edputil.dll
Description: EDP util
Authors: © Microsoft Corporation. All rights reserved.
Version: 10.0.19041.4355
Architecture: 64-bit
Operating System: Windows NT
SHA256: 5bd5ae579a5c96e3ae74f1bd4776e499
File Size: 123.0 KB
Uploaded At: Dec. 1, 2025, 7:27 a.m.
Views: 9
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: OpenProcess
Exported Functions
- EdpAddAppClipboardConsentInCache (Ordinal: 1, Address: 0x77b0)
- EdpAuditAction (Ordinal: 2, Address: 0x77c0)
- EdpCanCallerAccessWin32Clipboard (Ordinal: 3, Address: 0x9960)
- EdpCheckAccess (Ordinal: 4, Address: 0xd840)
- EdpCheckAccessForContext (Ordinal: 5, Address: 0xd930)
- EdpCheckIsDpapiNgEntId (Ordinal: 6, Address: 0x7c20)
- EdpCheckIsRmsEntId (Ordinal: 7, Address: 0x7c30)
- EdpClearClipboardMetaData (Ordinal: 8, Address: 0x7c40)
- EdpConvertProtectorToExternalId (Ordinal: 9, Address: 0x7c50)
- EdpFreeContext (Ordinal: 10, Address: 0xd950)
- EdpGetAppLockerUniqueAppIdentifier (Ordinal: 11, Address: 0x7c70)
- EdpGetAppLockerUniqueAppIdentifierByToken (Ordinal: 12, Address: 0x7e40)
- EdpGetAppLockerUniqueAppIdentifierByTokenEx (Ordinal: 13, Address: 0x7e60)
- EdpGetClipboardAccessDeniedData (Ordinal: 14, Address: 0x9bc0)
- EdpGetContextForBinaryPath (Ordinal: 15, Address: 0xda20)
- EdpGetContextForImpersonatedToken (Ordinal: 16, Address: 0xda30)
- EdpGetContextForPackageFullName (Ordinal: 17, Address: 0xdcc0)
- EdpGetContextForProcess (Ordinal: 18, Address: 0xdce0)
- EdpGetContextForWindow (Ordinal: 19, Address: 0xdf80)
- EdpGetDataInfoFromDataObject (Ordinal: 20, Address: 0x9e80)
- EdpGetDataInfoFromWin32Clipboard (Ordinal: 21, Address: 0xa100)
- EdpGetEnterpriseIdForClipboard (Ordinal: 22, Address: 0x7fb0)
- EdpGetEnterpriseIdForDataObject (Ordinal: 23, Address: 0xa230)
- EdpGetEnterpriseIdForUIEnforcement (Ordinal: 24, Address: 0x7fc0)
- EdpGetEnterpriseIdForUIEnforcementFromProcess (Ordinal: 25, Address: 0x7fd0)
- EdpGetFilePathsForDataObject (Ordinal: 26, Address: 0xa410)
- EdpGetIsManaged (Ordinal: 27, Address: 0x1230)
- EdpGetPersonalEnterpriseIdString (Ordinal: 28, Address: 0x8370)
- EdpGetPrimaryIdentities (Ordinal: 29, Address: 0x8500)
- EdpGetPrimaryIdentityIfManaged (Ordinal: 30, Address: 0x8510)
- EdpGetSourceAppIdForClipboard (Ordinal: 31, Address: 0x8530)
- EdpGetSourceIsEnlightenedForClipboard (Ordinal: 32, Address: 0x8540)
- EdpGetWindowFromThreadId (Ordinal: 33, Address: 0x8550)
- EdpIsAppClipboardConsentCached (Ordinal: 34, Address: 0x86f0)
- EdpIsContextExemptOrEnlightenedAllowed (Ordinal: 35, Address: 0xe320)
- EdpIsFileAccessAllowed (Ordinal: 36, Address: 0x8700)
- EdpIsUIPolicyEvaluationEnabledForThread (Ordinal: 37, Address: 0x8710)
