edputil.dll

Description: EDP util

Authors: © Microsoft Corporation. All rights reserved.

Version: 10.0.19041.4355

Architecture: 64-bit

Operating System: Windows NT

SHA256: 5bd5ae579a5c96e3ae74f1bd4776e499

File Size: 123.0 KB

Uploaded At: Dec. 1, 2025, 7:27 a.m.

Views: 9

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • EdpAddAppClipboardConsentInCache (Ordinal: 1, Address: 0x77b0)
  • EdpAuditAction (Ordinal: 2, Address: 0x77c0)
  • EdpCanCallerAccessWin32Clipboard (Ordinal: 3, Address: 0x9960)
  • EdpCheckAccess (Ordinal: 4, Address: 0xd840)
  • EdpCheckAccessForContext (Ordinal: 5, Address: 0xd930)
  • EdpCheckIsDpapiNgEntId (Ordinal: 6, Address: 0x7c20)
  • EdpCheckIsRmsEntId (Ordinal: 7, Address: 0x7c30)
  • EdpClearClipboardMetaData (Ordinal: 8, Address: 0x7c40)
  • EdpConvertProtectorToExternalId (Ordinal: 9, Address: 0x7c50)
  • EdpFreeContext (Ordinal: 10, Address: 0xd950)
  • EdpGetAppLockerUniqueAppIdentifier (Ordinal: 11, Address: 0x7c70)
  • EdpGetAppLockerUniqueAppIdentifierByToken (Ordinal: 12, Address: 0x7e40)
  • EdpGetAppLockerUniqueAppIdentifierByTokenEx (Ordinal: 13, Address: 0x7e60)
  • EdpGetClipboardAccessDeniedData (Ordinal: 14, Address: 0x9bc0)
  • EdpGetContextForBinaryPath (Ordinal: 15, Address: 0xda20)
  • EdpGetContextForImpersonatedToken (Ordinal: 16, Address: 0xda30)
  • EdpGetContextForPackageFullName (Ordinal: 17, Address: 0xdcc0)
  • EdpGetContextForProcess (Ordinal: 18, Address: 0xdce0)
  • EdpGetContextForWindow (Ordinal: 19, Address: 0xdf80)
  • EdpGetDataInfoFromDataObject (Ordinal: 20, Address: 0x9e80)
  • EdpGetDataInfoFromWin32Clipboard (Ordinal: 21, Address: 0xa100)
  • EdpGetEnterpriseIdForClipboard (Ordinal: 22, Address: 0x7fb0)
  • EdpGetEnterpriseIdForDataObject (Ordinal: 23, Address: 0xa230)
  • EdpGetEnterpriseIdForUIEnforcement (Ordinal: 24, Address: 0x7fc0)
  • EdpGetEnterpriseIdForUIEnforcementFromProcess (Ordinal: 25, Address: 0x7fd0)
  • EdpGetFilePathsForDataObject (Ordinal: 26, Address: 0xa410)
  • EdpGetIsManaged (Ordinal: 27, Address: 0x1230)
  • EdpGetPersonalEnterpriseIdString (Ordinal: 28, Address: 0x8370)
  • EdpGetPrimaryIdentities (Ordinal: 29, Address: 0x8500)
  • EdpGetPrimaryIdentityIfManaged (Ordinal: 30, Address: 0x8510)
  • EdpGetSourceAppIdForClipboard (Ordinal: 31, Address: 0x8530)
  • EdpGetSourceIsEnlightenedForClipboard (Ordinal: 32, Address: 0x8540)
  • EdpGetWindowFromThreadId (Ordinal: 33, Address: 0x8550)
  • EdpIsAppClipboardConsentCached (Ordinal: 34, Address: 0x86f0)
  • EdpIsContextExemptOrEnlightenedAllowed (Ordinal: 35, Address: 0xe320)
  • EdpIsFileAccessAllowed (Ordinal: 36, Address: 0x8700)
  • EdpIsUIPolicyEvaluationEnabledForThread (Ordinal: 37, Address: 0x8710)
  • EdpIsValidSubjectForEncryption (Ordinal: 38, Address: 0x8730)
  • EdpRequestAccess (Ordinal: 39, Address: 0xe450)
  • EdpRequestAccessForContext (Ordinal: 40, Address: 0xe590)
  • EdpSetEnterpriseIdForClipboard (Ordinal: 41, Address: 0x88d0)
  • EdpSetSourceAppIdForClipboard (Ordinal: 42, Address: 0x8910)
  • EdpSetSourceIsEnlightenedForClipboard (Ordinal: 43, Address: 0x8920)
  • EdpShouldShowEnterpriseIndicator (Ordinal: 44, Address: 0x8930)
  • EdpUtilCreateEnterpriseContextFromEnterpriseId (Ordinal: 45, Address: 0x8ac0)
  • EdpUtilFreeEnterpriseContext (Ordinal: 46, Address: 0x8c00)
  • EdpUtilGetEnterpriseContextByName (Ordinal: 47, Address: 0x8c10)
  • EdpUtilGetEnterpriseContextByProcess (Ordinal: 48, Address: 0x8c20)
  • EdpUtilGetEnterpriseContextByWindowHandle (Ordinal: 49, Address: 0x8e50)
  • EdpUtilGetEnterpriseContextForCurrentView (Ordinal: 50, Address: 0x8e60)
  • EdpUtilGetEnterpriseContextForView (Ordinal: 51, Address: 0x8e50)
  • EdpUtilIsAppEnlightened (Ordinal: 52, Address: 0x8e70)
  • EdpUtilQueryPolicy (Ordinal: 53, Address: 0x8e80)
  • GetProcessUniqueIdFromToken (Ordinal: 54, Address: 0x8ee0)

