DeviceReactivation.dll

Description: DeviceReactivation

Authors: © Microsoft Corporation. All rights reserved.

Version: 10.0.19041.6456

Architecture: 64-bit

Operating System: Windows NT

SHA256: ac5439eab4bce9226930158c6ff74e2c

File Size: 90.9 KB

Uploaded At: Dec. 1, 2025, 7:26 a.m.

Views: 9

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • DllCanUnloadNow (Ordinal: 1, Address: 0x4040)
  • DllGetActivationFactory (Ordinal: 2, Address: 0x3d30)
  • DllGetClassObject (Ordinal: 3, Address: 0x3f10)

Imported DLLs & Functions

api-ms-win-core-com-midlproxystub-l1-1-0.dll
  • CStdStubBuffer2_Connect (Address: 0x18000e168)
  • CStdStubBuffer2_CountRefs (Address: 0x18000e148)
  • CStdStubBuffer2_Disconnect (Address: 0x18000e128)
  • CStdStubBuffer2_QueryInterface (Address: 0x18000e138)
  • NdrProxyForwardingFunction3 (Address: 0x18000e160)
  • NdrProxyForwardingFunction4 (Address: 0x18000e178)
  • NdrProxyForwardingFunction5 (Address: 0x18000e140)
  • ObjectStublessClient3 (Address: 0x18000e130)
  • ObjectStublessClient6 (Address: 0x18000e150)
  • ObjectStublessClient7 (Address: 0x18000e170)
  • ObjectStublessClient8 (Address: 0x18000e158)
api-ms-win-core-debug-l1-1-0.dll
  • DebugBreak (Address: 0x18000e198)
  • IsDebuggerPresent (Address: 0x18000e188)
  • OutputDebugStringW (Address: 0x18000e190)
api-ms-win-core-delayload-l1-1-0.dll
  • DelayLoadFailureHook (Address: 0x18000e1a8)
api-ms-win-core-delayload-l1-1-1.dll
  • ResolveDelayLoadedAPI (Address: 0x18000e1b8)
api-ms-win-core-errorhandling-l1-1-0.dll
  • GetLastError (Address: 0x18000e1d8)
  • RaiseException (Address: 0x18000e1c8)
  • SetLastError (Address: 0x18000e1d0)
  • SetUnhandledExceptionFilter (Address: 0x18000e1e0)
  • UnhandledExceptionFilter (Address: 0x18000e1e8)
api-ms-win-core-handle-l1-1-0.dll
  • CloseHandle (Address: 0x18000e1f8)
api-ms-win-core-heap-l1-1-0.dll
  • GetProcessHeap (Address: 0x18000e210)
  • HeapAlloc (Address: 0x18000e208)
  • HeapFree (Address: 0x18000e218)
api-ms-win-core-libraryloader-l1-2-0.dll
  • DisableThreadLibraryCalls (Address: 0x18000e248)
  • GetModuleFileNameA (Address: 0x18000e228)
  • GetModuleHandleExW (Address: 0x18000e230)
  • GetModuleHandleW (Address: 0x18000e238)
  • GetProcAddress (Address: 0x18000e240)
api-ms-win-core-localization-l1-2-0.dll
  • FormatMessageW (Address: 0x18000e258)
api-ms-win-core-processthreads-l1-1-0.dll
  • GetCurrentProcess (Address: 0x18000e288)
  • GetCurrentProcessId (Address: 0x18000e270)
  • GetCurrentThreadId (Address: 0x18000e268)
  • OpenProcessToken (Address: 0x18000e278)
  • TerminateProcess (Address: 0x18000e280)
api-ms-win-core-processthreads-l1-1-1.dll
  • OpenProcess (Address: 0x18000e298)
api-ms-win-core-profile-l1-1-0.dll
  • QueryPerformanceCounter (Address: 0x18000e2a8)
api-ms-win-core-registry-l1-1-0.dll
  • RegGetValueW (Address: 0x18000e2b8)
api-ms-win-core-rtlsupport-l1-1-0.dll
  • RtlCaptureContext (Address: 0x18000e2c8)
  • RtlLookupFunctionEntry (Address: 0x18000e2d0)
  • RtlVirtualUnwind (Address: 0x18000e2d8)
api-ms-win-core-synch-l1-1-0.dll
  • AcquireSRWLockExclusive (Address: 0x18000e2f0)
  • AcquireSRWLockShared (Address: 0x18000e300)
  • CreateMutexExW (Address: 0x18000e2e8)
  • CreateSemaphoreExW (Address: 0x18000e328)
  • OpenSemaphoreW (Address: 0x18000e330)
