vfluapriv.dll

Description: Application Verifier Provider - LuaPriv Provider

Authors: © Microsoft Corporation. All rights reserved.

Version: 10.0.26100.4654

Architecture: 64-bit

Operating System: Windows NT

SHA256: 2cdcf02bb04a698c554cf996ef7202f7

File Size: 309.0 KB

Uploaded At: Dec. 1, 2025, 7:41 a.m.

Views: 3

Exported Functions

No exported functions.

Imported DLLs & Functions

ADVAPI32.dll
  • AccessCheck (Address: 0x1800279a8)
  • CloseServiceHandle (Address: 0x180027958)
  • ConvertSecurityDescriptorToStringSecurityDescriptorA (Address: 0x180027988)
  • ConvertSidToStringSidW (Address: 0x180027968)
  • ConvertStringSecurityDescriptorToSecurityDescriptorW (Address: 0x1800279d0)
  • EqualSid (Address: 0x180027960)
  • GetAce (Address: 0x1800279b8)
  • GetLengthSid (Address: 0x180027940)
  • GetSecurityDescriptorDacl (Address: 0x180027990)
  • GetSecurityDescriptorLength (Address: 0x1800279b0)
  • GetSecurityDescriptorOwner (Address: 0x180027928)
  • GetSecurityDescriptorSacl (Address: 0x180027978)
  • GetSecurityInfo (Address: 0x180027998)
  • GetSidSubAuthority (Address: 0x1800279c8)
  • GetSidSubAuthorityCount (Address: 0x1800279c0)
  • GetTokenInformation (Address: 0x180027950)
  • InitializeSecurityDescriptor (Address: 0x180027a10)
  • IsValidSid (Address: 0x1800279f0)
  • LookupAccountSidW (Address: 0x180027970)
  • LookupPrivilegeDisplayNameW (Address: 0x180027930)
  • LookupPrivilegeNameW (Address: 0x1800279e0)
  • MapGenericMask (Address: 0x180027a08)
  • OpenProcessToken (Address: 0x180027938)
  • OpenThreadToken (Address: 0x180027948)
  • RegCloseKey (Address: 0x180027a00)
  • RegEnumKeyExW (Address: 0x1800279e8)
  • RegOpenCurrentUser (Address: 0x1800279f8)
  • RegOpenKeyExW (Address: 0x1800279d8)
  • RegQueryValueExW (Address: 0x1800279a0)
  • SetSecurityDescriptorDacl (Address: 0x180027980)
KERNEL32.dll
  • CloseHandle (Address: 0x180027a78)
  • CompareStringW (Address: 0x180027d20)
  • CreateActCtxW (Address: 0x180027b68)
  • CreateFileW (Address: 0x180027ad0)
  • DecodePointer (Address: 0x180027c30)
  • DelayLoadFailureHook (Address: 0x180027d70)
  • DeleteCriticalSection (Address: 0x180027c70)
  • EncodePointer (Address: 0x180027c28)
  • EnterCriticalSection (Address: 0x180027c58)
  • EnumResourceNamesW (Address: 0x180027ae0)
  • ExitProcess (Address: 0x180027c88)
  • ExpandEnvironmentStringsW (Address: 0x180027b18)
  • FindResourceExW (Address: 0x180027a70)
  • FindResourceW (Address: 0x180027a58)
  • FlsAlloc (Address: 0x180027c38)
  • FlsFree (Address: 0x180027c48)
  • FlsGetValue (Address: 0x180027c40)
  • FlsSetValue (Address: 0x180027bf8)
  • FlushFileBuffers (Address: 0x180027ba0)
  • FreeEnvironmentStringsW (Address: 0x180027c80)
  • FreeLibrary (Address: 0x180027a48)
  • GetACP (Address: 0x180027c08)
  • GetCommandLineA (Address: 0x180027bf0)
  • GetConsoleCP (Address: 0x180027d10)
  • GetConsoleMode (Address: 0x180027d18)
  • GetCPInfo (Address: 0x180027c18)
  • GetCurrentProcess (Address: 0x180027ad8)
  • GetCurrentProcessId (Address: 0x180027cd8)
  • GetCurrentThread (Address: 0x180027af8)
  • GetCurrentThreadId (Address: 0x180027c50)
  • GetEnvironmentStringsW (Address: 0x180027c78)
  • GetEnvironmentVariableW (Address: 0x180027b10)
  • GetFileAttributesW (Address: 0x180027a60)
  • GetFileSizeEx (Address: 0x180027af0)
  • GetFileType (Address: 0x180027cb8)
  • GetFullPathNameW (Address: 0x180027a28)
  • GetLastError (Address: 0x180027ac8)
  • GetLongPathNameW (Address: 0x180027a20)
  • GetModuleFileNameA (Address: 0x180027cc8)
  • GetModuleFileNameW (Address: 0x180027a98)
  • GetModuleHandleExW (Address: 0x180027c90)
  • GetModuleHandleW (Address: 0x180027bb0)
