edputil.dll

Description: EDP util

Authors: © Microsoft Corporation. All rights reserved.

Version: 10.0.19041.4355

Architecture: 32-bit

Operating System: Windows NT

SHA256: 66aeed2cff351817c3626f26596e3d65

File Size: 91.5 KB

Uploaded At: Dec. 1, 2025, 7:56 a.m.

Views: 5

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • EdpAddAppClipboardConsentInCache (Ordinal: 1, Address: 0x8a70)
  • EdpAuditAction (Ordinal: 2, Address: 0x8a90)
  • EdpCanCallerAccessWin32Clipboard (Ordinal: 3, Address: 0xa520)
  • EdpCheckAccess (Ordinal: 4, Address: 0xd490)
  • EdpCheckAccessForContext (Ordinal: 5, Address: 0xd600)
  • EdpCheckIsDpapiNgEntId (Ordinal: 6, Address: 0x8e20)
  • EdpCheckIsRmsEntId (Ordinal: 7, Address: 0x8e40)
  • EdpClearClipboardMetaData (Ordinal: 8, Address: 0x8e60)
  • EdpConvertProtectorToExternalId (Ordinal: 9, Address: 0x8e70)
  • EdpFreeContext (Ordinal: 10, Address: 0xd640)
  • EdpGetAppLockerUniqueAppIdentifier (Ordinal: 11, Address: 0x8e90)
  • EdpGetAppLockerUniqueAppIdentifierByToken (Ordinal: 12, Address: 0x8ff0)
  • EdpGetAppLockerUniqueAppIdentifierByTokenEx (Ordinal: 13, Address: 0x9010)
  • EdpGetClipboardAccessDeniedData (Ordinal: 14, Address: 0xa720)
  • EdpGetContextForBinaryPath (Ordinal: 15, Address: 0xd6c0)
  • EdpGetContextForImpersonatedToken (Ordinal: 16, Address: 0xd6e0)
  • EdpGetContextForPackageFullName (Ordinal: 17, Address: 0xd8c0)
  • EdpGetContextForProcess (Ordinal: 18, Address: 0xd8e0)
  • EdpGetContextForWindow (Ordinal: 19, Address: 0xdaf0)
  • EdpGetDataInfoFromDataObject (Ordinal: 20, Address: 0xa9d0)
  • EdpGetDataInfoFromWin32Clipboard (Ordinal: 21, Address: 0xac10)
  • EdpGetEnterpriseIdForClipboard (Ordinal: 22, Address: 0x9100)
  • EdpGetEnterpriseIdForDataObject (Ordinal: 23, Address: 0xad20)
  • EdpGetEnterpriseIdForUIEnforcement (Ordinal: 24, Address: 0x9120)
  • EdpGetEnterpriseIdForUIEnforcementFromProcess (Ordinal: 25, Address: 0x9140)
  • EdpGetFilePathsForDataObject (Ordinal: 26, Address: 0xae90)
  • EdpGetIsManaged (Ordinal: 27, Address: 0x4370)
  • EdpGetPersonalEnterpriseIdString (Ordinal: 28, Address: 0x93c0)
  • EdpGetPrimaryIdentities (Ordinal: 29, Address: 0x94f0)
  • EdpGetPrimaryIdentityIfManaged (Ordinal: 30, Address: 0x9510)
  • EdpGetSourceAppIdForClipboard (Ordinal: 31, Address: 0x9540)
  • EdpGetSourceIsEnlightenedForClipboard (Ordinal: 32, Address: 0x9560)
  • EdpGetWindowFromThreadId (Ordinal: 33, Address: 0x9580)
  • EdpIsAppClipboardConsentCached (Ordinal: 34, Address: 0x96f0)
  • EdpIsContextExemptOrEnlightenedAllowed (Ordinal: 35, Address: 0xde20)
  • EdpIsFileAccessAllowed (Ordinal: 36, Address: 0x9710)
  • EdpIsUIPolicyEvaluationEnabledForThread (Ordinal: 37, Address: 0x9730)
  • EdpIsValidSubjectForEncryption (Ordinal: 38, Address: 0x9750)
  • EdpRequestAccess (Ordinal: 39, Address: 0xdf20)
  • EdpRequestAccessForContext (Ordinal: 40, Address: 0xe0b0)
  • EdpSetEnterpriseIdForClipboard (Ordinal: 41, Address: 0x98a0)
  • EdpSetSourceAppIdForClipboard (Ordinal: 42, Address: 0x98d0)
  • EdpSetSourceIsEnlightenedForClipboard (Ordinal: 43, Address: 0x98f0)
  • EdpShouldShowEnterpriseIndicator (Ordinal: 44, Address: 0x9910)
  • EdpUtilCreateEnterpriseContextFromEnterpriseId (Ordinal: 45, Address: 0x9a70)
  • EdpUtilFreeEnterpriseContext (Ordinal: 46, Address: 0x9b90)
  • EdpUtilGetEnterpriseContextByName (Ordinal: 47, Address: 0x9ba0)
  • EdpUtilGetEnterpriseContextByProcess (Ordinal: 48, Address: 0x9bc0)
  • EdpUtilGetEnterpriseContextByWindowHandle (Ordinal: 49, Address: 0x9d70)
  • EdpUtilGetEnterpriseContextForCurrentView (Ordinal: 50, Address: 0x9d90)
  • EdpUtilGetEnterpriseContextForView (Ordinal: 51, Address: 0x9d70)
  • EdpUtilIsAppEnlightened (Ordinal: 52, Address: 0x9db0)
  • EdpUtilQueryPolicy (Ordinal: 53, Address: 0x9dd0)
  • GetProcessUniqueIdFromToken (Ordinal: 54, Address: 0x9e10)

Imported DLLs & Functions

api-ms-win-core-apiquery-l1-1-0.dll
  • ApiSetQueryApiSetPresence (Address: 0x10016010)
api-ms-win-core-com-l1-1-0.dll
  • CoTaskMemAlloc (Address: 0x10016020)
  • CoTaskMemFree (Address: 0x10016018)
  • CoTaskMemRealloc (Address: 0x1001601c)
api-ms-win-core-debug-l1-1-0.dll
  • DebugBreak (Address: 0x10016030)
  • IsDebuggerPresent (Address: 0x10016028)
  • OutputDebugStringW (Address: 0x1001602c)
api-ms-win-core-errorhandling-l1-1-0.dll
  • GetLastError (Address: 0x1001603c)
  • RaiseException (Address: 0x10016044)
  • SetLastError (Address: 0x10016038)
  • SetUnhandledExceptionFilter (Address: 0x10016040)
  • UnhandledExceptionFilter (Address: 0x10016048)
api-ms-win-core-handle-l1-1-0.dll
  • CloseHandle (Address: 0x10016050)
api-ms-win-core-heap-l1-1-0.dll
  • GetProcessHeap (Address: 0x1001605c)
  • HeapAlloc (Address: 0x10016058)
  • HeapFree (Address: 0x10016060)
api-ms-win-core-heap-l2-1-0.dll
  • GlobalAlloc (Address: 0x10016068)
  • GlobalFree (Address: 0x10016074)
  • LocalAlloc (Address: 0x10016070)
  • LocalFree (Address: 0x1001606c)
api-ms-win-core-heap-obsolete-l1-1-0.dll
  • GlobalLock (Address: 0x1001607c)
  • GlobalSize (Address: 0x10016084)
  • GlobalUnlock (Address: 0x10016080)
api-ms-win-core-libraryloader-l1-2-0.dll
  • DisableThreadLibraryCalls (Address: 0x1001608c)
  • FindResourceExW (Address: 0x100160b8)
  • FreeLibrary (Address: 0x10016094)
  • GetModuleFileNameA (Address: 0x1001609c)
  • GetModuleHandleExW (Address: 0x100160ac)
  • GetModuleHandleW (Address: 0x100160a0)
  • GetProcAddress (Address: 0x10016090)
  • LoadLibraryExA (Address: 0x100160a4)
  • LoadResource (Address: 0x100160b4)
  • LoadStringA (Address: 0x100160a8)
  • LoadStringW (Address: 0x10016098)
  • LockResource (Address: 0x100160b0)
api-ms-win-core-localization-l1-2-0.dll
  • FormatMessageW (Address: 0x100160c4)
  • IdnToAscii (Address: 0x100160c0)
api-ms-win-core-memory-l1-1-0.dll
  • VirtualProtect (Address: 0x100160d0)
  • VirtualQuery (Address: 0x100160cc)
api-ms-win-core-processthreads-l1-1-0.dll
  • GetCurrentProcess (Address: 0x100160f4)
  • GetCurrentProcessId (Address: 0x100160ec)
  • GetCurrentThread (Address: 0x10016100)
  • GetCurrentThreadId (Address: 0x100160e0)
  • OpenProcessToken (Address: 0x100160f0)
  • OpenThreadToken (Address: 0x100160f8)
