vrfcore.dll

Description: Application Verifier Provider - Core Verification and SDK

Authors: © Microsoft Corporation. All rights reserved.

Version: 10.0.26100.4654

Architecture: 64-bit

Operating System: Windows NT

SHA256: 670bd5471f182db4c98b61b6b8168cad

File Size: 216.2 KB

Uploaded At: Dec. 1, 2025, 7:42 a.m.

Views: 7

Exported Functions

  • AVrfAPILookupCallback (Ordinal: 1, Address: 0x17f0)
  • VerifierGetInfoForException (Ordinal: 2, Address: 0x2670)
  • VerifierAreStaticDllsInitialized (Ordinal: 3, Address: 0x2ce0)
  • VerifierChainDuplicateHooks (Ordinal: 4, Address: 0x2d40)
  • VerifierCloseLayerProperties (Ordinal: 5, Address: 0x2f30)
  • VerifierConfigureStopOptions (Ordinal: 6, Address: 0x2f60)
  • VerifierCreateLayerProperties (Ordinal: 7, Address: 0x2fb0)
  • VerifierDisableFaultInjectionExclusionRange (Ordinal: 8, Address: 0xca80)
  • VerifierDisableFaultInjectionTargetRange (Ordinal: 9, Address: 0xcb80)
  • VerifierDisableLayer (Ordinal: 10, Address: 0x8140)
  • VerifierDisableVerifier (Ordinal: 11, Address: 0x8800)
  • VerifierEnableFaultInjectionExclusionRange (Ordinal: 12, Address: 0xcc80)
  • VerifierEnableFaultInjectionTargetRange (Ordinal: 13, Address: 0xcdb0)
  • VerifierEnableLayer (Ordinal: 14, Address: 0x8b70)
  • VerifierGetAppCallerAddress (Ordinal: 15, Address: 0x92c0)
  • VerifierGetLoggingDirectory (Ordinal: 16, Address: 0x3080)
  • VerifierGetRecursionTlsSlot (Ordinal: 17, Address: 0x30b0)
  • VerifierHandleVerifierStopException (Ordinal: 18, Address: 0x30c0)
  • VerifierIsDllEntryActive (Ordinal: 19, Address: 0x30d0)
  • VerifierIsInsideVerifierStop (Ordinal: 20, Address: 0x3110)
  • VerifierIsLayerEnabled (Ordinal: 21, Address: 0x3140)
  • VerifierLdrGetProcedureAddress (Ordinal: 22, Address: 0x31c0)
  • VerifierOpenLayerProperties (Ordinal: 23, Address: 0x31f0)
  • VerifierQueryGlobalProperties (Ordinal: 24, Address: 0x32b0)
  • VerifierQueryLayerBreak (Ordinal: 25, Address: 0x32d0)
  • VerifierQueryLayerBreaks (Ordinal: 26, Address: 0x3420)
  • VerifierQueryLayerProperties (Ordinal: 27, Address: 0x3480)
  • VerifierQueryLayerProperty (Ordinal: 28, Address: 0x34e0)
  • VerifierQueryRegisteredLayers (Ordinal: 29, Address: 0x9380)
  • VerifierRegisterFaultInjectProvider (Ordinal: 30, Address: 0xcee0)
  • VerifierRegisterLayer (Ordinal: 31, Address: 0x9430)
  • VerifierRegisterLayerEx (Ordinal: 32, Address: 0x9450)
  • VerifierRegisterProvider (Ordinal: 33, Address: 0xc680)
  • VerifierResetFaultInjectionAddressRanges (Ordinal: 34, Address: 0xcf80)
  • VerifierSetAPIClassName (Ordinal: 35, Address: 0xd090)
  • VerifierSetFaultInjectionProbability (Ordinal: 36, Address: 0xd130)
  • VerifierSetFaultInjectionSeed (Ordinal: 37, Address: 0xd1e0)
  • VerifierSetLayerBreak (Ordinal: 38, Address: 0x3570)
  • VerifierSetLayerProperty (Ordinal: 39, Address: 0x3740)
  • VerifierShouldFaultInject (Ordinal: 40, Address: 0xd210)
  • VerifierStopMessageEx (Ordinal: 41, Address: 0x37f0)
  • VerifierSuspendFaultInjection (Ordinal: 42, Address: 0xd360)
  • VerifierTlsGetValue (Ordinal: 43, Address: 0xb080)
  • VerifierTlsSetValue (Ordinal: 44, Address: 0xb0c0)
  • VerifierUnregisterLayer (Ordinal: 45, Address: 0x9460)

