aadWamExtension.dll
Description: AAD WAM extension DLL
Authors: © Microsoft Corporation. All rights reserved.
Version: 10.0.19041.5794
Architecture: 64-bit
Operating System: Windows NT
SHA256: 8f1f6a7c5176ba18563d20b6752238e1
File Size: 194.9 KB
Uploaded At: Dec. 1, 2025, 7:21 a.m.
Views: 11
Exported Functions
- DllCanUnloadNow (Ordinal: 1, Address: 0x4ff0)
- DllGetActivationFactory (Ordinal: 2, Address: 0x4d10)
- DllGetClassObject (Ordinal: 3, Address: 0x4ef0)
Imported DLLs & Functions
api-ms-win-core-debug-l1-1-0.dll
- DebugBreak (Address: 0x18001e860)
- IsDebuggerPresent (Address: 0x18001e848)
- OutputDebugStringA (Address: 0x18001e858)
- OutputDebugStringW (Address: 0x18001e850)
api-ms-win-core-delayload-l1-1-0.dll
- DelayLoadFailureHook (Address: 0x18001e870)
api-ms-win-core-delayload-l1-1-1.dll
- ResolveDelayLoadedAPI (Address: 0x18001e880)
api-ms-win-core-errorhandling-l1-1-0.dll
- GetLastError (Address: 0x18001e898)
- RaiseException (Address: 0x18001e8b0)
- SetLastError (Address: 0x18001e8a0)
- SetUnhandledExceptionFilter (Address: 0x18001e890)
- UnhandledExceptionFilter (Address: 0x18001e8a8)
api-ms-win-core-handle-l1-1-0.dll
- CloseHandle (Address: 0x18001e8c0)
api-ms-win-core-heap-l1-1-0.dll
- GetProcessHeap (Address: 0x18001e8d0)
- HeapAlloc (Address: 0x18001e8f0)
- HeapDestroy (Address: 0x18001e8d8)
- HeapFree (Address: 0x18001e8e0)
- HeapReAlloc (Address: 0x18001e8f8)
- HeapSize (Address: 0x18001e8e8)
api-ms-win-core-heap-l2-1-0.dll
- LocalAlloc (Address: 0x18001e910)
- LocalFree (Address: 0x18001e908)
api-ms-win-core-libraryloader-l1-2-0.dll
- FindResourceExW (Address: 0x18001e950)
- GetModuleFileNameA (Address: 0x18001e928)
- GetModuleHandleExW (Address: 0x18001e948)
- GetModuleHandleW (Address: 0x18001e938)
- GetProcAddress (Address: 0x18001e920)
- LoadResource (Address: 0x18001e958)
- LockResource (Address: 0x18001e940)
- SizeofResource (Address: 0x18001e930)
api-ms-win-core-localization-l1-2-0.dll
- FormatMessageW (Address: 0x18001e968)
api-ms-win-core-memory-l1-1-0.dll
- VirtualAlloc (Address: 0x18001e980)
- VirtualProtect (Address: 0x18001e988)
- VirtualQuery (Address: 0x18001e978)
api-ms-win-core-processthreads-l1-1-0.dll
- GetCurrentProcess (Address: 0x18001e9b8)
- GetCurrentProcessId (Address: 0x18001e998)
- GetCurrentThreadId (Address: 0x18001e9b0)
- SetThreadStackGuarantee (Address: 0x18001e9a8)
- TerminateProcess (Address: 0x18001e9a0)
api-ms-win-core-profile-l1-1-0.dll
- QueryPerformanceCounter (Address: 0x18001e9c8)
api-ms-win-core-rtlsupport-l1-1-0.dll
- RtlCaptureContext (Address: 0x18001e9e0)
- RtlLookupFunctionEntry (Address: 0x18001e9e8)
- RtlVirtualUnwind (Address: 0x18001e9d8)
api-ms-win-core-string-l1-1-0.dll
- MultiByteToWideChar (Address: 0x18001ea00)
- WideCharToMultiByte (Address: 0x18001e9f8)
api-ms-win-core-synch-l1-1-0.dll
- AcquireSRWLockExclusive (Address: 0x18001ea18)
- AcquireSRWLockShared (Address: 0x18001ea60)
- CreateMutexExW (Address: 0x18001ea38)
- CreateSemaphoreExW (Address: 0x18001ea78)
- DeleteCriticalSection (Address: 0x18001ea90)
- EnterCriticalSection (Address: 0x18001ea70)
- InitializeCriticalSection (Address: 0x18001ea88)
- InitializeCriticalSectionEx (Address: 0x18001ea80)
- InitializeSRWLock (Address: 0x18001ea50)
- LeaveCriticalSection (Address: 0x18001ea28)
- OpenSemaphoreW (Address: 0x18001ea30)
- ReleaseMutex (Address: 0x18001ea20)
- ReleaseSemaphore (Address: 0x18001ea68)
- ReleaseSRWLockExclusive (Address: 0x18001ea48)
- ReleaseSRWLockShared (Address: 0x18001ea40)
- WaitForSingleObject (Address: 0x18001ea58)
- WaitForSingleObjectEx (Address: 0x18001ea10)
api-ms-win-core-synch-l1-2-0.dll
- InitOnceBeginInitialize (Address: 0x18001eab0)
- InitOnceComplete (Address: 0x18001eab8)
- InitOnceExecuteOnce (Address: 0x18001eaa0)
- Sleep (Address: 0x18001eaa8)
api-ms-win-core-sysinfo-l1-1-0.dll
- GetSystemInfo (Address: 0x18001eac8)
- GetSystemTimeAsFileTime (Address: 0x18001ead0)
- GetTickCount (Address: 0x18001ead8)
api-ms-win-core-threadpool-l1-2-0.dll
- CloseThreadpoolTimer (Address: 0x18001eaf8)
- CreateThreadpoolTimer (Address: 0x18001eaf0)
- SetThreadpoolTimer (Address: 0x18001eae8)
- WaitForThreadpoolTimerCallbacks (Address: 0x18001eb00)
api-ms-win-core-util-l1-1-0.dll
- DecodePointer (Address: 0x18001eb18)
- EncodePointer (Address: 0x18001eb10)
api-ms-win-eventing-classicprovider-l1-1-0.dll
- GetTraceEnableFlags (Address: 0x18001eb40)
- GetTraceEnableLevel (Address: 0x18001eb38)
- GetTraceLoggerHandle (Address: 0x18001eb50)
- RegisterTraceGuidsW (Address: 0x18001eb28)
- TraceMessage (Address: 0x18001eb30)
- UnregisterTraceGuids (Address: 0x18001eb48)
api-ms-win-eventing-provider-l1-1-0.dll
- EventActivityIdControl (Address: 0x18001eb68)
- EventRegister (Address: 0x18001eb60)
- EventSetInformation (Address: 0x18001eb78)
- EventUnregister (Address: 0x18001eb70)
- EventWriteTransfer (Address: 0x18001eb80)
CRYPT32.dll
- CryptStringToBinaryW (Address: 0x18001e7f8)
msvcrt.dll
- __C_specific_handler (Address: 0x18001ebd0)
- __CxxFrameHandler3 (Address: 0x18001ecc8)
- __dllonexit (Address: 0x18001ec30)
- _amsg_exit (Address: 0x18001ebf0)
- _callnewh (Address: 0x18001ec08)
- _CxxThrowException (Address: 0x18001ec58)
- _errno (Address: 0x18001eba0)
- _initterm (Address: 0x18001ebd8)
- _lock (Address: 0x18001ecd0)
- _onexit (Address: 0x18001ec40)
- _purecall (Address: 0x18001ec38)
- _unlock (Address: 0x18001ec20)
- _vscwprintf (Address: 0x18001eba8)
- _vsnprintf (Address: 0x18001ed10)
- _vsnprintf_s (Address: 0x18001ec68)
- _vsnwprintf (Address: 0x18001eca8)
- _wcsicmp (Address: 0x18001ec80)
- _wcsnicmp (Address: 0x18001ebb8)
- _wtof (Address: 0x18001ecf8)
- _XcptFilter (Address: 0x18001ebf8)
- ??_V@YAXPEAX@Z (Address: 0x18001ecc0)
- ??0exception@@QEAA@AEBQEBD@Z (Address: 0x18001ec98)
- ??0exception@@QEAA@AEBQEBDH@Z (Address: 0x18001ec28)
- ??0exception@@QEAA@AEBV0@@Z (Address: 0x18001ec70)
- ??0exception@@QEAA@XZ (Address: 0x18001ec78)
- ??1exception@@UEAA@XZ (Address: 0x18001ec88)
- ??1type_info@@UEAA@XZ (Address: 0x18001ec48)
- ??3@YAXPEAX@Z (Address: 0x18001ec50)
- ?terminate@@YAXXZ (Address: 0x18001ec10)
- ?what@exception@@UEBAPEBDXZ (Address: 0x18001ec00)
- free (Address: 0x18001ebe8)
- isalpha (Address: 0x18001ecf0)
- isdigit (Address: 0x18001ecd8)
- isxdigit (Address: 0x18001ece0)
- malloc (Address: 0x18001ebe0)
- memcmp (Address: 0x18001ec18)
- memcpy (Address: 0x18001eb90)
- memcpy_s (Address: 0x18001ec90)
- memmove (Address: 0x18001eb98)
- memmove_s (Address: 0x18001ecb0)
- memset (Address: 0x18001ec60)
- realloc (Address: 0x18001eca0)
- strtol (Address: 0x18001ece8)
- swprintf_s (Address: 0x18001ed08)
- swscanf (Address: 0x18001ebc8)
- time (Address: 0x18001ebc0)
- vswprintf_s (Address: 0x18001ecb8)
- wcschr (Address: 0x18001ebb0)
- wcscmp (Address: 0x18001ed18)
- wcsnlen (Address: 0x18001ed00)
ntdll.dll
- RtlAllocateHeap (Address: 0x18001ed28)
- RtlFreeHeap (Address: 0x18001ed48)
- RtlImageNtHeader (Address: 0x18001ed40)
- RtlInitString (Address: 0x18001ed30)
- RtlNtStatusToDosError (Address: 0x18001ed38)
RPCRT4.dll
- UuidCreate (Address: 0x18001e808)
SspiCli.dll
- LsaCallAuthenticationPackage (Address: 0x18001e838)
- LsaConnectUntrusted (Address: 0x18001e830)
- LsaDeregisterLogonProcess (Address: 0x18001e820)
- LsaFreeReturnBuffer (Address: 0x18001e828)
- LsaLookupAuthenticationPackage (Address: 0x18001e818)