- EdpIsValidSubjectForEncryption (Ordinal: 38, Address: 0x8730)
- EdpRequestAccess (Ordinal: 39, Address: 0xe450)
- EdpRequestAccessForContext (Ordinal: 40, Address: 0xe590)
- EdpSetEnterpriseIdForClipboard (Ordinal: 41, Address: 0x88d0)
- EdpSetSourceAppIdForClipboard (Ordinal: 42, Address: 0x8910)
- EdpSetSourceIsEnlightenedForClipboard (Ordinal: 43, Address: 0x8920)
- EdpShouldShowEnterpriseIndicator (Ordinal: 44, Address: 0x8930)
- EdpUtilCreateEnterpriseContextFromEnterpriseId (Ordinal: 45, Address: 0x8ac0)
- EdpUtilFreeEnterpriseContext (Ordinal: 46, Address: 0x8c00)
- EdpUtilGetEnterpriseContextByName (Ordinal: 47, Address: 0x8c10)
- EdpUtilGetEnterpriseContextByProcess (Ordinal: 48, Address: 0x8c20)
- EdpUtilGetEnterpriseContextByWindowHandle (Ordinal: 49, Address: 0x8e50)
- EdpUtilGetEnterpriseContextForCurrentView (Ordinal: 50, Address: 0x8e60)
- EdpUtilGetEnterpriseContextForView (Ordinal: 51, Address: 0x8e50)
- EdpUtilIsAppEnlightened (Ordinal: 52, Address: 0x8e70)
- EdpUtilQueryPolicy (Ordinal: 53, Address: 0x8e80)
- GetProcessUniqueIdFromToken (Ordinal: 54, Address: 0x8ee0)
Imported DLLs & Functions
api-ms-win-core-apiquery-l1-1-0.dll
- ApiSetQueryApiSetPresence (Address: 0x180016ce8)
api-ms-win-core-com-l1-1-0.dll
- CoTaskMemAlloc (Address: 0x180016d08)
- CoTaskMemFree (Address: 0x180016d00)
- CoTaskMemRealloc (Address: 0x180016cf8)
api-ms-win-core-debug-l1-1-0.dll
- DebugBreak (Address: 0x180016d18)
- IsDebuggerPresent (Address: 0x180016d28)
- OutputDebugStringW (Address: 0x180016d20)
api-ms-win-core-errorhandling-l1-1-0.dll
- GetLastError (Address: 0x180016d48)
- RaiseException (Address: 0x180016d50)
- SetLastError (Address: 0x180016d40)
- SetUnhandledExceptionFilter (Address: 0x180016d38)
- UnhandledExceptionFilter (Address: 0x180016d58)
api-ms-win-core-handle-l1-1-0.dll
- CloseHandle (Address: 0x180016d68)
api-ms-win-core-heap-l1-1-0.dll
- GetProcessHeap (Address: 0x180016d78)
- HeapAlloc (Address: 0x180016d80)
- HeapFree (Address: 0x180016d88)
api-ms-win-core-heap-l2-1-0.dll
- GlobalAlloc (Address: 0x180016da0)
- GlobalFree (Address: 0x180016db0)
- LocalAlloc (Address: 0x180016da8)
- LocalFree (Address: 0x180016d98)
api-ms-win-core-heap-obsolete-l1-1-0.dll
- GlobalLock (Address: 0x180016dd0)
- GlobalSize (Address: 0x180016dc8)
- GlobalUnlock (Address: 0x180016dc0)
api-ms-win-core-libraryloader-l1-2-0.dll
- DisableThreadLibraryCalls (Address: 0x180016de0)
- FindResourceExW (Address: 0x180016e38)
- FreeLibrary (Address: 0x180016de8)
- GetModuleFileNameA (Address: 0x180016e00)
- GetModuleHandleExW (Address: 0x180016e20)
- GetModuleHandleW (Address: 0x180016df8)
- GetProcAddress (Address: 0x180016e18)
- LoadLibraryExA (Address: 0x180016e10)
- LoadResource (Address: 0x180016e30)
- LoadStringA (Address: 0x180016e08)
- LoadStringW (Address: 0x180016df0)
- LockResource (Address: 0x180016e28)
api-ms-win-core-localization-l1-2-0.dll
- FormatMessageW (Address: 0x180016e50)
- IdnToAscii (Address: 0x180016e48)
api-ms-win-core-memory-l1-1-0.dll
- VirtualProtect (Address: 0x180016e68)
- VirtualQuery (Address: 0x180016e60)
api-ms-win-core-processthreads-l1-1-0.dll
- GetCurrentProcess (Address: 0x180016e80)
- GetCurrentProcessId (Address: 0x180016eb0)
- GetCurrentThread (Address: 0x180016ec0)
- GetCurrentThreadId (Address: 0x180016ea8)
- OpenProcessToken (Address: 0x180016e90)
- OpenThreadToken (Address: 0x180016eb8)
- TerminateProcess (Address: 0x180016e98)
- TlsAlloc (Address: 0x180016e88)
- TlsFree (Address: 0x180016e78)
- TlsGetValue (Address: 0x180016ec8)
- TlsSetValue (Address: 0x180016ea0)
api-ms-win-core-processthreads-l1-1-1.dll
- OpenProcess (Address: 0x180016ed8)
api-ms-win-core-profile-l1-1-0.dll
- QueryPerformanceCounter (Address: 0x180016ee8)
- QueryPerformanceFrequency (Address: 0x180016ef0)
api-ms-win-core-registry-l1-1-0.dll
- RegCloseKey (Address: 0x180016f00)
- RegGetValueW (Address: 0x180016f10)
- RegOpenCurrentUser (Address: 0x180016f08)
api-ms-win-core-rtlsupport-l1-1-0.dll
- RtlCaptureContext (Address: 0x180016f20)
- RtlCompareMemory (Address: 0x180016f38)
- RtlLookupFunctionEntry (Address: 0x180016f30)
- RtlVirtualUnwind (Address: 0x180016f28)
api-ms-win-core-string-l1-1-0.dll
- CompareStringOrdinal (Address: 0x180016f48)
api-ms-win-core-synch-l1-1-0.dll
- AcquireSRWLockExclusive (Address: 0x180016f80)
- CreateMutexExW (Address: 0x180016f78)
- CreateSemaphoreExW (Address: 0x180016f58)
- InitializeSRWLock (Address: 0x180016fa0)
- OpenSemaphoreW (Address: 0x180016f68)
- ReleaseMutex (Address: 0x180016f70)
- ReleaseSemaphore (Address: 0x180016f90)
- ReleaseSRWLockExclusive (Address: 0x180016f88)
- WaitForSingleObject (Address: 0x180016f98)
- WaitForSingleObjectEx (Address: 0x180016f60)
api-ms-win-core-synch-l1-2-0.dll
- InitOnceBeginInitialize (Address: 0x180016fb0)
- InitOnceComplete (Address: 0x180016fc0)
- Sleep (Address: 0x180016fb8)
api-ms-win-core-sysinfo-l1-1-0.dll
- GetSystemInfo (Address: 0x180016fd8)
- GetSystemTimeAsFileTime (Address: 0x180016fd0)
- GetTickCount (Address: 0x180016fe0)
api-ms-win-core-winrt-l1-1-0.dll
- RoGetActivationFactory (Address: 0x180016ff0)
api-ms-win-core-winrt-string-l1-1-0.dll
- WindowsCreateStringReference (Address: 0x180017000)
- WindowsDeleteString (Address: 0x180017010)
- WindowsGetStringLen (Address: 0x180017018)
- WindowsGetStringRawBuffer (Address: 0x180017008)
api-ms-win-eventing-provider-l1-1-0.dll
- EventActivityIdControl (Address: 0x180017040)
- EventProviderEnabled (Address: 0x180017030)
- EventRegister (Address: 0x180017028)
- EventSetInformation (Address: 0x180017038)
- EventUnregister (Address: 0x180017050)
- EventWriteTransfer (Address: 0x180017048)
api-ms-win-security-base-l1-1-0.dll
- CopySid (Address: 0x180017060)
- GetLengthSid (Address: 0x180017068)
- GetTokenInformation (Address: 0x180017070)
- IsValidSid (Address: 0x180017078)
api-ms-win-security-sddl-l1-1-0.dll
- ConvertStringSidToSidW (Address: 0x180017088)
msvcrt.dll
- __C_specific_handler (Address: 0x1800170a8)
- __CxxFrameHandler3 (Address: 0x180017198)
- __dllonexit (Address: 0x1800171a0)
- _amsg_exit (Address: 0x1800170c8)
- _callnewh (Address: 0x1800171a8)
- _CxxThrowException (Address: 0x180017148)
- _initterm (Address: 0x1800170b0)
- _lock (Address: 0x1800170a0)
- _onexit (Address: 0x180017118)
- _purecall (Address: 0x180017178)
- _unlock (Address: 0x1800171b0)
- _vsnwprintf (Address: 0x180017190)
- _wcsicmp (Address: 0x1800170e0)
- _wcsnicmp (Address: 0x1800170e8)
- _XcptFilter (Address: 0x1800170d0)
- ??0exception@@QEAA@AEBQEBD@Z (Address: 0x180017120)
- ??0exception@@QEAA@AEBQEBDH@Z (Address: 0x180017128)
- ??0exception@@QEAA@AEBV0@@Z (Address: 0x180017130)
- ??1exception@@UEAA@XZ (Address: 0x180017138)
- ??1type_info@@UEAA@XZ (Address: 0x180017160)
- ??3@YAXPEAX@Z (Address: 0x180017180)
- ?what@exception@@UEBAPEBDXZ (Address: 0x180017140)
- free (Address: 0x1800170c0)
- malloc (Address: 0x1800170b8)
- memcmp (Address: 0x180017098)
- memcpy (Address: 0x180017150)
- memcpy_s (Address: 0x180017188)
- memmove (Address: 0x180017158)
- memset (Address: 0x1800171b8)
- toupper (Address: 0x180017110)
- wcschr (Address: 0x180017108)
- wcsncmp (Address: 0x1800170f8)
- wcsncpy_s (Address: 0x1800170d8)
- wcsnlen (Address: 0x180017170)
- wcsrchr (Address: 0x180017168)
- wcsstr (Address: 0x1800170f0)
- wcstok_s (Address: 0x180017100)
ntdll.dll
- NtQuerySecurityAttributesToken (Address: 0x180017220)
- NtQueryWnfStateData (Address: 0x180017210)
- NtUpdateWnfStateData (Address: 0x1800171e8)
- RtlAllocateHeap (Address: 0x1800171d0)
- RtlAppendUnicodeStringToString (Address: 0x1800171e0)
- RtlAppendUnicodeToString (Address: 0x1800171d8)
- RtlCompareUnicodeString (Address: 0x180017200)
- RtlCopyUnicodeString (Address: 0x1800171c8)
- RtlFreeHeap (Address: 0x180017208)
- RtlInitUnicodeString (Address: 0x180017228)
- RtlNtStatusToDosError (Address: 0x180017218)
- RtlNtStatusToDosErrorNoTeb (Address: 0x1800171f0)
- ZwQueryWnfStateData (Address: 0x1800171f8)
OLEAUT32.dll
- SysFreeString (Address: 0x180016cc8)
RPCRT4.dll
- UuidFromStringW (Address: 0x180016cd8)