srpapi.dll
Description: SRP APIs Dll
Authors: © Microsoft Corporation. All rights reserved.
Version: 10.0.19041.5072
Architecture: 64-bit
Operating System: Windows NT
SHA256: 2d031c6965bf307399e5b5307d332067
File Size: 154.0 KB
Uploaded At: Dec. 1, 2025, 7:39 a.m.
Views: 9
Exported Functions
- AiEvaluatePlugin (Ordinal: 1, Address: 0x60a0)
- AppIDDecodeAttributeString (Ordinal: 2, Address: 0x6810)
- AppIDEncodeAttributeString (Ordinal: 3, Address: 0x6720)
- AppIDFreeAttributeString (Ordinal: 4, Address: 0x6900)
- SrpCloseThreadNetworkContext (Ordinal: 5, Address: 0x11a0)
- SrpCloseTrackInstall (Ordinal: 6, Address: 0x6ca0)
- SrpCreateThreadNetworkContext (Ordinal: 7, Address: 0x1110)
- SrpDisablePermissiveModeFileEncryption (Ordinal: 8, Address: 0x17a0)
- SrpDoesPolicyAllowAppExecution (Ordinal: 9, Address: 0x13e0)
- SrpEnablePermissiveModeFileEncryption (Ordinal: 10, Address: 0x1740)
- SrpGetAllowedEnterprises (Ordinal: 11, Address: 0x6340)
- SrpGetAppxFqbnFromPackageFullName (Ordinal: 12, Address: 0x6d20)
- SrpGetEnterpriseIds (Ordinal: 13, Address: 0x14c0)
- SrpGetEnterprisePolicy (Ordinal: 14, Address: 0x15e0)
- SrpInheritEnterpriseContext (Ordinal: 15, Address: 0x1330)
- SrpInheritOriginClaim (Ordinal: 16, Address: 0x6a80)
- SrpIsAllowed (Ordinal: 17, Address: 0x52c0)
- SrpIsTokenService (Ordinal: 18, Address: 0x7650)
- SrpOpenTrackInstall (Ordinal: 19, Address: 0x6c00)
- SrpRestoreEnterpriseContext (Ordinal: 20, Address: 0x1380)
- SrpSetTokenEnterpriseId (Ordinal: 21, Address: 0x1230)
Imported DLLs & Functions
api-ms-win-appmodel-runtime-l1-1-0.dll
- PackageFamilyNameFromFullName (Address: 0x180014700)
- PackageFamilyNameFromId (Address: 0x180014718)
- PackageIdFromFullName (Address: 0x180014708)
- PackageNameAndPublisherIdFromFamilyName (Address: 0x180014710)
api-ms-win-appmodel-runtime-l1-1-1.dll
- GetStagedPackageOrigin (Address: 0x180014730)
- GetStagedPackagePathByFullName (Address: 0x180014728)
api-ms-win-core-apiquery-l1-1-0.dll
- ApiSetQueryApiSetPresence (Address: 0x180014740)
api-ms-win-core-debug-l1-1-0.dll
- DebugBreak (Address: 0x180014760)
- IsDebuggerPresent (Address: 0x180014750)
- OutputDebugStringW (Address: 0x180014758)
api-ms-win-core-delayload-l1-1-0.dll
- DelayLoadFailureHook (Address: 0x180014770)
api-ms-win-core-delayload-l1-1-1.dll
- ResolveDelayLoadedAPI (Address: 0x180014780)
api-ms-win-core-errorhandling-l1-1-0.dll
- GetLastError (Address: 0x180014798)
- SetUnhandledExceptionFilter (Address: 0x1800147a0)
- UnhandledExceptionFilter (Address: 0x180014790)
api-ms-win-core-file-l1-1-0.dll
- CreateFileW (Address: 0x1800147b8)
- GetFinalPathNameByHandleW (Address: 0x1800147b0)
api-ms-win-core-handle-l1-1-0.dll
- CloseHandle (Address: 0x1800147c8)
api-ms-win-core-heap-l1-1-0.dll
- GetProcessHeap (Address: 0x1800147d8)
- HeapAlloc (Address: 0x1800147e0)
- HeapFree (Address: 0x1800147e8)
api-ms-win-core-heap-l2-1-0.dll
- LocalAlloc (Address: 0x180014800)
- LocalFree (Address: 0x1800147f8)
api-ms-win-core-io-l1-1-0.dll
- DeviceIoControl (Address: 0x180014810)
api-ms-win-core-libraryloader-l1-2-0.dll
- DisableThreadLibraryCalls (Address: 0x180014850)
- FreeLibrary (Address: 0x180014840)