  • TerminateProcess (Address: 0x100160fc)
  • TlsAlloc (Address: 0x100160e8)
  • TlsFree (Address: 0x100160e4)
  • TlsGetValue (Address: 0x100160dc)
  • TlsSetValue (Address: 0x100160d8)
api-ms-win-core-processthreads-l1-1-1.dll
  • OpenProcess (Address: 0x10016108)
api-ms-win-core-profile-l1-1-0.dll
  • QueryPerformanceCounter (Address: 0x10016114)
  • QueryPerformanceFrequency (Address: 0x10016110)
api-ms-win-core-registry-l1-1-0.dll
  • RegCloseKey (Address: 0x10016120)
  • RegGetValueW (Address: 0x1001611c)
  • RegOpenCurrentUser (Address: 0x10016124)
api-ms-win-core-rtlsupport-l1-2-0.dll
  • RtlCompareMemory (Address: 0x1001612c)
api-ms-win-core-string-l1-1-0.dll
  • CompareStringOrdinal (Address: 0x10016134)
api-ms-win-core-synch-l1-1-0.dll
  • AcquireSRWLockExclusive (Address: 0x10016154)
  • CreateMutexExW (Address: 0x10016150)
  • CreateSemaphoreExW (Address: 0x1001614c)
  • InitializeSRWLock (Address: 0x10016160)
  • OpenSemaphoreW (Address: 0x10016148)
  • ReleaseMutex (Address: 0x1001615c)
  • ReleaseSemaphore (Address: 0x10016140)
  • ReleaseSRWLockExclusive (Address: 0x10016158)
  • WaitForSingleObject (Address: 0x1001613c)
  • WaitForSingleObjectEx (Address: 0x10016144)
api-ms-win-core-synch-l1-2-0.dll
  • InitOnceBeginInitialize (Address: 0x10016170)
  • InitOnceComplete (Address: 0x1001616c)
  • Sleep (Address: 0x10016168)
api-ms-win-core-sysinfo-l1-1-0.dll
  • GetSystemInfo (Address: 0x1001617c)
  • GetSystemTimeAsFileTime (Address: 0x10016178)
  • GetTickCount (Address: 0x10016180)
api-ms-win-core-winrt-l1-1-0.dll
  • RoGetActivationFactory (Address: 0x10016188)
api-ms-win-core-winrt-string-l1-1-0.dll
  • WindowsCreateStringReference (Address: 0x1001619c)
  • WindowsDeleteString (Address: 0x10016194)
  • WindowsGetStringLen (Address: 0x10016190)
  • WindowsGetStringRawBuffer (Address: 0x10016198)
api-ms-win-eventing-provider-l1-1-0.dll
  • EventActivityIdControl (Address: 0x100161ac)
  • EventProviderEnabled (Address: 0x100161b8)
  • EventRegister (Address: 0x100161a4)
  • EventSetInformation (Address: 0x100161b4)
  • EventUnregister (Address: 0x100161a8)
  • EventWriteTransfer (Address: 0x100161b0)
api-ms-win-security-base-l1-1-0.dll
  • CopySid (Address: 0x100161c0)
  • GetLengthSid (Address: 0x100161c4)
  • GetTokenInformation (Address: 0x100161cc)
