extract.dll

Description: Extract Module

Authors: Copyright © 2010 Tencent. All Rights Reserved.

Version: 1.9.275.400

Architecture: 32-bit

Operating System: Windows NT

SHA256: 19ad926bca40d99d2a1fe4c95a3079be

File Size: 366.4 KB

Uploaded At: Dec. 2, 2025, 2:41 p.m.

Views: 4

Exported Functions

  • CreateObject (Ordinal: 1, Address: 0x16be)
  • GetHandlerProperty2 (Ordinal: 2, Address: 0x1065)
  • GetHandlerProperty (Ordinal: 3, Address: 0x114b)
  • GetMethodProperty (Ordinal: 4, Address: 0x143f)
  • GetNumberOfFormats (Ordinal: 5, Address: 0x115d)
  • GetNumberOfMethods (Ordinal: 6, Address: 0x14ca)
  • SetLargePageMode (Ordinal: 7, Address: 0x16b6)

Imported DLLs & Functions

KERNEL32.dll
  • AreFileApisANSI (Address: 0x10046064)
  • CloseHandle (Address: 0x10046040)
  • CompareFileTime (Address: 0x10046124)
  • CompareStringA (Address: 0x10046144)
  • CompareStringW (Address: 0x10046140)
  • CreateDirectoryA (Address: 0x10046080)
  • CreateDirectoryW (Address: 0x100460a4)
  • CreateEventA (Address: 0x10046048)
  • CreateFileA (Address: 0x10046120)
  • CreateFileW (Address: 0x1004606c)
  • CreateSemaphoreA (Address: 0x10046054)
  • CreateThread (Address: 0x10046190)
  • DeleteCriticalSection (Address: 0x10046010)
  • DeleteFileA (Address: 0x10046084)
  • DeleteFileW (Address: 0x100460a8)
  • DosDateTimeToFileTime (Address: 0x10046130)
  • EnterCriticalSection (Address: 0x10046014)
  • EnumSystemLocalesA (Address: 0x10046160)
  • ExitProcess (Address: 0x100461dc)
  • ExitThread (Address: 0x1004618c)
  • FatalAppExitA (Address: 0x100461cc)
  • FileTimeToDosDateTime (Address: 0x10046134)
  • FindClose (Address: 0x100460e0)
  • FindCloseChangeNotification (Address: 0x100460e4)
  • FindFirstChangeNotificationA (Address: 0x100460e8)
  • FindFirstChangeNotificationW (Address: 0x100460fc)
  • FindFirstFileA (Address: 0x100460ec)
  • FindFirstFileW (Address: 0x100460f0)
  • FindNextFileA (Address: 0x100460f4)
  • FindNextFileW (Address: 0x100460f8)
  • FreeEnvironmentStringsA (Address: 0x100461fc)
  • FreeEnvironmentStringsW (Address: 0x10046204)
  • FreeLibrary (Address: 0x10046224)
  • GetACP (Address: 0x10046214)
  • GetCommandLineA (Address: 0x10046194)
  • GetCPInfo (Address: 0x10046210)
  • GetCurrentDirectoryA (Address: 0x100460b8)
  • GetCurrentDirectoryW (Address: 0x100460c0)
  • GetCurrentProcess (Address: 0x100461a0)
  • GetCurrentProcessId (Address: 0x10046028)
  • GetCurrentThread (Address: 0x100461c8)
  • GetCurrentThreadId (Address: 0x10046024)
  • GetDateFormatA (Address: 0x10046168)
  • GetEnvironmentStrings (Address: 0x10046200)
  • GetEnvironmentStringsW (Address: 0x10046208)
  • GetFileInformationByHandle (Address: 0x10046110)
  • GetFileSize (Address: 0x10046108)
  • GetFileType (Address: 0x100461f4)
  • GetFullPathNameA (Address: 0x100460b4)
  • GetFullPathNameW (Address: 0x100460d8)
  • GetLastError (Address: 0x1004600c)
  • GetLocaleInfoA (Address: 0x10046174)
  • GetLocaleInfoW (Address: 0x10046170)
  • GetLogicalDriveStringsA (Address: 0x10046100)
  • GetLogicalDriveStringsW (Address: 0x10046104)
  • GetModuleFileNameA (Address: 0x100461e4)
  • GetModuleHandleA (Address: 0x1004603c)
  • GetOEMCP (Address: 0x10046218)
  • GetProcAddress (Address: 0x10046038)
  • GetProcessHeap (Address: 0x10046198)
  • GetShortPathNameA (Address: 0x100460ac)
  • GetStartupInfoA (Address: 0x100461f8)
  • GetStdHandle (Address: 0x100461e0)
  • GetStringTypeA (Address: 0x10046158)
  • GetStringTypeW (Address: 0x10046154)
  • GetSystemDirectoryA (Address: 0x1004608c)
  • GetSystemDirectoryW (Address: 0x10046094)
