📄 kern.map
字号:
0001:00019338 SC_IsSystemFile 8c59a338 f nk:kmisc.obj
0001:0001939c SC_CreateFileW 8c59a39c f nk:kmisc.obj
0001:00019450 SC_ReadFile 8c59a450 f nk:kmisc.obj
0001:0001956c SC_CeWriteRecordProps 8c59a56c f nk:kmisc.obj
0001:00019644 SC_ReadFileWithSeek 8c59a644 f nk:kmisc.obj
0001:00019770 SC_WriteFileWithSeek 8c59a770 f nk:kmisc.obj
0001:00019894 SC_CloseHandle 8c59a894 f nk:kmisc.obj
0001:00019904 SC_DuplicateHandle 8c59a904 f nk:kmisc.obj
0001:00019a78 SC_DeviceIoControl 8c59aa78 f nk:kmisc.obj
0001:00019bc0 SC_OpenDatabaseEx 8c59abc0 f nk:kmisc.obj
0001:00019c9c SC_SeekDatabase 8c59ac9c f nk:kmisc.obj
0001:00019d7c SC_ReadRecordPropsEx 8c59ad7c f nk:kmisc.obj
0001:00019eb8 SC_CreateLocaleView 8c59aeb8 f nk:kmisc.obj
0001:00019f8c CertVerify 8c59af8c f nk:kmisc.obj
0001:00019fe8 FreeTokenMemory 8c59afe8 f nk:kmisc.obj
0001:0001a02c SC_GetSystemInfo 8c59b02c f nk:kmisc.obj
0001:0001a0c4 SC_QueryInstructionSet 8c59b0c4 f nk:kmisc.obj
0001:0001a20c SC_GetProcFromPtr 8c59b20c f nk:kmisc.obj
0001:0001a2c4 SC_MapCallerPtr 8c59b2c4 f nk:kmisc.obj
0001:0001a2fc RunApps 8c59b2fc f nk:kmisc.obj
0001:0001a6a8 SC_RegisterDbgZones 8c59b6a8 f nk:kmisc.obj
0001:0001aad8 SC_ProcWriteMemory 8c59bad8 f nk:kmisc.obj
0001:0001ad6c CELOG_VirtualAlloc 8c59bd6c f i nk:virtmem.obj
0001:0001ae00 CELOG_VirtualCopy 8c59be00 f i nk:virtmem.obj
0001:0001ae8c CELOG_VirtualFree 8c59be8c f i nk:virtmem.obj
0001:0001af10 CELOG_SystemPage 8c59bf10 f i nk:virtmem.obj
0001:0001afa0 VerifyAccess 8c59bfa0 f nk:virtmem.obj
0001:0001b248 IsROM 8c59c248 f nk:virtmem.obj
0001:0001b284 IsStackVA 8c59c284 f nk:virtmem.obj
0001:0001b360 MakePagePerms 8c59c360 f nk:virtmem.obj
0001:0001b498 ProtectFromPerms 8c59c498 f nk:virtmem.obj
0001:0001b510 NKSetMemoryAttributes 8c59c510 f nk:virtmem.obj
0001:0001b5e4 FindFirstBlock 8c59c5e4 f nk:virtmem.obj
0001:0001b61c ScanRegion 8c59c61c f nk:virtmem.obj
0001:0001b868 DecommitPages 8c59c868 f nk:virtmem.obj
0001:0001ba04 ReleaseRegion 8c59ca04 f nk:virtmem.obj
0001:0001ba64 IsAccessOK 8c59ca64 f nk:virtmem.obj
0001:0001bae4 GetKPagePMB 8c59cae4 f nk:virtmem.obj
0001:0001bb24 InitNKSection 8c59cb24 f nk:virtmem.obj
0001:0001bb54 DeleteSection 8c59cb54 f nk:virtmem.obj
0001:0001bd94 CreateSection 8c59cd94 f nk:virtmem.obj
0001:0001be90 CreateMapperSection 8c59ce90 f nk:virtmem.obj
0001:0001bfa8 DeleteMapperSection 8c59cfa8 f nk:virtmem.obj
0001:0001bfc4 DoVirtualAlloc 8c59cfc4 f nk:virtmem.obj
0001:0001c700 SC_VirtualAlloc 8c59d700 f nk:virtmem.obj
0001:0001c724 SC_VirtualFree 8c59d724 f nk:virtmem.obj
0001:0001c9b8 SC_CeVirtualSharedAlloc 8c59d9b8 f nk:virtmem.obj
0001:0001ca50 DoVirtualCopy 8c59da50 f nk:virtmem.obj