Imported DLLs & Functions

api-ms-win-core-apiquery-l1-1-0.dll
  • ApiSetQueryApiSetPresence (Address: 0x180016ce8)
api-ms-win-core-com-l1-1-0.dll
  • CoTaskMemAlloc (Address: 0x180016d08)
  • CoTaskMemFree (Address: 0x180016d00)
  • CoTaskMemRealloc (Address: 0x180016cf8)
api-ms-win-core-debug-l1-1-0.dll
  • DebugBreak (Address: 0x180016d18)
  • IsDebuggerPresent (Address: 0x180016d28)
  • OutputDebugStringW (Address: 0x180016d20)
api-ms-win-core-errorhandling-l1-1-0.dll
  • GetLastError (Address: 0x180016d48)
  • RaiseException (Address: 0x180016d50)
  • SetLastError (Address: 0x180016d40)
  • SetUnhandledExceptionFilter (Address: 0x180016d38)
  • UnhandledExceptionFilter (Address: 0x180016d58)
api-ms-win-core-handle-l1-1-0.dll
  • CloseHandle (Address: 0x180016d68)
api-ms-win-core-heap-l1-1-0.dll
  • GetProcessHeap (Address: 0x180016d78)
  • HeapAlloc (Address: 0x180016d80)
  • HeapFree (Address: 0x180016d88)
api-ms-win-core-heap-l2-1-0.dll
  • GlobalAlloc (Address: 0x180016da0)
  • GlobalFree (Address: 0x180016db0)
  • LocalAlloc (Address: 0x180016da8)
  • LocalFree (Address: 0x180016d98)
api-ms-win-core-heap-obsolete-l1-1-0.dll
  • GlobalLock (Address: 0x180016dd0)
  • GlobalSize (Address: 0x180016dc8)
  • GlobalUnlock (Address: 0x180016dc0)
api-ms-win-core-libraryloader-l1-2-0.dll
  • DisableThreadLibraryCalls (Address: 0x180016de0)
  • FindResourceExW (Address: 0x180016e38)
  • FreeLibrary (Address: 0x180016de8)
  • GetModuleFileNameA (Address: 0x180016e00)
  • GetModuleHandleExW (Address: 0x180016e20)
  • GetModuleHandleW (Address: 0x180016df8)
  • GetProcAddress (Address: 0x180016e18)
  • LoadLibraryExA (Address: 0x180016e10)
  • LoadResource (Address: 0x180016e30)
  • LoadStringA (Address: 0x180016e08)
  • LoadStringW (Address: 0x180016df0)
  • LockResource (Address: 0x180016e28)
api-ms-win-core-localization-l1-2-0.dll
  • FormatMessageW (Address: 0x180016e50)
  • IdnToAscii (Address: 0x180016e48)
api-ms-win-core-memory-l1-1-0.dll
  • VirtualProtect (Address: 0x180016e68)
  • VirtualQuery (Address: 0x180016e60)
api-ms-win-core-processthreads-l1-1-0.dll
  • GetCurrentProcess (Address: 0x180016e80)
  • GetCurrentProcessId (Address: 0x180016eb0)
  • GetCurrentThread (Address: 0x180016ec0)
  • GetCurrentThreadId (Address: 0x180016ea8)
  • OpenProcessToken (Address: 0x180016e90)
  • OpenThreadToken (Address: 0x180016eb8)
  • TerminateProcess (Address: 0x180016e98)
