Windows 10 DLL File Information - nettrace.dll |
The following DLL report was generated by automatic DLL script that scanned and loaded all DLL files in the system32 directory of Windows 10, extracted the information from them, and then saved it into HTML reports. If you want to view a report of another DLL, go to the main page of this Web site.
General Information
File Description: | Network Trace Helper |
File Version: | 10.0.10130.0 (fbl_impressive.150522-2224) |
Company: | Microsoft Corporation |
Product Name: | Microsoft® Windows® Operating System |
DLL popularity | Very Low - There is no any other DLL in system32 directory that is statically linked to this file. |
File Size: | 735 KB |
Total Number of Exported Functions: | 1 |
Total Number of Exported Functions With Names: | 1 |
Section Headers
Name | Virtual Address | Raw Data Size | % of File | Characteristics | Section Contains... |
---|---|---|---|---|---|
.text | 0x00001000 | 613,888 Bytes | 81.5% | Read, Execute | Code |
.data | 0x00097000 | 90,624 Bytes | 12.0% | Write, Read | Initialized Data |
.idata | 0x000b0000 | 8,192 Bytes | 1.1% | Read | Initialized Data |
.didat | 0x000b2000 | 512 Bytes | 0.1% | Write, Read | Initialized Data |
.rsrc | 0x000b3000 | 4,096 Bytes | 0.5% | Read | Initialized Data |
.reloc | 0x000b4000 | 34,816 Bytes | 4.6% | Read, Discardable | Initialized Data |
Static Linking
nettrace.dll is statically linked to the following files:msvcrt.dll
KERNEL32.dll
SHELL32.dll
ADVAPI32.dll
NETSH.EXE
OLEAUT32.dll
SHLWAPI.dll
USER32.dll
WS2_32.dll
wevtapi.dll
IPHLPAPI.DLL
NDFAPI.DLL
api-ms-win-core-path-l1-1-0.dll
tdh.dll
api-ms-win-core-com-l1-1-1.dll
SspiCli.dll
bcrypt.dll
ntdll.dll
RPCRT4.dll
This means that when nettrace.dll is loaded, the above files are automatically loaded too. If one of these files is corrupted or missing, nettrace.dll won't be loaded.
General Resources Information
Resource Type | Number of Items | Total Size | % of File |
---|---|---|---|
Icons | 0 | 0 Bytes | 0.0% |
Animated Icons | 0 | 0 Bytes | 0.0% |
Cursors | 0 | 0 Bytes | 0.0% |
Animated Cursors | 0 | 0 Bytes | 0.0% |
Bitmaps | 0 | 0 Bytes | 0.0% |
AVI Files | 0 | 0 Bytes | 0.0% |
Dialog-Boxes | 0 | 0 Bytes | 0.0% |
HTML Related Files | 1 | 4,353 Bytes | 0.6% |
Menus | 0 | 0 Bytes | 0.0% |
Strings | 153 | 49,130 Bytes | 6.5% |
Type Libraries | 0 | 0 Bytes | 0.0% |
Manifest | 0 | 0 Bytes | 0.0% |
All Others | 4 | 4,310 Bytes | 0.6% |
Total | 158 | 57,793 Bytes | 7.7% |
Icons in this file
No icons found in this file
Cursors in this file
No cursors found in this file
Dialog-boxes list (up to 1000 dialogs)
No dialog resources in this file.
