DeviceReactivation.dll
Description: DeviceReactivation
Authors: © Microsoft Corporation. All rights reserved.
Version: 10.0.19041.6456
Architecture: 32-bit
Operating System: Windows NT
SHA256: c54d278fb6c9e0e4d561048c011b50cc
File Size: 68.9 KB
Uploaded At: Dec. 1, 2025, 7:55 a.m.
Views: 4
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: OpenProcess
Exported Functions
- DllCanUnloadNow (Ordinal: 1, Address: 0x5e30)
- DllGetActivationFactory (Ordinal: 2, Address: 0x5dc0)
- DllGetClassObject (Ordinal: 3, Address: 0x5de0)
Imported DLLs & Functions
api-ms-win-core-com-midlproxystub-l1-1-0.dll
- CStdStubBuffer2_Connect (Address: 0x1000e074)
- CStdStubBuffer2_CountRefs (Address: 0x1000e060)
- CStdStubBuffer2_Disconnect (Address: 0x1000e064)
- CStdStubBuffer2_QueryInterface (Address: 0x1000e058)
- NdrProxyForwardingFunction3 (Address: 0x1000e070)
- NdrProxyForwardingFunction4 (Address: 0x1000e05c)
- NdrProxyForwardingFunction5 (Address: 0x1000e078)
- ObjectStublessClient3 (Address: 0x1000e054)
- ObjectStublessClient6 (Address: 0x1000e068)
- ObjectStublessClient7 (Address: 0x1000e07c)
- ObjectStublessClient8 (Address: 0x1000e06c)
api-ms-win-core-debug-l1-1-0.dll
- DebugBreak (Address: 0x1000e08c)
- IsDebuggerPresent (Address: 0x1000e084)
- OutputDebugStringW (Address: 0x1000e088)
api-ms-win-core-delayload-l1-1-0.dll
- DelayLoadFailureHook (Address: 0x1000e094)
api-ms-win-core-delayload-l1-1-1.dll
- ResolveDelayLoadedAPI (Address: 0x1000e09c)
api-ms-win-core-errorhandling-l1-1-0.dll
- GetLastError (Address: 0x1000e0ac)
- RaiseException (Address: 0x1000e0b0)
- SetLastError (Address: 0x1000e0a8)
- SetUnhandledExceptionFilter (Address: 0x1000e0b4)
- UnhandledExceptionFilter (Address: 0x1000e0a4)
api-ms-win-core-handle-l1-1-0.dll
- CloseHandle (Address: 0x1000e0bc)
api-ms-win-core-heap-l1-1-0.dll
- GetProcessHeap (Address: 0x1000e0cc)
- HeapAlloc (Address: 0x1000e0c4)
- HeapFree (Address: 0x1000e0c8)
api-ms-win-core-libraryloader-l1-2-0.dll
- DisableThreadLibraryCalls (Address: 0x1000e0e4)
- GetModuleFileNameA (Address: 0x1000e0dc)
- GetModuleHandleExW (Address: 0x1000e0d8)
- GetModuleHandleW (Address: 0x1000e0e0)
- GetProcAddress (Address: 0x1000e0d4)
api-ms-win-core-localization-l1-2-0.dll
- FormatMessageW (Address: 0x1000e0ec)
api-ms-win-core-processthreads-l1-1-0.dll
- GetCurrentProcess (Address: 0x1000e0f8)
- GetCurrentProcessId (Address: 0x1000e100)
- GetCurrentThreadId (Address: 0x1000e0fc)
- OpenProcessToken (Address: 0x1000e0f4)
- TerminateProcess (Address: 0x1000e104)
api-ms-win-core-processthreads-l1-1-1.dll
- OpenProcess (Address: 0x1000e10c)
api-ms-win-core-profile-l1-1-0.dll
- QueryPerformanceCounter (Address: 0x1000e114)
api-ms-win-core-registry-l1-1-0.dll
- RegGetValueW (Address: 0x1000e11c)
api-ms-win-core-synch-l1-1-0.dll
- AcquireSRWLockExclusive (Address: 0x1000e12c)
- AcquireSRWLockShared (Address: 0x1000e140)
- CreateMutexExW (Address: 0x1000e138)
- CreateSemaphoreExW (Address: 0x1000e144)
- OpenSemaphoreW (Address: 0x1000e148)
- ReleaseMutex (Address: 0x1000e134)
