msdia140.dll

Description: Microsoft® Debug Information Accessor

Authors: © Microsoft Corporation. All rights reserved.

Version: 14.30.30626.0

Architecture: 64-bit

Operating System: Windows

SHA256: 4ce86cf7f9f142ce94f11b8cb7d795b7

File Size: 1.7 MB

Uploaded At: Dec. 2, 2025, 2:44 p.m.

Views: 7

Exported Functions

  • DllCanUnloadNow (Ordinal: 1, Address: 0xb910)
  • DllGetClassObject (Ordinal: 2, Address: 0xbcf0)
  • DllRegisterServer (Ordinal: 3, Address: 0xbb70)
  • DllUnregisterServer (Ordinal: 4, Address: 0xbc70)
  • VSDllRegisterServer (Ordinal: 5, Address: 0xbb50)
  • VSDllUnregisterServer (Ordinal: 6, Address: 0xbb60)

Imported DLLs & Functions

KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x180138338)
  • AcquireSRWLockShared (Address: 0x180138340)
  • CloseHandle (Address: 0x180138088)
  • CloseThreadpoolWork (Address: 0x180138378)
  • CompareStringW (Address: 0x180138220)
  • CreateFileMappingA (Address: 0x180138318)
  • CreateFileMappingW (Address: 0x1801380b0)
  • CreateFileW (Address: 0x1801380a0)
  • CreateThreadpoolWork (Address: 0x180138360)
  • DeleteCriticalSection (Address: 0x180138070)
  • DeleteFileW (Address: 0x180138300)
  • DeviceIoControl (Address: 0x180138308)
  • EncodePointer (Address: 0x1801381a0)
  • EnterCriticalSection (Address: 0x180138090)
  • ExitProcess (Address: 0x1801381e8)
  • ExpandEnvironmentStringsW (Address: 0x180138348)
  • FindClose (Address: 0x180138230)
  • FindFirstFileExW (Address: 0x180138238)
  • FindNextFileW (Address: 0x180138240)
  • FindResourceExW (Address: 0x180138008)
  • FlushFileBuffers (Address: 0x1801382a8)
  • FreeEnvironmentStringsW (Address: 0x180138280)
  • FreeLibrary (Address: 0x1801380d8)
  • GetACP (Address: 0x180138250)
  • GetCommandLineA (Address: 0x180138268)
  • GetCommandLineW (Address: 0x180138270)
  • GetConsoleMode (Address: 0x1801381d8)
  • GetConsoleOutputCP (Address: 0x1801382b0)
  • GetCPInfo (Address: 0x180138260)
  • GetCurrentDirectoryW (Address: 0x1801382b8)
  • GetCurrentProcess (Address: 0x180138118)
  • GetCurrentProcessId (Address: 0x180138138)
  • GetCurrentThreadId (Address: 0x180138140)
  • GetDriveTypeW (Address: 0x180138210)
  • GetEnvironmentStringsW (Address: 0x180138278)
  • GetFileAttributesW (Address: 0x1801382f0)
  • GetFileSize (Address: 0x1801380a8)
  • GetFileSizeEx (Address: 0x1801382a0)
  • GetFileType (Address: 0x1801381c0)
  • GetFullPathNameW (Address: 0x1801381b0)
  • GetLastError (Address: 0x180138058)
  • GetModuleFileNameW (Address: 0x180138050)
  • GetModuleHandleExW (Address: 0x1801381f0)
  • GetModuleHandleW (Address: 0x1801380e0)
  • GetNativeSystemInfo (Address: 0x180138380)
  • GetOEMCP (Address: 0x180138258)
  • GetProcAddress (Address: 0x180138038)
  • GetProcessHeap (Address: 0x180138290)
  • GetStartupInfoW (Address: 0x180138160)
  • GetStdHandle (Address: 0x180138208)
  • GetStringTypeW (Address: 0x180138298)
  • GetSystemInfo (Address: 0x180138060)
  • GetSystemTimeAsFileTime (Address: 0x180138148)
  • HeapAlloc (Address: 0x180138200)
  • HeapFree (Address: 0x1801381f8)
  • HeapReAlloc (Address: 0x1801382c8)
  • HeapSize (Address: 0x1801382c0)
  • InitializeCriticalSection (Address: 0x180138068)
  • InitializeCriticalSectionAndSpinCount (Address: 0x180138178)
  • InitializeCriticalSectionEx (Address: 0x180138350)
  • InitializeSListHead (Address: 0x180138150)
  • InitializeSRWLock (Address: 0x180138320)
  • InterlockedFlushSList (Address: 0x180138170)
  • IsDebuggerPresent (Address: 0x180138158)
  • IsProcessorFeaturePresent (Address: 0x180138128)
  • IsValidCodePage (Address: 0x180138248)
  • LCMapStringW (Address: 0x180138078)
  • LeaveCriticalSection (Address: 0x180138098)
  • LoadLibraryExA (Address: 0x1801380e8)
  • LoadLibraryExW (Address: 0x180138030)
  • LoadResource (Address: 0x180138010)
  • LocalAlloc (Address: 0x180138040)
  • LocalFree (Address: 0x180138048)
  • LockResource (Address: 0x180138018)
  • MapViewOfFile (Address: 0x1801380b8)
  • MapViewOfFileEx (Address: 0x180138310)
  • MultiByteToWideChar (Address: 0x180138028)
  • QueryPerformanceCounter (Address: 0x180138130)
  • RaiseException (Address: 0x1801380c0)
  • ReadConsoleW (Address: 0x1801381e0)
  • ReadFile (Address: 0x1801381d0)
  • ReleaseSRWLockExclusive (Address: 0x180138328)
  • ReleaseSRWLockShared (Address: 0x180138330)
  • RtlCaptureContext (Address: 0x1801380f0)
  • RtlLookupFunctionEntry (Address: 0x1801380f8)
  • RtlPcToFileHeader (Address: 0x1801381a8)
  • RtlUnwindEx (Address: 0x180138168)
  • RtlVirtualUnwind (Address: 0x180138100)
  • SetEndOfFile (Address: 0x1801382d0)
  • SetEnvironmentVariableW (Address: 0x180138288)
  • SetFileAttributesW (Address: 0x1801382f8)
  • SetFilePointerEx (Address: 0x1801381c8)
  • SetLastError (Address: 0x180138000)
  • SetStdHandle (Address: 0x1801381b8)
  • SetUnhandledExceptionFilter (Address: 0x180138110)
  • SizeofResource (Address: 0x180138020)
  • SubmitThreadpoolWork (Address: 0x180138368)
  • TerminateProcess (Address: 0x180138120)
  • TlsAlloc (Address: 0x180138180)
  • TlsFree (Address: 0x180138198)
  • TlsGetValue (Address: 0x180138188)
  • TlsSetValue (Address: 0x180138190)
  • TryEnterCriticalSection (Address: 0x180138358)
  • UnhandledExceptionFilter (Address: 0x180138108)
  • UnmapViewOfFile (Address: 0x180138080)
  • VirtualAlloc (Address: 0x1801382e0)
  • VirtualFree (Address: 0x1801382e8)
  • VirtualProtect (Address: 0x1801380c8)
  • VirtualQuery (Address: 0x1801380d0)
  • WaitForThreadpoolWorkCallbacks (Address: 0x180138370)
  • WideCharToMultiByte (Address: 0x180138218)
  • WriteConsoleW (Address: 0x1801382d8)
  • WriteFile (Address: 0x180138228)