String resources in this dll (up to 1000 strings)
String ID | String Text |
---|---|
6000 | List interfaces, providers and tracing state. |
6100 | Starts tracing. |
6101 | %1!s! Starts tracing. Usage: trace start [[scenario=]<scenario1,scenario2>] [[globalKeywords=]keywords] [[globalLevel=]level] [[capture=]yes|no] [[capturetype=]physical|vmswitch|both] [[report=]yes|no|disabled] [[persistent=]yes|no] [[traceFile=]path\filename] [[maxSize=]filemaxsize] [[fileMode=]single|circular|append] [[overwrite=]yes|no] [[correlation=]yes|no|disabled] [capturefilters] [[provider=]providerIdOrName] [[keywords=]keywordMaskOrSet] [[level=]level] [[[provider=]provider2IdOrName] [[providerFilter=]yes|no]] [[keywords=]keyword2MaskOrSet] [[perfMerge=]yes|no] [[level=]level2] ... Defaults: capture=no (specifies whether packet capture is enabled in addition to trace events) capturetype=physical (specifies whether packet capture needs to be enabled for physical network adapters only, virtual switch only, or both physical network adapters and virtual switch) report=no (specifies whether a complementing report will be generated along with the trace file) persistent=no (specifies whether the tracing session continues across reboots, and is on until netsh trace stop is issued) maxSize=250 MB (specifies the maximum trace file size, 0=no maximum) fileMode=circular overwrite=yes (specifies whether an existing trace output file will be overwritten) correlation=yes (specifies whether related events will be correlated and grouped together) perfMerge=yes (specifies whether performance metadata is merged into trace) traceFile=%%LOCALAPPDATA%%\Temp\NetTraces\NetTrace.etl (specifies location of the output file) providerFilter=no (specifies whether provider filter is enabled) Provider keywords default to all and level to 255 unless otherwise specified. For example: netsh trace start scenario=InternetClient capture=yes Starts tracing for the InternetClient scenario and dependent providers with packet capture enabled for physical network adapters only. Tracing will stop when the "netsh trace stop" command is issued or when the system reboots. Default location and name will be used for the output file. If an old file exists, it will be overwritten. netsh trace start provider=microsoft-windows-wlan-autoconfig keywords=state,ut:authentication Starts tracing for the microsoft-windows-wlan-autoconfig provider Tracing will stop when the "netsh trace stop" command is issued or when the system reboots. Default location and name will be used for the output file. If an old file exists, it will be overwritten. Only events with keyword 'state' or 'ut:authentication' will be logged. netsh trace show provider command can be used to display supported keywords and levels. Capture Filters: Capture filters are only supported when capture is explicitly enabled with capture=yes. Use 'netsh trace show CaptureFilterHelp' to display a list of supported capture filters and their usage. Provider Filters: Provider filters are supported by multiple providers and are enabled with providerFilter=Yes after every provider. Use 'netsh trace show ProviderFilterHelp' to display a list of supported provider filters for each provider and their usage. |
6102 | Stops tracing. |
6103 | %1!s! Stops tracing. Remarks: Stops a network tracing session currently in progress |
6104 | Converts a trace file to an HTML report. |
6105 | %1!s! Converts a trace file to an HTML report. Usage: convert [input=]tracefilename.etl [[output=]filename] [[dump=]CSV|XML|EVTX|TXT|No] [[report=]yes|no] [[overwrite=]yes|no] [[tmfpath=]pathname] Parameters: Tag Value input - Input ETL trace file output - Output file name (defaults to input name) dump - Output format (default = TXT) report - Generates an HTML report (default = no) overwrite - Overwrites existing files (default = no) tmfpath - Path to tmf files for decoding WPP traces Remarks: Converts the input ETL file to the specified format. |
6106 | Start a diagnose session. |
6107 | %1!s! Starts a diagnose session. Usage: diagnose [scenario=]<scenarioname> [[namedAttribute=]<attributeValue>] [[saveSessionTrace=]<yes|no>] [[report=]<yes|no>] [[capture=]<yes|no>] Defaults: saveSessionTrace=no (defaults to 'yes' if report=yes is specified) capture=no report=no Remarks: Starts a diagnose session |
