winsrv.dll

Description: Multi-User Windows Server DLL

Authors: © Microsoft Corporation. All rights reserved.

Version: 10.0.19041.1

Architecture: 64-bit

Operating System: Windows NT

SHA256: 7f2a683f28877562409d810946ddca2f

File Size: 61.5 KB

Uploaded At: Dec. 1, 2025, 7:44 a.m.

Views: 5

Exported Functions

  • SrvEndTask (Ordinal: 1, Address: 0x1690)
  • UserCreateCallbackThread (Ordinal: 2, Address: 0x1800)
  • UserHardError (Ordinal: 3, Address: 0x1a30)
  • UserServerDllInitialization (Ordinal: 4, Address: 0x1010)

Imported DLLs & Functions

api-ms-win-core-apiquery-l1-1-0.dll
  • ApiSetQueryApiSetPresence (Address: 0x1800021b8)
api-ms-win-core-apiquery-l2-1-0.dll
  • IsApiSetImplemented (Address: 0x1800021c8)
api-ms-win-core-delayload-l1-1-0.dll
  • DelayLoadFailureHook (Address: 0x1800021d8)
api-ms-win-core-delayload-l1-1-1.dll
  • ResolveDelayLoadedAPI (Address: 0x1800021e8)
api-ms-win-core-errorhandling-l1-1-0.dll
  • SetUnhandledExceptionFilter (Address: 0x1800021f8)
  • UnhandledExceptionFilter (Address: 0x180002200)
api-ms-win-core-handle-l1-1-0.dll
  • CloseHandle (Address: 0x180002210)
api-ms-win-core-heap-l1-1-0.dll
  • GetProcessHeap (Address: 0x180002228)
  • HeapAlloc (Address: 0x180002220)
  • HeapFree (Address: 0x180002230)
api-ms-win-core-libraryloader-l1-2-0.dll
  • DisableThreadLibraryCalls (Address: 0x180002250)
  • GetProcAddress (Address: 0x180002248)
  • LoadLibraryExW (Address: 0x180002240)
api-ms-win-core-processthreads-l1-1-0.dll
  • GetCurrentProcess (Address: 0x180002268)
  • GetCurrentProcessId (Address: 0x180002278)
  • GetCurrentThreadId (Address: 0x180002260)
  • TerminateProcess (Address: 0x180002270)
api-ms-win-core-profile-l1-1-0.dll
  • QueryPerformanceCounter (Address: 0x180002288)
api-ms-win-core-sysinfo-l1-1-0.dll
  • GetSystemTimeAsFileTime (Address: 0x1800022a0)
  • GetTickCount (Address: 0x180002298)
BASESRV.dll
  • BaseGetProcessCrtlRoutine (Address: 0x180002180)
CSRSRV.dll
  • CsrDereferenceProcess (Address: 0x180002190)
  • CsrLockedReferenceProcess (Address: 0x180002198)
  • CsrLockProcessByClientId (Address: 0x1800021a0)
  • CsrUnlockProcess (Address: 0x1800021a8)
ntdll.dll
  • DbgPrintEx (Address: 0x180002328)
  • NtClose (Address: 0x1800022f0)
  • NtOpenProcess (Address: 0x180002310)
  • NtOpenProcessToken (Address: 0x1800022c8)
  • NtQueryInformationProcess (Address: 0x180002318)
  • NtQueryInformationToken (Address: 0x180002300)
  • NtReadVirtualMemory (Address: 0x1800022f8)
  • NtSetInformationThread (Address: 0x180002308)
  • RtlAllocateHeap (Address: 0x180002330)
  • RtlCaptureContext (Address: 0x1800022b8)
  • RtlCreateSecurityDescriptor (Address: 0x1800022d0)
  • RtlCreateTagHeap (Address: 0x1800022d8)
  • RtlCreateUserThread (Address: 0x1800022e8)
  • RtlFreeHeap (Address: 0x1800022e0)
  • RtlLookupFunctionEntry (Address: 0x1800022c0)
  • RtlSetDaclSecurityDescriptor (Address: 0x180002320)
  • RtlVirtualUnwind (Address: 0x1800022b0)