ChxUserDictDS.DLL
Description: Microsoft IME
Authors: © Microsoft Corporation. All rights reserved.
Version: 10.0.19041.5794
Architecture: 64-bit
Operating System: Windows NT
SHA256: 59b9f5e1052173e7ed6fa638375cc06e
File Size: 185.0 KB
Uploaded At: Dec. 1, 2025, 7:50 a.m.
Views: 6
Exported Functions
- DllCanUnloadNow (Ordinal: 1, Address: 0x53e0)
- DllGetClassObject (Ordinal: 2, Address: 0x52a0)
Imported DLLs & Functions
ADVAPI32.dll
- ConvertSidToStringSidW (Address: 0x180022a10)
- ConvertStringSecurityDescriptorToSecurityDescriptorW (Address: 0x1800229f8)
- GetTokenInformation (Address: 0x1800229f0)
- IsValidSid (Address: 0x180022a00)
- OpenProcessToken (Address: 0x180022a08)
- RegGetValueW (Address: 0x180022a18)
api-ms-win-core-com-l1-1-0.dll
- CoCreateInstance (Address: 0x180022c50)
- CoTaskMemFree (Address: 0x180022c48)
api-ms-win-core-memory-l1-1-0.dll
- CreateFileMappingW (Address: 0x180022c60)
- MapViewOfFile (Address: 0x180022c70)
- OpenFileMappingW (Address: 0x180022c78)
- UnmapViewOfFile (Address: 0x180022c68)
api-ms-win-core-memory-l1-1-1.dll
- PrefetchVirtualMemory (Address: 0x180022c88)
KERNEL32.dll
- AcquireSRWLockExclusive (Address: 0x180022a50)
- AcquireSRWLockShared (Address: 0x180022ad8)
- CloseHandle (Address: 0x180022b60)
- CloseThreadpoolTimer (Address: 0x180022a58)
- CreateFileW (Address: 0x180022b40)
- CreateMutexExW (Address: 0x180022ad0)
- CreateSemaphoreExW (Address: 0x180022ab0)
- CreateThreadpoolTimer (Address: 0x180022a28)
- DebugBreak (Address: 0x180022b00)
- DeleteCriticalSection (Address: 0x180022b28)
- DeleteFileW (Address: 0x180022b58)
- EnterCriticalSection (Address: 0x180022b10)
- FlushViewOfFile (Address: 0x180022b50)
- FormatMessageW (Address: 0x180022a70)
- GetCurrentProcess (Address: 0x180022b98)
- GetCurrentProcessId (Address: 0x180022bb0)
- GetCurrentThreadId (Address: 0x180022bb8)
- GetFileSize (Address: 0x180022ac0)
- GetLastError (Address: 0x180022b48)
- GetModuleFileNameA (Address: 0x180022ab8)
- GetModuleHandleExW (Address: 0x180022a98)
- GetModuleHandleW (Address: 0x180022ae0)
- GetProcAddress (Address: 0x180022ae8)
- GetProcessHeap (Address: 0x180022af8)
- GetSystemTimeAsFileTime (Address: 0x180022bc0)
- GetSystemWindowsDirectoryW (Address: 0x180022bd0)
- GetTickCount (Address: 0x180022bc8)
- HeapAlloc (Address: 0x180022b08)
- HeapFree (Address: 0x180022af0)
- HeapReAlloc (Address: 0x180022bf8)
- InitializeCriticalSection (Address: 0x180022b20)
- InitializeCriticalSectionEx (Address: 0x180022a90)
- IsDebuggerPresent (Address: 0x180022bd8)
- LeaveCriticalSection (Address: 0x180022b18)
- LocalFree (Address: 0x180022ac8)
- MulDiv (Address: 0x180022be0)
- OpenSemaphoreW (Address: 0x180022a40)
- OutputDebugStringW (Address: 0x180022a60)
- QueryPerformanceCounter (Address: 0x180022ba8)
