srcore.dll

Description: Microsoft® Windows System Restore Core Library

Authors: © Microsoft Corporation. All rights reserved.

Version: 10.0.19041.5794

Architecture: 64-bit

Operating System: Windows NT

SHA256: 9eb31c10100f0c0405971cde4a07ad25

File Size: 511.0 KB

Uploaded At: Dec. 1, 2025, 7:39 a.m.

Views: 4

Exported Functions

  • DllCanUnloadNow (Ordinal: 1, Address: 0xcab0)
  • DllGetClassObject (Ordinal: 2, Address: 0xca00)
  • DllRegisterServer (Ordinal: 3, Address: 0xcad0)
  • DllUnregisterServer (Ordinal: 4, Address: 0xcbd0)
  • ShutdownContinuation (Ordinal: 5, Address: 0x15b10)
  • SrFreeRestoreStatus (Ordinal: 6, Address: 0xcee0)
  • SrFreeRpPropArray (Ordinal: 7, Address: 0xce70)

Imported DLLs & Functions

ADVAPI32.dll
  • AdjustTokenPrivileges (Address: 0x18005ff80)
  • CloseEncryptedFileRaw (Address: 0x180060028)
  • ControlTraceW (Address: 0x180060048)
  • ConvertStringSecurityDescriptorToSecurityDescriptorW (Address: 0x18005ff88)
  • DeregisterEventSource (Address: 0x180060070)
  • EnableTraceEx2 (Address: 0x180060058)
  • EventEnabled (Address: 0x18005ff58)
  • EventRegister (Address: 0x18005ff60)
  • EventUnregister (Address: 0x18005ff48)
  • EventWrite (Address: 0x18005ff50)
  • GetTraceEnableFlags (Address: 0x18005ffc8)
  • GetTraceEnableLevel (Address: 0x18005ffd0)
  • GetTraceLoggerHandle (Address: 0x18005ffd8)
  • LookupPrivilegeValueW (Address: 0x18005ff68)
  • OpenEncryptedFileRawW (Address: 0x180060018)
  • OpenProcessToken (Address: 0x180060040)
  • OpenThreadToken (Address: 0x180060038)
  • ReadEncryptedFileRaw (Address: 0x180060020)
  • RegCloseKey (Address: 0x18005ffe0)
  • RegCreateKeyExW (Address: 0x18005fff0)
  • RegDeleteKeyExW (Address: 0x18005ff90)
  • RegDeleteValueW (Address: 0x18005ff98)
  • RegEnumKeyExW (Address: 0x18005fff8)
  • RegEnumValueW (Address: 0x18005ffa8)
  • RegisterEventSourceW (Address: 0x180060060)
  • RegisterTraceGuidsW (Address: 0x18005ffc0)
  • RegLoadKeyW (Address: 0x180060008)
  • RegOpenKeyExW (Address: 0x180060000)
  • RegOpenKeyTransactedW (Address: 0x18005ff78)
  • RegQueryInfoKeyW (Address: 0x18005ffb0)
  • RegQueryValueExW (Address: 0x18005ff70)
  • RegReplaceKeyW (Address: 0x18005ffe8)
  • RegSetValueExW (Address: 0x18005ffa0)
  • RegUnLoadKeyW (Address: 0x180060010)
  • ReportEventW (Address: 0x180060068)
  • StartTraceW (Address: 0x180060050)
  • TraceMessage (Address: 0x18005ff40)
  • UnregisterTraceGuids (Address: 0x18005ffb8)
  • WriteEncryptedFileRaw (Address: 0x180060030)
api-ms-win-core-wow64-l1-1-1.dll
  • GetSystemWow64Directory2W (Address: 0x1800604e8)
bcd.dll
  • BcdCloseObject (Address: 0x180060510)
  • BcdCloseStore (Address: 0x180060518)
  • BcdEnumerateObjects (Address: 0x180060500)
  • BcdGetElementData (Address: 0x180060520)
  • BcdOpenObject (Address: 0x180060508)
  • BcdOpenSystemStore (Address: 0x1800604f8)
KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x1800602c8)
  • AcquireSRWLockShared (Address: 0x180060098)
  • BackupRead (Address: 0x1800601d0)
  • BackupWrite (Address: 0x180060290)
  • CloseHandle (Address: 0x1800602b0)
  • CloseThreadpoolTimer (Address: 0x1800602d0)
  • CreateDirectoryExW (Address: 0x180060280)
  • CreateDirectoryW (Address: 0x180060198)
  • CreateEventW (Address: 0x180060208)
  • CreateFileMappingW (Address: 0x180060360)
  • CreateFileW (Address: 0x180060160)
