perf_tdh.dll

Description: Performance Analyzer AddIn: TDH

Authors: © 2024 Microsoft Corporation. All rights reserved.

Version: 10.0.26100.4654

Architecture: 64-bit

Operating System: Windows NT

SHA256: 057b0f6a84beace380ef17ed6f71d8db

File Size: 122.3 KB

Uploaded At: Dec. 3, 2025, 2:42 a.m.

Views: 6

Exported Functions

  • DllCanUnloadNow (Ordinal: 1, Address: 0x33f0)
  • DllGetClassObject (Ordinal: 2, Address: 0x3420)
  • DllRegisterServer (Ordinal: 3, Address: 0x2eb0)
  • DllUnregisterServer (Ordinal: 4, Address: 0x2eb0)

Imported DLLs & Functions

ADVAPI32.dll
  • ConvertSidToStringSidW (Address: 0x180011008)
  • RegCloseKey (Address: 0x180010ff0)
  • RegOpenKeyExW (Address: 0x180011000)
  • RegQueryValueExW (Address: 0x180010ff8)
KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x180011118)
  • CloseHandle (Address: 0x180011040)
  • CompareStringOrdinal (Address: 0x180011110)
  • CreateFileMappingW (Address: 0x180011050)
  • CreateFileW (Address: 0x180011028)
  • DelayLoadFailureHook (Address: 0x180011100)
  • DeleteCriticalSection (Address: 0x180011120)
  • EnterCriticalSection (Address: 0x180011130)
  • ExpandEnvironmentStringsW (Address: 0x180011030)
  • FileTimeToSystemTime (Address: 0x1800110e0)
  • FindResourceExW (Address: 0x1800110e8)
  • FreeLibrary (Address: 0x180011148)
  • FreeResource (Address: 0x180011018)
  • GetCurrentProcess (Address: 0x180011060)
  • GetCurrentProcessId (Address: 0x180011088)
  • GetCurrentThreadId (Address: 0x180011160)
  • GetFileSize (Address: 0x180011048)
  • GetLastError (Address: 0x1800110c0)
  • GetProcAddress (Address: 0x180011150)
  • GetProcessHeap (Address: 0x180011168)
  • GetSystemTimeAsFileTime (Address: 0x180011080)
  • GetTickCount (Address: 0x180011078)
  • HeapAlloc (Address: 0x180011170)
  • HeapDestroy (Address: 0x1800110c8)
  • HeapFree (Address: 0x180011178)
  • HeapReAlloc (Address: 0x1800110d0)
  • HeapSize (Address: 0x1800110d8)
  • InitializeCriticalSection (Address: 0x180011140)
  • LeaveCriticalSection (Address: 0x180011138)
  • LoadLibraryExW (Address: 0x180011158)
  • LoadResource (Address: 0x1800110f0)
  • LocalFree (Address: 0x180011188)
  • LockResource (Address: 0x1800110f8)
  • MapViewOfFile (Address: 0x1800110a8)
  • QueryPerformanceCounter (Address: 0x180011090)
  • QueryUnbiasedInterruptTime (Address: 0x180011038)
  • RaiseException (Address: 0x180011128)
  • ReleaseSRWLockExclusive (Address: 0x1800110b0)
  • ResolveDelayLoadedAPI (Address: 0x180011108)
  • SetLastError (Address: 0x180011190)
  • SetUnhandledExceptionFilter (Address: 0x180011068)
  • SizeofResource (Address: 0x180011180)
  • Sleep (Address: 0x1800110b8)
  • SleepConditionVariableSRW (Address: 0x180011098)
  • TerminateProcess (Address: 0x180011058)
  • UnhandledExceptionFilter (Address: 0x180011070)
  • UnmapViewOfFile (Address: 0x180011020)
  • WakeAllConditionVariable (Address: 0x1800110a0)
msvcrt.dll
  • __C_specific_handler (Address: 0x1800112e8)
  • __CxxFrameHandler3 (Address: 0x1800112f8)
  • __dllonexit (Address: 0x180011268)
  • __iob_func (Address: 0x180011290)
  • _amsg_exit (Address: 0x1800111f8)
  • _callnewh (Address: 0x180011230)
  • _CxxThrowException (Address: 0x180011220)
  • _initterm (Address: 0x1800111f0)
  • _lock (Address: 0x1800111e0)
  • _onexit (Address: 0x180011270)
  • _purecall (Address: 0x1800112f0)
  • _unlock (Address: 0x180011208)
  • _vscwprintf (Address: 0x180011258)
  • _XcptFilter (Address: 0x180011200)
  • ??0exception@@QEAA@AEBQEBD@Z (Address: 0x180011250)
  • ??0exception@@QEAA@AEBQEBDH@Z (Address: 0x180011228)
  • ??0exception@@QEAA@AEBV0@@Z (Address: 0x1800112a8)
  • ??1exception@@UEAA@XZ (Address: 0x1800112b8)
  • ??1type_info@@UEAA@XZ (Address: 0x180011278)
  • ?terminate@@YAXXZ (Address: 0x1800111e8)
  • ?what@exception@@UEBAPEBDXZ (Address: 0x1800112b0)
  • calloc (Address: 0x180011238)
  • fprintf (Address: 0x1800112a0)
  • free (Address: 0x1800112c8)
  • malloc (Address: 0x1800112c0)
  • memcmp (Address: 0x180011280)
  • memcpy (Address: 0x180011210)
  • memcpy_s (Address: 0x1800112d8)
  • memmove (Address: 0x180011288)
  • memmove_s (Address: 0x1800112d0)
  • memset (Address: 0x180011300)
  • swprintf_s (Address: 0x180011240)
  • vswprintf_s (Address: 0x180011260)
  • wcscpy_s (Address: 0x180011218)
  • wcsnlen (Address: 0x180011298)
  • wcsstr (Address: 0x180011248)
  • wprintf (Address: 0x1800112e0)
ntdll.dll
  • RtlCaptureContext (Address: 0x180011310)
  • RtlLookupFunctionEntry (Address: 0x180011318)
  • RtlVirtualUnwind (Address: 0x180011320)
USER32.dll
  • UnregisterClassA (Address: 0x1800111a0)
WS2_32.dll
  • ntohl (Address: 0x1800111c0)
  • ntohs (Address: 0x1800111b8)
  • WSAAddressToStringW (Address: 0x1800111b0)
  • WSACleanup (Address: 0x1800111d0)
  • WSAStartup (Address: 0x1800111c8)