📄 kernkitl.map
字号:
0001:0003f518 SC_SetTextColor 8c5c0518 f nk:kmisc.obj
0001:0003f5a0 SC_InvalidateRect 8c5c05a0 f nk:kmisc.obj
0001:0003f638 SC_TransparentImage 8c5c0638 f nk:kmisc.obj
0001:0003f708 SC_IsDialogMessageW 8c5c0708 f nk:kmisc.obj
0001:0003f798 SC_PostMessageW 8c5c0798 f nk:kmisc.obj
0001:0003f830 SC_IsWindowVisible 8c5c0830 f nk:kmisc.obj
0001:0003f8b0 SC_GetKeyState 8c5c08b0 f nk:kmisc.obj
0001:0003f930 SC_BeginPaint 8c5c0930 f nk:kmisc.obj
0001:0003f9c0 SC_EndPaint 8c5c09c0 f nk:kmisc.obj
0001:0003fa48 NKRegOpenKeyExW 8c5c0a48 f nk:kmisc.obj
0001:0003fac4 NKRegCloseKey 8c5c0ac4 f nk:kmisc.obj
0001:0003fb0c NKRegQueryValueExW 8c5c0b0c f nk:kmisc.obj
0001:0003fba0 NKRegCreateKeyExW 8c5c0ba0 f nk:kmisc.obj
0001:0003fc50 SC_IsSystemFile 8c5c0c50 f nk:kmisc.obj
0001:0003fca4 SC_CreateFileW 8c5c0ca4 f nk:kmisc.obj
0001:0003fd34 SC_ReadFile 8c5c0d34 f nk:kmisc.obj
0001:0003fe04 SC_CeWriteRecordProps 8c5c0e04 f nk:kmisc.obj
0001:0003fec0 SC_ReadFileWithSeek 8c5c0ec0 f nk:kmisc.obj
0001:0003ffa0 SC_WriteFileWithSeek 8c5c0fa0 f nk:kmisc.obj
0001:00040078 SC_CloseHandle 8c5c1078 f nk:kmisc.obj
0001:000400e8 SC_DuplicateHandle 8c5c10e8 f nk:kmisc.obj
0001:00040260 SC_DeviceIoControl 8c5c1260 f nk:kmisc.obj
0001:0004034c SC_OpenDatabaseEx 8c5c134c f nk:kmisc.obj
0001:000403e0 SC_SeekDatabase 8c5c13e0 f nk:kmisc.obj
0001:000404a8 SC_ReadRecordPropsEx 8c5c14a8 f nk:kmisc.obj
0001:00040588 SC_CreateLocaleView 8c5c1588 f nk:kmisc.obj
0001:0004066c VerifyAccess 8c5c166c f nk:virtmem.obj
0001:000407bc IsROM 8c5c17bc f nk:virtmem.obj
0001:0004095c IsStackVA 8c5c195c f nk:virtmem.obj
0001:00040a20 MakePagePerms 8c5c1a20 f nk:virtmem.obj
0001:00040af8 ProtectFromPerms 8c5c1af8 f nk:virtmem.obj
0001:00040b40 FindFirstBlock 8c5c1b40 f nk:virtmem.obj
0001:00040b7c ScanRegion 8c5c1b7c f nk:virtmem.obj
0001:00040d3c DecommitPages 8c5c1d3c f nk:virtmem.obj
0001:00040fe4 FreePageList 8c5c1fe4 f nk:virtmem.obj
0001:0004100c ReleaseRegion 8c5c200c f nk:virtmem.obj
0001:00041070 IsAccessOK 8c5c2070 f nk:virtmem.obj
0001:000410f4 DbgVerify 8c5c20f4 f nk:virtmem.obj
0001:00041240 GetKPagePMB 8c5c2240 f nk:virtmem.obj
0001:00041284 InitNKSection 8c5c2284 f nk:virtmem.obj
0001:000412b4 DeleteSection 8c5c22b4 f nk:virtmem.obj
0001:000413d4 CreateSection 8c5c23d4 f nk:virtmem.obj
0001:000414c4 CreateMapperSection 8c5c24c4 f nk:virtmem.obj
0001:000415c8 DeleteMapperSection 8c5c25c8 f nk:virtmem.obj
0001:000415e4 DoVirtualAlloc 8c5c25e4 f nk:virtmem.obj
0001:00041ebc SC_VirtualAlloc 8c5c2ebc f nk:virtmem.obj
0001:00041ee0 SC_VirtualFree 8c5c2ee0 f nk:virtmem.obj
0001:000421a4 DoVirtualCopy 8c5c31a4 f nk:virtmem.obj
0001:000425c0 SC_VirtualCopy 8c5c35c0 f nk:virtmem.obj
0001:00042614 SC_VirtualSetAttributes 8c5c3614 f nk:virtmem.obj
0001:000427b8 SC_VirtualProtect 8c5c37b8 f nk:virtmem.obj
