
  • RaiseException (Address: 0x11ffcce98)
  • ReadFile (Address: 0x11ffcccb8)
  • ReadFileScatter (Address: 0x11ffccde8)
  • RegisterWaitForSingleObject (Address: 0x11ffccd30)
  • ReleaseMutex (Address: 0x11ffccd00)
  • ReleaseSemaphore (Address: 0x11ffccb48)
  • ReleaseSRWLockExclusive (Address: 0x11ffccea8)
  • RemoveDirectoryW (Address: 0x11ffccd38)
  • ReOpenFile (Address: 0x11ffccdb8)
  • ResetEvent (Address: 0x11ffccb20)
  • SetEndOfFile (Address: 0x11ffcccc8)
  • SetEvent (Address: 0x11ffccb38)
  • SetFileAttributesW (Address: 0x11ffcccb0)
  • SetFileBandwidthReservation (Address: 0x11ffccd78)
  • SetFilePointerEx (Address: 0x11ffcccd0)
  • SetFileValidData (Address: 0x11ffcced0)
  • SetLastError (Address: 0x11ffccd70)
  • SetThreadPriority (Address: 0x11ffccb90)
  • SetUnhandledExceptionFilter (Address: 0x11ffccbc0)
  • Sleep (Address: 0x11ffccb98)
  • SystemTimeToFileTime (Address: 0x11ffccc40)
  • TerminateProcess (Address: 0x11ffccbc8)
  • TryEnterCriticalSection (Address: 0x11ffccd10)
  • UnhandledExceptionFilter (Address: 0x11ffccbb8)
  • UnmapViewOfFile (Address: 0x11ffcccd8)
  • UnregisterWaitEx (Address: 0x11ffccd60)
  • VirtualAlloc (Address: 0x11ffccb58)
  • VirtualFree (Address: 0x11ffccb60)
  • VirtualProtect (Address: 0x11ffcceb8)
  • VirtualQuery (Address: 0x11ffcce90)
  • WaitForMultipleObjects (Address: 0x11ffccd98)
  • WaitForSingleObject (Address: 0x11ffccb40)
  • WriteFile (Address: 0x11ffccc00)
  • WriteFileGather (Address: 0x11ffccdd8)
msvcrt.dll
  • __C_specific_handler (Address: 0x11ffcd0f8)
  • __dllonexit (Address: 0x11ffcd0e0)
  • _amsg_exit (Address: 0x11ffcd108)
  • _callnewh (Address: 0x11ffcd0b8)
  • _initterm (Address: 0x11ffcd100)
  • _lock (Address: 0x11ffcd0f0)
  • _onexit (Address: 0x11ffcd0d8)
  • _purecall (Address: 0x11ffcd0a8)
  • _snwprintf_s (Address: 0x11ffcd150)
  • _unlock (Address: 0x11ffcd0e8)
  • _vsnwprintf (Address: 0x11ffcd130)
  • _vsnwprintf_s (Address: 0x11ffcd0a0)
  • _wcsicmp (Address: 0x11ffcd148)
  • _XcptFilter (Address: 0x11ffcd120)
  • ceil (Address: 0x11ffcd118)
  • free (Address: 0x11ffcd0b0)
  • log (Address: 0x11ffcd110)
  • malloc (Address: 0x11ffcd0c0)
  • memcmp (Address: 0x11ffcd090)
  • memcpy (Address: 0x11ffcd128)
  • memcpy_s (Address: 0x11ffcd158)
  • memmove (Address: 0x11ffcd088)
  • memset (Address: 0x11ffcd0c8)
  • qsort (Address: 0x11ffcd140)
  • sqrt (Address: 0x11ffcd0d0)
  • swprintf_s (Address: 0x11ffcd168)
  • wcschr (Address: 0x11ffcd178)
  • wcscmp (Address: 0x11ffcd180)
  • wcscpy_s (Address: 0x11ffcd138)
  • wcsncpy_s (Address: 0x11ffcd160)
  • wcsrchr (Address: 0x11ffcd170)
  • wcsstr (Address: 0x11ffcd098)
ntdll.dll
  • RtlCaptureContext (Address: 0x11ffcd190)
  • RtlLookupFunctionEntry (Address: 0x11ffcd1a0)
  • RtlVirtualUnwind (Address: 0x11ffcd198)
ole32.dll
  • CoCreateGuid (Address: 0x11ffcd1b8)
  • CoCreateInstance (Address: 0x11ffcd1c0)
  • CoFreeUnusedLibraries (Address: 0x11ffcd200)
  • CoGetMalloc (Address: 0x11ffcd1f0)
  • CoInitializeEx (Address: 0x11ffcd1c8)
  • CoTaskMemAlloc (Address: 0x11ffcd1d8)
  • CoTaskMemFree (Address: 0x11ffcd1e0)
  • CoUninitialize (Address: 0x11ffcd1b0)
  • CreateStreamOnHGlobal (Address: 0x11ffcd1f8)
  • PropVariantClear (Address: 0x11ffcd1e8)
  • StringFromGUID2 (Address: 0x11ffcd1d0)
RPCRT4.dll
  • CStdStubBuffer_AddRef (Address: 0x11ffccf80)
  • CStdStubBuffer_Connect (Address: 0x11ffccf30)
  • CStdStubBuffer_CountRefs (Address: 0x11ffccef8)
  • CStdStubBuffer_DebugServerQueryInterface (Address: 0x11ffccf70)
  • CStdStubBuffer_DebugServerRelease (Address: 0x11ffccf58)
  • CStdStubBuffer_Disconnect (Address: 0x11ffccf50)
  • CStdStubBuffer_Invoke (Address: 0x11ffccf10)
  • CStdStubBuffer_IsIIDSupported (Address: 0x11ffccf38)
  • CStdStubBuffer_QueryInterface (Address: 0x11ffccf68)
  • IUnknown_AddRef_Proxy (Address: 0x11ffccf20)
  • IUnknown_QueryInterface_Proxy (Address: 0x11ffccf48)
  • IUnknown_Release_Proxy (Address: 0x11ffccf78)
  • NdrCStdStubBuffer_Release (Address: 0x11ffccf08)
  • NdrCStdStubBuffer2_Release (Address: 0x11ffccee0)
  • NdrDllCanUnloadNow (Address: 0x11ffccf00)
  • NdrDllGetClassObject (Address: 0x11ffccee8)
  • NdrDllRegisterProxy (Address: 0x11ffccf90)
  • NdrDllUnregisterProxy (Address: 0x11ffccef0)
  • NdrOleAllocate (Address: 0x11ffccf60)
  • NdrOleFree (Address: 0x11ffccf88)
  • NdrStubCall3 (Address: 0x11ffccf40)
  • NdrStubForwardingFunction (Address: 0x11ffccf18)
  • UuidCreate (Address: 0x11ffccf28)
SHELL32.dll
  • SHGetKnownFolderPath (Address: 0x11ffccfa0)
SHLWAPI.dll
  • PathFileExistsW (Address: 0x11ffccfb0)
WINMM.dll
  • timeBeginPeriod (Address: 0x11ffccfc8)
  • timeEndPeriod (Address: 0x11ffccfd0)
  • timeGetDevCaps (Address: 0x11ffccfc0)
  • timeGetTime (Address: 0x11ffccfd8)