gpscript.dll

Description: Script Client Side Extension

Authors: © Microsoft Corporation. All rights reserved.

Version: 10.0.19041.3636

Architecture: 64-bit

Operating System: Windows NT

SHA256: fd8464117e93978bbf87a0365a8b5792

File Size: 52.0 KB

Uploaded At: Dec. 1, 2025, 7:28 a.m.

Views: 6

Exported Functions

  • GenerateScriptsGroupPolicy (Ordinal: 1, Address: 0x4e80)
  • ProcessScriptsGroupPolicy (Ordinal: 2, Address: 0x4e10)
  • ProcessScriptsGroupPolicyEx (Ordinal: 3, Address: 0x4e40)
  • ScrRegGPOListToWbem (Ordinal: 4, Address: 0x3ed0)

Imported DLLs & Functions

api-ms-win-core-debug-l1-1-0.dll
  • OutputDebugStringW (Address: 0x180008be8)
api-ms-win-core-errorhandling-l1-1-0.dll
  • GetLastError (Address: 0x180008c10)
  • SetLastError (Address: 0x180008bf8)
  • SetUnhandledExceptionFilter (Address: 0x180008c00)
  • UnhandledExceptionFilter (Address: 0x180008c08)
api-ms-win-core-file-l1-1-0.dll
  • CreateDirectoryW (Address: 0x180008c38)
  • CreateFileW (Address: 0x180008c20)
  • GetFileAttributesExW (Address: 0x180008c40)
  • SetFilePointer (Address: 0x180008c28)
  • WriteFile (Address: 0x180008c30)
api-ms-win-core-handle-l1-1-0.dll
  • CloseHandle (Address: 0x180008c50)
api-ms-win-core-heap-l2-1-0.dll
  • GlobalAlloc (Address: 0x180008c68)
  • GlobalFree (Address: 0x180008c80)
  • LocalAlloc (Address: 0x180008c70)
  • LocalFree (Address: 0x180008c78)
  • LocalReAlloc (Address: 0x180008c60)
api-ms-win-core-libraryloader-l1-2-0.dll
  • DisableThreadLibraryCalls (Address: 0x180008c98)
  • LoadStringW (Address: 0x180008c90)
api-ms-win-core-privateprofile-l1-1-0.dll
  • GetPrivateProfileStringW (Address: 0x180008ca8)
api-ms-win-core-processenvironment-l1-1-0.dll
  • ExpandEnvironmentStringsW (Address: 0x180008cb8)
api-ms-win-core-processthreads-l1-1-0.dll
  • GetCurrentProcess (Address: 0x180008cd0)
  • GetCurrentProcessId (Address: 0x180008cf0)
  • GetCurrentThread (Address: 0x180008ce0)
  • GetCurrentThreadId (Address: 0x180008cf8)
  • OpenThreadToken (Address: 0x180008cc8)
  • SetThreadToken (Address: 0x180008cd8)
  • TerminateProcess (Address: 0x180008ce8)
api-ms-win-core-profile-l1-1-0.dll
  • QueryPerformanceCounter (Address: 0x180008d08)
api-ms-win-core-registry-l1-1-0.dll
  • RegCloseKey (Address: 0x180008d50)
  • RegCreateKeyExW (Address: 0x180008d30)
  • RegDeleteKeyExW (Address: 0x180008d58)
  • RegEnumKeyExW (Address: 0x180008d48)
  • RegOpenCurrentUser (Address: 0x180008d20)
  • RegOpenKeyExW (Address: 0x180008d40)
  • RegQueryInfoKeyW (Address: 0x180008d18)
  • RegQueryValueExW (Address: 0x180008d60)
  • RegSetKeySecurity (Address: 0x180008d38)
  • RegSetValueExW (Address: 0x180008d28)
api-ms-win-core-rtlsupport-l1-1-0.dll
