fhcleanup.dll
Description: File History Disk Cleanup Handler
Authors: © Microsoft Corporation. All rights reserved.
Version: 10.0.19041.3636
Architecture: 64-bit
Operating System: Windows NT
SHA256: e078d5186dc55fcb22ade0e5430ceabd
File Size: 55.5 KB
Uploaded At: Dec. 1, 2025, 7:28 a.m.
Views: 6
Exported Functions
- DllCanUnloadNow (Ordinal: 1, Address: 0x4580)
- DllGetClassObject (Ordinal: 2, Address: 0x45c0)
- DllInstall (Ordinal: 3, Address: 0x48c0)
- DllRegisterServer (Ordinal: 4, Address: 0x4700)
- DllUnregisterServer (Ordinal: 5, Address: 0x47e0)
Imported DLLs & Functions
ADVAPI32.dll
- GetTraceEnableFlags (Address: 0x18000a588)
- GetTraceEnableLevel (Address: 0x18000a590)
- GetTraceLoggerHandle (Address: 0x18000a598)
- RegCloseKey (Address: 0x18000a5a8)
- RegCreateKeyExW (Address: 0x18000a5b8)
- RegDeleteValueW (Address: 0x18000a5d8)
- RegEnumKeyExW (Address: 0x18000a5c0)
- RegisterTraceGuidsW (Address: 0x18000a580)
- RegOpenKeyExW (Address: 0x18000a5d0)
- RegQueryInfoKeyW (Address: 0x18000a5b0)
- RegSetValueExW (Address: 0x18000a5c8)
- TraceMessage (Address: 0x18000a5a0)
- UnregisterTraceGuids (Address: 0x18000a578)
api-ms-win-core-com-l1-1-0.dll
- CoCreateGuid (Address: 0x18000a780)
- CoCreateInstance (Address: 0x18000a7a8)
- CoGetCallContext (Address: 0x18000a770)
- CoSetProxyBlanket (Address: 0x18000a778)
- CoTaskMemAlloc (Address: 0x18000a790)
- CoTaskMemFree (Address: 0x18000a798)
- CoTaskMemRealloc (Address: 0x18000a7a0)
- StringFromGUID2 (Address: 0x18000a788)
fhsvcctl.dll
- FhServiceBlockBackup (Address: 0x18000a7b8)
- FhServiceClearProtectionState (Address: 0x18000a7d0)
- FhServiceClosePipe (Address: 0x18000a7c8)
- FhServiceOpenPipe (Address: 0x18000a7c0)
- FhServiceUnblockBackup (Address: 0x18000a7d8)
KERNEL32.dll
- DeleteCriticalSection (Address: 0x18000a6c0)
- EnterCriticalSection (Address: 0x18000a670)
- FindClose (Address: 0x18000a658)
- FindFirstFileExW (Address: 0x18000a600)
- FindNextFileW (Address: 0x18000a650)
- FindResourceExW (Address: 0x18000a6a8)
- FreeLibrary (Address: 0x18000a6d0)
- GetCurrentProcess (Address: 0x18000a618)
- GetCurrentProcessId (Address: 0x18000a660)
- GetCurrentThreadId (Address: 0x18000a5f8)
- GetLastError (Address: 0x18000a698)
- GetModuleFileNameW (Address: 0x18000a678)
- GetModuleHandleW (Address: 0x18000a6c8)
- GetProcAddress (Address: 0x18000a6b8)
- GetProcessHeap (Address: 0x18000a728)
- GetSystemTimeAsFileTime (Address: 0x18000a6f8)
- GetThreadLocale (Address: 0x18000a6e8)
- GetTickCount (Address: 0x18000a5f0)
- HeapAlloc (Address: 0x18000a720)
- HeapDestroy (Address: 0x18000a730)
- HeapFree (Address: 0x18000a718)
- HeapReAlloc (Address: 0x18000a710)
- HeapSize (Address: 0x18000a708)
- InitializeCriticalSection (Address: 0x18000a688)
- LeaveCriticalSection (Address: 0x18000a680)
- LoadLibraryExW (Address: 0x18000a6e0)
- LoadResource (Address: 0x18000a6b0)
- LockResource (Address: 0x18000a700)
- lstrcmpiW (Address: 0x18000a6d8)
- MultiByteToWideChar (Address: 0x18000a690)
- OutputDebugStringA (Address: 0x18000a5e8)
- QueryPerformanceCounter (Address: 0x18000a608)
- RaiseException (Address: 0x18000a6a0)
- RtlCaptureContext (Address: 0x18000a640)
- RtlLookupFunctionEntry (Address: 0x18000a638)
- RtlVirtualUnwind (Address: 0x18000a630)
- SetThreadLocale (Address: 0x18000a6f0)
- SetUnhandledExceptionFilter (Address: 0x18000a620)
- SizeofResource (Address: 0x18000a668)
- Sleep (Address: 0x18000a648)
- TerminateProcess (Address: 0x18000a610)
- UnhandledExceptionFilter (Address: 0x18000a628)
msvcrt.dll
- __C_specific_handler (Address: 0x18000a858)
- __CxxFrameHandler3 (Address: 0x18000a860)
- __dllonexit (Address: 0x18000a8c0)
- _amsg_exit (Address: 0x18000a8a0)
- _callnewh (Address: 0x18000a830)
- _CxxThrowException (Address: 0x18000a8b8)
- _errno (Address: 0x18000a890)
- _initterm (Address: 0x18000a898)
- _lock (Address: 0x18000a880)
- _onexit (Address: 0x18000a8c8)
- _purecall (Address: 0x18000a840)
- _unlock (Address: 0x18000a888)
- _wcsnicmp (Address: 0x18000a810)
- _XcptFilter (Address: 0x18000a8a8)
- ??_V@YAXPEAX@Z (Address: 0x18000a850)
- ??0exception@@QEAA@AEBQEBDH@Z (Address: 0x18000a800)
- ??0exception@@QEAA@AEBV0@@Z (Address: 0x18000a7f8)
- ??1exception@@UEAA@XZ (Address: 0x18000a8d0)
- ??1type_info@@UEAA@XZ (Address: 0x18000a878)
- ??3@YAXPEAX@Z (Address: 0x18000a8d8)
- ?terminate@@YAXXZ (Address: 0x18000a7f0)
- ?what@exception@@UEBAPEBDXZ (Address: 0x18000a7e8)
- free (Address: 0x18000a838)
- malloc (Address: 0x18000a8b0)
- memcpy_s (Address: 0x18000a848)
- memmove_s (Address: 0x18000a808)
- memset (Address: 0x18000a8e0)
- realloc (Address: 0x18000a870)
- wcscat_s (Address: 0x18000a818)
- wcschr (Address: 0x18000a868)
- wcscpy_s (Address: 0x18000a820)
- wcsncpy_s (Address: 0x18000a828)
ntdll.dll
- WinSqmEndSession (Address: 0x18000a910)
- WinSqmIsOptedIn (Address: 0x18000a900)
- WinSqmSetDWORD (Address: 0x18000a8f0)
- WinSqmSetDWORD64 (Address: 0x18000a908)
- WinSqmStartSession (Address: 0x18000a8f8)
OLEAUT32.dll
- SysFreeString (Address: 0x18000a748)
- VarUI4FromStr (Address: 0x18000a740)
USER32.dll
- CharNextW (Address: 0x18000a760)
- UnregisterClassA (Address: 0x18000a758)