ChtChangjieDS.DLL

Description: Microsoft IME

Authors: © Microsoft Corporation. All rights reserved.

Version: 10.0.19041.5794

Architecture: 64-bit

Operating System: Windows NT

SHA256: bb775ea519bcae283529582a4842d72e

File Size: 145.5 KB

Uploaded At: Dec. 1, 2025, 7:50 a.m.

Views: 6

Exported Functions

  • DllCanUnloadNow (Ordinal: 1, Address: 0x2ab0)
  • DllGetClassObject (Ordinal: 2, Address: 0x2970)
  • DllRegisterServer (Ordinal: 3, Address: 0x2af0)

Imported DLLs & Functions

ADVAPI32.dll
  • ConvertSidToStringSidW (Address: 0x18001a548)
  • ConvertStringSecurityDescriptorToSecurityDescriptorW (Address: 0x18001a540)
  • EventRegister (Address: 0x18001a558)
  • EventUnregister (Address: 0x18001a568)
  • EventWriteTransfer (Address: 0x18001a520)
  • GetTokenInformation (Address: 0x18001a538)
  • IsValidSid (Address: 0x18001a528)
  • OpenProcessToken (Address: 0x18001a550)
  • RegCloseKey (Address: 0x18001a530)
  • RegOpenKeyExW (Address: 0x18001a560)
  • RegQueryValueExW (Address: 0x18001a570)
api-ms-win-core-com-l1-1-0.dll
  • CoCreateInstance (Address: 0x18001a7b0)
  • CoTaskMemFree (Address: 0x18001a7b8)
api-ms-win-core-memory-l1-1-0.dll
  • CreateFileMappingW (Address: 0x18001a7c8)
  • MapViewOfFile (Address: 0x18001a7e0)
  • OpenFileMappingW (Address: 0x18001a7d8)
  • UnmapViewOfFile (Address: 0x18001a7d0)
api-ms-win-core-memory-l1-1-1.dll
  • PrefetchVirtualMemory (Address: 0x18001a7f0)
KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x18001a5c0)
  • AcquireSRWLockShared (Address: 0x18001a588)
  • CloseHandle (Address: 0x18001a728)
  • CloseThreadpoolTimer (Address: 0x18001a5c8)
  • CreateFileW (Address: 0x18001a720)
  • CreateMutexExW (Address: 0x18001a590)
  • CreateSemaphoreExW (Address: 0x18001a620)
  • CreateThreadpoolTimer (Address: 0x18001a598)
  • DebugBreak (Address: 0x18001a580)
  • DeleteCriticalSection (Address: 0x18001a680)
  • EnterCriticalSection (Address: 0x18001a640)
  • FormatMessageW (Address: 0x18001a5e0)
  • GetCurrentProcess (Address: 0x18001a6c0)
  • GetCurrentProcessId (Address: 0x18001a6d8)
  • GetCurrentThreadId (Address: 0x18001a6e0)
  • GetFileSize (Address: 0x18001a738)
  • GetLastError (Address: 0x18001a668)
  • GetModuleFileNameA (Address: 0x18001a628)
  • GetModuleFileNameW (Address: 0x18001a648)
  • GetModuleHandleExW (Address: 0x18001a608)
  • GetModuleHandleW (Address: 0x18001a688)
  • GetProcAddress (Address: 0x18001a678)
  • GetProcessHeap (Address: 0x18001a718)
  • GetSystemTimeAsFileTime (Address: 0x18001a6e8)
  • GetSystemWindowsDirectoryW (Address: 0x18001a5e8)
  • GetThreadLocale (Address: 0x18001a650)
  • GetTickCount (Address: 0x18001a6f0)
  • HeapAlloc (Address: 0x18001a710)
  • HeapFree (Address: 0x18001a700)
  • HeapReAlloc (Address: 0x18001a708)
  • InitializeCriticalSection (Address: 0x18001a660)
  • InitializeCriticalSectionEx (Address: 0x18001a600)
  • IsDebuggerPresent (Address: 0x18001a6f8)
  • LeaveCriticalSection (Address: 0x18001a658)
  • LocalFree (Address: 0x18001a730)
  • OpenSemaphoreW (Address: 0x18001a5b0)
  • OutputDebugStringW (Address: 0x18001a5d0)
