PenIMC2_v0400.dll
Description: Microsoft Tablet PC Component
Authors: © Microsoft Corporation. All rights reserved.
Version: 4.8.4662.0
Architecture: 32-bit
Operating System: Windows
SHA256: 7d16a86a387d70e586fb0ecb8e8767e2
File Size: 98.4 KB
Uploaded At: Dec. 1, 2025, 8:48 a.m.
Views: 6
Exported Functions
- CreateResetEvent (Ordinal: 1, Address: 0x8600)
- DestroyResetEvent (Ordinal: 2, Address: 0x8650)
- DllCanUnloadNow (Ordinal: 3, Address: 0x3420)
- DllGetClassObject (Ordinal: 4, Address: 0x3450)
- DllRegisterServer (Ordinal: 5, Address: 0x34a0)
- DllUnregisterServer (Ordinal: 6, Address: 0x34f0)
- GetLastSystemEventData (Ordinal: 7, Address: 0x8590)
- GetPenEvent (Ordinal: 8, Address: 0x84b0)
- GetPenEventMultiple (Ordinal: 9, Address: 0x8510)
- GetProxyDllInfo (Ordinal: 10, Address: 0x3130)
- LockWispObjectFromGit (Ordinal: 11, Address: 0xcba0)
- RaiseResetEvent (Ordinal: 12, Address: 0x8670)
- UnlockWispObjectFromGit (Ordinal: 13, Address: 0xcc30)
Imported DLLs & Functions
ADVAPI32.dll
- AllocateAndInitializeSid (Address: 0x10014028)
- ConvertSidToStringSidW (Address: 0x10014034)
- EqualSid (Address: 0x1001402c)
- FreeSid (Address: 0x10014030)
- GetTokenInformation (Address: 0x10014024)
- OpenProcessToken (Address: 0x10014020)
- RegCloseKey (Address: 0x10014004)
- RegCreateKeyExW (Address: 0x10014018)
- RegDeleteKeyW (Address: 0x10014000)
- RegDeleteValueW (Address: 0x1001401c)
- RegEnumKeyExW (Address: 0x1001400c)
- RegOpenKeyExW (Address: 0x10014010)
- RegQueryInfoKeyW (Address: 0x10014008)
- RegSetValueExW (Address: 0x10014014)
KERNEL32.dll
- CancelWaitableTimer (Address: 0x100140e4)
- CloseHandle (Address: 0x1001406c)
- CreateEventW (Address: 0x100140a0)
- CreateMutexW (Address: 0x10014070)
- CreateThread (Address: 0x100140d8)
- CreateWaitableTimerW (Address: 0x100140d4)
- DecodePointer (Address: 0x10014084)
- DeleteCriticalSection (Address: 0x1001407c)
- EncodePointer (Address: 0x10014088)
- EnterCriticalSection (Address: 0x1001408c)
- FindResourceW (Address: 0x10014060)
- FreeLibrary (Address: 0x1001403c)
- GetCurrentProcess (Address: 0x100140cc)
- GetCurrentProcessId (Address: 0x100140a4)
- GetCurrentThreadId (Address: 0x100140ac)
- GetLastError (Address: 0x10014050)
- GetModuleFileNameW (Address: 0x10014068)
- GetModuleHandleW (Address: 0x10014044)
- GetProcAddress (Address: 0x10014040)
- GetSystemTimeAsFileTime (Address: 0x10014108)
- GetThreadLocale (Address: 0x10014074)
- InitializeCriticalSection (Address: 0x1001409c)
- InitializeCriticalSectionEx (Address: 0x10014080)
- InitializeSListHead (Address: 0x1001410c)
- IsDebuggerPresent (Address: 0x10014100)
- IsProcessorFeaturePresent (Address: 0x100140fc)
- IsWow64Process (Address: 0x100140c8)
- LeaveCriticalSection (Address: 0x10014090)
- LoadLibraryExW (Address: 0x10014064)
- LoadResource (Address: 0x1001405c)
- LocalFree (Address: 0x100140c0)
- lstrcmpiW (Address: 0x10014048)
- MapViewOfFile (Address: 0x100140b4)
- MultiByteToWideChar (Address: 0x10014054)
- OpenEventW (Address: 0x100140a8)
- OpenFileMappingW (Address: 0x100140b0)
- OpenMutexW (Address: 0x10014114)
- OutputDebugStringW (Address: 0x100140d0)
- QueryPerformanceCounter (Address: 0x10014104)
- QueueUserAPC (Address: 0x100140dc)
- RaiseException (Address: 0x1001404c)
- ReleaseMutex (Address: 0x10014098)
- ResetEvent (Address: 0x100140e8)
- SetEvent (Address: 0x100140bc)
- SetThreadLocale (Address: 0x10014078)
- SetUnhandledExceptionFilter (Address: 0x100140f4)
- SetWaitableTimer (Address: 0x100140e0)
- SignalObjectAndWait (Address: 0x100140c4)
- SizeofResource (Address: 0x10014058)
- TerminateProcess (Address: 0x100140f8)
- UnhandledExceptionFilter (Address: 0x100140f0)
- UnmapViewOfFile (Address: 0x100140b8)
