edputil.dll
Description: EDP util
Authors: © Microsoft Corporation. All rights reserved.
Version: 10.0.19041.4355
Architecture: 32-bit
Operating System: Windows NT
SHA256: 66aeed2cff351817c3626f26596e3d65
File Size: 91.5 KB
Uploaded At: Dec. 1, 2025, 7:56 a.m.
Views: 5
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: OpenProcess
Exported Functions
- EdpAddAppClipboardConsentInCache (Ordinal: 1, Address: 0x8a70)
- EdpAuditAction (Ordinal: 2, Address: 0x8a90)
- EdpCanCallerAccessWin32Clipboard (Ordinal: 3, Address: 0xa520)
- EdpCheckAccess (Ordinal: 4, Address: 0xd490)
- EdpCheckAccessForContext (Ordinal: 5, Address: 0xd600)
- EdpCheckIsDpapiNgEntId (Ordinal: 6, Address: 0x8e20)
- EdpCheckIsRmsEntId (Ordinal: 7, Address: 0x8e40)
- EdpClearClipboardMetaData (Ordinal: 8, Address: 0x8e60)
- EdpConvertProtectorToExternalId (Ordinal: 9, Address: 0x8e70)
- EdpFreeContext (Ordinal: 10, Address: 0xd640)
- EdpGetAppLockerUniqueAppIdentifier (Ordinal: 11, Address: 0x8e90)
- EdpGetAppLockerUniqueAppIdentifierByToken (Ordinal: 12, Address: 0x8ff0)
- EdpGetAppLockerUniqueAppIdentifierByTokenEx (Ordinal: 13, Address: 0x9010)
- EdpGetClipboardAccessDeniedData (Ordinal: 14, Address: 0xa720)
- EdpGetContextForBinaryPath (Ordinal: 15, Address: 0xd6c0)
- EdpGetContextForImpersonatedToken (Ordinal: 16, Address: 0xd6e0)
- EdpGetContextForPackageFullName (Ordinal: 17, Address: 0xd8c0)
- EdpGetContextForProcess (Ordinal: 18, Address: 0xd8e0)
- EdpGetContextForWindow (Ordinal: 19, Address: 0xdaf0)
- EdpGetDataInfoFromDataObject (Ordinal: 20, Address: 0xa9d0)
- EdpGetDataInfoFromWin32Clipboard (Ordinal: 21, Address: 0xac10)
- EdpGetEnterpriseIdForClipboard (Ordinal: 22, Address: 0x9100)
- EdpGetEnterpriseIdForDataObject (Ordinal: 23, Address: 0xad20)
- EdpGetEnterpriseIdForUIEnforcement (Ordinal: 24, Address: 0x9120)
- EdpGetEnterpriseIdForUIEnforcementFromProcess (Ordinal: 25, Address: 0x9140)
- EdpGetFilePathsForDataObject (Ordinal: 26, Address: 0xae90)
- EdpGetIsManaged (Ordinal: 27, Address: 0x4370)
- EdpGetPersonalEnterpriseIdString (Ordinal: 28, Address: 0x93c0)
- EdpGetPrimaryIdentities (Ordinal: 29, Address: 0x94f0)
- EdpGetPrimaryIdentityIfManaged (Ordinal: 30, Address: 0x9510)
- EdpGetSourceAppIdForClipboard (Ordinal: 31, Address: 0x9540)
- EdpGetSourceIsEnlightenedForClipboard (Ordinal: 32, Address: 0x9560)
- EdpGetWindowFromThreadId (Ordinal: 33, Address: 0x9580)
- EdpIsAppClipboardConsentCached (Ordinal: 34, Address: 0x96f0)
- EdpIsContextExemptOrEnlightenedAllowed (Ordinal: 35, Address: 0xde20)
- EdpIsFileAccessAllowed (Ordinal: 36, Address: 0x9710)
- EdpIsUIPolicyEvaluationEnabledForThread (Ordinal: 37, Address: 0x9730)
- EdpIsValidSubjectForEncryption (Ordinal: 38, Address: 0x9750)
- EdpRequestAccess (Ordinal: 39, Address: 0xdf20)
- EdpRequestAccessForContext (Ordinal: 40, Address: 0xe0b0)
- EdpSetEnterpriseIdForClipboard (Ordinal: 41, Address: 0x98a0)
- EdpSetSourceAppIdForClipboard (Ordinal: 42, Address: 0x98d0)
- EdpSetSourceIsEnlightenedForClipboard (Ordinal: 43, Address: 0x98f0)
- EdpShouldShowEnterpriseIndicator (Ordinal: 44, Address: 0x9910)
- EdpUtilCreateEnterpriseContextFromEnterpriseId (Ordinal: 45, Address: 0x9a70)
- EdpUtilFreeEnterpriseContext (Ordinal: 46, Address: 0x9b90)
- EdpUtilGetEnterpriseContextByName (Ordinal: 47, Address: 0x9ba0)
- EdpUtilGetEnterpriseContextByProcess (Ordinal: 48, Address: 0x9bc0)
- EdpUtilGetEnterpriseContextByWindowHandle (Ordinal: 49, Address: 0x9d70)