  • QueryPerformanceCounter (Address: 0x18001a6d0)
  • RaiseException (Address: 0x18001a670)
  • ReleaseMutex (Address: 0x18001a630)
  • ReleaseSemaphore (Address: 0x18001a610)
  • ReleaseSRWLockExclusive (Address: 0x18001a5d8)
  • ReleaseSRWLockShared (Address: 0x18001a5a0)
  • RtlCaptureContext (Address: 0x18001a698)
  • RtlLookupFunctionEntry (Address: 0x18001a6a0)
  • RtlVirtualUnwind (Address: 0x18001a6a8)
  • SetLastError (Address: 0x18001a618)
  • SetThreadLocale (Address: 0x18001a638)
  • SetThreadpoolTimer (Address: 0x18001a5a8)
  • SetUnhandledExceptionFilter (Address: 0x18001a6b8)
  • Sleep (Address: 0x18001a690)
  • TerminateProcess (Address: 0x18001a6c8)
  • UnhandledExceptionFilter (Address: 0x18001a6b0)
  • WaitForSingleObject (Address: 0x18001a5f0)
  • WaitForSingleObjectEx (Address: 0x18001a5b8)
  • WaitForThreadpoolTimerCallbacks (Address: 0x18001a5f8)
msvcrt.dll
  • __C_specific_handler (Address: 0x18001a920)
  • __CxxFrameHandler3 (Address: 0x18001a938)
  • __dllonexit (Address: 0x18001a870)
  • _amsg_exit (Address: 0x18001a898)
  • _callnewh (Address: 0x18001a8f0)
  • _CxxThrowException (Address: 0x18001a8b8)
  • _initterm (Address: 0x18001a890)
  • _lock (Address: 0x18001a880)
  • _onexit (Address: 0x18001a868)
  • _purecall (Address: 0x18001a928)
  • _unlock (Address: 0x18001a878)
  • _vsnprintf_s (Address: 0x18001a800)
  • _vsnwprintf (Address: 0x18001a810)
  • _wfopen_s (Address: 0x18001a848)
  • _wtoi (Address: 0x18001a840)
  • _XcptFilter (Address: 0x18001a8a0)
  • ??_V@YAXPEAX@Z (Address: 0x18001a930)
  • ??0exception@@QEAA@AEBQEBD@Z (Address: 0x18001a8e0)
  • ??0exception@@QEAA@AEBQEBDH@Z (Address: 0x18001a8d8)
  • ??0exception@@QEAA@AEBV0@@Z (Address: 0x18001a8d0)
  • ??0exception@@QEAA@XZ (Address: 0x18001a8e8)
  • ??1exception@@UEAA@XZ (Address: 0x18001a8c8)
  • ??1type_info@@UEAA@XZ (Address: 0x18001a860)
  • ??3@YAXPEAX@Z (Address: 0x18001a850)
  • ?terminate@@YAXXZ (Address: 0x18001a888)
  • ?what@exception@@UEBAPEBDXZ (Address: 0x18001a8c0)
  • fclose (Address: 0x18001a828)
  • floorf (Address: 0x18001a948)
  • free (Address: 0x18001a910)
  • fwprintf_s (Address: 0x18001a940)
  • malloc (Address: 0x18001a8f8)
  • memcmp (Address: 0x18001a858)
  • memcpy (Address: 0x18001a8b0)
  • memcpy_s (Address: 0x18001a808)
  • memmove (Address: 0x18001a8a8)
  • memmove_s (Address: 0x18001a900)
  • memset (Address: 0x18001a950)
  • tolower (Address: 0x18001a838)
  • wcschr (Address: 0x18001a818)
  • wcscpy_s (Address: 0x18001a918)
  • wcsncmp (Address: 0x18001a820)
  • wcsncpy_s (Address: 0x18001a908)
  • wcstok_s (Address: 0x18001a830)
OLEAUT32.dll
  • LoadTypeLib (Address: 0x18001a768)
  • RegisterTypeLib (Address: 0x18001a770)
  • SysAllocString (Address: 0x18001a760)
  • SysAllocStringLen (Address: 0x18001a748)
  • SysFreeString (Address: 0x18001a750)
  • SysStringLen (Address: 0x18001a758)
SHELL32.dll
  • SHCreateDirectoryExW (Address: 0x18001a788)
  • SHGetKnownFolderPath (Address: 0x18001a780)
USER32.dll
  • CharNextW (Address: 0x18001a7a0)
  • UnregisterClassA (Address: 0x18001a798)