- ReleaseSemaphore (Address: 0x1000e14c)
- ReleaseSRWLockExclusive (Address: 0x1000e13c)
- ReleaseSRWLockShared (Address: 0x1000e130)
- WaitForSingleObject (Address: 0x1000e128)
- WaitForSingleObjectEx (Address: 0x1000e124)
api-ms-win-core-synch-l1-2-0.dll
- InitOnceExecuteOnce (Address: 0x1000e154)
- Sleep (Address: 0x1000e158)
api-ms-win-core-sysinfo-l1-1-0.dll
- GetSystemTimeAsFileTime (Address: 0x1000e164)
- GetTickCount (Address: 0x1000e160)
api-ms-win-core-util-l1-1-0.dll
- DecodePointer (Address: 0x1000e170)
- EncodePointer (Address: 0x1000e16c)
api-ms-win-core-winrt-l1-1-0.dll
- RoGetActivationFactory (Address: 0x1000e178)
api-ms-win-security-base-l1-1-0.dll
- DuplicateTokenEx (Address: 0x1000e184)
- GetTokenInformation (Address: 0x1000e180)
api-ms-win-shcore-taskpool-l1-1-0.dll
- SHTaskPoolAllowThreadReuse (Address: 0x1000e190)
- SHTaskPoolQueueTask (Address: 0x1000e18c)
msvcrt.dll
- __CxxFrameHandler3 (Address: 0x1000e19c)
- __dllonexit (Address: 0x1000e200)
- _amsg_exit (Address: 0x1000e1a8)
- _callnewh (Address: 0x1000e1f0)
- _CxxThrowException (Address: 0x1000e1e0)
- _except_handler4_common (Address: 0x1000e1cc)
- _initterm (Address: 0x1000e1c0)
- _lock (Address: 0x1000e1f4)
- _onexit (Address: 0x1000e1ac)
- _purecall (Address: 0x1000e1fc)
- _unlock (Address: 0x1000e1f8)
- _vsnprintf_s (Address: 0x1000e198)
- _vsnwprintf (Address: 0x1000e1a0)
- _XcptFilter (Address: 0x1000e1a4)
- ??0exception@@QAE@ABQBD@Z (Address: 0x1000e1ec)
- ??0exception@@QAE@ABQBDH@Z (Address: 0x1000e1e8)
- ??0exception@@QAE@ABV0@@Z (Address: 0x1000e1d4)
- ??0exception@@QAE@XZ (Address: 0x1000e208)
- ??1exception@@UAE@XZ (Address: 0x1000e1b0)
- ??1type_info@@UAE@XZ (Address: 0x1000e1d0)
- ??3@YAXPAX@Z (Address: 0x1000e1b4)
- ?terminate@@YAXXZ (Address: 0x1000e204)
- ?what@exception@@UBEPBDXZ (Address: 0x1000e1e4)
- free (Address: 0x1000e1b8)
- malloc (Address: 0x1000e1bc)
- memcmp (Address: 0x1000e1c8)
- memcpy (Address: 0x1000e1dc)
- memcpy_s (Address: 0x1000e1c4)
- memmove (Address: 0x1000e1d8)
- memset (Address: 0x1000e20c)
RPCRT4.dll
- CStdStubBuffer_AddRef (Address: 0x1000e040)
- CStdStubBuffer_Connect (Address: 0x1000e008)
- CStdStubBuffer_CountRefs (Address: 0x1000e02c)
- CStdStubBuffer_DebugServerQueryInterface (Address: 0x1000e044)
- CStdStubBuffer_DebugServerRelease (Address: 0x1000e020)
- CStdStubBuffer_Disconnect (Address: 0x1000e01c)
- CStdStubBuffer_Invoke (Address: 0x1000e030)
- CStdStubBuffer_IsIIDSupported (Address: 0x1000e010)
- CStdStubBuffer_QueryInterface (Address: 0x1000e028)
- IUnknown_AddRef_Proxy (Address: 0x1000e03c)
- IUnknown_QueryInterface_Proxy (Address: 0x1000e014)
- IUnknown_Release_Proxy (Address: 0x1000e000)
- NdrCStdStubBuffer_Release (Address: 0x1000e018)
- NdrCStdStubBuffer2_Release (Address: 0x1000e04c)
- NdrDllCanUnloadNow (Address: 0x1000e00c)
- NdrDllGetClassObject (Address: 0x1000e004)
- NdrOleAllocate (Address: 0x1000e024)
- NdrOleFree (Address: 0x1000e048)
- NdrStubCall2 (Address: 0x1000e038)
- NdrStubForwardingFunction (Address: 0x1000e034)