DeviceReactivation.dll
Description: DeviceReactivation
Authors: © Microsoft Corporation. All rights reserved.
Version: 10.0.19041.6456
Architecture: 64-bit
Operating System: Windows NT
SHA256: ac5439eab4bce9226930158c6ff74e2c
File Size: 90.9 KB
Uploaded At: Dec. 1, 2025, 7:26 a.m.
Views: 9
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: OpenProcess
Exported Functions
- DllCanUnloadNow (Ordinal: 1, Address: 0x4040)
- DllGetActivationFactory (Ordinal: 2, Address: 0x3d30)
- DllGetClassObject (Ordinal: 3, Address: 0x3f10)
Imported DLLs & Functions
api-ms-win-core-com-midlproxystub-l1-1-0.dll
- CStdStubBuffer2_Connect (Address: 0x18000e168)
- CStdStubBuffer2_CountRefs (Address: 0x18000e148)
- CStdStubBuffer2_Disconnect (Address: 0x18000e128)
- CStdStubBuffer2_QueryInterface (Address: 0x18000e138)
- NdrProxyForwardingFunction3 (Address: 0x18000e160)
- NdrProxyForwardingFunction4 (Address: 0x18000e178)
- NdrProxyForwardingFunction5 (Address: 0x18000e140)
- ObjectStublessClient3 (Address: 0x18000e130)
- ObjectStublessClient6 (Address: 0x18000e150)
- ObjectStublessClient7 (Address: 0x18000e170)
- ObjectStublessClient8 (Address: 0x18000e158)
api-ms-win-core-debug-l1-1-0.dll
- DebugBreak (Address: 0x18000e198)
- IsDebuggerPresent (Address: 0x18000e188)
- OutputDebugStringW (Address: 0x18000e190)
api-ms-win-core-delayload-l1-1-0.dll
- DelayLoadFailureHook (Address: 0x18000e1a8)
api-ms-win-core-delayload-l1-1-1.dll
- ResolveDelayLoadedAPI (Address: 0x18000e1b8)
api-ms-win-core-errorhandling-l1-1-0.dll
- GetLastError (Address: 0x18000e1d8)
- RaiseException (Address: 0x18000e1c8)
- SetLastError (Address: 0x18000e1d0)
- SetUnhandledExceptionFilter (Address: 0x18000e1e0)
- UnhandledExceptionFilter (Address: 0x18000e1e8)
api-ms-win-core-handle-l1-1-0.dll
- CloseHandle (Address: 0x18000e1f8)
api-ms-win-core-heap-l1-1-0.dll
- GetProcessHeap (Address: 0x18000e210)
- HeapAlloc (Address: 0x18000e208)
- HeapFree (Address: 0x18000e218)
api-ms-win-core-libraryloader-l1-2-0.dll
- DisableThreadLibraryCalls (Address: 0x18000e248)
- GetModuleFileNameA (Address: 0x18000e228)
- GetModuleHandleExW (Address: 0x18000e230)
- GetModuleHandleW (Address: 0x18000e238)
- GetProcAddress (Address: 0x18000e240)
api-ms-win-core-localization-l1-2-0.dll
- FormatMessageW (Address: 0x18000e258)
api-ms-win-core-processthreads-l1-1-0.dll
- GetCurrentProcess (Address: 0x18000e288)
- GetCurrentProcessId (Address: 0x18000e270)
- GetCurrentThreadId (Address: 0x18000e268)
- OpenProcessToken (Address: 0x18000e278)
- TerminateProcess (Address: 0x18000e280)
api-ms-win-core-processthreads-l1-1-1.dll
- OpenProcess (Address: 0x18000e298)
api-ms-win-core-profile-l1-1-0.dll
- QueryPerformanceCounter (Address: 0x18000e2a8)
api-ms-win-core-registry-l1-1-0.dll
- RegGetValueW (Address: 0x18000e2b8)
api-ms-win-core-rtlsupport-l1-1-0.dll
- RtlCaptureContext (Address: 0x18000e2c8)
- RtlLookupFunctionEntry (Address: 0x18000e2d0)
- RtlVirtualUnwind (Address: 0x18000e2d8)
api-ms-win-core-synch-l1-1-0.dll
- AcquireSRWLockExclusive (Address: 0x18000e2f0)
- AcquireSRWLockShared (Address: 0x18000e300)
- CreateMutexExW (Address: 0x18000e2e8)
- CreateSemaphoreExW (Address: 0x18000e328)