0001:000429f0 SC_VirtualQuery 8c5c39f0 f nk:virtmem.obj
0001:00042cfc IsCommittedSecureSlot 8c5c3cfc f nk:virtmem.obj
0001:00042d60 DoLockPages 8c5c3d60 f nk:virtmem.obj
0001:0004315c SC_LockPages 8c5c415c f nk:virtmem.obj
0001:000431b0 DoUnlockPages 8c5c41b0 f nk:virtmem.obj
0001:00043374 SC_UnlockPages 8c5c4374 f nk:virtmem.obj
0001:000433c8 AutoCommit 8c5c43c8 f nk:virtmem.obj
0001:00043560 GuardCommit 8c5c4560 f nk:virtmem.obj
0001:000435f4 ProcessPageFault 8c5c45f4 f nk:virtmem.obj
0001:00043814 CELOG_SystemPage 8c5c4814 f i nk:virtmem.obj
0001:00043880 ProfInit 8c5c4880 f nk:virtmem.obj
0001:000438d0 SC_GetProfileBaseAddress 8c5c48d0 f nk:virtmem.obj
0001:00043964 SC_SetProfilePortAddress 8c5c4964 f nk:virtmem.obj
0001:00043aa8 SC_AllocPhysMem 8c5c4aa8 f nk:virtmem.obj
0001:00043b74 SC_FreePhysMem 8c5c4b74 f nk:virtmem.obj
0001:00043bd4 GetVMInfo 8c5c4bd4 f nk:virtmem.obj
0001:00043d08 SC_ProfileSyscall 8c5c4d08 f nk:profiler.obj
0001:00043d0c SC_TurnOnProfiling 8c5c4d0c f nk:profiler.obj
0001:00043d30 SC_TurnOffProfiling 8c5c4d30 f nk:profiler.obj
0001:00043d58 SC_DumpKCallProfile 8c5c4d58 f nk:profiler.obj
0001:00043d5c Phys2VirtWrapper 8c5c4d5c f nk:profiler.obj
0001:00043d6c InSysCallWrapper 8c5c4d6c f nk:profiler.obj
0001:00043d7c KernelLibIoControl_Verifier 8c5c4d7c f nk:profiler.obj
0001:00043ef8 KernelLibIoControl_CeLog 8c5c4ef8 f nk:profiler.obj
0001:000440f8 CeLogThreadMigrate 8c5c50f8 f nk:profiler.obj
0001:0004414c SC_CeLogData 8c5c514c f nk:profiler.obj
0001:000441d4 SC_CeLogSetZones 8c5c51d4 f nk:profiler.obj
0001:0004420c SC_CeLogGetZones 8c5c520c f nk:profiler.obj
0001:000442e4 SC_CeLogReSync 8c5c52e4 f nk:profiler.obj
0001:000446d0 lowerW 8c5c56d0 f nk:loader.obj
0001:000446fc strcmponeiW 8c5c56fc f nk:loader.obj
0001:00044764 strcmpdllnameW 8c5c5764 f nk:loader.obj
0001:00044848 strcmpiAandW 8c5c5848 f nk:loader.obj
0001:000448cc kstrncmpi 8c5c58cc f nk:loader.obj
0001:0004493c kstrcmpi 8c5c593c f nk:loader.obj
0001:00044990 kstrcpyW 8c5c5990 f nk:loader.obj
0001:000449c8 FindOptr 8c5c59c8 f nk:loader.obj
0001:00044a64 ChkDebug 8c5c5a64 f nk:loader.obj
0001:00044aec ReadExtImageInfo 8c5c5aec f nk:loader.obj
0001:00044b40 VerifyBinary 8c5c5b40 f nk:loader.obj
0001:00044cf8 SetROMDllBase 8c5c5cf8 f nk:loader.obj
0001:00044f3c OpenExe 8c5c5f3c f nk:loader.obj
0001:00044f68 OpenFileFromFilesys 8c5c5f68 f nk:loader.obj
0001:000451ac SafeOpenExe 8c5c61ac f nk:loader.obj
0001:0004598c CloseExe 8c5c698c f nk:loader.obj
0001:00045a1c SC_CloseProcOE 8c5c6a1c f nk:loader.obj
0001:00045c24 NKForceCleanBoot 8c5c6c24 f nk:loader.obj
0001:00045c50 SC_SetCleanRebootFlag 8c5c6c50 f nk:loader.obj
0001:00045c90 KernelRelocate 8c5c6c90 f nk:loader.obj
0001:00045d58 SC_NotifyForceCleanboot 8c5c6d58 f nk:loader.obj
0001:00045d8c CalcFSPages 8c5c6d8c f nk:loader.obj
0001:00045e24 CarveMem 8c5c6e24 f nk:loader.obj