  • ReleaseMutex (Address: 0x18000e2f8)
  • ReleaseSemaphore (Address: 0x18000e338)
  • ReleaseSRWLockExclusive (Address: 0x18000e320)
  • ReleaseSRWLockShared (Address: 0x18000e308)
  • WaitForSingleObject (Address: 0x18000e318)
  • WaitForSingleObjectEx (Address: 0x18000e310)
api-ms-win-core-synch-l1-2-0.dll
  • InitOnceExecuteOnce (Address: 0x18000e348)
  • Sleep (Address: 0x18000e350)
api-ms-win-core-sysinfo-l1-1-0.dll
  • GetSystemTimeAsFileTime (Address: 0x18000e368)
  • GetTickCount (Address: 0x18000e360)
api-ms-win-core-util-l1-1-0.dll
  • DecodePointer (Address: 0x18000e378)
  • EncodePointer (Address: 0x18000e380)
api-ms-win-core-winrt-l1-1-0.dll
  • RoGetActivationFactory (Address: 0x18000e390)
api-ms-win-security-base-l1-1-0.dll
  • DuplicateTokenEx (Address: 0x18000e3a0)
  • GetTokenInformation (Address: 0x18000e3a8)
api-ms-win-shcore-taskpool-l1-1-0.dll
  • SHTaskPoolAllowThreadReuse (Address: 0x18000e3c0)
  • SHTaskPoolQueueTask (Address: 0x18000e3b8)
msvcrt.dll
  • __C_specific_handler (Address: 0x18000e3e8)
  • __CxxFrameHandler3 (Address: 0x18000e418)
  • __dllonexit (Address: 0x18000e410)
  • _amsg_exit (Address: 0x18000e428)
  • _callnewh (Address: 0x18000e480)
  • _CxxThrowException (Address: 0x18000e460)
  • _initterm (Address: 0x18000e3d0)
  • _lock (Address: 0x18000e3f0)
  • _onexit (Address: 0x18000e420)
  • _purecall (Address: 0x18000e498)
  • _unlock (Address: 0x18000e448)
  • _vsnprintf_s (Address: 0x18000e4a8)
  • _vsnwprintf (Address: 0x18000e3e0)
  • _XcptFilter (Address: 0x18000e430)
  • ??0exception@@QEAA@AEBQEBD@Z (Address: 0x18000e478)
  • ??0exception@@QEAA@AEBQEBDH@Z (Address: 0x18000e470)
  • ??0exception@@QEAA@AEBV0@@Z (Address: 0x18000e4b0)
  • ??0exception@@QEAA@XZ (Address: 0x18000e440)
  • ??1exception@@UEAA@XZ (Address: 0x18000e3d8)
  • ??1type_info@@UEAA@XZ (Address: 0x18000e490)
  • ??3@YAXPEAX@Z (Address: 0x18000e3f8)
  • ?terminate@@YAXXZ (Address: 0x18000e488)
  • ?what@exception@@UEBAPEBDXZ (Address: 0x18000e468)
  • free (Address: 0x18000e438)
  • malloc (Address: 0x18000e400)
  • memcmp (Address: 0x18000e4a0)
  • memcpy (Address: 0x18000e458)
  • memcpy_s (Address: 0x18000e408)
  • memmove (Address: 0x18000e450)
  • memset (Address: 0x18000e4b8)
RPCRT4.dll
  • CStdStubBuffer_AddRef (Address: 0x18000e108)
  • CStdStubBuffer_Connect (Address: 0x18000e090)
  • CStdStubBuffer_CountRefs (Address: 0x18000e0e0)
  • CStdStubBuffer_DebugServerQueryInterface (Address: 0x18000e110)
  • CStdStubBuffer_DebugServerRelease (Address: 0x18000e0c8)
  • CStdStubBuffer_Disconnect (Address: 0x18000e0c0)
  • CStdStubBuffer_Invoke (Address: 0x18000e0e8)
  • CStdStubBuffer_IsIIDSupported (Address: 0x18000e0a0)
  • CStdStubBuffer_QueryInterface (Address: 0x18000e0d8)
  • IUnknown_AddRef_Proxy (Address: 0x18000e0f8)
  • IUnknown_QueryInterface_Proxy (Address: 0x18000e0b0)
  • IUnknown_Release_Proxy (Address: 0x18000e080)
  • NdrCStdStubBuffer_Release (Address: 0x18000e0b8)
  • NdrCStdStubBuffer2_Release (Address: 0x18000e100)
  • NdrDllCanUnloadNow (Address: 0x18000e098)
  • NdrDllGetClassObject (Address: 0x18000e088)
  • NdrOleAllocate (Address: 0x18000e0d0)
  • NdrOleFree (Address: 0x18000e118)
  • NdrStubCall3 (Address: 0x18000e0a8)
  • NdrStubForwardingFunction (Address: 0x18000e0f0)