verifier.dll

Description: Standard application verifier provider dll

Authors: © Microsoft Corporation. All rights reserved.

Version: 10.0.19041.5438

Architecture: 64-bit

Operating System: Windows NT

SHA256: f919dd1f0ee559def47ed56971d02dc5

File Size: 388.0 KB

Uploaded At: Dec. 1, 2025, 7:41 a.m.

Views: 3

Exported Functions

  • AVrfAPILookupCallback (Ordinal: 1, Address: 0x91e0)
  • VerifierAddFreeMemoryCallback (Ordinal: 2, Address: 0xa4c0)
  • VerifierCheckPageHeapAllocation (Ordinal: 3, Address: 0xa8a0)
  • VerifierCreateRpcPageHeap (Ordinal: 4, Address: 0xa3c0)
  • VerifierDeleteFreeMemoryCallback (Ordinal: 5, Address: 0xa540)
  • VerifierDestroyRpcPageHeap (Ordinal: 6, Address: 0xa400)
  • VerifierDisableFaultInjectionExclusionRange (Ordinal: 7, Address: 0x1e00)
  • VerifierDisableFaultInjectionTargetRange (Ordinal: 8, Address: 0x1c60)
  • VerifierEnableFaultInjectionExclusionRange (Ordinal: 9, Address: 0x1d40)
  • VerifierEnableFaultInjectionTargetRange (Ordinal: 10, Address: 0x1b70)
  • VerifierEnumerateResource (Ordinal: 11, Address: 0xa1f0)
  • VerifierForceNormalHeap (Ordinal: 12, Address: 0xa830)
  • VerifierGetInfoForException (Ordinal: 13, Address: 0xa6f0)
  • VerifierGetMemoryForDump (Ordinal: 14, Address: 0xa790)
  • VerifierGetPropertyValueByName (Ordinal: 15, Address: 0xa9e0)
  • VerifierGetProviderHelper (Ordinal: 16, Address: 0xa960)
  • VerifierIsAddressInAnyPageHeap (Ordinal: 17, Address: 0xa570)
  • VerifierIsCurrentThreadHoldingLocks (Ordinal: 18, Address: 0xa480)
  • VerifierIsDllEntryActive (Ordinal: 19, Address: 0xa440)
  • VerifierIsPerUserSettingsEnabled (Ordinal: 20, Address: 0xa940)
  • VerifierQueryRuntimeFlags (Ordinal: 21, Address: 0xa360)
  • VerifierRedirectStopFunctions (Ordinal: 22, Address: 0x6760)
  • VerifierSetFaultInjectionProbability (Ordinal: 23, Address: 0x1ae0)
  • VerifierSetFlags (Ordinal: 24, Address: 0x7960)
  • VerifierSetRuntimeFlags (Ordinal: 25, Address: 0xa320)
  • VerifierStopMessage (Ordinal: 26, Address: 0x6770)

