PenIMC2_v0400.dll

Description: Microsoft Tablet PC Component

Authors: © Microsoft Corporation. All rights reserved.

Version: 4.8.4662.0

Architecture: 32-bit

Operating System: Windows

SHA256: 7d16a86a387d70e586fb0ecb8e8767e2

File Size: 98.4 KB

Uploaded At: Dec. 1, 2025, 8:48 a.m.

Views: 6

Exported Functions

  • CreateResetEvent (Ordinal: 1, Address: 0x8600)
  • DestroyResetEvent (Ordinal: 2, Address: 0x8650)
  • DllCanUnloadNow (Ordinal: 3, Address: 0x3420)
  • DllGetClassObject (Ordinal: 4, Address: 0x3450)
  • DllRegisterServer (Ordinal: 5, Address: 0x34a0)
  • DllUnregisterServer (Ordinal: 6, Address: 0x34f0)
  • GetLastSystemEventData (Ordinal: 7, Address: 0x8590)
  • GetPenEvent (Ordinal: 8, Address: 0x84b0)
  • GetPenEventMultiple (Ordinal: 9, Address: 0x8510)
  • GetProxyDllInfo (Ordinal: 10, Address: 0x3130)
  • LockWispObjectFromGit (Ordinal: 11, Address: 0xcba0)
  • RaiseResetEvent (Ordinal: 12, Address: 0x8670)
  • UnlockWispObjectFromGit (Ordinal: 13, Address: 0xcc30)

Imported DLLs & Functions

ADVAPI32.dll
  • AllocateAndInitializeSid (Address: 0x10014028)
  • ConvertSidToStringSidW (Address: 0x10014034)
  • EqualSid (Address: 0x1001402c)
  • FreeSid (Address: 0x10014030)
  • GetTokenInformation (Address: 0x10014024)
  • OpenProcessToken (Address: 0x10014020)
  • RegCloseKey (Address: 0x10014004)
  • RegCreateKeyExW (Address: 0x10014018)
  • RegDeleteKeyW (Address: 0x10014000)
  • RegDeleteValueW (Address: 0x1001401c)
  • RegEnumKeyExW (Address: 0x1001400c)
  • RegOpenKeyExW (Address: 0x10014010)
  • RegQueryInfoKeyW (Address: 0x10014008)
  • RegSetValueExW (Address: 0x10014014)
KERNEL32.dll
  • CancelWaitableTimer (Address: 0x100140e4)
  • CloseHandle (Address: 0x1001406c)
  • CreateEventW (Address: 0x100140a0)
  • CreateMutexW (Address: 0x10014070)
  • CreateThread (Address: 0x100140d8)
  • CreateWaitableTimerW (Address: 0x100140d4)
  • DecodePointer (Address: 0x10014084)
  • DeleteCriticalSection (Address: 0x1001407c)
  • EncodePointer (Address: 0x10014088)
  • EnterCriticalSection (Address: 0x1001408c)
  • FindResourceW (Address: 0x10014060)
  • FreeLibrary (Address: 0x1001403c)
  • GetCurrentProcess (Address: 0x100140cc)
  • GetCurrentProcessId (Address: 0x100140a4)
  • GetCurrentThreadId (Address: 0x100140ac)
  • GetLastError (Address: 0x10014050)
  • GetModuleFileNameW (Address: 0x10014068)
  • GetModuleHandleW (Address: 0x10014044)
  • GetProcAddress (Address: 0x10014040)
  • GetSystemTimeAsFileTime (Address: 0x10014108)
  • GetThreadLocale (Address: 0x10014074)
  • InitializeCriticalSection (Address: 0x1001409c)
  • InitializeCriticalSectionEx (Address: 0x10014080)
  • InitializeSListHead (Address: 0x1001410c)
  • IsDebuggerPresent (Address: 0x10014100)
  • IsProcessorFeaturePresent (Address: 0x100140fc)
  • IsWow64Process (Address: 0x100140c8)
  • LeaveCriticalSection (Address: 0x10014090)
  • LoadLibraryExW (Address: 0x10014064)
  • LoadResource (Address: 0x1001405c)
  • LocalFree (Address: 0x100140c0)
  • lstrcmpiW (Address: 0x10014048)
  • MapViewOfFile (Address: 0x100140b4)
  • MultiByteToWideChar (Address: 0x10014054)
  • OpenEventW (Address: 0x100140a8)
  • OpenFileMappingW (Address: 0x100140b0)
  • OpenMutexW (Address: 0x10014114)
  • OutputDebugStringW (Address: 0x100140d0)
  • QueryPerformanceCounter (Address: 0x10014104)
  • QueueUserAPC (Address: 0x100140dc)
  • RaiseException (Address: 0x1001404c)
  • ReleaseMutex (Address: 0x10014098)
  • ResetEvent (Address: 0x100140e8)
  • SetEvent (Address: 0x100140bc)
  • SetThreadLocale (Address: 0x10014078)
  • SetUnhandledExceptionFilter (Address: 0x100140f4)
  • SetWaitableTimer (Address: 0x100140e0)
  • SignalObjectAndWait (Address: 0x100140c4)
  • SizeofResource (Address: 0x10014058)
  • TerminateProcess (Address: 0x100140f8)
  • UnhandledExceptionFilter (Address: 0x100140f0)
  • UnmapViewOfFile (Address: 0x100140b8)
  • VerSetConditionMask (Address: 0x10014110)
  • WaitForSingleObject (Address: 0x10014094)
  • WaitForSingleObjectEx (Address: 0x100140ec)
ntdll.dll
  • RtlVerifyVersionInfo (Address: 0x1001420c)
ole32.dll
  • CoCreateInstance (Address: 0x10014218)
  • CoGetApartmentType (Address: 0x10014224)
  • CoLockObjectExternal (Address: 0x10014220)
  • CoTaskMemAlloc (Address: 0x10014214)
  • CoTaskMemFree (Address: 0x1001421c)
  • CoTaskMemRealloc (Address: 0x10014228)
  • StringFromGUID2 (Address: 0x1001422c)
OLEAUT32.dll
  • LoadTypeLib (Address: 0x10014120)
  • RegisterTypeLib (Address: 0x1001412c)
  • SysAllocString (Address: 0x1001411c)
  • SysFreeString (Address: 0x10014124)
  • SysStringLen (Address: 0x10014130)
  • UnRegisterTypeLib (Address: 0x10014134)
  • VarUI4FromStr (Address: 0x10014128)
RPCRT4.dll
  • CStdStubBuffer_AddRef (Address: 0x10014144)
  • CStdStubBuffer_Connect (Address: 0x10014160)
  • CStdStubBuffer_CountRefs (Address: 0x10014158)
  • CStdStubBuffer_DebugServerQueryInterface (Address: 0x1001413c)
  • CStdStubBuffer_DebugServerRelease (Address: 0x1001417c)
  • CStdStubBuffer_Disconnect (Address: 0x10014170)
  • CStdStubBuffer_Invoke (Address: 0x10014150)
  • CStdStubBuffer_IsIIDSupported (Address: 0x10014168)
  • CStdStubBuffer_QueryInterface (Address: 0x10014184)
  • IUnknown_AddRef_Proxy (Address: 0x1001414c)
  • IUnknown_QueryInterface_Proxy (Address: 0x1001416c)
  • IUnknown_Release_Proxy (Address: 0x10014148)
  • NdrCStdStubBuffer_Release (Address: 0x1001415c)
  • NdrDllCanUnloadNow (Address: 0x10014164)
  • NdrDllGetClassObject (Address: 0x10014174)
  • NdrDllRegisterProxy (Address: 0x10014178)
  • NdrDllUnregisterProxy (Address: 0x10014154)
  • NdrOleAllocate (Address: 0x10014180)
  • NdrOleFree (Address: 0x10014140)
SHELL32.dll
  • ShellExecuteExW (Address: 0x1001418c)
ucrtbase_clr0400.dll
  • __stdio_common_vswprintf (Address: 0x1001425c)
  • _callnewh (Address: 0x10014238)
  • _cexit (Address: 0x1001423c)
  • _configure_narrow_argv (Address: 0x10014250)
  • _crt_atexit (Address: 0x10014240)
  • _errno (Address: 0x1001426c)
  • _execute_onexit_table (Address: 0x1001427c)
  • _initialize_narrow_environment (Address: 0x1001424c)
  • _initialize_onexit_table (Address: 0x10014248)
  • _initterm (Address: 0x10014234)
  • _initterm_e (Address: 0x10014244)
  • _invalid_parameter_noinfo (Address: 0x10014270)
  • _recalloc (Address: 0x10014268)
  • _register_onexit_function (Address: 0x10014284)
  • _seh_filter_dll (Address: 0x10014254)
  • free (Address: 0x10014274)
  • malloc (Address: 0x10014278)
  • realloc (Address: 0x10014258)
  • wcscat_s (Address: 0x10014260)
  • wcscpy_s (Address: 0x10014264)
  • wcsncpy_s (Address: 0x10014280)
USER32.dll
  • CallNextHookEx (Address: 0x100141a0)
  • CharNextW (Address: 0x100141ac)
  • EqualRect (Address: 0x10014198)
  • GetDesktopWindow (Address: 0x100141bc)
  • GetMonitorInfoW (Address: 0x100141c0)
  • GetParent (Address: 0x100141a8)
  • GetSystemMetrics (Address: 0x100141c4)
  • GetWindow (Address: 0x10014194)
  • GetWindowRect (Address: 0x1001419c)
  • GetWindowThreadProcessId (Address: 0x100141d0)
  • IsWindow (Address: 0x100141b4)
  • MonitorFromWindow (Address: 0x100141b8)
  • MsgWaitForMultipleObjectsEx (Address: 0x100141b0)
  • PeekMessageW (Address: 0x100141cc)
  • SetWindowsHookExW (Address: 0x100141a4)
  • UnhookWindowsHookEx (Address: 0x100141c8)
VCRUNTIME140_CLR0400.dll
  • __CxxFrameHandler3 (Address: 0x10014200)
  • __std_exception_copy (Address: 0x100141dc)
  • __std_exception_destroy (Address: 0x100141e0)
  • __std_type_info_destroy_list (Address: 0x100141e4)
  • __vcrt_InitializeCriticalSectionEx (Address: 0x100141f4)
  • _CxxThrowException (Address: 0x10014204)
  • _except_handler4_common (Address: 0x100141d8)
  • _purecall (Address: 0x100141f8)
  • memcmp (Address: 0x100141e8)
  • memcpy (Address: 0x100141ec)
  • memset (Address: 0x100141f0)
  • wcsstr (Address: 0x100141fc)