ldpmonitor64.dll

Description: ldpmonitor

Authors: Copyright©2025 Kingsoft Corporation. All rights reserved.

Version: 12.9.0.22603

Architecture: 64-bit

Operating System: Windows NT

SHA256: ca8fde81e007644c5874dd47cfa830c4

File Size: 223.0 KB

Uploaded At: Dec. 4, 2025, 6:17 a.m.

Views: 14

Exported Functions

  • LdpEntry (Ordinal: 1, Address: 0x6cf0)

Imported DLLs & Functions

KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x180020178)
  • AcquireSRWLockShared (Address: 0x180020180)
  • CloseHandle (Address: 0x180020018)
  • CompareStringOrdinal (Address: 0x180020120)
  • CreateEventW (Address: 0x180020258)
  • CreateFileW (Address: 0x180020008)
  • CreateToolhelp32Snapshot (Address: 0x180020128)
  • DeleteCriticalSection (Address: 0x180020070)
  • DisableThreadLibraryCalls (Address: 0x1800200d0)
  • EncodePointer (Address: 0x1800202a8)
  • EnterCriticalSection (Address: 0x180020230)
  • ExitProcess (Address: 0x1800202d0)
  • FindClose (Address: 0x1800202f0)
  • FindFirstFileExW (Address: 0x1800202f8)
  • FindNextFileW (Address: 0x180020300)
  • FindResourceExW (Address: 0x1800200d8)
  • FindResourceW (Address: 0x180020110)
  • FlushFileBuffers (Address: 0x180020200)
  • FlushInstructionCache (Address: 0x1800201c8)
  • FreeEnvironmentStringsW (Address: 0x180020340)
  • FreeLibrary (Address: 0x1800200e0)
  • FreeLibraryAndExitThread (Address: 0x1800200e8)
  • GetACP (Address: 0x180020310)
  • GetCommandLineA (Address: 0x180020328)
  • GetCommandLineW (Address: 0x180020330)
  • GetConsoleCP (Address: 0x1800201f0)
  • GetConsoleMode (Address: 0x180020010)
  • GetCPInfo (Address: 0x180020320)
  • GetCurrentProcess (Address: 0x180020188)
  • GetCurrentProcessId (Address: 0x180020078)
  • GetCurrentThreadId (Address: 0x180020080)
  • GetEnvironmentStringsW (Address: 0x180020338)
  • GetFileType (Address: 0x1800202e8)
  • GetLastError (Address: 0x180020028)
  • GetModuleFileNameW (Address: 0x1800200f0)
  • GetModuleHandleExW (Address: 0x1800202d8)
  • GetModuleHandleW (Address: 0x180020150)
  • GetOEMCP (Address: 0x180020318)
  • GetProcAddress (Address: 0x180020158)
  • GetProcessHeap (Address: 0x180020060)
  • GetStartupInfoW (Address: 0x180020270)
  • GetStdHandle (Address: 0x1800202e0)
  • GetStringTypeW (Address: 0x180020210)
  • GetSystemInfo (Address: 0x180020220)
  • GetSystemTimeAsFileTime (Address: 0x180020290)
  • GetThreadContext (Address: 0x1800200a0)
  • GetWindowsDirectoryW (Address: 0x180020190)
  • HeapAlloc (Address: 0x180020040)
  • HeapDestroy (Address: 0x180020038)
  • HeapFree (Address: 0x180020050)
  • HeapReAlloc (Address: 0x180020048)
  • HeapSize (Address: 0x180020058)
  • InitializeCriticalSectionAndSpinCount (Address: 0x180020068)
  • InitializeSListHead (Address: 0x180020298)
  • InitializeSRWLock (Address: 0x180020160)
  • InterlockedFlushSList (Address: 0x1800202a0)
  • IsDebuggerPresent (Address: 0x180020228)
  • IsProcessorFeaturePresent (Address: 0x180020278)
  • IsValidCodePage (Address: 0x180020308)
  • IsWow64Process (Address: 0x180020198)
  • LCMapStringW (Address: 0x180020348)
  • LeaveCriticalSection (Address: 0x180020238)
  • LoadLibraryExA (Address: 0x180020000)
  • LoadLibraryExW (Address: 0x1800201e8)
  • LoadLibraryW (Address: 0x180020118)
  • LoadResource (Address: 0x1800200f8)
  • LockResource (Address: 0x180020100)
  • MapViewOfFile (Address: 0x1800200c0)
  • Module32FirstW (Address: 0x180020140)
  • Module32NextW (Address: 0x180020148)
  • MultiByteToWideChar (Address: 0x1800201b0)
  • OpenFileMappingW (Address: 0x1800200b8)
  • OpenThread (Address: 0x180020088)
  • OutputDebugStringA (Address: 0x1800201a0)
  • OutputDebugStringW (Address: 0x1800201a8)
  • QueryPerformanceCounter (Address: 0x180020288)
  • RaiseException (Address: 0x180020020)
  • ReleaseSRWLockExclusive (Address: 0x180020168)
  • ReleaseSRWLockShared (Address: 0x180020170)
  • ResetEvent (Address: 0x180020248)
  • ResumeThread (Address: 0x180020098)
  • SetEvent (Address: 0x180020240)
  • SetFilePointerEx (Address: 0x180020218)
  • SetLastError (Address: 0x180020030)
  • SetStdHandle (Address: 0x180020208)
  • SetThreadContext (Address: 0x1800201c0)
  • SetUnhandledExceptionFilter (Address: 0x180020268)
  • SizeofResource (Address: 0x180020108)
  • SuspendThread (Address: 0x180020090)
  • TerminateProcess (Address: 0x180020280)
  • Thread32First (Address: 0x180020130)
  • Thread32Next (Address: 0x180020138)
  • TlsAlloc (Address: 0x1800202b0)
  • TlsFree (Address: 0x1800202c8)
  • TlsGetValue (Address: 0x1800202b8)
  • TlsSetValue (Address: 0x1800202c0)
  • UnhandledExceptionFilter (Address: 0x180020260)
  • UnmapViewOfFile (Address: 0x1800200c8)
  • VirtualAlloc (Address: 0x1800201d0)
  • VirtualFree (Address: 0x1800201d8)
  • VirtualProtect (Address: 0x1800200a8)
  • VirtualQuery (Address: 0x1800200b0)
  • WaitForSingleObjectEx (Address: 0x180020250)
  • WideCharToMultiByte (Address: 0x1800201b8)
  • WriteConsoleW (Address: 0x1800201e0)
  • WriteFile (Address: 0x1800201f8)
ntdll.dll
  • RtlCaptureContext (Address: 0x180020378)
  • RtlCaptureStackBackTrace (Address: 0x1800203a0)
  • RtlCreateUnicodeString (Address: 0x180020388)
  • RtlFreeUnicodeString (Address: 0x180020398)
  • RtlLookupFunctionEntry (Address: 0x180020370)
  • RtlPcToFileHeader (Address: 0x180020360)
  • RtlUnwind (Address: 0x180020380)
  • RtlUnwindEx (Address: 0x180020358)
  • RtlVirtualUnwind (Address: 0x180020368)
  • ZwQueryKey (Address: 0x180020390)