  • IsValidSid (Address: 0x100161c8)
api-ms-win-security-sddl-l1-1-0.dll
  • ConvertStringSidToSidW (Address: 0x100161d4)
msvcrt.dll
  • __CxxFrameHandler3 (Address: 0x10016258)
  • __dllonexit (Address: 0x10016260)
  • _amsg_exit (Address: 0x100161f4)
  • _callnewh (Address: 0x1001625c)
  • _CxxThrowException (Address: 0x10016230)
  • _except_handler4_common (Address: 0x10016268)
  • _initterm (Address: 0x100161e8)
  • _lock (Address: 0x100161e4)
  • _onexit (Address: 0x10016218)
  • _purecall (Address: 0x1001624c)
  • _unlock (Address: 0x100161e0)
  • _vsnwprintf (Address: 0x10016264)
  • _wcsicmp (Address: 0x100161fc)
  • _wcsnicmp (Address: 0x10016200)
  • _XcptFilter (Address: 0x10016240)
  • ??0exception@@QAE@ABQBD@Z (Address: 0x1001621c)
  • ??0exception@@QAE@ABQBDH@Z (Address: 0x10016220)
  • ??0exception@@QAE@ABV0@@Z (Address: 0x10016224)
  • ??1exception@@UAE@XZ (Address: 0x10016228)
  • ??1type_info@@UAE@XZ (Address: 0x1001623c)
  • ??3@YAXPAX@Z (Address: 0x10016250)
  • ?what@exception@@UBEPBDXZ (Address: 0x1001622c)
  • free (Address: 0x100161f0)
  • malloc (Address: 0x100161ec)
  • memcmp (Address: 0x100161dc)
  • memcpy (Address: 0x10016234)
  • memcpy_s (Address: 0x10016254)
  • memmove (Address: 0x10016238)
  • memset (Address: 0x1001626c)
  • toupper (Address: 0x10016214)
  • wcschr (Address: 0x10016210)
  • wcsncmp (Address: 0x10016208)
  • wcsncpy_s (Address: 0x100161f8)
  • wcsnlen (Address: 0x10016248)
  • wcsrchr (Address: 0x10016244)
  • wcsstr (Address: 0x10016204)
  • wcstok_s (Address: 0x1001620c)
ntdll.dll
  • NtQuerySecurityAttributesToken (Address: 0x100162a0)
  • NtQueryWnfStateData (Address: 0x10016298)
  • NtUpdateWnfStateData (Address: 0x10016284)
  • RtlAllocateHeap (Address: 0x10016278)
  • RtlAppendUnicodeStringToString (Address: 0x10016280)
  • RtlAppendUnicodeToString (Address: 0x1001627c)
  • RtlCompareUnicodeString (Address: 0x10016290)
  • RtlCopyUnicodeString (Address: 0x10016274)
  • RtlFreeHeap (Address: 0x10016294)
  • RtlInitUnicodeString (Address: 0x100162a4)
  • RtlNtStatusToDosError (Address: 0x1001629c)
  • RtlNtStatusToDosErrorNoTeb (Address: 0x10016288)
  • ZwQueryWnfStateData (Address: 0x1001628c)
OLEAUT32.dll
  • SysFreeString (Address: 0x10016000)
RPCRT4.dll
  • UuidFromStringW (Address: 0x10016008)