Imported DLLs & Functions

ntdll.dll
  • __C_specific_handler (Address: 0x18000f358)
  • _stricmp (Address: 0x18000f3b8)
  • _vsnprintf (Address: 0x18000f380)
  • _vsnwprintf (Address: 0x18000f360)
  • _wcsicmp (Address: 0x18000f370)
  • _wcsnicmp (Address: 0x18000f348)
  • DbgPrint (Address: 0x18000f490)
  • DbgPrintEx (Address: 0x18000f310)
  • LdrAccessResource (Address: 0x18000f430)
  • LdrDisableThreadCalloutsForDll (Address: 0x18000f540)
  • LdrEnumerateLoadedModules (Address: 0x18000f338)
  • LdrFindEntryForAddress (Address: 0x18000f340)
  • LdrFindResource_U (Address: 0x18000f3f0)
  • LdrGetDllHandle (Address: 0x18000f4f0)
  • LdrGetProcedureAddress (Address: 0x18000f308)
  • LdrLoadDll (Address: 0x18000f330)
  • LdrLockLoaderLock (Address: 0x18000f3f8)
  • LdrUnloadDll (Address: 0x18000f378)
  • LdrUnlockLoaderLock (Address: 0x18000f418)
  • memcpy (Address: 0x18000f570)
  • memmove (Address: 0x18000f568)
  • memset (Address: 0x18000f578)
  • NtAllocateVirtualMemory (Address: 0x18000f468)
  • NtClose (Address: 0x18000f3a8)
  • NtCreateFile (Address: 0x18000f488)
  • NtCreateKey (Address: 0x18000f4e0)
  • NtDelayExecution (Address: 0x18000f478)
  • NtDeleteKey (Address: 0x18000f4b0)
  • NtDeleteValueKey (Address: 0x18000f398)
  • NtFreeVirtualMemory (Address: 0x18000f440)
  • NtOpenKey (Address: 0x18000f4b8)
  • NtProtectVirtualMemory (Address: 0x18000f4f8)
  • NtQueryInformationProcess (Address: 0x18000f328)
  • NtQueryKey (Address: 0x18000f4a8)
  • NtQueryPerformanceCounter (Address: 0x18000f538)
  • NtQuerySystemTime (Address: 0x18000f368)
  • NtQueryValueKey (Address: 0x18000f3d8)
  • NtQueryVirtualMemory (Address: 0x18000f318)
  • NtReadVirtualMemory (Address: 0x18000f3a0)
  • NtResumeThread (Address: 0x18000f508)
  • NtSetValueKey (Address: 0x18000f3c8)
  • NtTerminateProcess (Address: 0x18000f350)
  • NtWaitForSingleObject (Address: 0x18000f4a0)
  • NtWriteFile (Address: 0x18000f448)
  • RtlAcquirePebLock (Address: 0x18000f400)
  • RtlAllocateHeap (Address: 0x18000f3e8)
  • RtlAnsiStringToUnicodeString (Address: 0x18000f518)
  • RtlApplicationVerifierStop (Address: 0x18000f3e0)
  • RtlCaptureContext (Address: 0x18000f548)
  • RtlCaptureStackBackTrace (Address: 0x18000f390)
  • RtlCompareMemory (Address: 0x18000f500)
  • RtlCompareUnicodeString (Address: 0x18000f510)
  • RtlCopyUnicodeString (Address: 0x18000f460)
  • RtlDeleteCriticalSection (Address: 0x18000f438)
  • RtlDllShutdownInProgress (Address: 0x18000f320)
  • RtlDoesFileExists_U (Address: 0x18000f498)
  • RtlDosPathNameToNtPathName_U (Address: 0x18000f458)
  • RtlEnterCriticalSection (Address: 0x18000f3b0)
  • RtlFindClearBitsAndSet (Address: 0x18000f420)
  • RtlFreeHeap (Address: 0x18000f410)
  • RtlFreeUnicodeString (Address: 0x18000f450)
  • RtlImageDirectoryEntryToData (Address: 0x18000f520)
  • RtlImageNtHeader (Address: 0x18000f528)
  • RtlInitAnsiString (Address: 0x18000f4d0)
  • RtlInitializeCriticalSection (Address: 0x18000f480)
  • RtlInitUnicodeString (Address: 0x18000f388)
  • RtlInitUnicodeStringEx (Address: 0x18000f4c8)
  • RtlLeaveCriticalSection (Address: 0x18000f3c0)
  • RtlLookupFunctionEntry (Address: 0x18000f550)
  • RtlQueryEnvironmentVariable_U (Address: 0x18000f470)
  • RtlRaiseException (Address: 0x18000f3d0)
  • RtlRandom (Address: 0x18000f530)
  • RtlReleasePebLock (Address: 0x18000f428)
  • RtlUnhandledExceptionFilter (Address: 0x18000f560)
  • RtlUnicodeStringToAnsiString (Address: 0x18000f408)
  • RtlVirtualUnwind (Address: 0x18000f558)
  • wcsrchr (Address: 0x18000f4e8)
  • wcsstr (Address: 0x18000f4d8)
  • wcstoul (Address: 0x18000f4c0)