radardt.dll
Description: Microsoft Windows Resource Exhaustion Detector
Authors: © Microsoft Corporation. All rights reserved.
Version: 10.0.19041.1
Architecture: 64-bit
Operating System: Windows NT
SHA256: bd8425f42b093373fa24b98e5bfffd8e
File Size: 99.5 KB
Uploaded At: Dec. 1, 2025, 7:37 a.m.
Views: 3
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: OpenProcess
Exported Functions
- RdrSysprepSpecialize (Ordinal: 1, Address: 0xa020)
- RdrSysprepSpecializeOffline (Ordinal: 2, Address: 0x5180)
- WdiDiagnosticModuleMain (Ordinal: 3, Address: 0x1100)
- WdiGetDiagnosticModuleInterfaceVersion (Ordinal: 4, Address: 0x1060)
- WdiHandleInstance (Ordinal: 5, Address: 0x1730)
Imported DLLs & Functions
ADVAPI32.dll
- CloseServiceHandle (Address: 0x180013128)
- CopySid (Address: 0x180013168)
- EnumServicesStatusExW (Address: 0x180013138)
- EqualSid (Address: 0x180013160)
- GetLengthSid (Address: 0x180013180)
- GetTokenInformation (Address: 0x180013188)
- IsValidSid (Address: 0x180013170)
- OpenProcessToken (Address: 0x180013178)
- OpenSCManagerW (Address: 0x180013130)
- OpenServiceW (Address: 0x180013148)
- QueryServiceConfigW (Address: 0x180013140)
- RegCloseKey (Address: 0x1800131a0)
- RegCreateKeyExW (Address: 0x180013158)
- RegDeleteKeyExW (Address: 0x1800131a8)
- RegDeleteValueW (Address: 0x180013150)
- RegEnumKeyExW (Address: 0x1800131b8)
- RegOpenKeyExW (Address: 0x1800131c0)
- RegQueryInfoKeyW (Address: 0x1800131b0)
- RegQueryValueExW (Address: 0x180013198)
- RegSetValueExW (Address: 0x180013190)
KERNEL32.dll
- CloseHandle (Address: 0x180013280)
- CreateEventW (Address: 0x1800132c8)
- CreateProcessW (Address: 0x180013300)
- CreateThread (Address: 0x180013278)
- CreateWaitableTimerExW (Address: 0x1800132c0)
- DelayLoadFailureHook (Address: 0x180013270)
- DeleteCriticalSection (Address: 0x180013350)
- DisableThreadLibraryCalls (Address: 0x180013348)
- EnterCriticalSection (Address: 0x180013318)
- ExpandEnvironmentStringsW (Address: 0x180013290)
- FindFirstVolumeW (Address: 0x1800132a0)
- FindNextVolumeW (Address: 0x180013250)
- FindVolumeClose (Address: 0x180013258)
- FreeLibrary (Address: 0x180013368)
- FreeLibraryAndExitThread (Address: 0x1800132d0)
- GetCurrentProcess (Address: 0x180013230)
- GetCurrentProcessId (Address: 0x1800131d0)
- GetCurrentThreadId (Address: 0x180013218)
- GetDriveTypeW (Address: 0x180013248)
- GetFileAttributesW (Address: 0x180013298)
- GetLastError (Address: 0x180013338)
- GetModuleFileNameW (Address: 0x180013200)
- GetModuleHandleExW (Address: 0x1800132f0)
- GetProcessHeap (Address: 0x180013358)
- GetProcessId (Address: 0x1800131f8)
- GetProcessTimes (Address: 0x1800131e0)
- GetSystemDirectoryW (Address: 0x180013260)
- GetSystemTimeAsFileTime (Address: 0x1800132a8)
- GetTickCount (Address: 0x180013210)
- HeapAlloc (Address: 0x180013310)
- HeapCreate (Address: 0x180013360)
- HeapDestroy (Address: 0x1800131d8)
- HeapFree (Address: 0x180013308)
- InitializeCriticalSection (Address: 0x180013328)
- IsWow64Process (Address: 0x1800131e8)
- K32GetModuleFileNameExW (Address: 0x1800132f8)
- LeaveCriticalSection (Address: 0x180013320)
- LocalFree (Address: 0x1800131f0)
- OpenProcess (Address: 0x1800132e8)
- ProcessIdToSessionId (Address: 0x180013288)
- QueryPerformanceCounter (Address: 0x180013220)
- ResetEvent (Address: 0x1800132b0)
- ResolveDelayLoadedAPI (Address: 0x180013268)
- SetEvent (Address: 0x180013340)
- SetLastError (Address: 0x180013208)
- SetUnhandledExceptionFilter (Address: 0x180013238)
- SetWaitableTimer (Address: 0x1800132e0)
- TerminateProcess (Address: 0x180013228)
- TryEnterCriticalSection (Address: 0x1800132b8)
- UnhandledExceptionFilter (Address: 0x180013240)
- WaitForMultipleObjectsEx (Address: 0x1800132d8)
- WaitForSingleObject (Address: 0x180013330)
KERNELBASE.dll
- LocalAlloc (Address: 0x180013378)
- Sleep (Address: 0x180013380)
- WTSGetServiceSessionId (Address: 0x180013388)
msvcrt.dll
- __C_specific_handler (Address: 0x1800133e0)
- _amsg_exit (Address: 0x1800133c0)
- _initterm (Address: 0x1800133d8)
- _vsnwprintf (Address: 0x1800133f0)
- _wcsicmp (Address: 0x1800133b0)
- _XcptFilter (Address: 0x1800133b8)
- free (Address: 0x1800133c8)
- malloc (Address: 0x1800133d0)
- memset (Address: 0x180013400)
- qsort (Address: 0x1800133f8)
- wcsrchr (Address: 0x1800133e8)
ntdll.dll
- EtwEventEnabled (Address: 0x180013448)
- EtwEventRegister (Address: 0x180013440)
- EtwEventUnregister (Address: 0x180013460)
- EtwEventWrite (Address: 0x1800134a0)
- EtwGetTraceEnableFlags (Address: 0x180013480)
- EtwGetTraceEnableLevel (Address: 0x180013490)
- EtwGetTraceLoggerHandle (Address: 0x180013488)
- EtwRegisterTraceGuidsW (Address: 0x180013498)
- EtwTraceMessage (Address: 0x1800134a8)
- EtwUnregisterTraceGuids (Address: 0x180013478)
- NtOpenEvent (Address: 0x180013410)
- NtQueryEvent (Address: 0x180013458)
- NtQuerySystemInformation (Address: 0x180013470)
- RtlAllocateAndInitializeSid (Address: 0x1800134b0)
- RtlCaptureContext (Address: 0x180013428)
- RtlEqualUnicodeString (Address: 0x180013438)
- RtlFreeSid (Address: 0x180013450)
- RtlInitUnicodeString (Address: 0x180013430)
- RtlLookupFunctionEntry (Address: 0x180013420)
- RtlNtStatusToDosError (Address: 0x180013468)
- RtlVirtualUnwind (Address: 0x180013418)
POWRPROF.dll
- PowerSettingRegisterNotification (Address: 0x180013398)
- PowerSettingUnregisterNotification (Address: 0x1800133a0)