6108 | Normalizes or filters a trace file to a new output file. |
6109 | %1!s! Normalizes or filters a trace file to a new output file. Usage: trace correlate [input=]tracefilename.etl [output=]newtracefilename.etl [[filter=]Activity_ID] [[overwrite=]yes|no] [[retaincorrelationevents=]yes|no] [[retainpii=]yes|no] [[retainglobalevents=]yes|no] Parameters: Tag Value input - Input ETL trace file output - Output file name filter - Output only events related to this Activity GUID overwrite - Overwrites existing files retaincorrelationevents - Retains correlation events retainpii - Retains events containing personally identifiable information retainglobalevents - Retains global events Defaults: filter=none overwrite=no retaincorrevents=no retainpii=yes retainglobalevents=yes Remarks: Filter activity ID is a GUID expressed in the form {xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx} Personally identifiable information includes packet capture events |
6110 | Merges trace files and adds symbols metadata. |
6111 | %1!s! Merges trace files and adds symbols metadata. Usage: merge input1.etl input2.etl ... output.etl Parameters: A list of ETL files to merge The last file in the list is an output Remarks: Merges the files and injects symbols and PerfTrack metadata. |
6201 | Shows tracing configuration. |
6202 | %1!s! Shows tracing configuration. |
6203 | Shows available scenarios. |
6204 | %1!s! Shows a list of available scenarios that may be used with the start command. |
6205 | Shows scenario information. |
6206 | %1!s! Shows scenario information. Usage: trace show scenario [name=]<scenarioname> Remarks: This displays additional information about a scenario including any attributes that may be required by the 'diagnose command and the list of providers that would be enabled for the specified scenario, along with the default keywords and levels that would be applied. |
6207 | Shows available providers. |
6208 | %1!s! Shows a list of available providers that may be used with the start command. |
6209 | Shows provider information. |
6210 | %1!s! Shows provider information that can be used with the start command. Usage: trace show provider [name=]<providerIdOrName> Remarks: This displays the keywords and levels that the specified provider supports. These keywords and levels may be used while starting a tracing session. |
6211 | List global keywords and levels. |
6212 | %1!s! Shows a list of global keywords and levels that may be used with the start command. Usage: trace show globalKeywordsAndLevels |
6213 | List available interfaces. |
6214 | %1!s! Shows a list of network interfaces. Usage: trace show interfaces |
6215 | List supported capture filters and usage. |
6216 | %1!s! List supported capture filters and usage. Usage: trace show CaptureFilterHelp |
6217 | Show helper class information. |
6218 | %1!s! Shows helper class name, description and list of dependent helper classes. This also lists possible root causes and repairs that may be returned by the helper class. Usage: trace show helperclass [name=]<helperclassname> |
6219 | List supported provider filters and usage. |
6220 | %1!s! List supported provider filters and usage. Usage: trace show ProviderFilterHelp |
6301 | Trace configuration: ------------------------------------------------------------------- |
6302 | File location = %1!s! |
6303 | Available scenarios (%1!d!): ------------------------------------------------------------------- |
6305 | Entry Point: %1!ws! |
6306 | Providers --------- |
6307 | Available Providers (%1!d!) ------------------------------------------------------------------- |
6308 | Name: %1!s! Provider Guid: %2!s! |
6309 | Levels (value) - %1!d! element(s) ------------------------------------------------------------------- |
6310 | Keywords (mask) - %1!d! element(s) ------------------------------------------------------------------- |
6311 | Tracing session was successfully stopped. |
6312 | Status: Running Trace File: %1!s! Append: %2!s! Circular: %3!s! Max Size: %4!s! Report: %5!s! |
6313 | Provider: Name: %1!s! Provider Guid: %2!s! Level: %3!s! Keywords: %4!s! |
