frprov.dll

Description: Folder Redirection WMI Provider

Authors: © Microsoft Corporation. All rights reserved.

Version: 10.0.19041.1

Architecture: 32-bit

Operating System: Windows NT

SHA256: 66bc91f2e75bb32d5d73b1bd674fee15

File Size: 65.5 KB

Uploaded At: Dec. 1, 2025, 7:56 a.m.

Views: 6

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • DllCanUnloadNow (Ordinal: 1, Address: 0x3c90)
  • DllGetClassObject (Ordinal: 2, Address: 0x3c50)
  • DllRegisterServer (Ordinal: 3, Address: 0x3fa0)
  • DllUnregisterServer (Ordinal: 4, Address: 0x3fb0)

Imported DLLs & Functions

api-ms-win-core-com-l1-1-0.dll
  • CLSIDFromString (Address: 0x10010078)
  • CoCreateInstance (Address: 0x1001007c)
  • CoGetCallContext (Address: 0x10010080)
  • CoRevertToSelf (Address: 0x1001006c)
  • CoTaskMemFree (Address: 0x10010084)
  • StringFromCLSID (Address: 0x10010070)
  • StringFromGUID2 (Address: 0x10010074)
api-ms-win-core-errorhandling-l1-1-0.dll
  • GetLastError (Address: 0x1001008c)
  • SetLastError (Address: 0x10010098)
  • SetUnhandledExceptionFilter (Address: 0x10010090)
  • UnhandledExceptionFilter (Address: 0x10010094)
api-ms-win-core-handle-l1-1-0.dll
  • CloseHandle (Address: 0x100100a4)
  • DuplicateHandle (Address: 0x100100a0)
api-ms-win-core-heap-l1-1-0.dll
  • GetProcessHeap (Address: 0x100100b4)
  • HeapAlloc (Address: 0x100100ac)
  • HeapFree (Address: 0x100100b0)
api-ms-win-core-heap-l2-1-0.dll
  • LocalFree (Address: 0x100100bc)
api-ms-win-core-libraryloader-l1-2-0.dll
  • DisableThreadLibraryCalls (Address: 0x100100c8)
  • GetModuleFileNameW (Address: 0x100100cc)
  • GetProcAddress (Address: 0x100100c4)
api-ms-win-core-libraryloader-l1-2-1.dll
  • LoadLibraryW (Address: 0x100100d4)
api-ms-win-core-processenvironment-l1-1-0.dll
  • ExpandEnvironmentStringsW (Address: 0x100100dc)
api-ms-win-core-processthreads-l1-1-0.dll
  • GetCurrentProcess (Address: 0x100100e4)
  • GetCurrentProcessId (Address: 0x100100f0)
  • GetCurrentThread (Address: 0x100100f8)
  • GetCurrentThreadId (Address: 0x100100ec)
  • OpenThreadToken (Address: 0x100100fc)
  • SetThreadToken (Address: 0x100100f4)
  • TerminateProcess (Address: 0x100100e8)
api-ms-win-core-processthreads-l1-1-1.dll
  • OpenProcess (Address: 0x10010104)
api-ms-win-core-profile-l1-1-0.dll
  • QueryPerformanceCounter (Address: 0x1001010c)
api-ms-win-core-registry-l1-1-0.dll
  • RegCloseKey (Address: 0x1001011c)
  • RegCreateKeyExW (Address: 0x10010130)
  • RegDeleteKeyExW (Address: 0x1001012c)
  • RegDeleteTreeW (Address: 0x10010118)
  • RegDeleteValueW (Address: 0x10010120)
  • RegEnumValueW (Address: 0x10010114)
  • RegGetValueW (Address: 0x10010124)
  • RegOpenCurrentUser (Address: 0x10010134)
  • RegOpenKeyExW (Address: 0x10010138)
  • RegQueryValueExW (Address: 0x10010128)
  • RegSetValueExW (Address: 0x1001013c)
api-ms-win-core-string-l1-1-0.dll
  • CompareStringOrdinal (Address: 0x10010144)
api-ms-win-core-synch-l1-2-0.dll
  • Sleep (Address: 0x1001014c)
api-ms-win-core-sysinfo-l1-1-0.dll
  • GetSystemTimeAsFileTime (Address: 0x10010154)
  • GetTickCount (Address: 0x1001015c)
  • GetVersionExW (Address: 0x10010158)
api-ms-win-security-base-l1-1-0.dll
  • GetTokenInformation (Address: 0x10010168)
  • ImpersonateLoggedOnUser (Address: 0x1001016c)
  • IsValidSid (Address: 0x10010170)
  • RevertToSelf (Address: 0x10010164)
api-ms-win-security-sddl-l1-1-0.dll
  • ConvertSidToStringSidW (Address: 0x1001017c)
  • ConvertStringSidToSidW (Address: 0x10010178)
msvcrt.dll
  • __CxxFrameHandler3 (Address: 0x100101e8)
  • __dllonexit (Address: 0x100101b0)
  • _amsg_exit (Address: 0x100101c4)
  • _callnewh (Address: 0x100101a8)
  • _CxxThrowException (Address: 0x100101a4)
  • _except_handler4_common (Address: 0x100101cc)
  • _initterm (Address: 0x100101ec)
  • _lock (Address: 0x100101c8)
  • _onexit (Address: 0x1001019c)
  • _purecall (Address: 0x100101b8)
  • _unlock (Address: 0x100101d4)
  • _vsnwprintf (Address: 0x100101e0)
  • _XcptFilter (Address: 0x10010184)
  • ??_V@YAXPAX@Z (Address: 0x100101b4)
  • ??0exception@@QAE@ABQBD@Z (Address: 0x10010190)
  • ??0exception@@QAE@ABQBDH@Z (Address: 0x1001018c)
  • ??0exception@@QAE@ABV0@@Z (Address: 0x100101d0)
  • ??1exception@@UAE@XZ (Address: 0x100101e4)
  • ??1type_info@@UAE@XZ (Address: 0x100101c0)
  • ??3@YAXPAX@Z (Address: 0x100101d8)
  • ?terminate@@YAXXZ (Address: 0x100101bc)
  • ?what@exception@@UBEPBDXZ (Address: 0x10010188)
  • free (Address: 0x10010194)
  • malloc (Address: 0x100101ac)
  • memcpy (Address: 0x100101a0)
  • memcpy_s (Address: 0x100101dc)
  • memmove (Address: 0x10010198)
  • memset (Address: 0x100101f0)
ntdll.dll
  • EtwGetTraceEnableFlags (Address: 0x1001020c)
  • EtwGetTraceEnableLevel (Address: 0x10010200)
  • EtwGetTraceLoggerHandle (Address: 0x10010204)
  • EtwRegisterTraceGuidsW (Address: 0x100101fc)
  • EtwTraceMessage (Address: 0x10010208)
  • EtwUnregisterTraceGuids (Address: 0x100101f8)
OLEAUT32.dll
  • SafeArrayCopy (Address: 0x1001004c)
  • SafeArrayCreate (Address: 0x10010020)
  • SafeArrayCreateVector (Address: 0x10010044)
  • SafeArrayDestroy (Address: 0x10010054)
  • SafeArrayGetElement (Address: 0x10010038)
  • SafeArrayGetLBound (Address: 0x10010034)
  • SafeArrayGetUBound (Address: 0x10010048)
  • SafeArrayGetVartype (Address: 0x10010008)
  • SafeArrayLock (Address: 0x10010028)
  • SafeArrayPutElement (Address: 0x10010040)
  • SafeArrayRedim (Address: 0x10010050)
  • SafeArrayUnlock (Address: 0x1001003c)
  • SysAllocString (Address: 0x10010010)
  • SysAllocStringLen (Address: 0x1001000c)
  • SysFreeString (Address: 0x10010000)
  • SysStringByteLen (Address: 0x10010004)
  • SysStringLen (Address: 0x1001002c)
  • VariantChangeType (Address: 0x10010018)
  • VariantClear (Address: 0x10010014)
  • VariantCopy (Address: 0x1001001c)
  • VariantCopyInd (Address: 0x10010030)
  • VariantInit (Address: 0x10010024)
SHLWAPI.dll
  • SHDeleteKeyW (Address: 0x1001005c)
WTSAPI32.dll
  • WTSQueryUserToken (Address: 0x10010064)