- EdpUtilGetEnterpriseContextForCurrentView (Ordinal: 50, Address: 0x9d90)
- EdpUtilGetEnterpriseContextForView (Ordinal: 51, Address: 0x9d70)
- EdpUtilIsAppEnlightened (Ordinal: 52, Address: 0x9db0)
- EdpUtilQueryPolicy (Ordinal: 53, Address: 0x9dd0)
- GetProcessUniqueIdFromToken (Ordinal: 54, Address: 0x9e10)
Imported DLLs & Functions
api-ms-win-core-apiquery-l1-1-0.dll
- ApiSetQueryApiSetPresence (Address: 0x10016010)
api-ms-win-core-com-l1-1-0.dll
- CoTaskMemAlloc (Address: 0x10016020)
- CoTaskMemFree (Address: 0x10016018)
- CoTaskMemRealloc (Address: 0x1001601c)
api-ms-win-core-debug-l1-1-0.dll
- DebugBreak (Address: 0x10016030)
- IsDebuggerPresent (Address: 0x10016028)
- OutputDebugStringW (Address: 0x1001602c)
api-ms-win-core-errorhandling-l1-1-0.dll
- GetLastError (Address: 0x1001603c)
- RaiseException (Address: 0x10016044)
- SetLastError (Address: 0x10016038)
- SetUnhandledExceptionFilter (Address: 0x10016040)
- UnhandledExceptionFilter (Address: 0x10016048)
api-ms-win-core-handle-l1-1-0.dll
- CloseHandle (Address: 0x10016050)
api-ms-win-core-heap-l1-1-0.dll
- GetProcessHeap (Address: 0x1001605c)
- HeapAlloc (Address: 0x10016058)
- HeapFree (Address: 0x10016060)
api-ms-win-core-heap-l2-1-0.dll
- GlobalAlloc (Address: 0x10016068)
- GlobalFree (Address: 0x10016074)
- LocalAlloc (Address: 0x10016070)
- LocalFree (Address: 0x1001606c)
api-ms-win-core-heap-obsolete-l1-1-0.dll
- GlobalLock (Address: 0x1001607c)
- GlobalSize (Address: 0x10016084)
- GlobalUnlock (Address: 0x10016080)
api-ms-win-core-libraryloader-l1-2-0.dll
- DisableThreadLibraryCalls (Address: 0x1001608c)
- FindResourceExW (Address: 0x100160b8)
- FreeLibrary (Address: 0x10016094)
- GetModuleFileNameA (Address: 0x1001609c)
- GetModuleHandleExW (Address: 0x100160ac)
- GetModuleHandleW (Address: 0x100160a0)
- GetProcAddress (Address: 0x10016090)
- LoadLibraryExA (Address: 0x100160a4)
- LoadResource (Address: 0x100160b4)
- LoadStringA (Address: 0x100160a8)
- LoadStringW (Address: 0x10016098)
- LockResource (Address: 0x100160b0)
api-ms-win-core-localization-l1-2-0.dll
- FormatMessageW (Address: 0x100160c4)
- IdnToAscii (Address: 0x100160c0)
api-ms-win-core-memory-l1-1-0.dll
- VirtualProtect (Address: 0x100160d0)
- VirtualQuery (Address: 0x100160cc)
api-ms-win-core-processthreads-l1-1-0.dll
- GetCurrentProcess (Address: 0x100160f4)
- GetCurrentProcessId (Address: 0x100160ec)
- GetCurrentThread (Address: 0x10016100)
- GetCurrentThreadId (Address: 0x100160e0)
- OpenProcessToken (Address: 0x100160f0)
- OpenThreadToken (Address: 0x100160f8)
- TerminateProcess (Address: 0x100160fc)
- TlsAlloc (Address: 0x100160e8)
- TlsFree (Address: 0x100160e4)
- TlsGetValue (Address: 0x100160dc)
- TlsSetValue (Address: 0x100160d8)
api-ms-win-core-processthreads-l1-1-1.dll
- OpenProcess (Address: 0x10016108)
api-ms-win-core-profile-l1-1-0.dll
- QueryPerformanceCounter (Address: 0x10016114)
- QueryPerformanceFrequency (Address: 0x10016110)
api-ms-win-core-registry-l1-1-0.dll
- RegCloseKey (Address: 0x10016120)
- RegGetValueW (Address: 0x1001611c)
- RegOpenCurrentUser (Address: 0x10016124)
api-ms-win-core-rtlsupport-l1-2-0.dll
- RtlCompareMemory (Address: 0x1001612c)
api-ms-win-core-string-l1-1-0.dll
- CompareStringOrdinal (Address: 0x10016134)
api-ms-win-core-synch-l1-1-0.dll
- AcquireSRWLockExclusive (Address: 0x10016154)
- CreateMutexExW (Address: 0x10016150)
- CreateSemaphoreExW (Address: 0x1001614c)
- InitializeSRWLock (Address: 0x10016160)
- OpenSemaphoreW (Address: 0x10016148)
