📄 kernkitl.map
字号:
0001:0001b040 SC_OpenDatabaseEx 8c59c040 f nk:kmisc.obj
0001:0001b0d4 SC_SeekDatabase 8c59c0d4 f nk:kmisc.obj
0001:0001b19c SC_ReadRecordPropsEx 8c59c19c f nk:kmisc.obj
0001:0001b27c SC_CreateLocaleView 8c59c27c f nk:kmisc.obj
0001:0001b360 VerifyAccess 8c59c360 f nk:virtmem.obj
0001:0001b4b0 IsROM 8c59c4b0 f nk:virtmem.obj
0001:0001b650 IsStackVA 8c59c650 f nk:virtmem.obj
0001:0001b714 MakePagePerms 8c59c714 f nk:virtmem.obj
0001:0001b7ec ProtectFromPerms 8c59c7ec f nk:virtmem.obj
0001:0001b834 FindFirstBlock 8c59c834 f nk:virtmem.obj
0001:0001b870 ScanRegion 8c59c870 f nk:virtmem.obj
0001:0001ba30 DecommitPages 8c59ca30 f nk:virtmem.obj
0001:0001bcd8 FreePageList 8c59ccd8 f nk:virtmem.obj
0001:0001bd00 ReleaseRegion 8c59cd00 f nk:virtmem.obj
0001:0001bd64 IsAccessOK 8c59cd64 f nk:virtmem.obj
0001:0001bde8 DbgVerify 8c59cde8 f nk:virtmem.obj
0001:0001bf34 GetKPagePMB 8c59cf34 f nk:virtmem.obj
0001:0001bf78 InitNKSection 8c59cf78 f nk:virtmem.obj
0001:0001bfa8 DeleteSection 8c59cfa8 f nk:virtmem.obj
0001:0001c0c8 CreateSection 8c59d0c8 f nk:virtmem.obj
0001:0001c1b8 CreateMapperSection 8c59d1b8 f nk:virtmem.obj
0001:0001c2bc DeleteMapperSection 8c59d2bc f nk:virtmem.obj
0001:0001c2d8 DoVirtualAlloc 8c59d2d8 f nk:virtmem.obj
0001:0001cbb0 SC_VirtualAlloc 8c59dbb0 f nk:virtmem.obj
0001:0001cbd4 SC_VirtualFree 8c59dbd4 f nk:virtmem.obj
0001:0001ce98 DoVirtualCopy 8c59de98 f nk:virtmem.obj
0001:0001d2b4 SC_VirtualCopy 8c59e2b4 f nk:virtmem.obj
0001:0001d308 SC_VirtualSetAttributes 8c59e308 f nk:virtmem.obj
0001:0001d4ac SC_VirtualProtect 8c59e4ac f nk:virtmem.obj
0001:0001d6e4 SC_VirtualQuery 8c59e6e4 f nk:virtmem.obj
0001:0001d9f0 IsCommittedSecureSlot 8c59e9f0 f nk:virtmem.obj
0001:0001da54 DoLockPages 8c59ea54 f nk:virtmem.obj
0001:0001de50 SC_LockPages 8c59ee50 f nk:virtmem.obj
0001:0001dea4 DoUnlockPages 8c59eea4 f nk:virtmem.obj
0001:0001e068 SC_UnlockPages 8c59f068 f nk:virtmem.obj
0001:0001e0bc AutoCommit 8c59f0bc f nk:virtmem.obj
0001:0001e254 GuardCommit 8c59f254 f nk:virtmem.obj
0001:0001e2e8 ProcessPageFault 8c59f2e8 f nk:virtmem.obj
0001:0001e508 CELOG_SystemPage 8c59f508 f i nk:virtmem.obj
0001:0001e574 ProfInit 8c59f574 f nk:virtmem.obj
0001:0001e5c4 SC_GetProfileBaseAddress 8c59f5c4 f nk:virtmem.obj
0001:0001e658 SC_SetProfilePortAddress 8c59f658 f nk:virtmem.obj
0001:0001e79c SC_AllocPhysMem 8c59f79c f nk:virtmem.obj
0001:0001e868 SC_FreePhysMem 8c59f868 f nk:virtmem.obj
0001:0001e8c8 GetVMInfo 8c59f8c8 f nk:virtmem.obj
0001:0001e9fc SC_ProfileSyscall 8c59f9fc f nk:profiler.obj
0001:0001ea00 SC_TurnOnProfiling 8c59fa00 f nk:profiler.obj
0001:0001ea24 SC_TurnOffProfiling 8c59fa24 f nk:profiler.obj
0001:0001ea4c SC_DumpKCallProfile 8c59fa4c f nk:profiler.obj
0001:0001ea50 Phys2VirtWrapper 8c59fa50 f nk:profiler.obj
0001:0001ea60 InSysCallWrapper 8c59fa60 f nk:profiler.obj
