msdia140.dll

Description: Microsoft® Debug Information Accessor

Authors: © Microsoft Corporation. All rights reserved.

Version: 14.30.30626.0

Architecture: 32-bit

Operating System: Windows

SHA256: d3d26d22ba1a93ecd32d5feba5a9119c

File Size: 1.4 MB

Uploaded At: Dec. 2, 2025, 2:44 p.m.

Views: 7

Exported Functions

  • DllCanUnloadNow (Ordinal: 1, Address: 0x2acf0)
  • DllGetClassObject (Ordinal: 2, Address: 0x2b180)
  • DllRegisterServer (Ordinal: 3, Address: 0x2af40)
  • DllUnregisterServer (Ordinal: 4, Address: 0x2b0b0)
  • VSDllRegisterServer (Ordinal: 5, Address: 0x2aef0)
  • VSDllUnregisterServer (Ordinal: 6, Address: 0x2af10)

Imported DLLs & Functions

KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x10145190)
  • AcquireSRWLockShared (Address: 0x10145194)
  • CloseHandle (Address: 0x10145044)
  • CloseThreadpoolWork (Address: 0x101451b0)
  • CompareStringW (Address: 0x10145100)
  • CreateFileMappingA (Address: 0x10145180)
  • CreateFileMappingW (Address: 0x10145058)
  • CreateFileW (Address: 0x10145050)
  • CreateThreadpoolWork (Address: 0x101451a4)
  • DecodePointer (Address: 0x1014515c)
  • DeleteCriticalSection (Address: 0x10145038)
  • DeleteFileW (Address: 0x10145174)
  • DeviceIoControl (Address: 0x10145178)
  • EncodePointer (Address: 0x101450c4)
  • EnterCriticalSection (Address: 0x10145048)
  • ExitProcess (Address: 0x101450e4)
  • ExpandEnvironmentStringsW (Address: 0x10145198)
  • FindClose (Address: 0x10145108)
  • FindFirstFileExW (Address: 0x1014510c)
  • FindNextFileW (Address: 0x10145110)
  • FindResourceExW (Address: 0x10145004)
  • FlushFileBuffers (Address: 0x10145144)
  • FreeEnvironmentStringsW (Address: 0x10145130)
  • FreeLibrary (Address: 0x1014506c)
  • GetACP (Address: 0x10145118)
  • GetCommandLineA (Address: 0x10145124)
  • GetCommandLineW (Address: 0x10145128)
  • GetConsoleMode (Address: 0x101450dc)
  • GetConsoleOutputCP (Address: 0x10145148)
  • GetCPInfo (Address: 0x10145120)
  • GetCurrentDirectoryW (Address: 0x1014514c)
  • GetCurrentProcess (Address: 0x10145080)
  • GetCurrentProcessId (Address: 0x10145090)
  • GetCurrentThreadId (Address: 0x10145094)
  • GetDriveTypeW (Address: 0x101450f8)
  • GetEnvironmentStringsW (Address: 0x1014512c)
  • GetFileAttributesW (Address: 0x1014516c)
  • GetFileSize (Address: 0x10145054)
  • GetFileSizeEx (Address: 0x10145140)
  • GetFileType (Address: 0x101450d0)
  • GetFullPathNameW (Address: 0x101450c8)
  • GetLastError (Address: 0x1014502c)
  • GetModuleFileNameW (Address: 0x10145028)
  • GetModuleHandleExW (Address: 0x101450e8)
  • GetModuleHandleW (Address: 0x10145070)
  • GetNativeSystemInfo (Address: 0x101451b4)
  • GetOEMCP (Address: 0x1014511c)
  • GetProcAddress (Address: 0x1014501c)
  • GetProcessHeap (Address: 0x10145138)
  • GetStartupInfoW (Address: 0x101450a4)
  • GetStdHandle (Address: 0x101450f4)
  • GetStringTypeW (Address: 0x1014513c)
  • GetSystemInfo (Address: 0x10145030)
  • GetSystemTimeAsFileTime (Address: 0x10145098)
  • HeapAlloc (Address: 0x101450f0)
  • HeapFree (Address: 0x101450ec)
  • HeapReAlloc (Address: 0x10145154)
  • HeapSize (Address: 0x10145150)
  • InitializeCriticalSection (Address: 0x10145034)
  • InitializeCriticalSectionAndSpinCount (Address: 0x101450b0)
  • InitializeCriticalSectionEx (Address: 0x1014519c)
  • InitializeSListHead (Address: 0x1014509c)
  • InitializeSRWLock (Address: 0x10145184)
  • InterlockedFlushSList (Address: 0x101450a8)
  • IsDebuggerPresent (Address: 0x101450a0)
  • IsProcessorFeaturePresent (Address: 0x10145088)
  • IsValidCodePage (Address: 0x10145114)
  • LCMapStringW (Address: 0x1014503c)
  • LeaveCriticalSection (Address: 0x1014504c)
  • LoadLibraryExA (Address: 0x10145074)
  • LoadLibraryExW (Address: 0x10145018)
  • LoadResource (Address: 0x10145008)
  • LocalAlloc (Address: 0x10145020)
  • LocalFree (Address: 0x10145024)
  • LockResource (Address: 0x1014500c)
  • MapViewOfFile (Address: 0x1014505c)
  • MapViewOfFileEx (Address: 0x1014517c)
  • MultiByteToWideChar (Address: 0x10145014)
  • QueryPerformanceCounter (Address: 0x1014508c)
  • RaiseException (Address: 0x10145060)
  • ReadConsoleW (Address: 0x101450e0)
  • ReadFile (Address: 0x101450d8)
  • ReleaseSRWLockExclusive (Address: 0x10145188)
  • ReleaseSRWLockShared (Address: 0x1014518c)
  • RtlUnwind (Address: 0x101450ac)
  • SetEndOfFile (Address: 0x10145158)
  • SetEnvironmentVariableW (Address: 0x10145134)
  • SetFileAttributesW (Address: 0x10145170)
  • SetFilePointerEx (Address: 0x101450d4)
  • SetLastError (Address: 0x10145000)
  • SetStdHandle (Address: 0x101450cc)
  • SetUnhandledExceptionFilter (Address: 0x1014507c)
  • SizeofResource (Address: 0x10145010)
  • SubmitThreadpoolWork (Address: 0x101451a8)
  • TerminateProcess (Address: 0x10145084)
  • TlsAlloc (Address: 0x101450b4)
  • TlsFree (Address: 0x101450c0)
  • TlsGetValue (Address: 0x101450b8)
  • TlsSetValue (Address: 0x101450bc)
  • TryEnterCriticalSection (Address: 0x101451a0)
  • UnhandledExceptionFilter (Address: 0x10145078)
  • UnmapViewOfFile (Address: 0x10145040)
  • VirtualAlloc (Address: 0x10145164)
  • VirtualFree (Address: 0x10145168)
  • VirtualProtect (Address: 0x10145064)
  • VirtualQuery (Address: 0x10145068)
  • WaitForThreadpoolWorkCallbacks (Address: 0x101451ac)
  • WideCharToMultiByte (Address: 0x101450fc)
  • WriteConsoleW (Address: 0x10145160)
  • WriteFile (Address: 0x10145104)