6314 | Provider: Name: %1!s! Provider Guid: %2!s! Default Level: %3!s! Default Keywords: %4!s! |
6315 | Report location = %1!s! |
6316 | Input file: %1!s! Dump file: %2!s! Dump format: %3!s! Report file: %4!s! |
6318 | Description: %1!ws! Interface GUID: %2!S! Interface Index: %3!d! Interface Luid: 0x%4!I64X! |
6319 | Attribute Name Type Required Description -------------- ---- -------- ----------- |
6320 | Root causes found: %1!d! |
6321 | Root cause #%1!d! -------------- %2!ws! |
6322 | Repairs available: %1!d! |
6323 | Repair #%1!d! ---------- %2!ws! |
6324 | Diagnosing '%1!ws!' ... |
6325 | done |
6326 | Description: %1!ws! |
6327 | NDF Trace File: '%1!ws!' |
6328 | NDF Report File: '%1!ws!' |
6329 | Generating data collection and report ... |
6330 | Generating dump ... |
6331 | done |
6332 | failed (error=0x%1!X!) |
6333 | Capture Filters: Capture filters are only supported when capture is explicitly enabled with capture=yes. Supported capture filters are: CaptureInterface=<interface name or GUID> Enables packet capture for the specified interface name or GUID. Use 'netsh trace show interfaces' to list available interfaces. e.g. CaptureInterface={716A7812-4AEE-4545-9D00-C10EFD223551} e.g. CaptureInterface=!{716A7812-4AEE-4545-9D00-C10EFD223551} e.g. CaptureInterface="Local Area Connection" Ethernet.Address=<MAC address> Matches the specified filter against both source and destination MAC addresses. e.g. Ethernet.Address=00-0D-56-1F-73-64 Ethernet.SourceAddress=<MAC address> Matches the specified filter against source MAC addresses. e.g. Ethernet.SourceAddress=00-0D-56-1F-73-64 Ethernet.DestinationAddress=<MAC address> Matches the specified filter against destination MAC addresses. e.g. Ethernet.DestinationAddress=00-0D-56-1F-73-64 Ethernet.Type=<ethertype> Matches the specified filter against the MAC ethertype. e.g. Ethernet.Type=IPv4 e.g. Ethernet.Type=NOT(0x86DD) e.g. Ethernet.Type=(IPv4,IPv6) Wifi.Type=<Management|Data> Matches the specified filter against the Wifi type. Allowed values are 'Management' and 'Data'. If not specified, the Wifi.Type filter is not applied. Note: This capture filter does not support ranges, lists or negation. e.g. Wifi.Type=Management Protocol=<protocol> Matches the specified filter against the IP protocol. e.g. Protocol=6 e.g. Protocol=!(TCP,UDP) e.g. Protocol=(4-10) IPv4.Address=<IPv4 address> Matches the specified filter against both source and destination IPv4 addresses. e.g. IPv4.Address=157.59.136.1 e.g. IPv4.Address=!(157.59.136.1) e.g. IPv4.Address=(157.59.136.1,157.59.136.11) IPv4.SourceAddress=<IPv4 address> Matches the specified filter against source IPv4 addresses. e.g. IPv4.SourceAddress=157.59.136.1 IPv4.DestinationAddress=<IPv4 address> Matches the specified filter against destination IPv4 addresses. e.g. IPv4.DestinationAddress=157.59.136.1 IPv6.Address=<IPv6 address> Matches the specified filter against both source and destination IPv6 addresses. e.g. IPv6.Address=fe80::5038:3c4:35de:f4c3\%%8 e.g. IPv6.Address=!(fe80::5038:3c4:35de:f4c3\%%8) IPv6.SourceAddress=<IPv6 address> Matches the specified filter against source IPv6 addresses. e.g. IPv6.SourceAddress=fe80::5038:3c4:35de:f4c3\%%8 IPv6.DestinationAddress=<IPv6 address> Matches the specified filter against destination IPv6 addresses. e.g. IPv6.DestinationAddress=fe80::5038:3c4:35de:f4c3\%%8 CustomMac=<type(offset,value)> Matches the specified filter against the value at the specified offset starting with the MAC header. Note: This capture filter does not support ranges, lists or negation. e.g. CustomMac=UINT8(0x1,0x23) e.g. CustomMac=ASCIISTRING(3,test) e.g. CustomMac=UNICODESTRING(2,test) CustomIp=<type(offset,value)> Matches the specified filter against the value at the specified offset starting with the IP header. Note: This capture filter does not support ranges, lists or negation. e.g. CustomIp=UINT16(4,0x3201) e.g. CustomIp=UINT32(0x2,18932) CaptureMultiLayer=<yes|no> Enables multi-layer packet capture. Note: This capture filter does not support ranges, lists or negation. PacketTruncateBytes=<value> Captures only the the specified number of bytes of each packet. Note: This capture filter does not support ranges, lists or negation. e.g. PacketTruncateBytes=40 |