Imported DLLs & Functions

ntdll.dll
  • __C_specific_handler (Address: 0x18002a590)
  • __chkstk (Address: 0x18002a7e8)
  • _stricmp (Address: 0x18002a5d0)
  • _vsnprintf (Address: 0x18002a5a8)
  • _vsnwprintf (Address: 0x18002a598)
  • _wcsicmp (Address: 0x18002a5a0)
  • _wcsnicmp (Address: 0x18002a700)
  • DbgPrint (Address: 0x18002a390)
  • DbgPrintEx (Address: 0x18002a3d0)
  • EtwEventRegister (Address: 0x18002a560)
  • EtwEventUnregister (Address: 0x18002a558)
  • EtwEventWriteTransfer (Address: 0x18002a548)
  • iswspace (Address: 0x18002a6f0)
  • LdrAccessResource (Address: 0x18002a528)
  • LdrFindEntryForAddress (Address: 0x18002a6e8)
  • LdrFindResource_U (Address: 0x18002a518)
  • LdrGetDllHandle (Address: 0x18002a628)
  • LdrGetProcedureAddress (Address: 0x18002a4e0)
  • LdrLoadDll (Address: 0x18002a4f0)
  • LdrLockLoaderLock (Address: 0x18002a4b8)
  • LdrQueryImageFileExecutionOptions (Address: 0x18002a538)
  • LdrQueryImageFileKeyOption (Address: 0x18002a530)
  • LdrQueryProcessModuleInformation (Address: 0x18002a600)
  • LdrUnloadDll (Address: 0x18002a4e8)
  • LdrUnlockLoaderLock (Address: 0x18002a4c0)
  • memcpy (Address: 0x18002a7f0)
  • memmove (Address: 0x18002a588)
  • memset (Address: 0x18002a7f8)
  • NtAllocateVirtualMemory (Address: 0x18002a420)
  • NtClearEvent (Address: 0x18002a790)
  • NtClose (Address: 0x18002a5f8)
  • NtCreateEvent (Address: 0x18002a710)
  • NtCreateKey (Address: 0x18002a7b8)
  • NtCreateSection (Address: 0x18002a7c8)
  • NtDelayExecution (Address: 0x18002a640)
  • NtDeleteValueKey (Address: 0x18002a760)
  • NtFreeVirtualMemory (Address: 0x18002a3a0)
  • NtGetContextThread (Address: 0x18002a778)
  • NtMapViewOfSection (Address: 0x18002a7e0)
  • NtOpenEvent (Address: 0x18002a3f0)
  • NtOpenKey (Address: 0x18002a748)
  • NtOpenProcessTokenEx (Address: 0x18002a730)
  • NtOpenSection (Address: 0x18002a7d8)
  • NtOpenThread (Address: 0x18002a5e8)
  • NtProtectVirtualMemory (Address: 0x18002a470)
  • NtQueryEvent (Address: 0x18002a468)
  • NtQueryInformationProcess (Address: 0x18002a400)
  • NtQueryInformationThread (Address: 0x18002a670)
  • NtQueryInformationToken (Address: 0x18002a758)
  • NtQueryObject (Address: 0x18002a680)
  • NtQueryPerformanceCounter (Address: 0x18002a360)
  • NtQuerySystemInformation (Address: 0x18002a3e8)
  • NtQuerySystemTime (Address: 0x18002a348)
  • NtQueryValueKey (Address: 0x18002a770)
  • NtQueryVirtualMemory (Address: 0x18002a3d8)
  • NtReadVirtualMemory (Address: 0x18002a440)
  • NtResumeThread (Address: 0x18002a610)
  • NtSetEvent (Address: 0x18002a720)
  • NtSetValueKey (Address: 0x18002a768)
  • NtSuspendThread (Address: 0x18002a5f0)
  • NtTerminateProcess (Address: 0x18002a4d8)
  • NtUnmapViewOfSection (Address: 0x18002a7d0)
  • NtWaitForMultipleObjects (Address: 0x18002a7b0)
  • NtWaitForSingleObject (Address: 0x18002a7c0)
  • NtWriteVirtualMemory (Address: 0x18002a568)
  • RtlAcquirePebLock (Address: 0x18002a648)
  • RtlAcquireResourceExclusive (Address: 0x18002a660)
  • RtlAcquireResourceShared (Address: 0x18002a638)
  • RtlAcquireSRWLockExclusive (Address: 0x18002a418)
  • RtlAcquireSRWLockShared (Address: 0x18002a430)
  • RtlAddVectoredExceptionHandler (Address: 0x18002a618)
  • RtlAllocateHeap (Address: 0x18002a350)
  • RtlAppendUnicodeStringToString (Address: 0x18002a738)
  • RtlAppendUnicodeToString (Address: 0x18002a740)
  • RtlCaptureContext (Address: 0x18002a4c8)
  • RtlCaptureStackBackTrace (Address: 0x18002a370)
  • RtlCheckForOrphanedCriticalSections (Address: 0x18002a7a8)
  • RtlCompareUnicodeString (Address: 0x18002a340)
  • RtlConvertExclusiveToShared (Address: 0x18002a6c8)