  • GetOEMCP (Address: 0x180027c10)
  • GetProcAddress (Address: 0x180027b80)
  • GetProcessId (Address: 0x180027b20)
  • GetShortPathNameW (Address: 0x180027aa0)
  • GetStartupInfoW (Address: 0x180027cc0)
  • GetStdHandle (Address: 0x180027cb0)
  • GetStringTypeW (Address: 0x180027cf8)
  • GetSystemInfo (Address: 0x180027d40)
  • GetSystemTimeAsFileTime (Address: 0x180027ce0)
  • GetTickCount (Address: 0x180027ce8)
  • GetVersionExW (Address: 0x180027aa8)
  • HeapAlloc (Address: 0x180027ac0)
  • HeapCreate (Address: 0x180027a80)
  • HeapDestroy (Address: 0x180027c98)
  • HeapFree (Address: 0x180027a90)
  • HeapReAlloc (Address: 0x180027ab8)
  • HeapSetInformation (Address: 0x180027ca0)
  • HeapSize (Address: 0x180027d68)
  • InitializeCriticalSection (Address: 0x180027a88)
  • InitializeCriticalSectionAndSpinCount (Address: 0x180027c68)
  • IsProcessorFeaturePresent (Address: 0x180027ca8)
  • IsValidCodePage (Address: 0x180027c00)
  • LCMapStringW (Address: 0x180027cf0)
  • LeaveCriticalSection (Address: 0x180027c60)
  • LoadLibraryExA (Address: 0x180027d30)
  • LoadLibraryExW (Address: 0x180027a38)
  • LoadLibraryW (Address: 0x180027b78)
  • LoadResource (Address: 0x180027ab0)
  • LocalAlloc (Address: 0x180027a68)
  • LocalFree (Address: 0x180027b08)
  • MapViewOfFile (Address: 0x180027b58)
  • MultiByteToWideChar (Address: 0x180027b90)
  • OpenEventW (Address: 0x180027b30)
  • OpenFileMappingW (Address: 0x180027b40)
  • OpenMutexW (Address: 0x180027b60)
  • OutputDebugStringA (Address: 0x180027c20)
  • QueryActCtxW (Address: 0x180027b70)
  • QueryPerformanceCounter (Address: 0x180027cd0)
  • ReadFile (Address: 0x180027ba8)
  • ReleaseActCtx (Address: 0x180027b88)
  • ReleaseMutex (Address: 0x180027b38)
  • ResetEvent (Address: 0x180027b50)
  • RtlCaptureContext (Address: 0x180027bc0)
  • RtlLookupFunctionEntry (Address: 0x180027bc8)
  • RtlUnwindEx (Address: 0x180027bb8)
  • RtlVirtualUnwind (Address: 0x180027bd0)
  • SetEnvironmentVariableW (Address: 0x180027d28)
  • SetEvent (Address: 0x180027b48)
  • SetFilePointer (Address: 0x180027ae8)
  • SetFilePointerEx (Address: 0x180027a50)
  • SetLastError (Address: 0x180027a30)
  • SetStdHandle (Address: 0x180027d58)
  • SetThreadStackGuarantee (Address: 0x180027d38)
  • SetUnhandledExceptionFilter (Address: 0x180027be0)
  • SizeofResource (Address: 0x180027b00)
  • Sleep (Address: 0x180027d00)
  • TerminateProcess (Address: 0x180027be8)
  • UnhandledExceptionFilter (Address: 0x180027bd8)
  • VirtualAlloc (Address: 0x180027d48)
  • VirtualProtect (Address: 0x180027d50)
  • VirtualQuery (Address: 0x180027a40)
  • WaitForSingleObject (Address: 0x180027b28)
  • WideCharToMultiByte (Address: 0x180027b98)
  • WriteConsoleW (Address: 0x180027d60)
  • WriteFile (Address: 0x180027d08)
ntdll.dll
  • DbgPrint (Address: 0x180027da8)
  • NtQueryObject (Address: 0x180027da0)
  • RtlAllocateHeap (Address: 0x180027dd0)
  • RtlFreeHeap (Address: 0x180027dc8)
  • RtlInitializeSid (Address: 0x180027db0)
  • RtlLengthRequiredSid (Address: 0x180027dc0)
  • RtlSubAuthoritySid (Address: 0x180027db8)
psapi.dll
  • GetModuleBaseNameW (Address: 0x180027de0)
VERSION.dll
  • GetFileVersionInfoSizeW (Address: 0x180027d80)
  • GetFileVersionInfoW (Address: 0x180027d90)
  • VerQueryValueW (Address: 0x180027d88)
vrfcore.dll
  • VerifierGetRecursionTlsSlot (Address: 0x180027df0)
  • VerifierIsLayerEnabled (Address: 0x180027e08)
  • VerifierRegisterLayer (Address: 0x180027e00)
  • VerifierRegisterProvider (Address: 0x180027e28)
  • VerifierStopMessageEx (Address: 0x180027df8)
  • VerifierTlsGetValue (Address: 0x180027e18)
  • VerifierTlsSetValue (Address: 0x180027e20)
  • VerifierUnregisterLayer (Address: 0x180027e10)