0001:0001cd7c SC_VirtualCopy 8c59dd7c f nk:virtmem.obj
0001:0001cdc0 VirtualSetPages 8c59ddc0 f nk:virtmem.obj
0001:0001cf40 NKVirtualSetAttributes 8c59df40 f nk:virtmem.obj
0001:0001d0e4 SC_VirtualProtect 8c59e0e4 f nk:virtmem.obj
0001:0001d2dc SC_VirtualQuery 8c59e2dc f nk:virtmem.obj
0001:0001d5dc IsCommittedSecureSlot 8c59e5dc f nk:virtmem.obj
0001:0001d630 DoUnlockPagesInSlot 8c59e630 f nk:virtmem.obj
0001:0001d720 DoUnlockPages 8c59e720 f nk:virtmem.obj
0001:0001d828 SC_UnlockPages 8c59e828 f nk:virtmem.obj
0001:0001d86c AutoCommit 8c59e86c f nk:virtmem.obj
0001:0001d9ec GuardCommit 8c59e9ec f nk:virtmem.obj
0001:0001da84 ProcessPageFault 8c59ea84 f nk:virtmem.obj
0001:0001dc50 ProfInit 8c59ec50 f nk:virtmem.obj
0001:0001dcb4 SC_GetProfileBaseAddress 8c59ecb4 f nk:virtmem.obj
0001:0001dd58 SC_SetProfilePortAddress 8c59ed58 f nk:virtmem.obj
0001:0001de9c SC_AllocPhysMem 8c59ee9c f nk:virtmem.obj
0001:0001df6c SC_FreePhysMem 8c59ef6c f nk:virtmem.obj
0001:0001dfc4 GetVMInfo 8c59efc4 f nk:virtmem.obj
0001:0001e0e4 DoLockPagesInSlot 8c59f0e4 f nk:virtmem.obj
0001:0001e3b4 DoLockPages 8c59f3b4 f nk:virtmem.obj
0001:0001e53c SC_LockPages 8c59f53c f nk:virtmem.obj
0001:0001e580 DbgVerify 8c59f580 f nk:virtmem.obj
0001:0001e630 CELOG_FileInfoFromOE 8c59f630 f i nk:logger.obj
0001:0001e714 KernelLibIoControl_Verifier 8c59f714 f nk:logger.obj
0001:0001ec2c Phys2VirtWrapper 8c59fc2c f nk:logger.obj
0001:0001ec3c InSysCallWrapper 8c59fc3c f nk:logger.obj
0001:0001ec4c CeLogThreadMigrate 8c59fc4c f nk:logger.obj
0001:0001ecc0 SC_CeLogData 8c59fcc0 f nk:logger.obj
0001:0001ed84 SC_CeLogSetZones 8c59fd84 f nk:logger.obj
0001:0001ee60 SC_CeLogGetZones 8c59fe60 f nk:logger.obj
0001:0001f3d0 SC_CeLogReSync 8c5a03d0 f nk:logger.obj
0001:0001f5a4 KernelLibIoControl_CeLog 8c5a05a4 f nk:logger.obj
0001:0001fb1c CELOG_ModuleFree 8c5a0b1c f i nk:loader.obj
0001:0001fb98 FreeProcModList 8c5a0b98 f nk:loader.obj
0001:0001fbe0 lowerW 8c5a0be0 f nk:loader.obj
0001:0001fbfc strcmponeiW 8c5a0bfc f nk:loader.obj
0001:0001fc48 strcmpdllnameW 8c5a0c48 f nk:loader.obj
0001:0001fd1c strcmpiAandW 8c5a0d1c f nk:loader.obj
0001:0001fda4 kstrncmpi 8c5a0da4 f nk:loader.obj
0001:0001fe20 kstrcmpi 8c5a0e20 f nk:loader.obj
0001:0001fe84 kstrcpyW 8c5a0e84 f nk:loader.obj
0001:0001fea8 FindOptr 8c5a0ea8 f nk:loader.obj
0001:0001ff38 ChkDebug 8c5a0f38 f nk:loader.obj
0001:0001ffbc IsInDbgList 8c5a0fbc f nk:loader.obj
0001:00020024 SetDbgList 8c5a1024 f nk:loader.obj
0001:000200ec ReadExtImageInfo 8c5a10ec f nk:loader.obj
0001:00020148 VerifyBinary 8c5a1148 f nk:loader.obj
0001:00020368 SetROMDllBase 8c5a1368 f nk:loader.obj
0001:000205f8 CloseExe 8c5a15f8 f nk:loader.obj
0001:0002067c SC_CloseProcOE 8c5a167c f nk:loader.obj