  • RtlConvertSharedToExclusive (Address: 0x18002a6d8)
  • RtlConvertSidToUnicodeString (Address: 0x18002a750)
  • RtlCreateHeap (Address: 0x18002a498)
  • RtlDecodePointer (Address: 0x18002a4f8)
  • RtlDelete (Address: 0x18002a6a0)
  • RtlDeleteCriticalSection (Address: 0x18002a398)
  • RtlDeleteElementGenericTableAvl (Address: 0x18002a3e0)
  • RtlDeleteResource (Address: 0x18002a630)
  • RtlDeregisterWait (Address: 0x18002a718)
  • RtlDeregisterWaitEx (Address: 0x18002a780)
  • RtlDestroyHeap (Address: 0x18002a3b0)
  • RtlDllShutdownInProgress (Address: 0x18002a338)
  • RtlEncodePointer (Address: 0x18002a508)
  • RtlEnterCriticalSection (Address: 0x18002a378)
  • RtlEnumerateGenericTableAvl (Address: 0x18002a448)
  • RtlEnumerateGenericTableWithoutSplayingAvl (Address: 0x18002a6f8)
  • RtlEqualUnicodeString (Address: 0x18002a620)
  • RtlFindClearBitsAndSet (Address: 0x18002a678)
  • RtlFlushSecureMemoryCache (Address: 0x18002a488)
  • RtlFreeAnsiString (Address: 0x18002a510)
  • RtlFreeHeap (Address: 0x18002a480)
  • RtlFreeUnicodeString (Address: 0x18002a798)
  • RtlGetUserInfoHeap (Address: 0x18002a3a8)
  • RtlImageNtHeader (Address: 0x18002a540)
  • RtlInitAnsiString (Address: 0x18002a500)
  • RtlInitializeCriticalSection (Address: 0x18002a380)
  • RtlInitializeCriticalSectionAndSpinCount (Address: 0x18002a6b8)
  • RtlInitializeCriticalSectionEx (Address: 0x18002a450)
  • RtlInitializeGenericTableAvl (Address: 0x18002a3c0)
  • RtlInitializeResource (Address: 0x18002a658)
  • RtlInitializeSListHead (Address: 0x18002a6a8)
  • RtlInitializeSRWLock (Address: 0x18002a3c8)
  • RtlInitUnicodeString (Address: 0x18002a368)
  • RtlInsertElementGenericTableAvl (Address: 0x18002a428)
  • RtlInterlockedPopEntrySList (Address: 0x18002a6e0)
  • RtlInterlockedPushEntrySList (Address: 0x18002a690)
  • RtlLeaveCriticalSection (Address: 0x18002a388)
  • RtlLockHeap (Address: 0x18002a4a8)
  • RtlLookupElementGenericTableAvl (Address: 0x18002a410)
  • RtlLookupFunctionEntry (Address: 0x18002a570)
  • RtlNtStatusToDosError (Address: 0x18002a608)
  • RtlpWaitForCriticalSection (Address: 0x18002a6b0)
  • RtlQueryDepthSList (Address: 0x18002a708)
  • RtlQueryHeapInformation (Address: 0x18002a5e0)
  • RtlRaiseException (Address: 0x18002a4b0)
  • RtlRaiseStatus (Address: 0x18002a6d0)
  • RtlRandom (Address: 0x18002a358)
  • RtlRegisterWait (Address: 0x18002a728)
  • RtlReleasePebLock (Address: 0x18002a688)
  • RtlReleaseResource (Address: 0x18002a650)
  • RtlReleaseSRWLockExclusive (Address: 0x18002a408)
  • RtlReleaseSRWLockShared (Address: 0x18002a438)
  • RtlRemoveVectoredExceptionHandler (Address: 0x18002a668)
  • RtlReportException (Address: 0x18002a4d0)
  • RtlSetEnvironmentVariable (Address: 0x18002a550)
  • RtlSetHeapInformation (Address: 0x18002a490)
  • RtlSetThreadPoolStartFunc (Address: 0x18002a7a0)
  • RtlSetUserFlagsHeap (Address: 0x18002a460)
  • RtlSetUserValueHeap (Address: 0x18002a478)
  • RtlSizeHeap (Address: 0x18002a458)
  • RtlSplay (Address: 0x18002a698)
  • RtlTryEnterCriticalSection (Address: 0x18002a6c0)
  • RtlUnhandledExceptionFilter (Address: 0x18002a580)
  • RtlUnicodeStringToAnsiString (Address: 0x18002a520)
  • RtlUnlockHeap (Address: 0x18002a4a0)
  • RtlUpcaseUnicodeChar (Address: 0x18002a3f8)
  • RtlValidateHeap (Address: 0x18002a3b8)
  • RtlVerifyVersionInfo (Address: 0x18002a5c0)
  • RtlVirtualUnwind (Address: 0x18002a578)
  • RtlWalkFrameChain (Address: 0x18002a788)
  • sscanf_s (Address: 0x18002a5b0)
  • VerSetConditionMask (Address: 0x18002a5d8)
  • wcsstr (Address: 0x18002a5c8)
  • wcstoul (Address: 0x18002a5b8)