ldpmonitor.dll

Description: ldpmonitor

Authors: Copyright©2025 Kingsoft Corporation. All rights reserved.

Version: 12.9.0.22603

Architecture: 32-bit

Operating System: Windows NT

SHA256: 581f90deda85f49fced4cab067aed912

File Size: 183.5 KB

Uploaded At: Dec. 4, 2025, 6:17 a.m.

Views: 13

Exported Functions

  • _LdpEntry@16 (Ordinal: 1, Address: 0x6510)

Imported DLLs & Functions

KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x1001c0bc)
  • AcquireSRWLockShared (Address: 0x1001c0c0)
  • CloseHandle (Address: 0x1001c00c)
  • CompareStringOrdinal (Address: 0x1001c090)
  • CreateEventW (Address: 0x1001c120)
  • CreateFileW (Address: 0x1001c000)
  • CreateToolhelp32Snapshot (Address: 0x1001c094)
  • DecodePointer (Address: 0x1001c008)
  • DeleteCriticalSection (Address: 0x1001c038)
  • DisableThreadLibraryCalls (Address: 0x1001c068)
  • EncodePointer (Address: 0x1001c148)
  • EnterCriticalSection (Address: 0x1001c10c)
  • ExitProcess (Address: 0x1001c15c)
  • FindClose (Address: 0x1001c16c)
  • FindFirstFileExW (Address: 0x1001c170)
  • FindNextFileW (Address: 0x1001c174)
  • FindResourceExW (Address: 0x1001c06c)
  • FindResourceW (Address: 0x1001c088)
  • FlushFileBuffers (Address: 0x1001c1a8)
  • FlushInstructionCache (Address: 0x1001c0e4)
  • FreeEnvironmentStringsW (Address: 0x1001c194)
  • FreeLibrary (Address: 0x1001c070)
  • FreeLibraryAndExitThread (Address: 0x1001c074)
  • GetACP (Address: 0x1001c17c)
  • GetCommandLineA (Address: 0x1001c188)
  • GetCommandLineW (Address: 0x1001c18c)
  • GetConsoleCP (Address: 0x1001c0fc)
  • GetConsoleMode (Address: 0x1001c004)
  • GetCPInfo (Address: 0x1001c184)
  • GetCurrentProcess (Address: 0x1001c0c4)
  • GetCurrentProcessId (Address: 0x1001c03c)
  • GetCurrentThreadId (Address: 0x1001c040)
  • GetEnvironmentStringsW (Address: 0x1001c190)
  • GetFileType (Address: 0x1001c168)
  • GetLastError (Address: 0x1001c014)
  • GetModuleFileNameW (Address: 0x1001c078)
  • GetModuleHandleExW (Address: 0x1001c160)
  • GetModuleHandleW (Address: 0x1001c0a8)
  • GetOEMCP (Address: 0x1001c180)
  • GetProcAddress (Address: 0x1001c0ac)
  • GetProcessHeap (Address: 0x1001c030)
  • GetStartupInfoW (Address: 0x1001c130)
  • GetStdHandle (Address: 0x1001c164)
  • GetStringTypeW (Address: 0x1001c1a0)
  • GetSystemInfo (Address: 0x1001c104)
  • GetSystemTimeAsFileTime (Address: 0x1001c13c)
  • GetThreadContext (Address: 0x1001c050)
  • GetWindowsDirectoryW (Address: 0x1001c0c8)
  • HeapAlloc (Address: 0x1001c020)
  • HeapDestroy (Address: 0x1001c01c)
  • HeapFree (Address: 0x1001c028)
  • HeapReAlloc (Address: 0x1001c024)
  • HeapSize (Address: 0x1001c02c)
  • InitializeCriticalSectionAndSpinCount (Address: 0x1001c034)
  • InitializeSListHead (Address: 0x1001c140)
  • InitializeSRWLock (Address: 0x1001c0b0)
  • InterlockedFlushSList (Address: 0x1001c144)
  • IsDebuggerPresent (Address: 0x1001c108)
  • IsProcessorFeaturePresent (Address: 0x1001c124)
  • IsValidCodePage (Address: 0x1001c178)
  • IsWow64Process (Address: 0x1001c0cc)
  • LCMapStringW (Address: 0x1001c198)
  • LeaveCriticalSection (Address: 0x1001c110)
  • LoadLibraryExA (Address: 0x1001c0f4)
  • LoadLibraryExW (Address: 0x1001c0f8)
  • LoadLibraryW (Address: 0x1001c08c)
  • LoadResource (Address: 0x1001c07c)
  • LockResource (Address: 0x1001c080)
  • MapViewOfFile (Address: 0x1001c060)
  • Module32FirstW (Address: 0x1001c0a0)
  • Module32NextW (Address: 0x1001c0a4)
  • MultiByteToWideChar (Address: 0x1001c0d8)
  • OpenFileMappingW (Address: 0x1001c05c)
  • OpenThread (Address: 0x1001c044)
  • OutputDebugStringA (Address: 0x1001c0d0)
  • OutputDebugStringW (Address: 0x1001c0d4)
  • QueryPerformanceCounter (Address: 0x1001c138)
  • RaiseException (Address: 0x1001c010)
  • ReleaseSRWLockExclusive (Address: 0x1001c0b4)
  • ReleaseSRWLockShared (Address: 0x1001c0b8)
  • ResetEvent (Address: 0x1001c118)
  • ResumeThread (Address: 0x1001c04c)
  • SetEvent (Address: 0x1001c114)
  • SetFilePointerEx (Address: 0x1001c19c)
  • SetLastError (Address: 0x1001c018)
  • SetStdHandle (Address: 0x1001c1a4)
  • SetThreadContext (Address: 0x1001c0e0)
  • SetUnhandledExceptionFilter (Address: 0x1001c12c)
  • SizeofResource (Address: 0x1001c084)
  • SuspendThread (Address: 0x1001c048)
  • TerminateProcess (Address: 0x1001c134)
  • Thread32First (Address: 0x1001c098)
  • Thread32Next (Address: 0x1001c09c)
  • TlsAlloc (Address: 0x1001c14c)
  • TlsFree (Address: 0x1001c158)
  • TlsGetValue (Address: 0x1001c150)
  • TlsSetValue (Address: 0x1001c154)
  • UnhandledExceptionFilter (Address: 0x1001c128)
  • UnmapViewOfFile (Address: 0x1001c064)
  • VirtualAlloc (Address: 0x1001c0e8)
  • VirtualFree (Address: 0x1001c0ec)
  • VirtualProtect (Address: 0x1001c054)
  • VirtualQuery (Address: 0x1001c058)
  • WaitForSingleObjectEx (Address: 0x1001c11c)
  • WideCharToMultiByte (Address: 0x1001c0dc)
  • WriteConsoleW (Address: 0x1001c0f0)
  • WriteFile (Address: 0x1001c100)
ntdll.dll
  • RtlCaptureStackBackTrace (Address: 0x1001c1b0)
  • RtlCreateUnicodeString (Address: 0x1001c1bc)
  • RtlFreeUnicodeString (Address: 0x1001c1b8)
  • RtlUnwind (Address: 0x1001c1c0)
  • ZwQueryKey (Address: 0x1001c1b4)