  • CreateMutexExW (Address: 0x180060090)
  • CreateProcessW (Address: 0x180060368)
  • CreateSemaphoreExW (Address: 0x1800603e8)
  • CreateThread (Address: 0x180060210)
  • CreateThreadpoolTimer (Address: 0x180060420)
  • DebugBreak (Address: 0x1800600c0)
  • DeleteCriticalSection (Address: 0x1800600a0)
  • DeleteFileW (Address: 0x180060190)
  • DeleteProcThreadAttributeList (Address: 0x1800603a0)
  • DeviceIoControl (Address: 0x180060168)
  • DisableThreadLibraryCalls (Address: 0x180060148)
  • DuplicateHandle (Address: 0x180060350)
  • EnterCriticalSection (Address: 0x180060338)
  • ExpandEnvironmentStringsW (Address: 0x180060268)
  • FindClose (Address: 0x1800601f8)
  • FindFirstFileW (Address: 0x1800601e8)
  • FindFirstVolumeW (Address: 0x180060408)
  • FindNextFileW (Address: 0x1800601f0)
  • FindNextVolumeW (Address: 0x180060410)
  • FindResourceExW (Address: 0x180060130)
  • FindVolumeClose (Address: 0x180060418)
  • FormatMessageW (Address: 0x1800602f0)
  • FreeLibrary (Address: 0x1800600d8)
  • GetCurrentProcess (Address: 0x180060250)
  • GetCurrentProcessId (Address: 0x1800600a8)
  • GetCurrentThread (Address: 0x180060348)
  • GetCurrentThreadId (Address: 0x180060300)
  • GetDiskFreeSpaceExW (Address: 0x1800603d0)
  • GetDriveTypeW (Address: 0x180060400)
  • GetFileAttributesW (Address: 0x1800600d0)
  • GetFileSizeEx (Address: 0x180060188)
  • GetFileType (Address: 0x180060298)
  • GetFullPathNameW (Address: 0x1800603f8)
  • GetLastError (Address: 0x1800602e8)
  • GetModuleFileNameA (Address: 0x1800603f0)
  • GetModuleFileNameW (Address: 0x180060138)
  • GetModuleHandleExW (Address: 0x180060328)
  • GetModuleHandleW (Address: 0x1800600b8)
  • GetProcAddress (Address: 0x180060088)
  • GetProcessHeap (Address: 0x1800600b0)
  • GetProcessId (Address: 0x1800603b8)
  • GetSystemDirectoryW (Address: 0x1800603c0)
  • GetSystemInfo (Address: 0x180060110)
  • GetSystemTimeAsFileTime (Address: 0x1800601c8)
  • GetTickCount (Address: 0x180060260)
  • GetVolumeNameForVolumeMountPointW (Address: 0x180060270)
  • GetVolumePathNamesForVolumeNameW (Address: 0x180060278)
  • GetVolumePathNameW (Address: 0x180060288)
  • HeapAlloc (Address: 0x180060080)
  • HeapDestroy (Address: 0x180060150)
  • HeapFree (Address: 0x1800603e0)
  • InitializeCriticalSection (Address: 0x180060140)
  • InitializeCriticalSectionEx (Address: 0x180060318)
  • InitializeProcThreadAttributeList (Address: 0x1800603b0)
  • IsDebuggerPresent (Address: 0x1800600c8)
  • IsWow64Process2 (Address: 0x1800603c8)
  • LeaveCriticalSection (Address: 0x180060320)
  • LoadLibraryExW (Address: 0x1800600e0)
  • LoadResource (Address: 0x180060128)
  • LocalFree (Address: 0x180060158)
  • lstrcmpiW (Address: 0x1800600e8)
  • lstrcpynW (Address: 0x1800600f0)
  • MapViewOfFile (Address: 0x180060358)
  • MoveFileExW (Address: 0x1800601b8)
  • MultiByteToWideChar (Address: 0x180060118)
  • OpenSemaphoreW (Address: 0x1800602b8)
  • OutputDebugStringW (Address: 0x1800602d8)
  • QueryPerformanceCounter (Address: 0x1800601b0)
  • QueryPerformanceFrequency (Address: 0x1800601d8)
  • ReadFile (Address: 0x180060178)
  • ReleaseMutex (Address: 0x1800602f8)
  • ReleaseSemaphore (Address: 0x180060330)
  • ReleaseSRWLockExclusive (Address: 0x1800602e0)
  • ReleaseSRWLockShared (Address: 0x1800602a0)
  • RemoveDirectoryW (Address: 0x1800601c0)