6334 | Note: Multiple filters may be used together. However the same filter may not be repeated. e.g. 'netsh trace start capture=yes Ethernet.Type=IPv4 IPv4.Address=157.59.136.1' Filters need to be explicitly stated when required. If a filter is not specified, it is treated as "don't-care". e.g. 'netsh trace start capture=yes IPv4.SourceAddress=157.59.136.1' This will capture IPv4 packets only from 157.59.136.1, and it will also capture packets with non-IPv4 Ethernet Types, since the Ethernet.Type filter is not explicitly specified. e.g. 'netsh trace start capture=yes IPv4.SourceAddress=157.59.136.1 Ethernet.Type=IPv4' This will capture IPv4 packets only from 157.59.136.1. Packets with other Ethernet Types will be discarded since an explicit filter has been specified. Capture filters support ranges, lists and negation (unless stated otherwise). e.g. Range: 'netsh trace start capture=yes Ethernet.Type=IPv4 Protocol=(4-10)' This will capture IPv4 packets with protocols between 4 and 10 inclusive. e.g. List: 'netsh trace start capture=yes Ethernet.Type=(IPv4,IPv6)' This will capture only IPv4 and IPv6 packets. e.g. Negation: 'netsh trace start capture=yes Ethernet.Type=!IPv4' This will capture all non-IPv4 packets. Negation may be combined with lists in some cases. e.g. 'netsh trace start capture=yes Ethernet.Type=!(IPv4,IPv6)' This will capture all non-IPv4 and non-IPv6 packets. 'NOT' can be used instead of '!' to indicate negation. This requires parentheses to be present around the values to be negated. e.g. 'netsh trace start capture=yes Ethernet.Type=NOT(IPv4)' |
6335 | Name: %1!ws! Description: %2!ws! |
6336 | Dependent Helper Classes: Helper Class Name Description ----------------- ----------- |
6337 | Root Cause %1!d!/%2!d! ---------------- Description: %3!ws! ID: %4!ws! |
6338 | Repair %1!d!/%2!d! ------------ Description: %3!ws! ID: %4!ws! |
6339 | Input file: %1!s! Output file: %2!s! Filter: %3!s! Overwrite: %4!s! RetainCorrelationEvents: %5!s! RetainPII: %6!s! RetainGlobalEvents: %7!s! |
6340 | Correlating traces ... |
6341 | The trace file and additional troubleshooting information have been compiled as "%1!s!". |
6342 | Generating data collection ... |
6343 | Merging traces ... |
6344 | Provider Filters: Provider filters are supported by multiple providers and are enabled with providerFilter=Yes after every provider. Supported providers are: Provider: Microsoft-Windows-Ras-NdisWanPacketCapture RoutingDomain=<GUID> Enables packet capture for the specified routing domain. Use 'Get-NetCompartment' to list available routing domains. Note: This provider filter supports lists and negations. e.g.netsh trace start provider=Microsoft-Windows-Ras-NdisWanPacketCapture providerFilter=Yes RoutingDomain="{11111111-1111-1111-1111-111111111001}" e.g.netsh trace start provider=Microsoft-Windows-Ras-NdisWanPacketCapture providerFilter=Yes RoutingDomain="(<GUID1>,<GUID2>)" e.g.netsh trace start provider=Microsoft-Windows-Ras-NdisWanPacketCapture providerFilter=Yes RoutingDomain=!"(<GUID1>,<GUID2>)" VPN.UserName=<UserName/InterfaceName> Enables packet capture for specified user or interface name. Note: This provider filter does not support ranges, lists or negation. e.g.netsh trace start provider=Microsoft-Windows-Ras-NdisWanPacketCapture providerFilter=Yes VPN.UserName="UserXXX" |
6345 | Provider: Microsoft-Windows-TCPIP TCP.AnyPort=<PORT>, TCP.SourcePort=<PORT>, TCP.DestinationPort=<PORT> Allows traces to be collected on ports specified by rules. Any combination of the above filters can be applied. TCP.AnyPort will allow traces to be collected if either the source or destination port match. Note: These provider filters support lists, ranges, and negations. e.g.netsh trace start provider=Microsoft-Windows-TCPIP providerFilter=Yes TCP.SourcePort=80 TCP.DestinationPort=1234 e.g.netsh trace start provider=Microsoft-Windows-TCPIP providerFilter=Yes TCP.AnyPort=(80,443) e.g.netsh trace start provider=Microsoft-Windows-TCPIP providerFilter=Yes TCP.SourcePort=!