  • GetSystemInfo (Address: 0x10046128)
  • GetSystemTime (Address: 0x1004613c)
  • GetSystemTimeAsFileTime (Address: 0x1004620c)
  • GetTempFileNameA (Address: 0x100460d0)
  • GetTempFileNameW (Address: 0x100460d4)
  • GetTempPathA (Address: 0x100460c8)
  • GetTempPathW (Address: 0x100460cc)
  • GetTickCount (Address: 0x10046020)
  • GetTimeFormatA (Address: 0x1004616c)
  • GetTimeZoneInformation (Address: 0x10046148)
  • GetUserDefaultLCID (Address: 0x10046164)
  • GetVersionExA (Address: 0x10046000)
  • GetWindowsDirectoryA (Address: 0x10046088)
  • GetWindowsDirectoryW (Address: 0x10046090)
  • GlobalMemoryStatus (Address: 0x1004612c)
  • HeapAlloc (Address: 0x10046184)
  • HeapCreate (Address: 0x100461d8)
  • HeapDestroy (Address: 0x100461d4)
  • HeapFree (Address: 0x10046188)
  • HeapReAlloc (Address: 0x100461d0)
  • HeapSize (Address: 0x100461ec)
  • InitializeCriticalSection (Address: 0x1004605c)
  • InterlockedDecrement (Address: 0x100461c4)
  • InterlockedExchange (Address: 0x10046228)
  • InterlockedIncrement (Address: 0x100461c0)
  • IsDebuggerPresent (Address: 0x100461ac)
  • IsValidCodePage (Address: 0x1004621c)
  • IsValidLocale (Address: 0x1004615c)
  • LCMapStringA (Address: 0x10046150)
  • LCMapStringW (Address: 0x1004614c)
  • LeaveCriticalSection (Address: 0x10046018)
  • LoadLibraryA (Address: 0x10046178)
  • lstrlenA (Address: 0x100460b0)
  • MoveFileA (Address: 0x1004607c)
  • MoveFileW (Address: 0x100460a0)
  • MultiByteToWideChar (Address: 0x10046004)
  • QueryPerformanceCounter (Address: 0x1004601c)
  • RaiseException (Address: 0x10046180)
  • ReadFile (Address: 0x10046114)
  • ReleaseSemaphore (Address: 0x10046058)
  • RemoveDirectoryA (Address: 0x10046078)
  • RemoveDirectoryW (Address: 0x1004609c)
  • ResetEvent (Address: 0x10046050)
  • RtlUnwind (Address: 0x1004617c)
  • SearchPathA (Address: 0x100460c4)
  • SearchPathW (Address: 0x100460dc)
  • SetConsoleCtrlHandler (Address: 0x10046220)
  • SetCurrentDirectoryA (Address: 0x10046060)
  • SetCurrentDirectoryW (Address: 0x100460bc)
  • SetEndOfFile (Address: 0x1004611c)
  • SetEnvironmentVariableA (Address: 0x1004622c)
  • SetEvent (Address: 0x1004604c)
  • SetFileAttributesA (Address: 0x10046074)
  • SetFileAttributesW (Address: 0x10046098)
  • SetFilePointer (Address: 0x1004610c)
  • SetFileTime (Address: 0x10046068)
  • SetHandleCount (Address: 0x100461f0)
  • SetLastError (Address: 0x10046070)
  • SetUnhandledExceptionFilter (Address: 0x100461a8)
  • Sleep (Address: 0x100461e8)
  • SystemTimeToFileTime (Address: 0x10046138)
  • TerminateProcess (Address: 0x1004619c)
  • TlsAlloc (Address: 0x100461b4)
  • TlsFree (Address: 0x100461bc)
  • TlsGetValue (Address: 0x100461b0)
  • TlsSetValue (Address: 0x100461b8)
  • UnhandledExceptionFilter (Address: 0x100461a4)
  • VirtualAlloc (Address: 0x10046030)
  • VirtualFree (Address: 0x10046034)
  • WaitForMultipleObjects (Address: 0x1004602c)
  • WaitForSingleObject (Address: 0x10046044)
  • WideCharToMultiByte (Address: 0x10046008)
  • WriteFile (Address: 0x10046118)
OLEAUT32.dll
  • SysAllocString (Address: 0x10046240)
  • SysAllocStringByteLen (Address: 0x10046244)
  • SysFreeString (Address: 0x10046238)
  • VariantClear (Address: 0x1004623c)
  • VariantCopy (Address: 0x10046234)
USER32.dll
  • CharLowerA (Address: 0x10046260)
  • CharLowerW (Address: 0x10046258)
  • CharNextA (Address: 0x10046254)
  • CharPrevA (Address: 0x1004624c)
  • CharPrevExA (Address: 0x10046268)
  • CharToOemA (Address: 0x10046250)
  • CharUpperA (Address: 0x10046264)
  • CharUpperW (Address: 0x1004625c)