  • RtlCaptureContext (Address: 0x180060228)
  • RtlLookupFunctionEntry (Address: 0x180060230)
  • RtlVirtualUnwind (Address: 0x180060238)
  • SetErrorMode (Address: 0x180060378)
  • SetEvent (Address: 0x180060200)
  • SetFileAttributesW (Address: 0x1800601a0)
  • SetFileShortNameW (Address: 0x1800601a8)
  • SetLastError (Address: 0x1800603d8)
  • SetThreadErrorMode (Address: 0x180060370)
  • SetThreadExecutionState (Address: 0x180060170)
  • SetThreadpoolTimer (Address: 0x1800602a8)
  • SetUnhandledExceptionFilter (Address: 0x180060248)
  • SizeofResource (Address: 0x180060120)
  • Sleep (Address: 0x180060220)
  • SleepConditionVariableSRW (Address: 0x180060380)
  • TerminateProcess (Address: 0x180060258)
  • UnhandledExceptionFilter (Address: 0x180060240)
  • UnmapViewOfFile (Address: 0x180060340)
  • UpdateProcThreadAttribute (Address: 0x1800603a8)
  • VirtualAlloc (Address: 0x180060100)
  • VirtualFree (Address: 0x180060398)
  • VirtualProtect (Address: 0x1800600f8)
  • VirtualQuery (Address: 0x180060108)
  • VirtualUnlock (Address: 0x180060390)
  • WaitForMultipleObjects (Address: 0x180060218)
  • WaitForSingleObject (Address: 0x180060308)
  • WaitForSingleObjectEx (Address: 0x1800602c0)
  • WaitForThreadpoolTimerCallbacks (Address: 0x180060310)
  • WakeAllConditionVariable (Address: 0x180060388)
  • WerRegisterFile (Address: 0x1800601e0)
  • WriteFile (Address: 0x180060180)
ktmw32.dll
  • CommitTransaction (Address: 0x180060540)
  • CreateTransaction (Address: 0x180060538)
  • RollbackTransaction (Address: 0x180060530)
msvcrt.dll
  • __C_specific_handler (Address: 0x1800605c8)
  • __dllonexit (Address: 0x180060580)
  • _amsg_exit (Address: 0x180060660)
  • _callnewh (Address: 0x180060650)
  • _initterm (Address: 0x180060630)
  • _lock (Address: 0x180060590)
  • _onexit (Address: 0x180060578)
  • _purecall (Address: 0x1800605a8)
  • _unlock (Address: 0x180060588)
  • _vscwprintf (Address: 0x180060568)
  • _vsnwprintf (Address: 0x1800605b0)
  • _wcsicmp (Address: 0x1800605f0)
  • _wcslwr (Address: 0x180060620)
  • _wcsnicmp (Address: 0x1800605c0)
  • _wcsupr (Address: 0x180060640)
  • _XcptFilter (Address: 0x180060658)
  • free (Address: 0x1800605d0)
  • iswspace (Address: 0x180060570)
  • malloc (Address: 0x1800605d8)
  • memcmp (Address: 0x180060608)
  • memcpy (Address: 0x180060610)
  • memcpy_s (Address: 0x1800605a0)
  • memmove (Address: 0x180060618)
  • memmove_s (Address: 0x1800605b8)
  • memset (Address: 0x180060628)
  • realloc (Address: 0x1800605e8)
  • strchr (Address: 0x180060600)
  • wcscat_s (Address: 0x1800605e0)
  • wcschr (Address: 0x1800605f8)
  • wcscmp (Address: 0x180060668)
  • wcsncmp (Address: 0x180060638)
  • wcsnlen (Address: 0x180060550)
  • wcspbrk (Address: 0x180060558)
  • wcsrchr (Address: 0x180060560)
  • wcsstr (Address: 0x180060598)
  • wcstoul (Address: 0x180060648)
ntdll.dll
  • DbgPrintEx (Address: 0x1800606d8)
  • EtwTraceMessage (Address: 0x180060720)
  • NtClearEvent (Address: 0x180060708)
  • NtClose (Address: 0x1800606e0)
  • NtOpenFile (Address: 0x1800607d8)
  • NtQueryInformationFile (Address: 0x1800607d0)
  • NtQueryInformationProcess (Address: 0x1800607b8)
  • NtQuerySecurityObject (Address: 0x180060728)
  • NtSetInformationFile (Address: 0x1800607e0)
  • NtSetInformationProcess (Address: 0x1800607b0)
  • NtSetSecurityObject (Address: 0x180060758)