(900-1000) ProcessId=<Process ID> Enables ETW traces for the described process IDs. Note: This provider filter supports ranges, lists, and negations. e.g.netsh trace start provider=Microsoft-Windows-TCPIP providerFilter=Yes ProcessId=987 e.g.netsh trace start provider=Microsoft-Windows-TCPIP providerFilter=Yes ProcessId=(1,5,8,9) e.g.netsh trace start provider=Microsoft-Windows-TCPIP providerFilter=Yes ProcessId=!(100-200) IPv4.Address=<IPv4 Address> IPv4.SourceAddress=<IPv4 Address> IPv4.DestinationAddress=<IPv4 Address> Enables ETW traces for the described IPv4 address or addresses. IPv4.Address will allow traces if either the source or destination address match the filter. Source and destination filters can be used simultaneously. Note: These provider filters support lists, ranges, and negations. e.g.netsh trace start provider=Microsoft-Windows-TCPIP providerFilter=Yes IPv4.Address=(2.0.0.0-3.0.0.0) e.g.netsh trace start provider=Microsoft-Windows-TCPIP providerFilter=Yes IPv4.SourceAddress=(2.0.0.0,3.0.0.0) e.g.netsh trace start provider=Microsoft-Windows-TCPIP providerFilter=Yes IPv4.DestinationAddress=!(2.0.0.0) IPv6.Address=<IPv6 Address> IPv6.SourceAddress=<IPv6 Address> IPv6.DestinationAddress=<IPv6 Address> Enables ETW traces for the described IPv6 address or addresses. IPv6.Address will allow traces if either the source or destination address match the filter. Source and destination filters can be used simultaneously. Note: These provider filters support lists, ranges, and negations. e.g.netsh trace start provider=Microsoft-Windows-TCPIP providerFilter=Yes IPv6.Address=(2001::1-2001::ffff) e.g.netsh trace start provider=Microsoft-Windows-TCPIP providerFilter=Yes IPv6.SourceAddress=(2001::1-2001::ffff) e.g.netsh trace start provider=Microsoft-Windows-TCPIP providerFilter=Yes IPv6.DestinationAddress=!(2001::ffff) RoutingDomain=<GUID> Enables packet capture for the specified routing domain. Use 'Get-NetCompartment' to list available routing domains. Note: This provider filter supports lists and negations. e.g.netsh trace start provider=Microsoft-Windows-TCPIP providerFilter=Yes RoutingDomain="{B1062982-2B18-4B4F-B3D5-A78DDB9CDD49}" e.g.netsh trace start provider=Microsoft-Windows-TCPIP providerFilter=Yes RoutingDomain="(<GUID1>,<GUID2>)" e.g.netsh trace start provider=Microsoft-Windows-TCPIP providerFilter=Yes RoutingDomain=!"(<GUID1>,<GUID2>)" |
6346 | Note: Provider filters usage is similar to Capture filters unless stated otherwise. Use 'netsh trace show CaptureFilterHelp' to display the capture filters' usage |
6347 | The following providers support provider filtering. Provider specific help can be viewed with the following commands: Microsoft-Windows-TCPIP 'netsh trace show providerFilterHelp Microsoft-Windows-TCPIP' Microsoft-Windows-Ras-NdisWanPacketCapture 'netsh trace show providerFilterHelp Microsoft-Windows-Ras-NdisWanPacketCapture' |
6401 | Other adapter %1: |
6402 | Ethernet adapter %1: |
6403 | Token Ring adapter %1: |
6404 | FDDI adapter %1: |
6405 | Loopback adapter %1: |
6406 | PPP adapter %1: |
6407 | SLIP adapter %1: |
6408 | Tunnel adapter %1: |
6409 | Wireless LAN adapter %1: |
6410 | Unknown adapter %1: |
6701 | Invalid value "%2!s!" for command option "%1!s!". |
6702 | Invalid value "%2!s!" for command option "%1!s!". |
6703 | One or more parameters for the command are not correct or missing. |
6704 | File "%1!s!" already exists. |
6705 | A tracing session is already in progress. |
6706 | Failed to start the tracing session (error=%1!d!). |
6707 | Circular mode requires a non-zero MaxSize parameter. |
6708 | There is no trace session currently in progress. |
6709 | Failed to stop the tracing session (error=0x%1!x!). |
6710 | '%1!s!' is not a valid or known provider. |
6711 | Overwrite=yes is not allowed with Append mode. |
6712 | The inbox capture driver could not be started (error=0x%1!x!). |
6714 | The '%1!s!' application has locked the Network Configuration database. Please close that application and try again. |
6715 | '%1!s!' is not a valid scenario. |
6716 | The scenario '%1!s!' could not be added to the tracing session (error=0x%2!x!). |
6717 | Packet Capture providers could not be added to the tracing session (error=0x%1!x!). |
6718 | The required correlation provider (%1!s!) could not be added to the tracing session (error=0x%2!x!). |
6719 | The specified keywords are not valid for the provider '%1!s!'. |
6720 | The specified level is not valid for the provider '%1!s!'. |
6721 | The specified file '%1!s!' does not exist. |
6722 | Conversion failed (error=0x%1!x!). |
6723 | '%1!s!' is not a valid operator. |
6724 | '%1!s!' is not a valid range. |
6725 | %1!s! is not a valid interface. |
6726 | '%1!s!' is not a valid type. |
6727 | Capture filters are only allowed when capture is enabled. |
6728 | See 'trace %1!s! help' for detailed help. |
6729 | '%1!s!' is a required parameter. |
6730 | Network Diagnostics failed (error=0x%1!x!). |
6731 | The registry entry for '%1!s!' is not valid (error=0x%2!x!). |
6732 | Report=yes is not allowed when SaveSessionTrace=no is specified. |
6733 | '%1!ws!' is not a valid helper class or may not be correctly installed. |
6734 | <Unavailable - check helper class registration> |
6735 | Correlation failed (error=0x%1!x!). |
6736 | Activity "%1!s!" was not found. |
6737 | Invalid value "%2!s!" for command option "%1!s!" - Must be a GUID. |
6738 | The specified path '%1!s!' does not exist. |
6739 | The CaptureType switch is only allowed when capture is enabled. |
6740 | This CaptureType is not applicable to this system's architecture. |
6741 | Virtual Switch capture can be enabled only after installing the Hyper-V role. |
6742 | Trace merge failed (error=0x%1!x!). |
6743 | %1!s! is not a valid routing domain. |
6801 | Warning: The inbox capture driver could not be stopped (error=0x%1!x!). |
6802 | Warning: Session information could not be saved (error=0x%1!x!). |
6803 | Warning: Report generation failed (error=0x%1!x!). |
6804 | Warning: An instance of the 'NT Kernel Logger' is already running. System information will not be added to the trace file. |
6805 | Warning: System information could not be added to the trace file (error=0x%1!x!). |
6806 | Warning: Helper class attributes could not be retrieved (error=0x%1!08X!). |
6807 | Warning: The NDF trace file is not available. |
6808 | Warning: Some events were not captured due to high volume of events. Please consider using filters to reduce the volume |
6809 | Warning: Report generation is not supported in safe mode. |
6810 | Warning: Packet capture is not supported in safe mode. |
6903 | %systemroot%\pla\Reports\Report.System.NetTrace.xml |
6904 | %systemroot%\pla\Rules\Rules.System.NetTrace.xml |
6907 | %systemroot%\system32\NetTrace.PLA.Diagnostics.xml |
6908 | Network Diagnostics |
6909 | This data collector set collects network related data on your local system. The data to be collected includes network component traces, registry keys, system hardware information that can help troubleshoot network related problems. |
6910 | Microsoft Windows Network Trace |
6911 | Microsoft |
6912 | Network information collector |
6913 | Disabled |
COM Classes/Interfaces
There is no type library in this file with COM classes/interfaces information
Exported Functions List
The following functions are exported by this dll:InitHelperDll |
Imported Functions List
The following functions are imported by this dll:- msvcrt.dll:
_CxxThrowException _XcptFilter __CxxFrameHandler __dllonexit _amsg_exit _callnewh _errno _except_handler4_common _ftol2 _gmtime64 _initterm _lock _memicmp _onexit _purecall _strcmpi _time64 _unlock _vscwprintf _vsnprintf _vsnwprintf _wcsicmp _wcslwr_s _wcsnicmp _wcstoi64 _wcstoui64 _wcsupr_s _wfopen _wfopen_s _wtoi calloc div fclose fgetws free fwprintf iswcntrl iswdigit iswspace malloc memchr memcpy memcpy_s memmove memmove_s memset public: __thiscall exception::exception(char const * const &) public: __thiscall exception::exception(class exception const &) public: __thiscall exception::exception(void) public: virtual __thiscall exception::~exception(void) public: virtual __thiscall type_info::~type_info(void) public: virtual char const * __thiscall exception::what(void)const realloc strncmp strrchr swscanf toupper towlower void __cdecl terminate(void) vswprintf_s wcschr wcscpy_s wcscspn wcsncmp wcsrchr wcsspn wcsstr wcstok wcstol wcstoul - KERNEL32.dll:
CloseHandle CopyFileW CreateDirectoryW CreateFileMappingW CreateFileW CreateMutexW CreateProcessW DeleteFileW DisableThreadLibraryCalls ExpandEnvironmentStringsW FileTimeToLocalFileTime FileTimeToSystemTime FindClose FindFirstFileW FindFirstVolumeW FindNextFileW FindNextVolumeW FindResourceExW FindResourceW FindVolumeClose FlushInstructionCache FormatMessageW FreeLibrary GetCurrentDirectoryW GetCurrentProcess GetCurrentProcessId GetCurrentThreadId GetDateFormatW GetEnvironmentVariableW GetExitCodeProcess GetFileSize GetLastError GetModuleFileNameA GetModuleHandleExW GetModuleHandleW GetProcAddress GetProcessHeap GetSystemDirectoryW GetSystemInfo GetSystemTimeAsFileTime GetSystemWindowsDirectoryW GetTempFileNameW GetTempPathW GetThreadLocale GetTickCount GetTimeFormatW GetVersionExW GetVolumePathNamesForVolumeNameW GetWindowsDirectoryW HeapDestroy HeapFree IsProcessorFeaturePresent LoadLibraryExA LoadLibraryExW LoadLibraryW LoadResource LocalAlloc LocalFree LockResource MapViewOfFileEx MoveFileExW MultiByteToWideChar OutputDebugStringA QueryDosDeviceW QueryPerformanceCounter RaiseException ReadFile ReleaseMutex RemoveDirectoryW SearchPathW SetFilePointer SetLastError SetUnhandledExceptionFilter SizeofResource Sleep SystemTimeToFileTime SystemTimeToTzSpecificLocalTime TerminateProcess UnhandledExceptionFilter UnmapViewOfFile VirtualAlloc VirtualFree VirtualProtect VirtualQuery WaitForSingleObject WideCharToMultiByte WriteFile ntdll!RtlAcquireSRWLockExclusive ntdll!RtlAllocateHeap ntdll!RtlDeleteCriticalSection ntdll!RtlEnterCriticalSection ntdll!RtlInitializeCriticalSection ntdll!RtlInterlockedPopEntrySList ntdll!RtlInterlockedPushEntrySList ntdll!RtlLeaveCriticalSection ntdll!RtlReAllocateHeap ntdll!RtlReleaseSRWLockExclusive ntdll!RtlSizeHeap - SHELL32.dll:
PathResolve SHFileOperationW SHGetFolderPathAndSubDirW - ADVAPI32.dll:
AddAce ChangeServiceConfigW CheckTokenMembership CloseServiceHandle CloseTrace ControlService ControlTraceW ConvertSidToStringSidW CopySid EnableTraceEx2 GetAclInformation GetLengthSid GetSecurityDescriptorControl GetSecurityDescriptorDacl GetSecurityDescriptorGroup GetSecurityDescriptorLength GetSecurityDescriptorOwner GetSecurityDescriptorSacl GetSidLengthRequired GetSidSubAuthority InitializeAcl InitializeSecurityDescriptor InitializeSid IsValidSid LookupAccountSidW MakeAbsoluteSD MakeSelfRelativeSD OpenSCManagerW OpenServiceW OpenTraceW ProcessTrace QueryServiceStatus RegCloseKey RegCreateKeyExW RegEnumKeyExW RegOpenKeyExW RegQueryValueExW RegSetValueExW SetSecurityDescriptorDacl StartServiceW StartTraceW ntdll!EtwEventWrite ntdll!EtwLogTraceEvent ntdll!EtwRegisterTraceGuidsW ntdll!EtwUnregisterTraceGuids - NETSH.EXE:
MatchEnumTag MatchTagsInCmdLine PrintMessage PrintMessageFromModule RegisterContext RegisterHelper - OLEAUT32.dll:
SysAllocString SysAllocStringByteLen SysAllocStringLen SysFreeString SysStringByteLen SysStringLen VariantClear VariantInit - SHLWAPI.dll:
PathFileExistsW PathFindFileNameW PathRemoveFileSpecW PathStripPathW StrCmpIW - USER32.dll:
CharLowerBuffW CharLowerW GetSystemMetrics UnregisterClassA - WS2_32.dll:
FreeAddrInfoW GetAddrInfoW WSACleanup WSAStartup WSAStringToAddressW htonl htons - wevtapi.dll:
EvtClose EvtGetObjectArrayProperty EvtGetObjectArraySize EvtGetPublisherMetadataProperty EvtOpenPublisherMetadata - IPHLPAPI.DLL:
ConvertCompartmentGuidToId ConvertInterfaceAliasToLuid ConvertInterfaceGuidToLuid ConvertInterfaceLuidToIndex GetAdaptersAddresses - NDFAPI.DLL:
NdfCloseIncident NdfCreateIncident NdfDiagnoseIncident NdfGetTraceFile - api-ms-win-core-path-l1-1-0.dll:
KernelBase!PathCchRemoveExtension - tdh.dll:
TdhFormatProperty TdhGetEventInformation TdhGetEventMapInformation TdhGetProperty - api-ms-win-core-com-l1-1-1.dll:
combase!CLSIDFromString combase!CoCreateGuid combase!CoCreateInstance combase!CoInitializeEx combase!CoTaskMemAlloc combase!CoTaskMemFree combase!CoTaskMemRealloc combase!CoUninitialize combase!StringFromGUID2 - SspiCli.dll:
GetUserNameExW - bcrypt.dll:
BCryptCloseAlgorithmProvider BCryptCreateHash BCryptDestroyHash BCryptFinishHash BCryptGetProperty BCryptHashData BCryptOpenAlgorithmProvider - ntdll.dll:
LdrStandardizeSystemPath WinSqmAddToAverageDWORD WinSqmAddToStream WinSqmStartSession - RPCRT4.dll:
UuidCreateSequential