0001:0001ea70 KernelLibIoControl_Verifier 8c59fa70 f nk:profiler.obj
0001:0001ebec KernelLibIoControl_CeLog 8c59fbec f nk:profiler.obj
0001:0001edec CeLogThreadMigrate 8c59fdec f nk:profiler.obj
0001:0001ee40 SC_CeLogData 8c59fe40 f nk:profiler.obj
0001:0001eec8 SC_CeLogSetZones 8c59fec8 f nk:profiler.obj
0001:0001ef00 SC_CeLogGetZones 8c59ff00 f nk:profiler.obj
0001:0001efd8 SC_CeLogReSync 8c59ffd8 f nk:profiler.obj
0001:0001f3c4 lowerW 8c5a03c4 f nk:loader.obj
0001:0001f3f0 strcmponeiW 8c5a03f0 f nk:loader.obj
0001:0001f458 strcmpdllnameW 8c5a0458 f nk:loader.obj
0001:0001f53c strcmpiAandW 8c5a053c f nk:loader.obj
0001:0001f5c0 kstrncmpi 8c5a05c0 f nk:loader.obj
0001:0001f630 kstrcmpi 8c5a0630 f nk:loader.obj
0001:0001f684 kstrcpyW 8c5a0684 f nk:loader.obj
0001:0001f6bc FindOptr 8c5a06bc f nk:loader.obj
0001:0001f758 ChkDebug 8c5a0758 f nk:loader.obj
0001:0001f7e0 ReadExtImageInfo 8c5a07e0 f nk:loader.obj
0001:0001f834 VerifyBinary 8c5a0834 f nk:loader.obj
0001:0001f9ec SetROMDllBase 8c5a09ec f nk:loader.obj
0001:0001fc30 OpenExe 8c5a0c30 f nk:loader.obj
0001:0001fc5c OpenFileFromFilesys 8c5a0c5c f nk:loader.obj
0001:0001fea0 SafeOpenExe 8c5a0ea0 f nk:loader.obj
0001:00020680 CloseExe 8c5a1680 f nk:loader.obj
0001:00020710 SC_CloseProcOE 8c5a1710 f nk:loader.obj
0001:00020918 NKForceCleanBoot 8c5a1918 f nk:loader.obj
0001:00020944 SC_SetCleanRebootFlag 8c5a1944 f nk:loader.obj
0001:00020984 KernelRelocate 8c5a1984 f nk:loader.obj
0001:00020a4c SC_NotifyForceCleanboot 8c5a1a4c f nk:loader.obj
0001:00020a80 CalcFSPages 8c5a1a80 f nk:loader.obj
0001:00020b18 CarveMem 8c5a1b18 f nk:loader.obj
0001:00020bbc GrabFSPages 8c5a1bbc f nk:loader.obj
0001:00020c1c KernelFindMemory 8c5a1c1c f nk:loader.obj
0001:00021170 RelocatePage 8c5a2170 f nk:loader.obj
0001:0002166c Relocate 8c5a266c f nk:loader.obj
0001:00021978 Katoi 8c5a2978 f nk:loader.obj
0001:000219ac AddrFromEat 8c5a29ac f nk:loader.obj
0001:00021b34 ResolveImpOrd 8c5a2b34 f nk:loader.obj
0001:00021b90 ResolveImpStr 8c5a2b90 f nk:loader.obj
0001:00021c58 ResolveImpHintStr 8c5a2c58 f nk:loader.obj
0001:00021cf8 IncRefCount 8c5a2cf8 f nk:loader.obj
0001:00021d70 DecRefCount 8c5a2d70 f nk:loader.obj
0001:00021df0 UnlinkModule 8c5a2df0 f nk:loader.obj
0001:00021e70 UnCopyRegions 8c5a2e70 f nk:loader.obj
0001:00021f48 FreeModuleMemory 8c5a2f48 f nk:loader.obj
0001:00022034 FreeLibraryFromProc 8c5a3034 f nk:loader.obj
0001:00022144 FreeAllProcLibraries 8c5a3144 f nk:loader.obj
0001:0002219c CallDLLEntry 8c5a319c f nk:loader.obj
0001:000224b0 FreeOneLibrary 8c5a34b0 f nk:loader.obj
0001:000227ac FreeLibraryByName 8c5a37ac f nk:loader.obj
0001:00022830 KAsciiToUnicode 8c5a3830 f nk:loader.obj
0001:00022868 KUnicodeToAscii 8c5a3868 f nk:loader.obj
0001:000228bc DoImports 8c5a38bc f nk:loader.obj