- GetModuleFileNameA (Address: 0x180014820)
- GetModuleHandleExW (Address: 0x180014848)
- GetModuleHandleW (Address: 0x180014828)
- GetProcAddress (Address: 0x180014830)
- LoadLibraryExW (Address: 0x180014838)
api-ms-win-core-localization-l1-2-0.dll
- FormatMessageW (Address: 0x180014860)
api-ms-win-core-processthreads-l1-1-0.dll
- GetCurrentProcess (Address: 0x180014878)
- GetCurrentProcessId (Address: 0x180014890)
- GetCurrentThreadId (Address: 0x180014880)
- OpenProcessToken (Address: 0x180014870)
- TerminateProcess (Address: 0x180014888)
api-ms-win-core-profile-l1-1-0.dll
- QueryPerformanceCounter (Address: 0x1800148a0)
api-ms-win-core-registry-l1-1-0.dll
- RegQueryValueExW (Address: 0x1800148b0)
api-ms-win-core-registry-l2-1-0.dll
- RegCreateKeyW (Address: 0x1800148c0)
api-ms-win-core-rtlsupport-l1-1-0.dll
- RtlCaptureContext (Address: 0x1800148e8)
- RtlCompareMemory (Address: 0x1800148e0)
- RtlLookupFunctionEntry (Address: 0x1800148d8)
- RtlVirtualUnwind (Address: 0x1800148d0)
api-ms-win-core-synch-l1-1-0.dll
- CreateMutexExW (Address: 0x1800148f8)
- CreateSemaphoreExW (Address: 0x180014908)
- OpenSemaphoreW (Address: 0x180014928)
- ReleaseMutex (Address: 0x180014900)
- ReleaseSemaphore (Address: 0x180014910)
- WaitForSingleObject (Address: 0x180014918)
- WaitForSingleObjectEx (Address: 0x180014920)
api-ms-win-core-synch-l1-2-0.dll
- Sleep (Address: 0x180014938)
api-ms-win-core-sysinfo-l1-1-0.dll
- GetSystemTimeAsFileTime (Address: 0x180014950)
- GetTickCount (Address: 0x180014948)
api-ms-win-ntuser-sysparams-l1-1-0.dll
- GetSystemMetrics (Address: 0x180014960)
bcrypt.dll
- BCryptCloseAlgorithmProvider (Address: 0x180014970)
- BCryptCreateHash (Address: 0x180014990)
- BCryptDestroyHash (Address: 0x1800149a0)
- BCryptFinishHash (Address: 0x180014980)
- BCryptGetProperty (Address: 0x180014998)
- BCryptHashData (Address: 0x180014988)
- BCryptOpenAlgorithmProvider (Address: 0x180014978)
CRYPT32.dll
- CertGetEnhancedKeyUsage (Address: 0x1800146d8)
- CertGetNameStringW (Address: 0x1800146c8)
- CryptSIPLoad (Address: 0x1800146e0)
- CryptSIPRetrieveSubjectGuidForCatalogFile (Address: 0x1800146d0)
KERNELBASE.dll
- IsDeveloperModeEnabled (Address: 0x1800146f0)
msvcrt.dll
- __C_specific_handler (Address: 0x1800149e0)
- __CxxFrameHandler3 (Address: 0x180014a98)
- __dllonexit (Address: 0x1800149f8)
- _amsg_exit (Address: 0x180014a80)
- _CxxThrowException (Address: 0x180014a38)
- _errno (Address: 0x1800149c0)
- _initterm (Address: 0x180014a50)
- _lock (Address: 0x180014a40)
- _onexit (Address: 0x1800149f0)
- _stricmp (Address: 0x180014a68)
- _unlock (Address: 0x180014a00)
- _vsnprintf (Address: 0x1800149b0)
- _vsnprintf_s (Address: 0x180014aa0)
- _vsnwprintf (Address: 0x180014a28)
- _wcsicmp (Address: 0x180014a10)
- _wcstoi64 (Address: 0x180014a18)
- _XcptFilter (Address: 0x180014a88)
- ??0exception@@QEAA@AEBV0@@Z (Address: 0x1800149d0)
- ??0exception@@QEAA@XZ (Address: 0x1800149c8)
- ??1exception@@UEAA@XZ (Address: 0x180014a20)
- ??1type_info@@UEAA@XZ (Address: 0x180014a48)
- ??3@YAXPEAX@Z (Address: 0x1800149b8)
- free (Address: 0x180014a60)
- iswspace (Address: 0x180014aa8)
- malloc (Address: 0x180014a58)
- memcmp (Address: 0x180014a30)
- memcpy (Address: 0x180014a08)
