dggpext.dll

Description: Device Guard Group Policy CSE

Authors: © Microsoft Corporation. All rights reserved.

Version: 10.0.19041.3636

Architecture: 64-bit

Operating System: Windows NT

SHA256: bd6234f2305f9a68ae73905d97675e35

File Size: 77.0 KB

Uploaded At: Dec. 1, 2025, 7:26 a.m.

Views: 10

Exported Functions

  • ProcessConfigCIPolicyGroupPolicy (Ordinal: 1, Address: 0x3c60)
  • ProcessVirtualizationBasedSecurityGroupPolicy (Ordinal: 2, Address: 0x3720)
  • ProcessVirtualizationBasedSecurityMDMPolicy (Ordinal: 3, Address: 0x37a0)
  • DllRegisterServer (Ordinal: 4, Address: 0x2880)
  • DllUnregisterServer (Ordinal: 5, Address: 0x2930)

Imported DLLs & Functions

ADVAPI32.dll
  • EventRegister (Address: 0x18000e350)
  • EventUnregister (Address: 0x18000e348)
  • EventWriteTransfer (Address: 0x18000e340)
  • RegCloseKey (Address: 0x18000e370)
  • RegCreateKeyExW (Address: 0x18000e360)
  • RegDeleteKeyExW (Address: 0x18000e378)
  • RegDeleteValueW (Address: 0x18000e338)
  • RegGetValueW (Address: 0x18000e358)
  • RegSetValueExW (Address: 0x18000e368)
api-ms-win-core-shlwapi-legacy-l1-1-0.dll
  • PathFindFileNameW (Address: 0x18000e5b8)
KERNEL32.dll
  • CopyFileExW (Address: 0x18000e3a8)
  • DecodePointer (Address: 0x18000e420)
  • DeleteCriticalSection (Address: 0x18000e498)
  • EncodePointer (Address: 0x18000e418)
  • EnterCriticalSection (Address: 0x18000e548)
  • ExitProcess (Address: 0x18000e450)
  • FlsAlloc (Address: 0x18000e430)
  • FlsFree (Address: 0x18000e440)
  • FlsGetValue (Address: 0x18000e438)
  • FlsSetValue (Address: 0x18000e3d8)
  • FormatMessageW (Address: 0x18000e3c8)
  • FreeEnvironmentStringsW (Address: 0x18000e4d8)
  • GetACP (Address: 0x18000e528)
  • GetCommandLineA (Address: 0x18000e3d0)
  • GetCPInfo (Address: 0x18000e538)
  • GetCurrentProcess (Address: 0x18000e508)
  • GetCurrentProcessId (Address: 0x18000e4b8)
  • GetCurrentThreadId (Address: 0x18000e448)
  • GetEnvironmentStringsW (Address: 0x18000e4d0)
  • GetFileAttributesW (Address: 0x18000e390)
  • GetFileType (Address: 0x18000e488)
  • GetLastError (Address: 0x18000e3b0)
  • GetModuleFileNameA (Address: 0x18000e4a8)
  • GetModuleHandleExW (Address: 0x18000e458)
  • GetOEMCP (Address: 0x18000e530)
  • GetProcAddress (Address: 0x18000e460)
  • GetStartupInfoW (Address: 0x18000e4a0)
  • GetStdHandle (Address: 0x18000e480)
  • GetStringTypeW (Address: 0x18000e560)
  • GetSystemInfo (Address: 0x18000e588)
  • GetSystemTimeAsFileTime (Address: 0x18000e4c0)
  • GetTickCount (Address: 0x18000e4c8)
  • GetVersionExW (Address: 0x18000e3e0)
  • GetWindowsDirectoryW (Address: 0x18000e3b8)
  • HeapAlloc (Address: 0x18000e410)
  • HeapCreate (Address: 0x18000e468)
  • HeapDestroy (Address: 0x18000e470)
  • HeapFree (Address: 0x18000e408)
  • HeapSetInformation (Address: 0x18000e478)
  • InitializeCriticalSectionAndSpinCount (Address: 0x18000e490)
  • IsProcessorFeaturePresent (Address: 0x18000e3c0)
  • IsValidCodePage (Address: 0x18000e520)
  • LCMapStringW (Address: 0x18000e570)
  • LeaveCriticalSection (Address: 0x18000e550)
  • LoadLibraryExW (Address: 0x18000e578)
  • LocalAlloc (Address: 0x18000e398)
  • LocalFree (Address: 0x18000e3a0)
  • MultiByteToWideChar (Address: 0x18000e568)
  • OutputDebugStringA (Address: 0x18000e518)
  • QueryPerformanceCounter (Address: 0x18000e388)
  • RaiseException (Address: 0x18000e400)
  • RtlCaptureContext (Address: 0x18000e4e8)
  • RtlLookupFunctionEntry (Address: 0x18000e3e8)
  • RtlPcToFileHeader (Address: 0x18000e3f8)
  • RtlUnwindEx (Address: 0x18000e3f0)
  • RtlVirtualUnwind (Address: 0x18000e4f0)
  • SetLastError (Address: 0x18000e428)
  • SetThreadStackGuarantee (Address: 0x18000e580)
  • SetUnhandledExceptionFilter (Address: 0x18000e500)
  • Sleep (Address: 0x18000e558)
  • TerminateProcess (Address: 0x18000e510)
  • UnhandledExceptionFilter (Address: 0x18000e4f8)
  • VirtualAlloc (Address: 0x18000e590)
  • VirtualProtect (Address: 0x18000e598)
  • VirtualQuery (Address: 0x18000e4b0)
  • WideCharToMultiByte (Address: 0x18000e4e0)
  • WriteFile (Address: 0x18000e540)
ntdll.dll
  • NtQuerySystemInformation (Address: 0x18000e5c8)
USER32.dll
  • LoadStringW (Address: 0x18000e5a8)