- ReleaseMutex (Address: 0x1001615c)
- ReleaseSemaphore (Address: 0x10016140)
- ReleaseSRWLockExclusive (Address: 0x10016158)
- WaitForSingleObject (Address: 0x1001613c)
- WaitForSingleObjectEx (Address: 0x10016144)
api-ms-win-core-synch-l1-2-0.dll
- InitOnceBeginInitialize (Address: 0x10016170)
- InitOnceComplete (Address: 0x1001616c)
- Sleep (Address: 0x10016168)
api-ms-win-core-sysinfo-l1-1-0.dll
- GetSystemInfo (Address: 0x1001617c)
- GetSystemTimeAsFileTime (Address: 0x10016178)
- GetTickCount (Address: 0x10016180)
api-ms-win-core-winrt-l1-1-0.dll
- RoGetActivationFactory (Address: 0x10016188)
api-ms-win-core-winrt-string-l1-1-0.dll
- WindowsCreateStringReference (Address: 0x1001619c)
- WindowsDeleteString (Address: 0x10016194)
- WindowsGetStringLen (Address: 0x10016190)
- WindowsGetStringRawBuffer (Address: 0x10016198)
api-ms-win-eventing-provider-l1-1-0.dll
- EventActivityIdControl (Address: 0x100161ac)
- EventProviderEnabled (Address: 0x100161b8)
- EventRegister (Address: 0x100161a4)
- EventSetInformation (Address: 0x100161b4)
- EventUnregister (Address: 0x100161a8)
- EventWriteTransfer (Address: 0x100161b0)
api-ms-win-security-base-l1-1-0.dll
- CopySid (Address: 0x100161c0)
- GetLengthSid (Address: 0x100161c4)
- GetTokenInformation (Address: 0x100161cc)
- IsValidSid (Address: 0x100161c8)
api-ms-win-security-sddl-l1-1-0.dll
- ConvertStringSidToSidW (Address: 0x100161d4)
msvcrt.dll
- __CxxFrameHandler3 (Address: 0x10016258)
- __dllonexit (Address: 0x10016260)
- _amsg_exit (Address: 0x100161f4)
- _callnewh (Address: 0x1001625c)
- _CxxThrowException (Address: 0x10016230)
- _except_handler4_common (Address: 0x10016268)
- _initterm (Address: 0x100161e8)
- _lock (Address: 0x100161e4)
- _onexit (Address: 0x10016218)
- _purecall (Address: 0x1001624c)
- _unlock (Address: 0x100161e0)
- _vsnwprintf (Address: 0x10016264)
- _wcsicmp (Address: 0x100161fc)
- _wcsnicmp (Address: 0x10016200)
- _XcptFilter (Address: 0x10016240)
- ??0exception@@QAE@ABQBD@Z (Address: 0x1001621c)
- ??0exception@@QAE@ABQBDH@Z (Address: 0x10016220)
- ??0exception@@QAE@ABV0@@Z (Address: 0x10016224)
- ??1exception@@UAE@XZ (Address: 0x10016228)
- ??1type_info@@UAE@XZ (Address: 0x1001623c)
- ??3@YAXPAX@Z (Address: 0x10016250)
- ?what@exception@@UBEPBDXZ (Address: 0x1001622c)
- free (Address: 0x100161f0)
- malloc (Address: 0x100161ec)
- memcmp (Address: 0x100161dc)
- memcpy (Address: 0x10016234)
- memcpy_s (Address: 0x10016254)
- memmove (Address: 0x10016238)
- memset (Address: 0x1001626c)
- toupper (Address: 0x10016214)
- wcschr (Address: 0x10016210)
- wcsncmp (Address: 0x10016208)
- wcsncpy_s (Address: 0x100161f8)
- wcsnlen (Address: 0x10016248)
- wcsrchr (Address: 0x10016244)
- wcsstr (Address: 0x10016204)
- wcstok_s (Address: 0x1001620c)
ntdll.dll
- NtQuerySecurityAttributesToken (Address: 0x100162a0)
- NtQueryWnfStateData (Address: 0x10016298)
- NtUpdateWnfStateData (Address: 0x10016284)
- RtlAllocateHeap (Address: 0x10016278)
- RtlAppendUnicodeStringToString (Address: 0x10016280)
- RtlAppendUnicodeToString (Address: 0x1001627c)
- RtlCompareUnicodeString (Address: 0x10016290)
- RtlCopyUnicodeString (Address: 0x10016274)
- RtlFreeHeap (Address: 0x10016294)
- RtlInitUnicodeString (Address: 0x100162a4)
- RtlNtStatusToDosError (Address: 0x1001629c)
- RtlNtStatusToDosErrorNoTeb (Address: 0x10016288)
- ZwQueryWnfStateData (Address: 0x1001628c)
OLEAUT32.dll
- SysFreeString (Address: 0x10016000)
RPCRT4.dll
- UuidFromStringW (Address: 0x10016008)