- ReleaseMutex (Address: 0x180022a78)
- ReleaseSemaphore (Address: 0x180022aa0)
- ReleaseSRWLockExclusive (Address: 0x180022a68)
- ReleaseSRWLockShared (Address: 0x180022a30)
- RtlCaptureContext (Address: 0x180022b70)
- RtlLookupFunctionEntry (Address: 0x180022b78)
- RtlVirtualUnwind (Address: 0x180022b80)
- SetEndOfFile (Address: 0x180022b38)
- SetLastError (Address: 0x180022aa8)
- SetThreadpoolTimer (Address: 0x180022a38)
- SetUnhandledExceptionFilter (Address: 0x180022b90)
- Sleep (Address: 0x180022b68)
- SleepConditionVariableSRW (Address: 0x180022bf0)
- TerminateProcess (Address: 0x180022ba0)
- UnhandledExceptionFilter (Address: 0x180022b88)
- WaitForSingleObject (Address: 0x180022a80)
- WaitForSingleObjectEx (Address: 0x180022a48)
- WaitForThreadpoolTimerCallbacks (Address: 0x180022a88)
- WakeAllConditionVariable (Address: 0x180022be8)
- WriteFile (Address: 0x180022b30)
msvcrt.dll
- __C_specific_handler (Address: 0x180022da0)
- __CxxFrameHandler3 (Address: 0x180022db8)
- __dllonexit (Address: 0x180022ce0)
- _amsg_exit (Address: 0x180022d00)
- _callnewh (Address: 0x180022d58)
- _CxxThrowException (Address: 0x180022d20)
- _initterm (Address: 0x180022cf8)
- _lock (Address: 0x180022cf0)
- _onexit (Address: 0x180022cd8)
- _purecall (Address: 0x180022db0)
- _unlock (Address: 0x180022ce8)
- _vsnprintf_s (Address: 0x180022ca0)
- _vsnwprintf (Address: 0x180022c98)
- _wfopen_s (Address: 0x180022d90)
- _XcptFilter (Address: 0x180022dc0)
- ??_V@YAXPEAX@Z (Address: 0x180022da8)
- ??0exception@@QEAA@AEBQEBD@Z (Address: 0x180022d48)
- ??0exception@@QEAA@AEBQEBDH@Z (Address: 0x180022d40)
- ??0exception@@QEAA@AEBV0@@Z (Address: 0x180022d38)
- ??0exception@@QEAA@XZ (Address: 0x180022d50)
- ??1exception@@UEAA@XZ (Address: 0x180022d30)
- ??1type_info@@UEAA@XZ (Address: 0x180022cd0)
- ??3@YAXPEAX@Z (Address: 0x180022cc0)
- ?terminate@@YAXXZ (Address: 0x180022dc8)
- ?what@exception@@UEBAPEBDXZ (Address: 0x180022d28)
- fclose (Address: 0x180022d88)
- floorf (Address: 0x180022dd0)
- free (Address: 0x180022d68)
- fwprintf_s (Address: 0x180022d80)
- malloc (Address: 0x180022d60)
- memcmp (Address: 0x180022cc8)
- memcpy (Address: 0x180022d18)
- memcpy_s (Address: 0x180022d98)
- memmove (Address: 0x180022d10)
- memmove_s (Address: 0x180022ca8)
- memset (Address: 0x180022dd8)
- qsort (Address: 0x180022d70)
- tolower (Address: 0x180022cb8)
- wcschr (Address: 0x180022cb0)
- wcscpy_s (Address: 0x180022d78)
- wcsncmp (Address: 0x180022d08)
OLEAUT32.dll
- SysAllocString (Address: 0x180022c10)
- SysAllocStringLen (Address: 0x180022c20)
- SysFreeString (Address: 0x180022c18)
- SysStringLen (Address: 0x180022c08)
SHELL32.dll
- SHCreateDirectoryExW (Address: 0x180022c30)
- SHGetKnownFolderPath (Address: 0x180022c38)