  • TlsAlloc (Address: 0x180016e88)
  • TlsFree (Address: 0x180016e78)
  • TlsGetValue (Address: 0x180016ec8)
  • TlsSetValue (Address: 0x180016ea0)
api-ms-win-core-processthreads-l1-1-1.dll
  • OpenProcess (Address: 0x180016ed8)
api-ms-win-core-profile-l1-1-0.dll
  • QueryPerformanceCounter (Address: 0x180016ee8)
  • QueryPerformanceFrequency (Address: 0x180016ef0)
api-ms-win-core-registry-l1-1-0.dll
  • RegCloseKey (Address: 0x180016f00)
  • RegGetValueW (Address: 0x180016f10)
  • RegOpenCurrentUser (Address: 0x180016f08)
api-ms-win-core-rtlsupport-l1-1-0.dll
  • RtlCaptureContext (Address: 0x180016f20)
  • RtlCompareMemory (Address: 0x180016f38)
  • RtlLookupFunctionEntry (Address: 0x180016f30)
  • RtlVirtualUnwind (Address: 0x180016f28)
api-ms-win-core-string-l1-1-0.dll
  • CompareStringOrdinal (Address: 0x180016f48)
api-ms-win-core-synch-l1-1-0.dll
  • AcquireSRWLockExclusive (Address: 0x180016f80)
  • CreateMutexExW (Address: 0x180016f78)
  • CreateSemaphoreExW (Address: 0x180016f58)
  • InitializeSRWLock (Address: 0x180016fa0)
  • OpenSemaphoreW (Address: 0x180016f68)
  • ReleaseMutex (Address: 0x180016f70)
  • ReleaseSemaphore (Address: 0x180016f90)
  • ReleaseSRWLockExclusive (Address: 0x180016f88)
  • WaitForSingleObject (Address: 0x180016f98)
  • WaitForSingleObjectEx (Address: 0x180016f60)
api-ms-win-core-synch-l1-2-0.dll
  • InitOnceBeginInitialize (Address: 0x180016fb0)
  • InitOnceComplete (Address: 0x180016fc0)
  • Sleep (Address: 0x180016fb8)
api-ms-win-core-sysinfo-l1-1-0.dll
  • GetSystemInfo (Address: 0x180016fd8)
  • GetSystemTimeAsFileTime (Address: 0x180016fd0)
  • GetTickCount (Address: 0x180016fe0)
api-ms-win-core-winrt-l1-1-0.dll
  • RoGetActivationFactory (Address: 0x180016ff0)
api-ms-win-core-winrt-string-l1-1-0.dll
  • WindowsCreateStringReference (Address: 0x180017000)
  • WindowsDeleteString (Address: 0x180017010)
  • WindowsGetStringLen (Address: 0x180017018)
  • WindowsGetStringRawBuffer (Address: 0x180017008)
api-ms-win-eventing-provider-l1-1-0.dll
  • EventActivityIdControl (Address: 0x180017040)
  • EventProviderEnabled (Address: 0x180017030)
  • EventRegister (Address: 0x180017028)
  • EventSetInformation (Address: 0x180017038)
  • EventUnregister (Address: 0x180017050)
  • EventWriteTransfer (Address: 0x180017048)
api-ms-win-security-base-l1-1-0.dll
  • CopySid (Address: 0x180017060)
  • GetLengthSid (Address: 0x180017068)
