perfts.dll
Description: Windows Remote Desktop Services Performance Objects
Authors: © Microsoft Corporation. All rights reserved.
Version: 10.0.19041.5794
Architecture: 64-bit
Operating System: Windows NT
SHA256: 831e56bc34498fb8a35316ba398df22e
File Size: 81.5 KB
Uploaded At: Dec. 1, 2025, 7:36 a.m.
Views: 4
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: OpenProcess
Exported Functions
- OpenTSObject (Ordinal: 1, Address: 0x1990)
- CollectTSObjectData (Ordinal: 2, Address: 0x1da0)
- CloseTSObject (Ordinal: 3, Address: 0x19f0)
- OpenLagPerfData (Ordinal: 4, Address: 0x28a0)
- CollectLagPerfData (Ordinal: 5, Address: 0x28b0)
- CloseLagPerfData (Ordinal: 6, Address: 0x28c0)
Imported DLLs & Functions
ADVAPI32.dll
- CloseTrace (Address: 0x16200ec68)
- ControlTraceW (Address: 0x16200ec58)
- DeregisterEventSource (Address: 0x16200ec18)
- EnableTraceEx2 (Address: 0x16200ec48)
- EventWriteTransfer (Address: 0x16200ec78)
- FlushTraceW (Address: 0x16200ec60)
- OpenTraceW (Address: 0x16200ec50)
- ProcessTrace (Address: 0x16200ec70)
- QueryAllTracesW (Address: 0x16200ec80)
- RegCloseKey (Address: 0x16200ec20)
- RegisterEventSourceW (Address: 0x16200ec30)
- RegOpenKeyExW (Address: 0x16200ec28)
- RegQueryValueExW (Address: 0x16200ec38)
- StartTraceW (Address: 0x16200ec40)
KERNEL32.dll
- AcquireSRWLockExclusive (Address: 0x16200eca8)
- AcquireSRWLockShared (Address: 0x16200ee08)
- CloseHandle (Address: 0x16200ecc8)
- CloseThreadpoolTimer (Address: 0x16200eca0)
- CreateEventExW (Address: 0x16200ee48)
- CreateMutexExW (Address: 0x16200edb8)
- CreateMutexW (Address: 0x16200ee18)
- CreateSemaphoreExW (Address: 0x16200ee58)
- CreateThread (Address: 0x16200eda8)
- CreateThreadpoolTimer (Address: 0x16200ecf0)
- CreateToolhelp32Snapshot (Address: 0x16200ed08)
- DebugBreak (Address: 0x16200ede8)
- DeleteCriticalSection (Address: 0x16200edc8)
- DisableThreadLibraryCalls (Address: 0x16200ed28)
- EnterCriticalSection (Address: 0x16200ee40)
- FormatMessageW (Address: 0x16200ecf8)
- FreeLibrary (Address: 0x16200edf8)
- GetCurrentProcess (Address: 0x16200ed60)
- GetCurrentProcessId (Address: 0x16200ed78)
- GetCurrentThreadId (Address: 0x16200ed80)
- GetLastError (Address: 0x16200ed20)
- GetModuleFileNameA (Address: 0x16200ee60)
- GetModuleHandleExW (Address: 0x16200ee30)
- GetModuleHandleW (Address: 0x16200ee00)
- GetProcAddress (Address: 0x16200edb0)
- GetProcessHeap (Address: 0x16200ed40)
- GetSystemTimeAsFileTime (Address: 0x16200ed88)
- GetTickCount (Address: 0x16200ed90)
- HeapAlloc (Address: 0x16200ed38)
- HeapFree (Address: 0x16200ed10)
- HeapReAlloc (Address: 0x16200ed30)
- InitializeCriticalSectionEx (Address: 0x16200ee10)
- IsDebuggerPresent (Address: 0x16200ece0)
- LeaveCriticalSection (Address: 0x16200ee20)
- LoadLibraryW (Address: 0x16200eda0)
- OpenProcess (Address: 0x16200ed98)
- OpenSemaphoreW (Address: 0x16200ecb8)
- OutputDebugStringA (Address: 0x16200ed18)
- OutputDebugStringW (Address: 0x16200ec90)
- Process32FirstW (Address: 0x16200ecc0)
- Process32NextW (Address: 0x16200ece8)
- ProcessIdToSessionId (Address: 0x16200ed00)
- QueryFullProcessImageNameW (Address: 0x16200edf0)