  • NtSetSystemInformation (Address: 0x1800606f0)
  • RtlComputeCrc32 (Address: 0x1800606c8)
  • RtlCreateSystemVolumeInformationFolder (Address: 0x180060770)
  • RtlDecodeSystemPointer (Address: 0x180060710)
  • RtlDeleteCriticalSection (Address: 0x180060680)
  • RtlDeleteElementGenericTableAvl (Address: 0x1800606a0)
  • RtlDosPathNameToNtPathName_U (Address: 0x1800606d0)
  • RtlEnumerateGenericTableAvl (Address: 0x1800606a8)
  • RtlEnumerateGenericTableWithoutSplayingAvl (Address: 0x180060718)
  • RtlFreeHeap (Address: 0x180060778)
  • RtlFreeUnicodeString (Address: 0x180060798)
  • RtlGetControlSecurityDescriptor (Address: 0x180060738)
  • RtlGetCurrentTransaction (Address: 0x180060690)
  • RtlGetDaclSecurityDescriptor (Address: 0x180060748)
  • RtlGetLastNtStatus (Address: 0x180060780)
  • RtlGetSaclSecurityDescriptor (Address: 0x180060750)
  • RtlGetSetBootStatusData (Address: 0x180060790)
  • RtlInitializeBitMap (Address: 0x1800607a8)
  • RtlInitializeCriticalSection (Address: 0x180060678)
  • RtlInitializeGenericTableAvl (Address: 0x1800606b0)
  • RtlInitUnicodeString (Address: 0x180060768)
  • RtlInsertElementGenericTableAvl (Address: 0x1800606c0)
  • RtlLockBootStatusData (Address: 0x180060788)
  • RtlLookupElementGenericTableAvl (Address: 0x1800606b8)
  • RtlNtStatusToDosError (Address: 0x180060760)
  • RtlReleasePebLock (Address: 0x180060700)
  • RtlSetBits (Address: 0x1800607a0)
  • RtlSetControlSecurityDescriptor (Address: 0x180060740)
  • RtlSetCurrentTransaction (Address: 0x180060688)
  • RtlTryAcquirePebLock (Address: 0x1800606f8)
  • RtlUnlockBootStatusData (Address: 0x1800607c8)
  • RtlValidRelativeSecurityDescriptor (Address: 0x180060730)
  • RtlWerpReportException (Address: 0x1800606e8)
  • WinSqmAddToStream (Address: 0x180060698)
  • WinSqmAddToStreamEx (Address: 0x1800607c0)
ole32.dll
  • CLSIDFromString (Address: 0x180060830)
  • CoCreateGuid (Address: 0x180060800)
  • CoCreateInstance (Address: 0x180060818)
  • CoGetMalloc (Address: 0x1800607f0)
  • CoTaskMemAlloc (Address: 0x180060808)
  • CoTaskMemFree (Address: 0x1800607f8)
  • CoTaskMemRealloc (Address: 0x180060810)
  • StringFromCLSID (Address: 0x180060820)
  • StringFromGUID2 (Address: 0x180060828)
OLEAUT32.dll
  • SysAllocString (Address: 0x180060430)
  • SysFreeString (Address: 0x180060440)
  • VarUI4FromStr (Address: 0x180060438)
RPCRT4.dll
  • I_RpcExceptionFilter (Address: 0x180060478)
  • MesDecodeBufferHandleCreate (Address: 0x180060470)
  • MesEncodeDynBufferHandleCreate (Address: 0x180060460)
  • MesHandleFree (Address: 0x180060468)
  • NdrMesTypeDecode3 (Address: 0x180060458)
  • NdrMesTypeEncode3 (Address: 0x180060450)
SPP.dll
  • SppFreeGroupPropArray (Address: 0x180060488)
  • SxTracerDebuggerBreak (Address: 0x1800604a0)
  • SxTracerGetThreadContextRetail (Address: 0x180060490)
  • SxTracerShouldTrackFailure (Address: 0x180060498)
USER32.dll
  • CharNextW (Address: 0x1800604b0)
  • CharPrevW (Address: 0x1800604b8)
  • GetSystemMetrics (Address: 0x1800604c0)
  • LoadStringW (Address: 0x1800604c8)
VSSAPI.DLL
  • GetProviderMgmtInterfaceInternal (Address: 0x1800604d8)
wer.dll
  • WerReportAddFile (Address: 0x180060840)
  • WerReportCloseHandle (Address: 0x180060858)
  • WerReportCreate (Address: 0x180060860)
  • WerReportSetParameter (Address: 0x180060848)
  • WerReportSubmit (Address: 0x180060850)