PenIMC2_v0400.dll
Description: Microsoft Tablet PC Component
Authors: © Microsoft Corporation. All rights reserved.
Version: 4.8.9316.0
Architecture: 64-bit
Operating System: Windows
SHA256: 03361a5857c071a84791b7af665fd2c9
File Size: 108.1 KB
Uploaded At: Dec. 1, 2025, 7:20 a.m.
Views: 11
Exported Functions
- CreateResetEvent (Ordinal: 1, Address: 0x7a60)
- DestroyResetEvent (Ordinal: 2, Address: 0x7ab0)
- DllCanUnloadNow (Ordinal: 3, Address: 0x1460)
- DllGetClassObject (Ordinal: 4, Address: 0x14a0)
- DllRegisterServer (Ordinal: 5, Address: 0x1510)
- DllUnregisterServer (Ordinal: 6, Address: 0x1650)
- GetLastSystemEventData (Ordinal: 7, Address: 0x79c0)
- GetPenEvent (Ordinal: 8, Address: 0x7870)
- GetPenEventMultiple (Ordinal: 9, Address: 0x7900)
- GetProxyDllInfo (Ordinal: 10, Address: 0x1150)
- LockWispObjectFromGit (Ordinal: 11, Address: 0xc8c0)
- RaiseResetEvent (Ordinal: 12, Address: 0x7ae0)
- UnlockWispObjectFromGit (Ordinal: 13, Address: 0xc950)
Imported DLLs & Functions
ADVAPI32.dll
- AllocateAndInitializeSid (Address: 0x180011050)
- ConvertSidToStringSidW (Address: 0x180011068)
- EqualSid (Address: 0x180011058)
- FreeSid (Address: 0x180011060)
- GetTokenInformation (Address: 0x180011048)
- OpenProcessToken (Address: 0x180011040)
- RegCloseKey (Address: 0x180011008)
- RegCreateKeyExW (Address: 0x180011030)
- RegDeleteKeyW (Address: 0x180011000)
- RegDeleteValueW (Address: 0x180011038)
- RegEnumKeyExW (Address: 0x180011018)
- RegOpenKeyExW (Address: 0x180011020)
- RegQueryInfoKeyW (Address: 0x180011010)
- RegSetValueExW (Address: 0x180011028)
KERNEL32.dll
- CancelWaitableTimer (Address: 0x1800111c8)
- CloseHandle (Address: 0x1800110d8)
- CreateEventW (Address: 0x180011140)
- CreateMutexW (Address: 0x1800110e0)
- CreateThread (Address: 0x1800111b0)
- CreateWaitableTimerW (Address: 0x1800111a8)
- DecodePointer (Address: 0x180011100)
- DeleteCriticalSection (Address: 0x1800110f8)
- EncodePointer (Address: 0x180011108)
- EnterCriticalSection (Address: 0x180011110)
- FindResourceW (Address: 0x1800110c0)
- FreeLibrary (Address: 0x180011078)
- GetCurrentProcess (Address: 0x180011198)
- GetCurrentProcessId (Address: 0x180011148)
- GetCurrentThreadId (Address: 0x180011160)
- GetLastError (Address: 0x1800110a0)
- GetModuleFileNameW (Address: 0x1800110d0)
- GetModuleHandleW (Address: 0x180011088)
- GetProcAddress (Address: 0x180011080)
- GetSystemTimeAsFileTime (Address: 0x180011218)
- GetThreadLocale (Address: 0x1800110e8)
- InitializeCriticalSection (Address: 0x180011138)
- InitializeCriticalSectionAndSpinCount (Address: 0x1800111f0)
- InitializeCriticalSectionEx (Address: 0x180011120)
- InitializeSListHead (Address: 0x180011220)
- IsDebuggerPresent (Address: 0x180011208)
- IsProcessorFeaturePresent (Address: 0x1800111e8)
- IsWow64Process (Address: 0x180011190)
- LeaveCriticalSection (Address: 0x180011118)
- LoadLibraryExW (Address: 0x1800110c8)
- LoadLibraryW (Address: 0x180011228)
- LoadResource (Address: 0x1800110b8)
- LocalFree (Address: 0x180011180)
- lstrcmpiW (Address: 0x180011090)
- MapViewOfFile (Address: 0x180011168)
- MultiByteToWideChar (Address: 0x1800110a8)
- OpenEventW (Address: 0x180011150)
- OpenFileMappingW (Address: 0x180011238)
- OpenMutexW (Address: 0x180011158)
- OutputDebugStringW (Address: 0x1800111a0)
- QueryPerformanceCounter (Address: 0x180011210)
- QueueUserAPC (Address: 0x1800111b8)
- RaiseException (Address: 0x180011098)
- ReleaseMutex (Address: 0x180011130)
- ResetEvent (Address: 0x1800111f8)
- SetEvent (Address: 0x180011178)
- SetThreadLocale (Address: 0x1800110f0)
- SetUnhandledExceptionFilter (Address: 0x1800111d8)
- SetWaitableTimer (Address: 0x1800111c0)
- SignalObjectAndWait (Address: 0x180011188)
- SizeofResource (Address: 0x1800110b0)
- TerminateProcess (Address: 0x1800111e0)
- UnhandledExceptionFilter (Address: 0x1800111d0)
- UnmapViewOfFile (Address: 0x180011170)
- VerSetConditionMask (Address: 0x180011230)
- WaitForSingleObject (Address: 0x180011128)
- WaitForSingleObjectEx (Address: 0x180011200)
ntdll.dll
- RtlCaptureContext (Address: 0x180011438)
- RtlLookupFunctionEntry (Address: 0x180011428)
- RtlVirtualUnwind (Address: 0x180011430)
ole32.dll
- CoCreateInstance (Address: 0x180011468)
- CoGetApartmentType (Address: 0x180011450)
- CoLockObjectExternal (Address: 0x180011470)
- CoTaskMemAlloc (Address: 0x180011448)
- CoTaskMemFree (Address: 0x180011458)
- CoTaskMemRealloc (Address: 0x180011478)
- StringFromGUID2 (Address: 0x180011460)
OLEAUT32.dll
- LoadTypeLib (Address: 0x180011270)
- RegisterTypeLib (Address: 0x180011258)
- SysAllocString (Address: 0x180011268)
- SysFreeString (Address: 0x180011278)
- SysStringLen (Address: 0x180011248)
- UnRegisterTypeLib (Address: 0x180011260)
- VarUI4FromStr (Address: 0x180011250)
RPCRT4.dll
- CStdStubBuffer_AddRef (Address: 0x1800112a0)
- CStdStubBuffer_Connect (Address: 0x1800112e0)
- CStdStubBuffer_CountRefs (Address: 0x1800112c0)
- CStdStubBuffer_DebugServerQueryInterface (Address: 0x1800112b8)
- CStdStubBuffer_DebugServerRelease (Address: 0x180011318)
- CStdStubBuffer_Disconnect (Address: 0x180011300)
- CStdStubBuffer_Invoke (Address: 0x180011290)
- CStdStubBuffer_IsIIDSupported (Address: 0x1800112f0)
- CStdStubBuffer_QueryInterface (Address: 0x1800112c8)
- IUnknown_AddRef_Proxy (Address: 0x180011298)
- IUnknown_QueryInterface_Proxy (Address: 0x1800112f8)
- IUnknown_Release_Proxy (Address: 0x1800112b0)
- NdrCStdStubBuffer_Release (Address: 0x1800112d8)
- NdrDllCanUnloadNow (Address: 0x1800112e8)
- NdrDllGetClassObject (Address: 0x180011308)
- NdrDllRegisterProxy (Address: 0x180011310)
- NdrDllUnregisterProxy (Address: 0x1800112a8)
- NdrOleAllocate (Address: 0x1800112d0)
- NdrOleFree (Address: 0x180011288)
SHELL32.dll
- ShellExecuteExW (Address: 0x180011328)
ucrtbase_clr0400.dll
- __stdio_common_vswprintf (Address: 0x1800114e0)
- _callnewh (Address: 0x180011498)
- _cexit (Address: 0x1800114a0)
- _configure_narrow_argv (Address: 0x1800114c8)
- _crt_atexit (Address: 0x1800114a8)
- _errno (Address: 0x180011500)
- _execute_onexit_table (Address: 0x180011528)
- _initialize_narrow_environment (Address: 0x1800114c0)
- _initialize_onexit_table (Address: 0x1800114b8)
- _initterm (Address: 0x180011490)
- _initterm_e (Address: 0x180011488)
- _invalid_parameter_noinfo (Address: 0x180011508)
- _recalloc (Address: 0x1800114f8)
- _register_onexit_function (Address: 0x1800114b0)
- _seh_filter_dll (Address: 0x1800114d0)
- free (Address: 0x180011510)
- malloc (Address: 0x180011518)
- realloc (Address: 0x1800114d8)
- wcscat_s (Address: 0x1800114e8)
- wcscpy_s (Address: 0x1800114f0)
- wcsncpy_s (Address: 0x180011520)
USER32.dll
- CallNextHookEx (Address: 0x180011350)
- CharNextW (Address: 0x180011390)
- EqualRect (Address: 0x180011340)
- GetDesktopWindow (Address: 0x1800113b0)
- GetMonitorInfoW (Address: 0x180011388)
- GetParent (Address: 0x180011360)
- GetSystemMetrics (Address: 0x180011380)
- GetWindow (Address: 0x180011338)
- GetWindowRect (Address: 0x180011348)
- GetWindowThreadProcessId (Address: 0x180011368)
- IsWindow (Address: 0x1800113a0)
- MonitorFromWindow (Address: 0x1800113a8)
- MsgWaitForMultipleObjectsEx (Address: 0x180011398)
- PeekMessageW (Address: 0x180011370)
- SetWindowsHookExW (Address: 0x180011358)
- UnhookWindowsHookEx (Address: 0x180011378)
VCRUNTIME140_1_CLR0400.dll
- __CxxFrameHandler4 (Address: 0x1800113c0)
VCRUNTIME140_CLR0400.dll
- __C_specific_handler (Address: 0x180011400)
- __std_exception_copy (Address: 0x1800113d8)
- __std_exception_destroy (Address: 0x1800113e0)
- __std_type_info_destroy_list (Address: 0x180011410)
- _CxxThrowException (Address: 0x180011418)
- _purecall (Address: 0x1800113e8)
- memcmp (Address: 0x1800113f0)
- memcpy (Address: 0x1800113f8)
- memset (Address: 0x1800113d0)
- wcsstr (Address: 0x180011408)