  • RtlCaptureContext (Address: 0x180008d80)
  • RtlLookupFunctionEntry (Address: 0x180008d78)
  • RtlVirtualUnwind (Address: 0x180008d70)
api-ms-win-core-string-l1-1-0.dll
  • CompareStringW (Address: 0x180008d90)
api-ms-win-core-synch-l1-1-0.dll
  • DeleteCriticalSection (Address: 0x180008da0)
  • InitializeCriticalSectionEx (Address: 0x180008da8)
api-ms-win-core-synch-l1-2-0.dll
  • Sleep (Address: 0x180008db8)
api-ms-win-core-sysinfo-l1-1-0.dll
  • GetLocalTime (Address: 0x180008dc8)
  • GetSystemTimeAsFileTime (Address: 0x180008dd0)
  • GetTickCount (Address: 0x180008dd8)
api-ms-win-security-base-l1-1-0.dll
  • AddAccessAllowedAce (Address: 0x180008e08)
  • AllocateAndInitializeSid (Address: 0x180008e20)
  • FreeSid (Address: 0x180008df8)
  • GetAce (Address: 0x180008e00)
  • GetLengthSid (Address: 0x180008e28)
  • ImpersonateLoggedOnUser (Address: 0x180008e18)
  • InitializeAcl (Address: 0x180008e10)
  • InitializeSecurityDescriptor (Address: 0x180008de8)
  • SetSecurityDescriptorDacl (Address: 0x180008df0)
msvcrt.dll
  • __C_specific_handler (Address: 0x180008f10)
  • __CxxFrameHandler3 (Address: 0x180008e88)
  • __dllonexit (Address: 0x180008e50)
  • _amsg_exit (Address: 0x180008e58)
  • _callnewh (Address: 0x180008ed8)
  • _CxxThrowException (Address: 0x180008e90)
  • _initterm (Address: 0x180008e40)
  • _itow (Address: 0x180008f08)
  • _lock (Address: 0x180008e38)
  • _onexit (Address: 0x180008e70)
  • _purecall (Address: 0x180008ed0)
  • _unlock (Address: 0x180008e48)
  • _vsnwprintf (Address: 0x180008ee8)
  • _wcsicmp (Address: 0x180008f00)
  • _XcptFilter (Address: 0x180008e60)
  • ??0exception@@QEAA@AEBQEBD@Z (Address: 0x180008ec8)
  • ??0exception@@QEAA@AEBQEBDH@Z (Address: 0x180008ec0)
  • ??0exception@@QEAA@AEBV0@@Z (Address: 0x180008eb8)
  • ??1exception@@UEAA@XZ (Address: 0x180008eb0)
  • ??1type_info@@UEAA@XZ (Address: 0x180008e78)
  • ??3@YAXPEAX@Z (Address: 0x180008ef0)
  • ?what@exception@@UEBAPEBDXZ (Address: 0x180008ea8)
  • free (Address: 0x180008ea0)
  • malloc (Address: 0x180008ee0)
  • memcpy (Address: 0x180008e80)
  • memmove (Address: 0x180008e68)
  • memset (Address: 0x180008e98)
  • wcschr (Address: 0x180008ef8)
  • wcscmp (Address: 0x180008f18)
ntdll.dll
  • NtQueryInformationToken (Address: 0x180008f38)
  • RtlConvertSidToUnicodeString (Address: 0x180008f50)
  • RtlCopySid (Address: 0x180008f28)
  • RtlFreeUnicodeString (Address: 0x180008f40)
  • RtlInitUnicodeString (Address: 0x180008f48)
  • RtlLengthSid (Address: 0x180008f30)
OLEAUT32.dll
  • SafeArrayCreate (Address: 0x180008bd0)
  • SafeArrayDestroy (Address: 0x180008bd8)
  • SafeArrayPutElement (Address: 0x180008bc0)
  • SysAllocString (Address: 0x180008bb8)
  • SysFreeString (Address: 0x180008bc8)