iasads.dll

Description: NPS Active Directory Data Store

Authors: © Microsoft Corporation. All rights reserved.

Version: 10.0.19041.3636

Architecture: 64-bit

Operating System: Windows NT

SHA256: 325625103b3d9028d0b6d80fa46aad6f

File Size: 77.0 KB

Uploaded At: Dec. 1, 2025, 7:29 a.m.

Views: 5

Exported Functions

  • DllCanUnloadNow (Ordinal: 1, Address: 0x5ee0)
  • DllGetClassObject (Ordinal: 2, Address: 0x5f00)
  • DllRegisterServer (Ordinal: 3, Address: 0x5f30)
  • DllUnregisterServer (Ordinal: 4, Address: 0x5f50)

Imported DLLs & Functions

ACTIVEDS.dll
  • (Address: 0x18000ca38)
ADVAPI32.dll
  • GetTraceEnableFlags (Address: 0x18000ca58)
  • GetTraceEnableLevel (Address: 0x18000ca60)
  • GetTraceLoggerHandle (Address: 0x18000ca68)
  • RegCloseKey (Address: 0x18000ca70)
  • RegisterTraceGuidsW (Address: 0x18000ca50)
  • RegOpenKeyExW (Address: 0x18000ca80)
  • RegQueryValueExW (Address: 0x18000ca78)
  • UnregisterTraceGuids (Address: 0x18000ca48)
ATL.DLL
  • (Address: 0x18000ca90)
  • (Address: 0x18000ca98)
  • (Address: 0x18000caa0)
  • (Address: 0x18000caa8)
  • (Address: 0x18000cab0)
  • (Address: 0x18000cab8)
  • (Address: 0x18000cac0)
iassvcs.dll
  • IASRegisterComponent (Address: 0x18000cc40)
  • IASVariantChangeType (Address: 0x18000cc38)
KERNEL32.dll
  • DeleteCriticalSection (Address: 0x18000cb48)
  • DisableThreadLibraryCalls (Address: 0x18000cad8)
  • EnterCriticalSection (Address: 0x18000cb60)
  • GetCurrentProcess (Address: 0x18000cad0)
  • GetCurrentProcessId (Address: 0x18000cb08)
  • GetCurrentThreadId (Address: 0x18000cb70)
  • GetSystemInfo (Address: 0x18000cb78)
  • GetSystemTimeAsFileTime (Address: 0x18000cb10)
  • GetTickCount (Address: 0x18000cb18)
  • InitializeCriticalSection (Address: 0x18000cb50)
  • LeaveCriticalSection (Address: 0x18000cb58)
  • LocalAlloc (Address: 0x18000cb20)
  • LocalFree (Address: 0x18000cb68)
  • QueryPerformanceCounter (Address: 0x18000cb00)
  • SetThreadStackGuarantee (Address: 0x18000cb28)
  • SetUnhandledExceptionFilter (Address: 0x18000caf0)
  • Sleep (Address: 0x18000cae0)
  • TerminateProcess (Address: 0x18000caf8)
  • UnhandledExceptionFilter (Address: 0x18000cae8)
  • VirtualAlloc (Address: 0x18000cb38)
  • VirtualProtect (Address: 0x18000cb40)
  • VirtualQuery (Address: 0x18000cb30)
msvcrt.dll
  • __C_specific_handler (Address: 0x18000cc78)
  • __CxxFrameHandler3 (Address: 0x18000ccf8)
  • __dllonexit (Address: 0x18000cce8)
  • _amsg_exit (Address: 0x18000ccb8)
  • _callnewh (Address: 0x18000cc90)
  • _CxxThrowException (Address: 0x18000cca8)
  • _initterm (Address: 0x18000ccc0)
  • _lock (Address: 0x18000ccd8)
  • _onexit (Address: 0x18000ccf0)
  • _unlock (Address: 0x18000cce0)
  • _wcsicmp (Address: 0x18000cd18)
  • _XcptFilter (Address: 0x18000ccb0)
  • ??0exception@@QEAA@AEBQEBD@Z (Address: 0x18000cc58)
  • ??0exception@@QEAA@AEBQEBDH@Z (Address: 0x18000cc80)
  • ??0exception@@QEAA@AEBV0@@Z (Address: 0x18000cca0)
  • ??0exception@@QEAA@XZ (Address: 0x18000cc68)
  • ??1exception@@UEAA@XZ (Address: 0x18000cc50)
  • ??1type_info@@UEAA@XZ (Address: 0x18000ccc8)
  • ?terminate@@YAXXZ (Address: 0x18000ccd0)
  • ?what@exception@@UEBAPEBDXZ (Address: 0x18000cc70)
  • free (Address: 0x18000cc98)
  • malloc (Address: 0x18000cc88)
  • memcpy (Address: 0x18000cd00)
  • memcpy_s (Address: 0x18000cd08)
  • memmove (Address: 0x18000cd10)
  • memmove_s (Address: 0x18000cc60)
  • memset (Address: 0x18000cd50)
  • swprintf_s (Address: 0x18000cd48)
  • wcscat_s (Address: 0x18000cd38)
  • wcschr (Address: 0x18000cd28)
  • wcscpy_s (Address: 0x18000cd30)
  • wcsncpy_s (Address: 0x18000cd20)
  • wcstoul (Address: 0x18000cd40)
netutils.dll
  • NetApiBufferFree (Address: 0x18000cd60)
ntdll.dll
  • RtlAllocateHeap (Address: 0x18000cd88)
  • RtlCaptureContext (Address: 0x18000cda0)
  • RtlCompareMemory (Address: 0x18000cda8)
  • RtlFreeHeap (Address: 0x18000cd98)
  • RtlImageNtHeader (Address: 0x18000cd90)
  • RtlInitUnicodeString (Address: 0x18000cd78)
  • RtlLookupFunctionEntry (Address: 0x18000cd70)
  • RtlNtStatusToDosError (Address: 0x18000cd80)
  • RtlVirtualUnwind (Address: 0x18000cdb0)
OLEAUT32.dll
  • LoadRegTypeLib (Address: 0x18000cbc8)
  • SafeArrayAccessData (Address: 0x18000cbd8)
  • SafeArrayCreate (Address: 0x18000cc28)
  • SafeArrayCreateVector (Address: 0x18000cbe0)
  • SafeArrayGetDim (Address: 0x18000cb90)
  • SafeArrayGetLBound (Address: 0x18000cba8)
  • SafeArrayGetUBound (Address: 0x18000cba0)
  • SafeArrayPtrOfIndex (Address: 0x18000cb88)
  • SafeArrayRedim (Address: 0x18000cb98)
  • SafeArrayUnaccessData (Address: 0x18000cbe8)
  • SetErrorInfo (Address: 0x18000cbc0)
  • SysAllocString (Address: 0x18000cbb0)
  • SysAllocStringByteLen (Address: 0x18000cc00)
  • SysAllocStringLen (Address: 0x18000cbd0)
  • SysFreeString (Address: 0x18000cc20)
  • SysStringByteLen (Address: 0x18000cc08)
  • SysStringLen (Address: 0x18000cbf8)
  • UnRegisterTypeLib (Address: 0x18000cbb8)
  • VariantClear (Address: 0x18000cc10)
  • VariantCopy (Address: 0x18000cbf0)
  • VariantInit (Address: 0x18000cc18)
samcli.dll
  • NetUserGetInfo (Address: 0x18000cdc8)
  • NetUserSetInfo (Address: 0x18000cdc0)