IMEPADSM.DLL
Description: Microsoft IME
Authors: © Microsoft Corporation. All rights reserved.
Version: 10.0.19041.5794
Architecture: 64-bit
Operating System: Windows NT
SHA256: 05f7ee50b356bf644b75726c225e87a4
File Size: 120.4 KB
Uploaded At: Dec. 1, 2025, 7:50 a.m.
Views: 5
Exported Functions
- CreateObject2 (Ordinal: 1, Address: 0x94d0)
- CreateObject (Ordinal: 2, Address: 0x9400)
- RegClass (Ordinal: 3, Address: 0x9720)
- UnregClass (Ordinal: 4, Address: 0x9800)
- DllCanUnloadNow (Ordinal: 5, Address: 0x4f70)
- DllGetClassObject (Ordinal: 6, Address: 0x9350)
- DllRegisterServer (Ordinal: 7, Address: 0x4f70)
- DllUnregisterServer (Ordinal: 8, Address: 0x4f70)
Imported DLLs & Functions
ADVAPI32.dll
- ConvertSidToStringSidW (Address: 0x180014ca8)
- ConvertStringSecurityDescriptorToSecurityDescriptorW (Address: 0x180014c90)
- EventRegister (Address: 0x180014cf8)
- EventSetInformation (Address: 0x180014cf0)
- EventUnregister (Address: 0x180014d00)
- EventWriteTransfer (Address: 0x180014ce8)
- GetSidSubAuthority (Address: 0x180014c98)
- GetSidSubAuthorityCount (Address: 0x180014ca0)
- GetTokenInformation (Address: 0x180014cd8)
- IsValidSid (Address: 0x180014cb0)
- OpenProcessToken (Address: 0x180014ce0)
- OpenThreadToken (Address: 0x180014cd0)
- RegCloseKey (Address: 0x180014cc0)
- RegOpenKeyExW (Address: 0x180014cc8)
- RegQueryValueExW (Address: 0x180014cb8)
KERNEL32.dll
- AcquireSRWLockExclusive (Address: 0x180014e80)
- AcquireSRWLockShared (Address: 0x180014ef8)
- CloseHandle (Address: 0x180014e30)
- CloseThreadpoolTimer (Address: 0x180014ec0)
- CreateEventW (Address: 0x180014dd8)
- CreateMutexExW (Address: 0x180014dc0)
- CreateProcessW (Address: 0x180014f30)
- CreateSemaphoreExW (Address: 0x180014dc8)
- CreateThread (Address: 0x180014de0)
- CreateThreadpoolTimer (Address: 0x180014eb8)
- DebugBreak (Address: 0x180014d48)
- DelayLoadFailureHook (Address: 0x180014f18)
- DeleteCriticalSection (Address: 0x180014f00)
- EnterCriticalSection (Address: 0x180014ed0)
- ExpandEnvironmentStringsW (Address: 0x180014f28)
- FormatMessageW (Address: 0x180014d10)
- FreeLibrary (Address: 0x180014f48)
- FreeLibraryAndExitThread (Address: 0x180014e00)
- GetAppContainerNamedObjectPath (Address: 0x180014e10)
- GetCurrentPackageFullName (Address: 0x180014f08)
- GetCurrentProcess (Address: 0x180014dd0)
- GetCurrentProcessId (Address: 0x180014da8)
- GetCurrentThread (Address: 0x180014e08)
- GetCurrentThreadId (Address: 0x180014d18)
- GetLastError (Address: 0x180014d60)
- GetModuleFileNameA (Address: 0x180014d40)
- GetModuleHandleExW (Address: 0x180014d38)
- GetModuleHandleW (Address: 0x180014d50)
- GetProcAddress (Address: 0x180014d58)
- GetProcessHeap (Address: 0x180014d28)
- GetSystemTimeAsFileTime (Address: 0x180014ea0)
- GetTickCount (Address: 0x180014ea8)
- GetTickCount64 (Address: 0x180014f40)
- GetVersionExW (Address: 0x180014ed8)
- HeapAlloc (Address: 0x180014d20)
- HeapFree (Address: 0x180014d30)
- InitializeCriticalSection (Address: 0x180014f10)
- InitializeCriticalSectionEx (Address: 0x180014ee8)
- InitOnceBeginInitialize (Address: 0x180014db0)
- InitOnceComplete (Address: 0x180014db8)
- IsDebuggerPresent (Address: 0x180014d68)
- LeaveCriticalSection (Address: 0x180014ee0)
- LocalFree (Address: 0x180014df8)
- OpenSemaphoreW (Address: 0x180014da0)
- OutputDebugStringW (Address: 0x180014d70)
- ProcessIdToSessionId (Address: 0x180014e18)
- QueryPerformanceCounter (Address: 0x180014e98)
- ReleaseMutex (Address: 0x180014d88)
- ReleaseSemaphore (Address: 0x180014d80)
- ReleaseSRWLockExclusive (Address: 0x180014e78)
- ReleaseSRWLockShared (Address: 0x180014ef0)
- ResolveDelayLoadedAPI (Address: 0x180014f20)
- ResumeThread (Address: 0x180014de8)
- RtlCaptureContext (Address: 0x180014e48)
- RtlLookupFunctionEntry (Address: 0x180014e50)
- RtlVirtualUnwind (Address: 0x180014e58)
- SetEvent (Address: 0x180014df0)
- SetLastError (Address: 0x180014d78)
- SetThreadpoolTimer (Address: 0x180014eb0)
- SetUnhandledExceptionFilter (Address: 0x180014e68)
- Sleep (Address: 0x180014e40)
- SleepConditionVariableSRW (Address: 0x180014e90)
- TerminateProcess (Address: 0x180014e70)
- TlsAlloc (Address: 0x180014e20)
- TlsFree (Address: 0x180014e28)
- TlsGetValue (Address: 0x180014f38)
- TlsSetValue (Address: 0x180014e38)
- UnhandledExceptionFilter (Address: 0x180014e60)
- WaitForSingleObject (Address: 0x180014d98)
- WaitForSingleObjectEx (Address: 0x180014d90)
- WaitForThreadpoolTimerCallbacks (Address: 0x180014ec8)
- WakeAllConditionVariable (Address: 0x180014e88)
msvcrt.dll
- __C_specific_handler (Address: 0x1800150f8)
- __CxxFrameHandler3 (Address: 0x1800150d0)
- __dllonexit (Address: 0x180015148)
- _amsg_exit (Address: 0x1800150c0)
- _callnewh (Address: 0x1800150e8)
- _CxxThrowException (Address: 0x1800150a0)
- _initterm (Address: 0x1800150c8)
- _lock (Address: 0x180015138)
- _onexit (Address: 0x180015150)
- _purecall (Address: 0x180015180)
- _unlock (Address: 0x180015140)
- _vsnprintf_s (Address: 0x180015128)
- _vsnwprintf (Address: 0x180015170)
- _vsnwprintf_s (Address: 0x180015178)
- _XcptFilter (Address: 0x1800150b8)
- ??0exception@@QEAA@AEBQEBD@Z (Address: 0x1800150e0)
- ??0exception@@QEAA@AEBQEBDH@Z (Address: 0x1800150d8)
- ??0exception@@QEAA@AEBV0@@Z (Address: 0x180015110)
- ??0exception@@QEAA@XZ (Address: 0x180015120)
- ??1exception@@UEAA@XZ (Address: 0x180015118)
- ??1type_info@@UEAA@XZ (Address: 0x180015160)
- ??3@YAXPEAX@Z (Address: 0x180015188)
- ?terminate@@YAXXZ (Address: 0x180015158)
- ?what@exception@@UEBAPEBDXZ (Address: 0x180015098)
- free (Address: 0x180015108)
- malloc (Address: 0x180015100)
- memcmp (Address: 0x180015168)
- memcpy (Address: 0x1800150a8)
- memcpy_s (Address: 0x180015130)
- memmove (Address: 0x1800150b0)
- memmove_s (Address: 0x180015090)
- memset (Address: 0x180015190)
- swscanf_s (Address: 0x180015088)
- wcsncpy_s (Address: 0x1800150f0)
ole32.dll
- CoCreateInstance (Address: 0x1800151b8)
- CoInitializeEx (Address: 0x1800151b0)
- CoTaskMemAlloc (Address: 0x1800151a0)
- CoTaskMemFree (Address: 0x1800151a8)
- CoUninitialize (Address: 0x1800151c0)
OLEAUT32.dll
- SysAllocString (Address: 0x180014f60)
- SysFreeString (Address: 0x180014f58)
RPCRT4.dll
- NdrClientCall3 (Address: 0x180014f90)
- NdrServerCall2 (Address: 0x180014fa0)
- NdrServerCallAll (Address: 0x180014f98)
- RpcBindingFree (Address: 0x180014fa8)
- RpcBindingFromStringBindingW (Address: 0x180014f88)
- RpcBindingSetAuthInfoExW (Address: 0x180014f70)
- RpcImpersonateClient (Address: 0x180014f80)
- RpcMgmtStopServerListening (Address: 0x180014ff0)
- RpcRevertToSelf (Address: 0x180014f78)
- RpcServerListen (Address: 0x180014fd8)
- RpcServerRegisterIf3 (Address: 0x180014fd0)
- RpcServerUnregisterIf (Address: 0x180014fe0)
- RpcServerUseProtseqEpW (Address: 0x180014fc8)
- RpcStringBindingComposeW (Address: 0x180014fe8)
- RpcStringFreeW (Address: 0x180014fb0)
- UuidCreate (Address: 0x180014fc0)
- UuidToStringW (Address: 0x180014fb8)
USER32.dll
- AllowSetForegroundWindow (Address: 0x180015008)
- CopyIcon (Address: 0x180015050)
- CreateWindowExW (Address: 0x180015020)
- DefWindowProcW (Address: 0x180015030)
- DestroyWindow (Address: 0x180015018)
- FindWindowExW (Address: 0x180015078)
- GetWindowLongPtrW (Address: 0x180015038)
- GetWindowThreadProcessId (Address: 0x180015058)
- IsWindow (Address: 0x180015048)
- MsgWaitForMultipleObjects (Address: 0x180015060)
- PeekMessageW (Address: 0x180015068)
- RegisterClassExW (Address: 0x180015028)
- SendMessageTimeoutW (Address: 0x180015070)
- SetWindowLongPtrW (Address: 0x180015040)
- UnregisterClassW (Address: 0x180015010)
- WaitForInputIdle (Address: 0x180015000)