nettraceex.dll

Description:

Authors:

Version:

Architecture: 64-bit

Operating System:

SHA256: 0f29e51333bf28ff523e4d69697f263e

File Size: 71.5 KB

Uploaded At: Dec. 1, 2025, 7:35 a.m.

Views: 6

Exported Functions

  • TraceExGenerateDump (Ordinal: 1, Address: 0x1420)
  • TraceExGenerateMiniReport (Ordinal: 2, Address: 0x1450)
  • TraceExGenerateReport (Ordinal: 3, Address: 0x1360)
  • TraceExRunDiagnostic (Ordinal: 4, Address: 0x1470)

Imported DLLs & Functions

api-ms-win-core-com-l1-1-0.dll
  • CoCreateInstance (Address: 0x18000ce60)
api-ms-win-core-processthreads-l1-1-0.dll
  • OpenProcessToken (Address: 0x18000ce70)
api-ms-win-core-registry-l1-1-0.dll
  • RegCloseKey (Address: 0x18000ce98)
  • RegDeleteTreeW (Address: 0x18000ce80)
  • RegOpenKeyExW (Address: 0x18000cea0)
  • RegQueryInfoKeyW (Address: 0x18000ce90)
  • RegSetValueExW (Address: 0x18000ce88)
api-ms-win-core-registry-l2-1-0.dll
  • RegEnumKeyW (Address: 0x18000ceb0)
api-ms-win-core-shutdown-l1-1-0.dll
  • InitiateSystemShutdownExW (Address: 0x18000cec0)
api-ms-win-eventing-consumer-l1-1-0.dll
  • CloseTrace (Address: 0x18000ced8)
  • OpenTraceW (Address: 0x18000ced0)
  • ProcessTrace (Address: 0x18000cee0)
api-ms-win-eventing-provider-l1-1-0.dll
  • EventRegister (Address: 0x18000cf00)
  • EventSetInformation (Address: 0x18000cef8)
  • EventUnregister (Address: 0x18000cef0)
  • EventWriteTransfer (Address: 0x18000cf08)
api-ms-win-security-base-l1-1-0.dll
  • AdjustTokenPrivileges (Address: 0x18000cf28)
  • CheckTokenMembership (Address: 0x18000cf20)
  • CopySid (Address: 0x18000cf40)
  • GetLengthSid (Address: 0x18000cf18)
  • GetSidLengthRequired (Address: 0x18000cf38)
  • GetSidSubAuthority (Address: 0x18000cf30)
  • InitializeSid (Address: 0x18000cf48)
  • IsValidSid (Address: 0x18000cf50)
api-ms-win-security-lsalookup-l2-1-0.dll
  • LookupPrivilegeValueW (Address: 0x18000cf60)
KERNEL32.dll
  • CloseHandle (Address: 0x18000ccd8)
  • CopyFileW (Address: 0x18000cd10)
  • CreateDirectoryW (Address: 0x18000cc68)
  • CreateFileW (Address: 0x18000cca8)
  • CreatePipe (Address: 0x18000cc40)
  • CreateProcessW (Address: 0x18000cd08)
  • DeleteCriticalSection (Address: 0x18000cd60)
  • DeleteFileW (Address: 0x18000ccd0)
  • DisableThreadLibraryCalls (Address: 0x18000cc50)
  • EnterCriticalSection (Address: 0x18000cd70)
  • ExpandEnvironmentStringsW (Address: 0x18000cc80)
  • FileTimeToSystemTime (Address: 0x18000ccc0)
  • FindResourceExW (Address: 0x18000cce0)
  • FindResourceW (Address: 0x18000ccf0)
  • FormatMessageW (Address: 0x18000cc58)
  • GetCurrentProcess (Address: 0x18000cdb8)
  • GetCurrentProcessId (Address: 0x18000cd88)
  • GetCurrentThreadId (Address: 0x18000cd90)
  • GetDateFormatW (Address: 0x18000cc20)
  • GetExitCodeProcess (Address: 0x18000cd28)
  • GetLastError (Address: 0x18000cc60)
  • GetProcessHeap (Address: 0x18000cd50)
  • GetSystemDirectoryW (Address: 0x18000cc38)
  • GetSystemTimeAsFileTime (Address: 0x18000cd98)
  • GetTempFileNameW (Address: 0x18000cd20)
  • GetTempPathW (Address: 0x18000cc90)
  • GetTickCount (Address: 0x18000cda0)
  • GetTimeFormatW (Address: 0x18000cc28)
  • HeapAlloc (Address: 0x18000cd48)
  • HeapDestroy (Address: 0x18000cc18)
  • HeapFree (Address: 0x18000cd40)
  • HeapReAlloc (Address: 0x18000cd38)
  • HeapSize (Address: 0x18000cd30)
  • InitializeCriticalSection (Address: 0x18000cd58)