  • GetTokenInformation (Address: 0x180017070)
  • IsValidSid (Address: 0x180017078)
api-ms-win-security-sddl-l1-1-0.dll
  • ConvertStringSidToSidW (Address: 0x180017088)
msvcrt.dll
  • __C_specific_handler (Address: 0x1800170a8)
  • __CxxFrameHandler3 (Address: 0x180017198)
  • __dllonexit (Address: 0x1800171a0)
  • _amsg_exit (Address: 0x1800170c8)
  • _callnewh (Address: 0x1800171a8)
  • _CxxThrowException (Address: 0x180017148)
  • _initterm (Address: 0x1800170b0)
  • _lock (Address: 0x1800170a0)
  • _onexit (Address: 0x180017118)
  • _purecall (Address: 0x180017178)
  • _unlock (Address: 0x1800171b0)
  • _vsnwprintf (Address: 0x180017190)
  • _wcsicmp (Address: 0x1800170e0)
  • _wcsnicmp (Address: 0x1800170e8)
  • _XcptFilter (Address: 0x1800170d0)
  • ??0exception@@QEAA@AEBQEBD@Z (Address: 0x180017120)
  • ??0exception@@QEAA@AEBQEBDH@Z (Address: 0x180017128)
  • ??0exception@@QEAA@AEBV0@@Z (Address: 0x180017130)
  • ??1exception@@UEAA@XZ (Address: 0x180017138)
  • ??1type_info@@UEAA@XZ (Address: 0x180017160)
  • ??3@YAXPEAX@Z (Address: 0x180017180)
  • ?what@exception@@UEBAPEBDXZ (Address: 0x180017140)
  • free (Address: 0x1800170c0)
  • malloc (Address: 0x1800170b8)
  • memcmp (Address: 0x180017098)
  • memcpy (Address: 0x180017150)
  • memcpy_s (Address: 0x180017188)
  • memmove (Address: 0x180017158)
  • memset (Address: 0x1800171b8)
  • toupper (Address: 0x180017110)
  • wcschr (Address: 0x180017108)
  • wcsncmp (Address: 0x1800170f8)
  • wcsncpy_s (Address: 0x1800170d8)
  • wcsnlen (Address: 0x180017170)
  • wcsrchr (Address: 0x180017168)
  • wcsstr (Address: 0x1800170f0)
  • wcstok_s (Address: 0x180017100)
ntdll.dll
  • NtQuerySecurityAttributesToken (Address: 0x180017220)
  • NtQueryWnfStateData (Address: 0x180017210)
  • NtUpdateWnfStateData (Address: 0x1800171e8)
  • RtlAllocateHeap (Address: 0x1800171d0)
  • RtlAppendUnicodeStringToString (Address: 0x1800171e0)
  • RtlAppendUnicodeToString (Address: 0x1800171d8)
  • RtlCompareUnicodeString (Address: 0x180017200)
  • RtlCopyUnicodeString (Address: 0x1800171c8)
  • RtlFreeHeap (Address: 0x180017208)
  • RtlInitUnicodeString (Address: 0x180017228)
  • RtlNtStatusToDosError (Address: 0x180017218)
  • RtlNtStatusToDosErrorNoTeb (Address: 0x1800171f0)
  • ZwQueryWnfStateData (Address: 0x1800171f8)
OLEAUT32.dll
  • SysFreeString (Address: 0x180016cc8)
RPCRT4.dll
  • UuidFromStringW (Address: 0x180016cd8)