0001:00022db8 AdjustRegions 8c5a3db8 f nk:loader.obj
0001:00022e68 GetNameFromOE 8c5a3e68 f nk:loader.obj
0001:00022fac ReopenExe 8c5a3fac f nk:loader.obj
0001:0002319c JitOpenFile 8c5a419c f nk:loader.obj
0001:0002321c JitCloseFile 8c5a421c f nk:loader.obj
0001:00023234 LoadE32 8c5a4234 f nk:loader.obj
0001:000235e8 PageInPage 8c5a45e8 f nk:loader.obj
0001:000236ac PageInFromROM 8c5a46ac f nk:loader.obj
0001:0002390c PageInFromRAM 8c5a490c f nk:loader.obj
0001:00023b20 PageInModule 8c5a4b20 f nk:loader.obj
0001:00023dec PageInProcess 8c5a4dec f nk:loader.obj
0001:00023ef0 AccessFromFlags 8c5a4ef0 f nk:loader.obj
0001:00023f18 UnloadMod 8c5a4f18 f nk:loader.obj
0001:000241f8 UnloadExe 8c5a51f8 f nk:loader.obj
0001:00024394 ReadO32FromFile 8c5a5394 f nk:loader.obj
0001:0002444c ReadSection 8c5a544c f nk:loader.obj
0001:00024714 UpdateKmodVSize 8c5a5714 f nk:loader.obj
0001:000247ac LoadO32 8c5a57ac f nk:loader.obj
0001:00024a28 FindEntryPoint 8c5a5a28 f nk:loader.obj
0001:00024acc OpenAnExe 8c5a5acc f nk:loader.obj
0001:00024b74 OpenADll 8c5a5b74 f nk:loader.obj
0001:00024c18 CalcStackSize 8c5a5c18 f nk:loader.obj
0001:00024c54 LoadSwitch 8c5a5c54 f nk:loader.obj
0001:00024cd0 FinishLoadSwitch 8c5a5cd0 f nk:loader.obj
0001:00024e58 ReserveDllRW 8c5a5e58 f nk:loader.obj
0001:00024f54 CreateNewProc 8c5a5f54 f nk:loader.obj
0001:000259e8 CopyRegions 8c5a69e8 f nk:loader.obj
0001:00025ce8 FindModByName 8c5a6ce8 f nk:loader.obj
0001:00025d70 SC_ThreadDetachAllDLLs 8c5a6d70 f nk:loader.obj
0001:00025e94 SC_ProcessDetachAllDLLs 8c5a6e94 f nk:loader.obj
0001:00025ebc SC_ThreadAttachAllDLLs 8c5a6ebc f nk:loader.obj
0001:00025f44 UnDoDepends 8c5a6f44 f nk:loader.obj
0001:00025ff4 InitModule 8c5a6ff4 f nk:loader.obj
0001:00026738 LoadOneLibraryW 8c5a7738 f nk:loader.obj
0001:00026e34 CELOG_ModuleLoad 8c5a7e34 f i nk:loader.obj
0001:00026f18 SC_LoadLibraryW 8c5a7f18 f nk:loader.obj
0001:00026f54 SC_LoadLibraryExW 8c5a7f54 f nk:loader.obj
0001:00026fc4 SC_GetModuleHandleW 8c5a7fc4 f nk:loader.obj
0001:0002708c SC_LoadDriver 8c5a808c f nk:loader.obj
0001:000270f8 SC_LoadKernelLibrary 8c5a80f8 f nk:loader.obj
0001:000271c4 SC_LoadIntChainHandler 8c5a81c4 f nk:loader.obj
0001:0002730c SC_FreeIntChainHandler 8c5a830c f nk:loader.obj
0001:00027404 SC_FreeLibrary 8c5a8404 f nk:loader.obj
0001:00027448 GetOneProcAddress 8c5a8448 f nk:loader.obj
0001:00027500 DisableThreadCalls 8c5a8500 f nk:loader.obj
0001:00027578 SC_DisableThreadLibraryCalls 8c5a8578 f nk:loader.obj
0001:0002759c SC_GetProcAddressA 8c5a859c f nk:loader.obj
0001:000275f4 SC_GetProcAddressW 8c5a85f4 f nk:loader.obj
0001:00027644 MatchesExtRange 8c5a8644 f nk:loader.obj
0001:000276d4 PDataFromExt 8c5a86d4 f nk:loader.obj
0001:00027758 PDataFromPC 8c5a8758 f nk:loader.obj
0001:000279b0 LoaderPageIn 8c5a89b0 f
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -