winsrv.dll
Description: Multi-User Windows Server DLL
Authors: © Microsoft Corporation. All rights reserved.
Version: 10.0.19041.1
Architecture: 64-bit
Operating System: Windows NT
SHA256: 7f2a683f28877562409d810946ddca2f
File Size: 61.5 KB
Uploaded At: Dec. 1, 2025, 7:44 a.m.
Views: 5
Exported Functions
- SrvEndTask (Ordinal: 1, Address: 0x1690)
- UserCreateCallbackThread (Ordinal: 2, Address: 0x1800)
- UserHardError (Ordinal: 3, Address: 0x1a30)
- UserServerDllInitialization (Ordinal: 4, Address: 0x1010)
Imported DLLs & Functions
api-ms-win-core-apiquery-l1-1-0.dll
- ApiSetQueryApiSetPresence (Address: 0x1800021b8)
api-ms-win-core-apiquery-l2-1-0.dll
- IsApiSetImplemented (Address: 0x1800021c8)
api-ms-win-core-delayload-l1-1-0.dll
- DelayLoadFailureHook (Address: 0x1800021d8)
api-ms-win-core-delayload-l1-1-1.dll
- ResolveDelayLoadedAPI (Address: 0x1800021e8)
api-ms-win-core-errorhandling-l1-1-0.dll
- SetUnhandledExceptionFilter (Address: 0x1800021f8)
- UnhandledExceptionFilter (Address: 0x180002200)
api-ms-win-core-handle-l1-1-0.dll
- CloseHandle (Address: 0x180002210)
api-ms-win-core-heap-l1-1-0.dll
- GetProcessHeap (Address: 0x180002228)
- HeapAlloc (Address: 0x180002220)
- HeapFree (Address: 0x180002230)
api-ms-win-core-libraryloader-l1-2-0.dll
- DisableThreadLibraryCalls (Address: 0x180002250)
- GetProcAddress (Address: 0x180002248)
- LoadLibraryExW (Address: 0x180002240)
api-ms-win-core-processthreads-l1-1-0.dll
- GetCurrentProcess (Address: 0x180002268)
- GetCurrentProcessId (Address: 0x180002278)
- GetCurrentThreadId (Address: 0x180002260)
- TerminateProcess (Address: 0x180002270)
api-ms-win-core-profile-l1-1-0.dll
- QueryPerformanceCounter (Address: 0x180002288)
api-ms-win-core-sysinfo-l1-1-0.dll
- GetSystemTimeAsFileTime (Address: 0x1800022a0)
- GetTickCount (Address: 0x180002298)
BASESRV.dll
- BaseGetProcessCrtlRoutine (Address: 0x180002180)
CSRSRV.dll
- CsrDereferenceProcess (Address: 0x180002190)
- CsrLockedReferenceProcess (Address: 0x180002198)
- CsrLockProcessByClientId (Address: 0x1800021a0)
- CsrUnlockProcess (Address: 0x1800021a8)
ntdll.dll
- DbgPrintEx (Address: 0x180002328)
- NtClose (Address: 0x1800022f0)
- NtOpenProcess (Address: 0x180002310)
- NtOpenProcessToken (Address: 0x1800022c8)
- NtQueryInformationProcess (Address: 0x180002318)
- NtQueryInformationToken (Address: 0x180002300)
- NtReadVirtualMemory (Address: 0x1800022f8)
- NtSetInformationThread (Address: 0x180002308)
- RtlAllocateHeap (Address: 0x180002330)
- RtlCaptureContext (Address: 0x1800022b8)
- RtlCreateSecurityDescriptor (Address: 0x1800022d0)
- RtlCreateTagHeap (Address: 0x1800022d8)
- RtlCreateUserThread (Address: 0x1800022e8)
- RtlFreeHeap (Address: 0x1800022e0)
- RtlLookupFunctionEntry (Address: 0x1800022c0)
- RtlSetDaclSecurityDescriptor (Address: 0x180002320)
- RtlVirtualUnwind (Address: 0x1800022b0)