- QueryPerformanceCounter (Address: 0x16200ed70)
- ReleaseMutex (Address: 0x16200edd0)
- ReleaseSemaphore (Address: 0x16200ee38)
- ReleaseSRWLockExclusive (Address: 0x16200edc0)
- ReleaseSRWLockShared (Address: 0x16200ecd8)
- SetEvent (Address: 0x16200ec98)
- SetLastError (Address: 0x16200ee50)
- SetThreadpoolTimer (Address: 0x16200ecd0)
- SetUnhandledExceptionFilter (Address: 0x16200ed58)
- Sleep (Address: 0x16200ed48)
- TerminateProcess (Address: 0x16200ed68)
- UnhandledExceptionFilter (Address: 0x16200ed50)
- WaitForMultipleObjects (Address: 0x16200ee28)
- WaitForSingleObject (Address: 0x16200edd8)
- WaitForSingleObjectEx (Address: 0x16200ecb0)
- WaitForThreadpoolTimerCallbacks (Address: 0x16200ede0)
msvcrt.dll
- __C_specific_handler (Address: 0x16200efa0)
- __CxxFrameHandler3 (Address: 0x16200eff0)
- __dllonexit (Address: 0x16200ef88)
- _amsg_exit (Address: 0x16200efc0)
- _callnewh (Address: 0x16200ef48)
- _CxxThrowException (Address: 0x16200eeb0)
- _initterm (Address: 0x16200efa8)
- _lock (Address: 0x16200ef98)
- _ltow (Address: 0x16200efe0)
- _onexit (Address: 0x16200ef80)
- _purecall (Address: 0x16200ef70)
- _ultow_s (Address: 0x16200ef18)
- _unlock (Address: 0x16200ef90)
- _vsnprintf (Address: 0x16200efe8)
- _vsnprintf_s (Address: 0x16200ef30)
- _vsnwprintf (Address: 0x16200ef20)
- _wcslwr_s (Address: 0x16200ef60)
- _XcptFilter (Address: 0x16200efc8)
- ??_V@YAXPEAX@Z (Address: 0x16200ef28)
- ??0exception@@QEAA@AEBQEBD@Z (Address: 0x16200ef40)
- ??0exception@@QEAA@AEBQEBDH@Z (Address: 0x16200ef38)
- ??0exception@@QEAA@AEBV0@@Z (Address: 0x16200eed8)
- ??0exception@@QEAA@XZ (Address: 0x16200eee0)
- ??1exception@@UEAA@XZ (Address: 0x16200eee8)
- ??1type_info@@UEAA@XZ (Address: 0x16200eed0)
- ??3@YAXPEAX@Z (Address: 0x16200eef8)
- ?terminate@@YAXXZ (Address: 0x16200eec8)
- ?what@exception@@UEBAPEBDXZ (Address: 0x16200eef0)
- free (Address: 0x16200efb8)
- malloc (Address: 0x16200efb0)
- memcmp (Address: 0x16200ef78)
- memcpy (Address: 0x16200eeb8)
- memcpy_s (Address: 0x16200efd0)
- memmove (Address: 0x16200eec0)
- memmove_s (Address: 0x16200ef50)
- memset (Address: 0x16200f000)
- vswprintf_s (Address: 0x16200ef08)
- wcscpy_s (Address: 0x16200ef10)
- wcsncat_s (Address: 0x16200eff8)
- wcsncpy_s (Address: 0x16200efd8)
- wcsrchr (Address: 0x16200ef58)
- wcsstr (Address: 0x16200ef68)
- wcstoul (Address: 0x16200ef00)
ntdll.dll
- NtClose (Address: 0x16200f050)
- NtOpenKey (Address: 0x16200f018)
- NtQuerySystemInformation (Address: 0x16200f010)
- NtQueryValueKey (Address: 0x16200f040)
- RtlCaptureContext (Address: 0x16200f038)
- RtlInitUnicodeString (Address: 0x16200f020)
- RtlLookupFunctionEntry (Address: 0x16200f030)
- RtlNtStatusToDosError (Address: 0x16200f048)
- RtlVirtualUnwind (Address: 0x16200f028)
tdh.dll
- TdhGetEventInformation (Address: 0x16200f060)
- TdhGetProperty (Address: 0x16200f068)
- TdhGetPropertySize (Address: 0x16200f070)
UTILDLL.dll
- StrConnectState (Address: 0x16200ee70)
WINSTA.dll
- WinStationEnumerateExW (Address: 0x16200ee80)
- WinStationFreeMemory (Address: 0x16200ee88)
WTSAPI32.dll
- WTSEnumerateProcessesW (Address: 0x16200ee98)
- WTSFreeMemory (Address: 0x16200eea0)