- memcpy_s (Address: 0x180014a90)
- memmove (Address: 0x1800149d8)
- memset (Address: 0x1800149e8)
- strcmp (Address: 0x180014ab0)
- wcsnlen (Address: 0x180014a78)
- wcsstr (Address: 0x180014a70)
ntdll.dll
- EtwEventEnabled (Address: 0x180014ac8)
- EtwEventRegister (Address: 0x180014be8)
- EtwEventUnregister (Address: 0x180014be0)
- EtwEventWrite (Address: 0x180014bd0)
- EtwEventWriteTransfer (Address: 0x180014ac0)
- EtwGetTraceEnableFlags (Address: 0x180014c08)
- EtwGetTraceEnableLevel (Address: 0x180014c10)
- EtwGetTraceLoggerHandle (Address: 0x180014c18)
- EtwRegisterTraceGuidsW (Address: 0x180014c00)
- EtwTraceMessage (Address: 0x180014c20)
- EtwUnregisterTraceGuids (Address: 0x180014bf8)
- LdrResRelease (Address: 0x180014ca0)
- LdrResSearchResource (Address: 0x180014bb8)
- NtAccessCheck (Address: 0x180014bb0)
- NtClose (Address: 0x180014b38)
- NtCreateSection (Address: 0x180014c88)
- NtDelayExecution (Address: 0x180014b30)
- NtDeviceIoControlFile (Address: 0x180014b98)
- NtDuplicateObject (Address: 0x180014c50)
- NtDuplicateToken (Address: 0x180014cc8)
- NtGetCachedSigningLevel (Address: 0x180014c60)
- NtMapViewOfSection (Address: 0x180014c98)
- NtOpenFile (Address: 0x180014b28)
- NtOpenKey (Address: 0x180014ba0)
- NtOpenProcessToken (Address: 0x180014c40)
- NtOpenSymbolicLinkObject (Address: 0x180014b78)
- NtOpenThreadToken (Address: 0x180014c58)
- NtQueryDirectoryFile (Address: 0x180014b48)
- NtQueryEaFile (Address: 0x180014c30)
- NtQueryInformationFile (Address: 0x180014b18)
- NtQueryLicenseValue (Address: 0x180014b20)
- NtQueryObject (Address: 0x180014b90)
- NtQuerySecurityAttributesToken (Address: 0x180014c28)
- NtQuerySymbolicLinkObject (Address: 0x180014b80)
- NtQueryValueKey (Address: 0x180014ba8)
- NtQueryVolumeInformationFile (Address: 0x180014b88)
- NtReadFile (Address: 0x180014b00)
- NtSetCachedSigningLevel (Address: 0x180014c68)
- NtSetInformationThread (Address: 0x180014c48)
- NtSetValueKey (Address: 0x180014cb8)
- NtUnmapViewOfSection (Address: 0x180014c90)
- NtWaitForSingleObject (Address: 0x180014b08)
- RtlAcquireSRWLockExclusive (Address: 0x180014b60)
- RtlAllocateHeap (Address: 0x180014af0)
- RtlAppendUnicodeStringToString (Address: 0x180014c78)
- RtlAppendUnicodeToString (Address: 0x180014c80)
- RtlCompareUnicodeString (Address: 0x180014bc0)
- RtlCopyUnicodeString (Address: 0x180014b70)
- RtlCreateUnicodeString (Address: 0x180014b40)
- RtlEqualSid (Address: 0x180014c70)
- RtlEqualUnicodeString (Address: 0x180014ad8)
- RtlFreeHeap (Address: 0x180014af8)
- RtlFreeUnicodeString (Address: 0x180014cc0)
- RtlGetNtSystemRoot (Address: 0x180014b58)
- RtlGUIDFromString (Address: 0x180014ae0)
- RtlInitializeSRWLock (Address: 0x180014b50)
- RtlInitUnicodeString (Address: 0x180014ca8)
- RtlLengthSid (Address: 0x180014ad0)
- RtlNtStatusToDosError (Address: 0x180014c38)
- RtlNtStatusToDosErrorNoTeb (Address: 0x180014bc8)
- RtlPrefixUnicodeString (Address: 0x180014ae8)
- RtlReleaseSRWLockExclusive (Address: 0x180014b68)
- RtlRunOnceExecuteOnce (Address: 0x180014bd8)
- RtlSetLastWin32Error (Address: 0x180014bf0)
- RtlSetThreadSubProcessTag (Address: 0x180014cb0)
- RtlUpcaseUnicodeString (Address: 0x180014b10)