  • LeaveCriticalSection (Address: 0x18000cd78)
  • LoadResource (Address: 0x18000cce8)
  • LocalAlloc (Address: 0x18000cca0)
  • LocalFree (Address: 0x18000ccf8)
  • LockResource (Address: 0x18000ccc8)
  • MoveFileExW (Address: 0x18000cd00)
  • MultiByteToWideChar (Address: 0x18000ccb0)
  • QueryPerformanceCounter (Address: 0x18000cd80)
  • RaiseException (Address: 0x18000cd68)
  • ReadFile (Address: 0x18000cdc8)
  • RemoveDirectoryW (Address: 0x18000cc88)
  • SetHandleInformation (Address: 0x18000cc48)
  • SetUnhandledExceptionFilter (Address: 0x18000cdb0)
  • SizeofResource (Address: 0x18000cc70)
  • Sleep (Address: 0x18000ccb8)
  • SystemTimeToFileTime (Address: 0x18000cc30)
  • SystemTimeToTzSpecificLocalTime (Address: 0x18000cd18)
  • TerminateProcess (Address: 0x18000cdc0)
  • UnhandledExceptionFilter (Address: 0x18000cda8)
  • WaitForSingleObject (Address: 0x18000cc98)
  • WriteFile (Address: 0x18000cc78)
msvcrt.dll
  • __C_specific_handler (Address: 0x18000d008)
  • __CxxFrameHandler3 (Address: 0x18000d068)
  • __dllonexit (Address: 0x18000cfd0)
  • _amsg_exit (Address: 0x18000cff8)
  • _callnewh (Address: 0x18000cf78)
  • _CxxThrowException (Address: 0x18000cfa8)
  • _initterm (Address: 0x18000cff0)
  • _lock (Address: 0x18000cfe0)
  • _onexit (Address: 0x18000cfc8)
  • _purecall (Address: 0x18000cf70)
  • _unlock (Address: 0x18000cfd8)
  • _vscwprintf (Address: 0x18000d030)
  • _vsnwprintf (Address: 0x18000d060)
  • _wfopen_s (Address: 0x18000d050)
  • _XcptFilter (Address: 0x18000d000)
  • ??0exception@@QEAA@AEBQEBD@Z (Address: 0x18000cf80)
  • ??0exception@@QEAA@AEBQEBDH@Z (Address: 0x18000cf88)
  • ??0exception@@QEAA@AEBV0@@Z (Address: 0x18000cf90)
  • ??1exception@@UEAA@XZ (Address: 0x18000cf98)
  • ??1type_info@@UEAA@XZ (Address: 0x18000cfe8)
  • ??3@YAXPEAX@Z (Address: 0x18000d070)
  • ?what@exception@@UEBAPEBDXZ (Address: 0x18000cfa0)
  • fclose (Address: 0x18000d048)
  • free (Address: 0x18000d028)
  • fwprintf (Address: 0x18000d018)
  • iswcntrl (Address: 0x18000d040)
  • malloc (Address: 0x18000d010)
  • memcpy (Address: 0x18000cfb0)
  • memcpy_s (Address: 0x18000d058)
  • memmove (Address: 0x18000cfb8)
  • memmove_s (Address: 0x18000d020)
  • memset (Address: 0x18000cfc0)
  • vswprintf_s (Address: 0x18000d038)
NDFAPI.DLL
  • NdfCloseIncident (Address: 0x18000cdf0)
  • NdfCreateIncident (Address: 0x18000cdd8)
  • NdfDiagnoseIncident (Address: 0x18000cde0)
  • NdfGetTraceFile (Address: 0x18000cde8)
ntdll.dll
  • RtlCaptureContext (Address: 0x18000d080)
  • RtlLookupFunctionEntry (Address: 0x18000d088)
  • RtlVirtualUnwind (Address: 0x18000d090)
OLEAUT32.dll
  • SysAllocString (Address: 0x18000ce10)
  • SysFreeString (Address: 0x18000ce00)
  • VariantClear (Address: 0x18000ce08)
SHELL32.dll
  • SHFileOperationW (Address: 0x18000ce20)
SHLWAPI.dll
  • PathFindFileNameW (Address: 0x18000ce38)
  • PathRemoveFileSpecW (Address: 0x18000ce30)
  • PathStripPathW (Address: 0x18000ce40)
tdh.dll
  • TdhCloseDecodingHandle (Address: 0x18000d0c0)
  • TdhFormatProperty (Address: 0x18000d0a0)
  • TdhGetEventInformation (Address: 0x18000d0d0)
  • TdhGetEventMapInformation (Address: 0x18000d0b0)
  • TdhGetProperty (Address: 0x18000d0d8)
  • TdhGetWppMessage (Address: 0x18000d0b8)
  • TdhOpenDecodingHandle (Address: 0x18000d0c8)
  • TdhQueryProviderFieldInformation (Address: 0x18000d0a8)
USER32.dll
  • UnregisterClassA (Address: 0x18000ce50)