MsRdpWebAccess.dll

Description: Microsoft Remote Desktop Services Web Access Control

Authors: © Microsoft Corporation. All rights reserved.

Version: 10.0.19041.3636

Architecture: 64-bit

Operating System: Windows NT

SHA256: c970b263a15e55810f0bd4bbbd601fe9

File Size: 62.0 KB

Uploaded At: Dec. 1, 2025, 7:34 a.m.

Views: 5

Exported Functions

  • DllCanUnloadNow (Ordinal: 1, Address: 0x1240)
  • DllGetClassObject (Ordinal: 2, Address: 0x1280)
  • DllRegisterServer (Ordinal: 3, Address: 0x13c0)
  • DllUnregisterServer (Ordinal: 4, Address: 0x1500)

Imported DLLs & Functions

ADVAPI32.dll
  • RegCloseKey (Address: 0x18000ab70)
  • RegCreateKeyExW (Address: 0x18000ab68)
  • RegDeleteValueW (Address: 0x18000ab60)
  • RegEnumKeyExW (Address: 0x18000ab80)
  • RegOpenKeyExW (Address: 0x18000ab78)
  • RegQueryInfoKeyW (Address: 0x18000ab58)
  • RegSetValueExW (Address: 0x18000ab50)
KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x18000abd8)
  • DeleteCriticalSection (Address: 0x18000ac90)
  • EnterCriticalSection (Address: 0x18000aca0)
  • FindResourceExW (Address: 0x18000ac70)
  • FreeLibrary (Address: 0x18000ac20)
  • GetCurrentProcess (Address: 0x18000abf0)
  • GetCurrentProcessId (Address: 0x18000abb8)
  • GetCurrentThreadId (Address: 0x18000abb0)
  • GetLastError (Address: 0x18000ac28)
  • GetModuleFileNameW (Address: 0x18000ac78)
  • GetModuleHandleW (Address: 0x18000ac40)
  • GetProcAddress (Address: 0x18000ac30)
  • GetSystemTimeAsFileTime (Address: 0x18000aba8)
  • GetThreadLocale (Address: 0x18000ac80)
  • GetTickCount (Address: 0x18000aba0)
  • InitializeCriticalSection (Address: 0x18000ac98)
  • LeaveCriticalSection (Address: 0x18000aca8)
  • LoadLibraryExW (Address: 0x18000ac38)
  • LoadResource (Address: 0x18000ac68)
  • lstrcmpiW (Address: 0x18000ac48)
  • MultiByteToWideChar (Address: 0x18000ac58)
  • OutputDebugStringA (Address: 0x18000ab98)
  • QueryPerformanceCounter (Address: 0x18000abc0)
  • RaiseException (Address: 0x18000ac50)
  • ReleaseSRWLockExclusive (Address: 0x18000abe0)
  • RtlCaptureContext (Address: 0x18000ab90)
  • RtlLookupFunctionEntry (Address: 0x18000ac10)
  • RtlVirtualUnwind (Address: 0x18000ac08)
  • SetThreadLocale (Address: 0x18000ac88)
  • SetUnhandledExceptionFilter (Address: 0x18000abf8)
  • SizeofResource (Address: 0x18000ac60)
  • Sleep (Address: 0x18000ac18)
  • SleepConditionVariableSRW (Address: 0x18000abc8)
  • TerminateProcess (Address: 0x18000abe8)
  • UnhandledExceptionFilter (Address: 0x18000ac00)
  • WakeAllConditionVariable (Address: 0x18000abd0)
msvcrt.dll
  • __C_specific_handler (Address: 0x18000ad58)
  • __CxxFrameHandler3 (Address: 0x18000adc0)
  • __dllonexit (Address: 0x18000adb0)
  • _amsg_exit (Address: 0x18000ad78)
  • _callnewh (Address: 0x18000ad68)
  • _CxxThrowException (Address: 0x18000ad60)
  • _errno (Address: 0x18000ad90)
  • _initterm (Address: 0x18000ad88)
  • _lock (Address: 0x18000ada0)
  • _onexit (Address: 0x18000adb8)
  • _purecall (Address: 0x18000ad28)
  • _unlock (Address: 0x18000ada8)
  • _vsnwprintf (Address: 0x18000ad18)
  • _XcptFilter (Address: 0x18000ad70)
  • ??1type_info@@UEAA@XZ (Address: 0x18000ad38)
  • ?terminate@@YAXXZ (Address: 0x18000ad20)
  • free (Address: 0x18000ad40)
  • malloc (Address: 0x18000ad48)
  • memcmp (Address: 0x18000add0)
  • memcpy_s (Address: 0x18000ad80)
  • memset (Address: 0x18000add8)
  • realloc (Address: 0x18000ad98)
  • wcscat_s (Address: 0x18000ad30)
  • wcscpy_s (Address: 0x18000adc8)
  • wcsncpy_s (Address: 0x18000ad50)
ole32.dll
  • CLSIDFromProgID (Address: 0x18000ae18)
  • CoCreateInstance (Address: 0x18000ade8)
  • CoTaskMemAlloc (Address: 0x18000adf8)
  • CoTaskMemFree (Address: 0x18000ae08)
  • CoTaskMemRealloc (Address: 0x18000ae00)
  • IIDFromString (Address: 0x18000adf0)
  • StringFromGUID2 (Address: 0x18000ae10)
OLEAUT32.dll
  • LoadRegTypeLib (Address: 0x18000acf0)
  • LoadTypeLib (Address: 0x18000acc8)
  • RegisterTypeLib (Address: 0x18000acc0)
  • SysAllocString (Address: 0x18000acd0)
  • SysFreeString (Address: 0x18000ace8)
  • SysStringLen (Address: 0x18000acb8)
  • UnRegisterTypeLib (Address: 0x18000acd8)
  • VarUI4FromStr (Address: 0x18000ace0)
USER32.dll
  • CharNextW (Address: 0x18000ad00)
  • UnregisterClassA (Address: 0x18000ad08)