0001:0002087c NKForceCleanBoot 8c5a187c f nk:loader.obj
0001:000208a8 SC_SetCleanRebootFlag 8c5a18a8 f nk:loader.obj
0001:000208e8 KernelRelocate 8c5a18e8 f nk:loader.obj
0001:000209b4 SC_NotifyForceCleanboot 8c5a19b4 f nk:loader.obj
0001:00020a1c CalcFSPages 8c5a1a1c f nk:loader.obj
0001:00020ac8 CarveMem 8c5a1ac8 f nk:loader.obj
0001:00020b64 GrabFSPages 8c5a1b64 f nk:loader.obj
0001:00020bbc KernelFindMemory 8c5a1bbc f nk:loader.obj
0001:000210c4 RelocatePage 8c5a20c4 f nk:loader.obj
0001:00021568 Relocate 8c5a2568 f nk:loader.obj
0001:00021858 Katoi 8c5a2858 f nk:loader.obj
0001:00021894 ResolveImpStr 8c5a2894 f nk:loader.obj
0001:00021950 ResolveImpHintStr 8c5a2950 f nk:loader.obj
0001:000219ec UnlinkModule 8c5a29ec f nk:loader.obj
0001:00021a6c UnCopyRegions 8c5a2a6c f nk:loader.obj
0001:00021b60 FreeModuleMemory 8c5a2b60 f nk:loader.obj
0001:00021cb0 AddModToProcsList 8c5a2cb0 f nk:loader.obj
0001:00021dd8 CheckFreeModuleMemory 8c5a2dd8 f nk:loader.obj
0001:00021e34 FreeLibraryByName 8c5a2e34 f nk:loader.obj
0001:00021ea8 KAsciiToUnicode 8c5a2ea8 f nk:loader.obj
0001:00021ed8 KUnicodeToAscii 8c5a2ed8 f nk:loader.obj
0001:00021f10 DoImports 8c5a2f10 f nk:loader.obj
0001:00022408 AdjustRegions 8c5a3408 f nk:loader.obj
0001:000224d4 GetNameFromOE 8c5a34d4 f nk:loader.obj
0001:00022648 LoadE32 8c5a3648 f nk:loader.obj
0001:000228bc PageInPage 8c5a38bc f nk:loader.obj
0001:00022980 PageInFromROM 8c5a3980 f nk:loader.obj
0001:00022bc0 PageInFromRAM 8c5a3bc0 f nk:loader.obj
0001:00022df0 PageInModule 8c5a3df0 f nk:loader.obj
0001:00023098 PageInProcess 8c5a4098 f nk:loader.obj
0001:00023194 UnloadMod 8c5a4194 f nk:loader.obj
0001:00023408 UnloadExe 8c5a4408 f nk:loader.obj
0001:00023558 ReadO32FromFile 8c5a4558 f nk:loader.obj
0001:00023610 ReadSection 8c5a4610 f nk:loader.obj
0001:0002388c UpdateKmodVSize 8c5a488c f nk:loader.obj
0001:00023910 LoadO32 8c5a4910 f nk:loader.obj
0001:00023c64 FindEntryPoint 8c5a4c64 f nk:loader.obj
0001:00023cf0 CalcStackSize 8c5a4cf0 f nk:loader.obj
0001:00023d2c LoadSwitch 8c5a4d2c f nk:loader.obj
0001:00023d9c FinishLoadSwitch 8c5a4d9c f nk:loader.obj
0001:00023ebc ReserveDllRW 8c5a4ebc f nk:loader.obj
0001:00023fb0 CopyRegions 8c5a4fb0 f nk:loader.obj
0001:000242a4 FindModByName 8c5a52a4 f nk:loader.obj
0001:00024330 SC_ThreadAttachOrDetach 8c5a5330 f nk:loader.obj
0001:000243e8 UnDoDepends 8c5a53e8 f nk:loader.obj
0001:000244ec SC_GetProcModList 8c5a54ec f nk:loader.obj
0001:00024678 SC_FreeModFromCurrProc 8c5a5678 f nk:loader.obj
0001:0002477c SC_GetModuleHandleW 8c5a577c f nk:loader.obj
0001:00024834 DisableThreadCalls 8c5a5834 f nk:loader.obj
0001:000248b0
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -