padrs412.dll
Description: Microsoft IME
Authors: © Microsoft Corporation. All rights reserved.
Version: 10.0.19041.5794
Architecture: 64-bit
Operating System: Windows NT
SHA256: a65f32cba776294b20150ac41f58aa35
File Size: 60.5 KB
Uploaded At: Dec. 1, 2025, 7:50 a.m.
Views: 6
Exported Functions
- PadHelp_HandleContextPopup (Ordinal: 1, Address: 0x15c0)
- PadHelp_HandleHelp (Ordinal: 2, Address: 0x1440)
Imported DLLs & Functions
ADVAPI32.dll
- GetSidSubAuthority (Address: 0x18000ac48)
- GetSidSubAuthorityCount (Address: 0x18000ac50)
- GetTokenInformation (Address: 0x18000ac60)
- IsValidSid (Address: 0x18000ac58)
- OpenProcessToken (Address: 0x18000ac68)
- RegCloseKey (Address: 0x18000ac40)
- RegOpenKeyExW (Address: 0x18000ac70)
- RegQueryValueExW (Address: 0x18000ac78)
KERNEL32.dll
- AcquireSRWLockExclusive (Address: 0x18000ac98)
- AcquireSRWLockShared (Address: 0x18000ad48)
- CloseHandle (Address: 0x18000ad18)
- CloseThreadpoolTimer (Address: 0x18000ae08)
- CreateMutexExW (Address: 0x18000ad50)
- CreateProcessW (Address: 0x18000ad28)
- CreateSemaphoreExW (Address: 0x18000adc0)
- CreateThreadpoolTimer (Address: 0x18000ae00)
- DebugBreak (Address: 0x18000ad30)
- DeleteCriticalSection (Address: 0x18000ad40)
- EnterCriticalSection (Address: 0x18000adb8)
- ExpandEnvironmentStringsW (Address: 0x18000ad20)
- FormatMessageW (Address: 0x18000ad80)
- GetCurrentProcess (Address: 0x18000acd8)
- GetCurrentProcessId (Address: 0x18000acf0)
- GetCurrentThreadId (Address: 0x18000acf8)
- GetLastError (Address: 0x18000adf0)
- GetModuleFileNameA (Address: 0x18000ae18)
- GetModuleHandleExW (Address: 0x18000ada8)
- GetModuleHandleW (Address: 0x18000ad38)
- GetProcAddress (Address: 0x18000ad58)
- GetProcessHeap (Address: 0x18000add0)
- GetSystemTimeAsFileTime (Address: 0x18000ad00)
- GetTickCount (Address: 0x18000ad08)
- GetVersionExW (Address: 0x18000adc8)
- HeapAlloc (Address: 0x18000ade0)
- HeapFree (Address: 0x18000add8)
- InitializeCriticalSectionEx (Address: 0x18000ad98)
- IsDebuggerPresent (Address: 0x18000ad10)
- LeaveCriticalSection (Address: 0x18000ada0)
- OpenSemaphoreW (Address: 0x18000ad68)
- OutputDebugStringW (Address: 0x18000ad78)
- QueryPerformanceCounter (Address: 0x18000ace8)
- ReleaseMutex (Address: 0x18000ad88)
- ReleaseSemaphore (Address: 0x18000adb0)
- ReleaseSRWLockExclusive (Address: 0x18000ac90)
- ReleaseSRWLockShared (Address: 0x18000ad60)
- RtlCaptureContext (Address: 0x18000acb0)
- RtlLookupFunctionEntry (Address: 0x18000acb8)
- RtlVirtualUnwind (Address: 0x18000acc0)
- SetLastError (Address: 0x18000ade8)
- SetThreadpoolTimer (Address: 0x18000adf8)
- SetUnhandledExceptionFilter (Address: 0x18000acd0)
- Sleep (Address: 0x18000ac88)
- SleepConditionVariableSRW (Address: 0x18000aca8)
- TerminateProcess (Address: 0x18000ace0)
- UnhandledExceptionFilter (Address: 0x18000acc8)
- WaitForSingleObject (Address: 0x18000ad90)
- WaitForSingleObjectEx (Address: 0x18000ad70)
- WaitForThreadpoolTimerCallbacks (Address: 0x18000ae10)
- WakeAllConditionVariable (Address: 0x18000aca0)
msvcrt.dll
- __C_specific_handler (Address: 0x18000aee0)
- __CxxFrameHandler3 (Address: 0x18000aeb0)
- __dllonexit (Address: 0x18000aec8)
- _amsg_exit (Address: 0x18000af00)
- _callnewh (Address: 0x18000ae30)
- _CxxThrowException (Address: 0x18000af10)
- _initterm (Address: 0x18000aee8)
- _lock (Address: 0x18000aed8)
- _onexit (Address: 0x18000aec0)
- _purecall (Address: 0x18000ae90)
- _unlock (Address: 0x18000aed0)
- _vsnprintf_s (Address: 0x18000ae70)
- _vsnwprintf (Address: 0x18000ae98)
- _vsnwprintf_s (Address: 0x18000af18)
- _XcptFilter (Address: 0x18000af08)
- ??0exception@@QEAA@AEBQEBD@Z (Address: 0x18000ae60)
- ??0exception@@QEAA@AEBQEBDH@Z (Address: 0x18000ae58)
- ??0exception@@QEAA@AEBV0@@Z (Address: 0x18000ae78)
- ??0exception@@QEAA@XZ (Address: 0x18000ae80)
- ??1exception@@UEAA@XZ (Address: 0x18000ae88)
- ??1type_info@@UEAA@XZ (Address: 0x18000aeb8)
- ??3@YAXPEAX@Z (Address: 0x18000aea0)
- ?terminate@@YAXXZ (Address: 0x18000ae28)
- ?what@exception@@UEBAPEBDXZ (Address: 0x18000ae50)
- free (Address: 0x18000aef8)
- malloc (Address: 0x18000aef0)
- memcmp (Address: 0x18000ae48)
- memcpy (Address: 0x18000ae40)
- memcpy_s (Address: 0x18000aea8)
- memmove (Address: 0x18000ae38)
- memmove_s (Address: 0x18000ae68)
- memset (Address: 0x18000af20)