- VerSetConditionMask (Address: 0x10014110)
- WaitForSingleObject (Address: 0x10014094)
- WaitForSingleObjectEx (Address: 0x100140ec)
ntdll.dll
- RtlVerifyVersionInfo (Address: 0x1001420c)
ole32.dll
- CoCreateInstance (Address: 0x10014218)
- CoGetApartmentType (Address: 0x10014224)
- CoLockObjectExternal (Address: 0x10014220)
- CoTaskMemAlloc (Address: 0x10014214)
- CoTaskMemFree (Address: 0x1001421c)
- CoTaskMemRealloc (Address: 0x10014228)
- StringFromGUID2 (Address: 0x1001422c)
OLEAUT32.dll
- LoadTypeLib (Address: 0x10014120)
- RegisterTypeLib (Address: 0x1001412c)
- SysAllocString (Address: 0x1001411c)
- SysFreeString (Address: 0x10014124)
- SysStringLen (Address: 0x10014130)
- UnRegisterTypeLib (Address: 0x10014134)
- VarUI4FromStr (Address: 0x10014128)
RPCRT4.dll
- CStdStubBuffer_AddRef (Address: 0x10014144)
- CStdStubBuffer_Connect (Address: 0x10014160)
- CStdStubBuffer_CountRefs (Address: 0x10014158)
- CStdStubBuffer_DebugServerQueryInterface (Address: 0x1001413c)
- CStdStubBuffer_DebugServerRelease (Address: 0x1001417c)
- CStdStubBuffer_Disconnect (Address: 0x10014170)
- CStdStubBuffer_Invoke (Address: 0x10014150)
- CStdStubBuffer_IsIIDSupported (Address: 0x10014168)
- CStdStubBuffer_QueryInterface (Address: 0x10014184)
- IUnknown_AddRef_Proxy (Address: 0x1001414c)
- IUnknown_QueryInterface_Proxy (Address: 0x1001416c)
- IUnknown_Release_Proxy (Address: 0x10014148)
- NdrCStdStubBuffer_Release (Address: 0x1001415c)
- NdrDllCanUnloadNow (Address: 0x10014164)
- NdrDllGetClassObject (Address: 0x10014174)
- NdrDllRegisterProxy (Address: 0x10014178)
- NdrDllUnregisterProxy (Address: 0x10014154)
- NdrOleAllocate (Address: 0x10014180)
- NdrOleFree (Address: 0x10014140)
SHELL32.dll
- ShellExecuteExW (Address: 0x1001418c)
ucrtbase_clr0400.dll
- __stdio_common_vswprintf (Address: 0x1001425c)
- _callnewh (Address: 0x10014238)
- _cexit (Address: 0x1001423c)
- _configure_narrow_argv (Address: 0x10014250)
- _crt_atexit (Address: 0x10014240)
- _errno (Address: 0x1001426c)
- _execute_onexit_table (Address: 0x1001427c)
- _initialize_narrow_environment (Address: 0x1001424c)
- _initialize_onexit_table (Address: 0x10014248)
- _initterm (Address: 0x10014234)
- _initterm_e (Address: 0x10014244)
- _invalid_parameter_noinfo (Address: 0x10014270)
- _recalloc (Address: 0x10014268)
- _register_onexit_function (Address: 0x10014284)
- _seh_filter_dll (Address: 0x10014254)
- free (Address: 0x10014274)
- malloc (Address: 0x10014278)
- realloc (Address: 0x10014258)
- wcscat_s (Address: 0x10014260)
- wcscpy_s (Address: 0x10014264)
- wcsncpy_s (Address: 0x10014280)
USER32.dll
- CallNextHookEx (Address: 0x100141a0)
- CharNextW (Address: 0x100141ac)
- EqualRect (Address: 0x10014198)
- GetDesktopWindow (Address: 0x100141bc)
- GetMonitorInfoW (Address: 0x100141c0)
- GetParent (Address: 0x100141a8)
- GetSystemMetrics (Address: 0x100141c4)
- GetWindow (Address: 0x10014194)
- GetWindowRect (Address: 0x1001419c)
- GetWindowThreadProcessId (Address: 0x100141d0)
- IsWindow (Address: 0x100141b4)
- MonitorFromWindow (Address: 0x100141b8)
- MsgWaitForMultipleObjectsEx (Address: 0x100141b0)
- PeekMessageW (Address: 0x100141cc)
- SetWindowsHookExW (Address: 0x100141a4)
- UnhookWindowsHookEx (Address: 0x100141c8)
VCRUNTIME140_CLR0400.dll
- __CxxFrameHandler3 (Address: 0x10014200)
- __std_exception_copy (Address: 0x100141dc)
- __std_exception_destroy (Address: 0x100141e0)
- __std_type_info_destroy_list (Address: 0x100141e4)
- __vcrt_InitializeCriticalSectionEx (Address: 0x100141f4)
- _CxxThrowException (Address: 0x10014204)
- _except_handler4_common (Address: 0x100141d8)
- _purecall (Address: 0x100141f8)
- memcmp (Address: 0x100141e8)
- memcpy (Address: 0x100141ec)
- memset (Address: 0x100141f0)
- wcsstr (Address: 0x100141fc)