ldpmonitor64.dll
Description: ldpmonitor
Authors: Copyright©2025 Kingsoft Corporation. All rights reserved.
Version: 12.9.0.22603
Architecture: 64-bit
Operating System: Windows NT
SHA256: ca8fde81e007644c5874dd47cfa830c4
File Size: 223.0 KB
Uploaded At: Dec. 4, 2025, 6:17 a.m.
Views: 14
Exported Functions
- LdpEntry (Ordinal: 1, Address: 0x6cf0)
Imported DLLs & Functions
KERNEL32.dll
- AcquireSRWLockExclusive (Address: 0x180020178)
- AcquireSRWLockShared (Address: 0x180020180)
- CloseHandle (Address: 0x180020018)
- CompareStringOrdinal (Address: 0x180020120)
- CreateEventW (Address: 0x180020258)
- CreateFileW (Address: 0x180020008)
- CreateToolhelp32Snapshot (Address: 0x180020128)
- DeleteCriticalSection (Address: 0x180020070)
- DisableThreadLibraryCalls (Address: 0x1800200d0)
- EncodePointer (Address: 0x1800202a8)
- EnterCriticalSection (Address: 0x180020230)
- ExitProcess (Address: 0x1800202d0)
- FindClose (Address: 0x1800202f0)
- FindFirstFileExW (Address: 0x1800202f8)
- FindNextFileW (Address: 0x180020300)
- FindResourceExW (Address: 0x1800200d8)
- FindResourceW (Address: 0x180020110)
- FlushFileBuffers (Address: 0x180020200)
- FlushInstructionCache (Address: 0x1800201c8)
- FreeEnvironmentStringsW (Address: 0x180020340)
- FreeLibrary (Address: 0x1800200e0)
- FreeLibraryAndExitThread (Address: 0x1800200e8)
- GetACP (Address: 0x180020310)
- GetCommandLineA (Address: 0x180020328)
- GetCommandLineW (Address: 0x180020330)
- GetConsoleCP (Address: 0x1800201f0)
- GetConsoleMode (Address: 0x180020010)
- GetCPInfo (Address: 0x180020320)
- GetCurrentProcess (Address: 0x180020188)
- GetCurrentProcessId (Address: 0x180020078)
- GetCurrentThreadId (Address: 0x180020080)
- GetEnvironmentStringsW (Address: 0x180020338)
- GetFileType (Address: 0x1800202e8)
- GetLastError (Address: 0x180020028)
- GetModuleFileNameW (Address: 0x1800200f0)
- GetModuleHandleExW (Address: 0x1800202d8)
- GetModuleHandleW (Address: 0x180020150)
- GetOEMCP (Address: 0x180020318)
- GetProcAddress (Address: 0x180020158)
- GetProcessHeap (Address: 0x180020060)
- GetStartupInfoW (Address: 0x180020270)
- GetStdHandle (Address: 0x1800202e0)
- GetStringTypeW (Address: 0x180020210)
- GetSystemInfo (Address: 0x180020220)
- GetSystemTimeAsFileTime (Address: 0x180020290)
- GetThreadContext (Address: 0x1800200a0)
- GetWindowsDirectoryW (Address: 0x180020190)
- HeapAlloc (Address: 0x180020040)
- HeapDestroy (Address: 0x180020038)
- HeapFree (Address: 0x180020050)
- HeapReAlloc (Address: 0x180020048)
- HeapSize (Address: 0x180020058)
- InitializeCriticalSectionAndSpinCount (Address: 0x180020068)
- InitializeSListHead (Address: 0x180020298)
- InitializeSRWLock (Address: 0x180020160)
- InterlockedFlushSList (Address: 0x1800202a0)
- IsDebuggerPresent (Address: 0x180020228)
- IsProcessorFeaturePresent (Address: 0x180020278)
- IsValidCodePage (Address: 0x180020308)
- IsWow64Process (Address: 0x180020198)
- LCMapStringW (Address: 0x180020348)
- LeaveCriticalSection (Address: 0x180020238)
- LoadLibraryExA (Address: 0x180020000)
- LoadLibraryExW (Address: 0x1800201e8)
- LoadLibraryW (Address: 0x180020118)
- LoadResource (Address: 0x1800200f8)
- LockResource (Address: 0x180020100)
- MapViewOfFile (Address: 0x1800200c0)
- Module32FirstW (Address: 0x180020140)
- Module32NextW (Address: 0x180020148)
- MultiByteToWideChar (Address: 0x1800201b0)
- OpenFileMappingW (Address: 0x1800200b8)
- OpenThread (Address: 0x180020088)
- OutputDebugStringA (Address: 0x1800201a0)
- OutputDebugStringW (Address: 0x1800201a8)
- QueryPerformanceCounter (Address: 0x180020288)
- RaiseException (Address: 0x180020020)
- ReleaseSRWLockExclusive (Address: 0x180020168)
- ReleaseSRWLockShared (Address: 0x180020170)
- ResetEvent (Address: 0x180020248)
- ResumeThread (Address: 0x180020098)
- SetEvent (Address: 0x180020240)
- SetFilePointerEx (Address: 0x180020218)
- SetLastError (Address: 0x180020030)
- SetStdHandle (Address: 0x180020208)
- SetThreadContext (Address: 0x1800201c0)
- SetUnhandledExceptionFilter (Address: 0x180020268)
- SizeofResource (Address: 0x180020108)
- SuspendThread (Address: 0x180020090)
- TerminateProcess (Address: 0x180020280)
- Thread32First (Address: 0x180020130)
- Thread32Next (Address: 0x180020138)
- TlsAlloc (Address: 0x1800202b0)
- TlsFree (Address: 0x1800202c8)
- TlsGetValue (Address: 0x1800202b8)
- TlsSetValue (Address: 0x1800202c0)
- UnhandledExceptionFilter (Address: 0x180020260)
- UnmapViewOfFile (Address: 0x1800200c8)
- VirtualAlloc (Address: 0x1800201d0)
- VirtualFree (Address: 0x1800201d8)
- VirtualProtect (Address: 0x1800200a8)
- VirtualQuery (Address: 0x1800200b0)
- WaitForSingleObjectEx (Address: 0x180020250)
- WideCharToMultiByte (Address: 0x1800201b8)
- WriteConsoleW (Address: 0x1800201e0)
- WriteFile (Address: 0x1800201f8)
ntdll.dll
- RtlCaptureContext (Address: 0x180020378)
- RtlCaptureStackBackTrace (Address: 0x1800203a0)
- RtlCreateUnicodeString (Address: 0x180020388)
- RtlFreeUnicodeString (Address: 0x180020398)
- RtlLookupFunctionEntry (Address: 0x180020370)
- RtlPcToFileHeader (Address: 0x180020360)
- RtlUnwind (Address: 0x180020380)
- RtlUnwindEx (Address: 0x180020358)
- RtlVirtualUnwind (Address: 0x180020368)
- ZwQueryKey (Address: 0x180020390)