- OpenSemaphoreW (Address: 0x18000e330)
- ReleaseMutex (Address: 0x18000e2f8)
- ReleaseSemaphore (Address: 0x18000e338)
- ReleaseSRWLockExclusive (Address: 0x18000e320)
- ReleaseSRWLockShared (Address: 0x18000e308)
- WaitForSingleObject (Address: 0x18000e318)
- WaitForSingleObjectEx (Address: 0x18000e310)
api-ms-win-core-synch-l1-2-0.dll
- InitOnceExecuteOnce (Address: 0x18000e348)
- Sleep (Address: 0x18000e350)
api-ms-win-core-sysinfo-l1-1-0.dll
- GetSystemTimeAsFileTime (Address: 0x18000e368)
- GetTickCount (Address: 0x18000e360)
api-ms-win-core-util-l1-1-0.dll
- DecodePointer (Address: 0x18000e378)
- EncodePointer (Address: 0x18000e380)
api-ms-win-core-winrt-l1-1-0.dll
- RoGetActivationFactory (Address: 0x18000e390)
api-ms-win-security-base-l1-1-0.dll
- DuplicateTokenEx (Address: 0x18000e3a0)
- GetTokenInformation (Address: 0x18000e3a8)
api-ms-win-shcore-taskpool-l1-1-0.dll
- SHTaskPoolAllowThreadReuse (Address: 0x18000e3c0)
- SHTaskPoolQueueTask (Address: 0x18000e3b8)
msvcrt.dll
- __C_specific_handler (Address: 0x18000e3e8)
- __CxxFrameHandler3 (Address: 0x18000e418)
- __dllonexit (Address: 0x18000e410)
- _amsg_exit (Address: 0x18000e428)
- _callnewh (Address: 0x18000e480)
- _CxxThrowException (Address: 0x18000e460)
- _initterm (Address: 0x18000e3d0)
- _lock (Address: 0x18000e3f0)
- _onexit (Address: 0x18000e420)
- _purecall (Address: 0x18000e498)
- _unlock (Address: 0x18000e448)
- _vsnprintf_s (Address: 0x18000e4a8)
- _vsnwprintf (Address: 0x18000e3e0)
- _XcptFilter (Address: 0x18000e430)
- ??0exception@@QEAA@AEBQEBD@Z (Address: 0x18000e478)
- ??0exception@@QEAA@AEBQEBDH@Z (Address: 0x18000e470)
- ??0exception@@QEAA@AEBV0@@Z (Address: 0x18000e4b0)
- ??0exception@@QEAA@XZ (Address: 0x18000e440)
- ??1exception@@UEAA@XZ (Address: 0x18000e3d8)
- ??1type_info@@UEAA@XZ (Address: 0x18000e490)
- ??3@YAXPEAX@Z (Address: 0x18000e3f8)
- ?terminate@@YAXXZ (Address: 0x18000e488)
- ?what@exception@@UEBAPEBDXZ (Address: 0x18000e468)
- free (Address: 0x18000e438)
- malloc (Address: 0x18000e400)
- memcmp (Address: 0x18000e4a0)
- memcpy (Address: 0x18000e458)
- memcpy_s (Address: 0x18000e408)
- memmove (Address: 0x18000e450)
- memset (Address: 0x18000e4b8)
RPCRT4.dll
- CStdStubBuffer_AddRef (Address: 0x18000e108)
- CStdStubBuffer_Connect (Address: 0x18000e090)
- CStdStubBuffer_CountRefs (Address: 0x18000e0e0)
- CStdStubBuffer_DebugServerQueryInterface (Address: 0x18000e110)
- CStdStubBuffer_DebugServerRelease (Address: 0x18000e0c8)
- CStdStubBuffer_Disconnect (Address: 0x18000e0c0)
- CStdStubBuffer_Invoke (Address: 0x18000e0e8)
- CStdStubBuffer_IsIIDSupported (Address: 0x18000e0a0)
- CStdStubBuffer_QueryInterface (Address: 0x18000e0d8)
- IUnknown_AddRef_Proxy (Address: 0x18000e0f8)
- IUnknown_QueryInterface_Proxy (Address: 0x18000e0b0)
- IUnknown_Release_Proxy (Address: 0x18000e080)
- NdrCStdStubBuffer_Release (Address: 0x18000e0b8)
- NdrCStdStubBuffer2_Release (Address: 0x18000e100)
- NdrDllCanUnloadNow (Address: 0x18000e098)
- NdrDllGetClassObject (Address: 0x18000e088)
- NdrOleAllocate (Address: 0x18000e0d0)
- NdrOleFree (Address: 0x18000e118)
- NdrStubCall3 (Address: 0x18000e0a8)
- NdrStubForwardingFunction (Address: 0x18000e0f0)