0001:00045ec8 GrabFSPages 8c5c6ec8 f nk:loader.obj
0001:00045f28 KernelFindMemory 8c5c6f28 f nk:loader.obj
0001:0004647c RelocatePage 8c5c747c f nk:loader.obj
0001:00046978 Relocate 8c5c7978 f nk:loader.obj
0001:00046c84 Katoi 8c5c7c84 f nk:loader.obj
0001:00046cb8 AddrFromEat 8c5c7cb8 f nk:loader.obj
0001:00046e40 ResolveImpOrd 8c5c7e40 f nk:loader.obj
0001:00046e9c ResolveImpStr 8c5c7e9c f nk:loader.obj
0001:00046f64 ResolveImpHintStr 8c5c7f64 f nk:loader.obj
0001:00047004 IncRefCount 8c5c8004 f nk:loader.obj
0001:0004707c DecRefCount 8c5c807c f nk:loader.obj
0001:000470fc UnlinkModule 8c5c80fc f nk:loader.obj
0001:0004717c UnCopyRegions 8c5c817c f nk:loader.obj
0001:00047254 FreeModuleMemory 8c5c8254 f nk:loader.obj
0001:00047340 FreeLibraryFromProc 8c5c8340 f nk:loader.obj
0001:00047450 FreeAllProcLibraries 8c5c8450 f nk:loader.obj
0001:000474a8 CallDLLEntry 8c5c84a8 f nk:loader.obj
0001:000477bc FreeOneLibrary 8c5c87bc f nk:loader.obj
0001:00047ab8 FreeLibraryByName 8c5c8ab8 f nk:loader.obj
0001:00047b3c KAsciiToUnicode 8c5c8b3c f nk:loader.obj
0001:00047b74 KUnicodeToAscii 8c5c8b74 f nk:loader.obj
0001:00047bc8 DoImports 8c5c8bc8 f nk:loader.obj
0001:000480c4 AdjustRegions 8c5c90c4 f nk:loader.obj
0001:00048174 GetNameFromOE 8c5c9174 f nk:loader.obj
0001:000482b8 ReopenExe 8c5c92b8 f nk:loader.obj
0001:000484a8 JitOpenFile 8c5c94a8 f nk:loader.obj
0001:00048528 JitCloseFile 8c5c9528 f nk:loader.obj
0001:00048540 LoadE32 8c5c9540 f nk:loader.obj
0001:000488f4 PageInPage 8c5c98f4 f nk:loader.obj
0001:000489b8 PageInFromROM 8c5c99b8 f nk:loader.obj
0001:00048c18 PageInFromRAM 8c5c9c18 f nk:loader.obj
0001:00048e2c PageInModule 8c5c9e2c f nk:loader.obj
0001:000490f8 PageInProcess 8c5ca0f8 f nk:loader.obj
0001:000491fc AccessFromFlags 8c5ca1fc f nk:loader.obj
0001:00049224 UnloadMod 8c5ca224 f nk:loader.obj
0001:00049504 UnloadExe 8c5ca504 f nk:loader.obj
0001:000496a0 ReadO32FromFile 8c5ca6a0 f nk:loader.obj
0001:00049758 ReadSection 8c5ca758 f nk:loader.obj
0001:00049a20 UpdateKmodVSize 8c5caa20 f nk:loader.obj
0001:00049ab8 LoadO32 8c5caab8 f nk:loader.obj
0001:00049d34 FindEntryPoint 8c5cad34 f nk:loader.obj
0001:00049dd8 OpenAnExe 8c5cadd8 f nk:loader.obj
0001:00049e80 OpenADll 8c5cae80 f nk:loader.obj
0001:00049f24 CalcStackSize 8c5caf24 f nk:loader.obj
0001:00049f60 LoadSwitch 8c5caf60 f nk:loader.obj
0001:00049fdc FinishLoadSwitch 8c5cafdc f nk:loader.obj
0001:0004a164 ReserveDllRW 8c5cb164 f nk:loader.obj
0001:0004a260 CreateNewProc 8c5cb260 f nk:loader.obj
0001:0004acf4 CopyRegions 8c5cbcf4 f nk:loader.obj
0001:0004aff4 FindModByName 8c5cbff4 f nk:loader.obj
0001:0004b07c SC_ThreadDetachAllDLLs 8c5cc07c f nk:loader.obj
0001:0004b1a0 SC_ProcessDetachAllDLLs 8c5cc1a0 f nk:loader.obj
0001:0004b1c8 SC_Thre
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -