fmapi.dll

Description: File Management API

Authors: © Microsoft Corporation. All rights reserved.

Version: 10.0.19041.1

Architecture: 64-bit

Operating System: Windows NT

SHA256: cd375aeab416e68c62ed19bc2f2c5e59

File Size: 73.5 KB

Uploaded At: Dec. 1, 2025, 7:28 a.m.

Views: 9

Exported Functions

  • CloseFileRestoreContext (Ordinal: 1, Address: 0xdb30)
  • CreateFileRestoreContext (Ordinal: 2, Address: 0xd6c0)
  • DetectBootSector (Ordinal: 3, Address: 0xdfe0)
  • DetectEncryptedVolume (Ordinal: 4, Address: 0xdfb0)
  • DetectEncryptedVolumeEx (Ordinal: 5, Address: 0xdfb0)
  • RestoreFile (Ordinal: 6, Address: 0xddd0)
  • ScanRestorableFiles (Ordinal: 7, Address: 0xdc50)
  • SupplyDecryptionInfo (Ordinal: 8, Address: 0xdfb0)

Imported DLLs & Functions

ADVAPI32.dll
  • GetTraceEnableFlags (Address: 0x180011368)
  • GetTraceEnableLevel (Address: 0x180011390)
  • GetTraceLoggerHandle (Address: 0x180011380)
  • RegCloseKey (Address: 0x180011370)
  • RegisterTraceGuidsW (Address: 0x180011398)
  • RegOpenKeyExW (Address: 0x180011378)
  • TraceMessage (Address: 0x180011388)
  • UnregisterTraceGuids (Address: 0x1800113a0)
KERNEL32.dll
  • CloseHandle (Address: 0x180011450)
  • CreateFileW (Address: 0x180011438)
  • DebugBreak (Address: 0x180011418)
  • DeleteCriticalSection (Address: 0x180011478)
  • DeleteFileW (Address: 0x180011448)
  • DeviceIoControl (Address: 0x180011488)
  • DosDateTimeToFileTime (Address: 0x180011460)
  • EnterCriticalSection (Address: 0x180011490)
  • GetCurrentProcess (Address: 0x1800113d8)
  • GetCurrentProcessId (Address: 0x1800113c0)
  • GetCurrentThreadId (Address: 0x180011420)
  • GetLastError (Address: 0x180011440)
  • GetSystemTimeAsFileTime (Address: 0x1800113b8)
  • GetTickCount (Address: 0x1800113b0)
  • GetVersionExW (Address: 0x180011410)
  • InitializeCriticalSectionAndSpinCount (Address: 0x180011428)
  • LeaveCriticalSection (Address: 0x180011470)
  • MultiByteToWideChar (Address: 0x180011458)
  • QueryPerformanceCounter (Address: 0x1800113c8)
  • ReadFile (Address: 0x180011480)
  • RtlCaptureContext (Address: 0x180011400)
  • RtlLookupFunctionEntry (Address: 0x1800113f8)
  • RtlVirtualUnwind (Address: 0x1800113f0)
  • SetFilePointerEx (Address: 0x180011498)
  • SetLastError (Address: 0x180011468)
  • SetUnhandledExceptionFilter (Address: 0x1800113e0)
  • Sleep (Address: 0x180011408)
  • TerminateProcess (Address: 0x1800113d0)
  • UnhandledExceptionFilter (Address: 0x1800113e8)
  • WriteFile (Address: 0x180011430)
msvcrt.dll
  • __C_specific_handler (Address: 0x180011520)
  • _amsg_exit (Address: 0x1800114c8)
  • _callnewh (Address: 0x1800114d8)
  • _CxxThrowException (Address: 0x180011510)
  • _initterm (Address: 0x1800114c0)
  • _purecall (Address: 0x180011550)
  • _vsnwprintf (Address: 0x180011558)
  • _wcsicmp (Address: 0x180011538)
  • _XcptFilter (Address: 0x1800114d0)
  • ??0exception@@QEAA@AEBQEBDH@Z (Address: 0x1800114f8)
  • ??0exception@@QEAA@AEBV0@@Z (Address: 0x1800114f0)
  • ??1exception@@UEAA@XZ (Address: 0x1800114e8)
  • ??1type_info@@UEAA@XZ (Address: 0x1800114b8)
  • ?what@exception@@UEBAPEBDXZ (Address: 0x1800114e0)
  • free (Address: 0x180011518)
  • malloc (Address: 0x180011500)
  • memcmp (Address: 0x180011568)
  • memcpy (Address: 0x180011560)
  • memcpy_s (Address: 0x180011540)
  • memmove (Address: 0x180011508)
  • memset (Address: 0x180011570)
  • wcschr (Address: 0x180011548)
  • wcscpy_s (Address: 0x180011530)
  • wcsncmp (Address: 0x180011528)
ntdll.dll
  • RtlDecompressBuffer (Address: 0x180011580)
USER32.dll
  • CharUpperW (Address: 0x1800114a8)