PenIMC2_v0400.dll

Description: Microsoft Tablet PC Component

Authors: © Microsoft Corporation. All rights reserved.

Version: 4.8.9316.0

Architecture: 64-bit

Operating System: Windows

SHA256: 03361a5857c071a84791b7af665fd2c9

File Size: 108.1 KB

Uploaded At: Dec. 1, 2025, 7:20 a.m.

Views: 11

Exported Functions

  • CreateResetEvent (Ordinal: 1, Address: 0x7a60)
  • DestroyResetEvent (Ordinal: 2, Address: 0x7ab0)
  • DllCanUnloadNow (Ordinal: 3, Address: 0x1460)
  • DllGetClassObject (Ordinal: 4, Address: 0x14a0)
  • DllRegisterServer (Ordinal: 5, Address: 0x1510)
  • DllUnregisterServer (Ordinal: 6, Address: 0x1650)
  • GetLastSystemEventData (Ordinal: 7, Address: 0x79c0)
  • GetPenEvent (Ordinal: 8, Address: 0x7870)
  • GetPenEventMultiple (Ordinal: 9, Address: 0x7900)
  • GetProxyDllInfo (Ordinal: 10, Address: 0x1150)
  • LockWispObjectFromGit (Ordinal: 11, Address: 0xc8c0)
  • RaiseResetEvent (Ordinal: 12, Address: 0x7ae0)
  • UnlockWispObjectFromGit (Ordinal: 13, Address: 0xc950)

Imported DLLs & Functions

ADVAPI32.dll
  • AllocateAndInitializeSid (Address: 0x180011050)
  • ConvertSidToStringSidW (Address: 0x180011068)
  • EqualSid (Address: 0x180011058)
  • FreeSid (Address: 0x180011060)
  • GetTokenInformation (Address: 0x180011048)
  • OpenProcessToken (Address: 0x180011040)
  • RegCloseKey (Address: 0x180011008)
  • RegCreateKeyExW (Address: 0x180011030)
  • RegDeleteKeyW (Address: 0x180011000)
  • RegDeleteValueW (Address: 0x180011038)
  • RegEnumKeyExW (Address: 0x180011018)
  • RegOpenKeyExW (Address: 0x180011020)
  • RegQueryInfoKeyW (Address: 0x180011010)
  • RegSetValueExW (Address: 0x180011028)
KERNEL32.dll
  • CancelWaitableTimer (Address: 0x1800111c8)
  • CloseHandle (Address: 0x1800110d8)
  • CreateEventW (Address: 0x180011140)
  • CreateMutexW (Address: 0x1800110e0)
  • CreateThread (Address: 0x1800111b0)
  • CreateWaitableTimerW (Address: 0x1800111a8)
  • DecodePointer (Address: 0x180011100)
  • DeleteCriticalSection (Address: 0x1800110f8)
  • EncodePointer (Address: 0x180011108)
  • EnterCriticalSection (Address: 0x180011110)
  • FindResourceW (Address: 0x1800110c0)
  • FreeLibrary (Address: 0x180011078)
  • GetCurrentProcess (Address: 0x180011198)
  • GetCurrentProcessId (Address: 0x180011148)
  • GetCurrentThreadId (Address: 0x180011160)
  • GetLastError (Address: 0x1800110a0)
  • GetModuleFileNameW (Address: 0x1800110d0)
  • GetModuleHandleW (Address: 0x180011088)
  • GetProcAddress (Address: 0x180011080)
  • GetSystemTimeAsFileTime (Address: 0x180011218)
  • GetThreadLocale (Address: 0x1800110e8)
  • InitializeCriticalSection (Address: 0x180011138)
  • InitializeCriticalSectionAndSpinCount (Address: 0x1800111f0)
  • InitializeCriticalSectionEx (Address: 0x180011120)
  • InitializeSListHead (Address: 0x180011220)
  • IsDebuggerPresent (Address: 0x180011208)
  • IsProcessorFeaturePresent (Address: 0x1800111e8)
  • IsWow64Process (Address: 0x180011190)
  • LeaveCriticalSection (Address: 0x180011118)
  • LoadLibraryExW (Address: 0x1800110c8)
  • LoadLibraryW (Address: 0x180011228)
  • LoadResource (Address: 0x1800110b8)
  • LocalFree (Address: 0x180011180)
  • lstrcmpiW (Address: 0x180011090)
  • MapViewOfFile (Address: 0x180011168)
  • MultiByteToWideChar (Address: 0x1800110a8)
  • OpenEventW (Address: 0x180011150)
  • OpenFileMappingW (Address: 0x180011238)
  • OpenMutexW (Address: 0x180011158)
  • OutputDebugStringW (Address: 0x1800111a0)
  • QueryPerformanceCounter (Address: 0x180011210)
  • QueueUserAPC (Address: 0x1800111b8)
  • RaiseException (Address: 0x180011098)
  • ReleaseMutex (Address: 0x180011130)
  • ResetEvent (Address: 0x1800111f8)
  • SetEvent (Address: 0x180011178)
  • SetThreadLocale (Address: 0x1800110f0)
  • SetUnhandledExceptionFilter (Address: 0x1800111d8)
  • SetWaitableTimer (Address: 0x1800111c0)
  • SignalObjectAndWait (Address: 0x180011188)
  • SizeofResource (Address: 0x1800110b0)
  • TerminateProcess (Address: 0x1800111e0)
  • UnhandledExceptionFilter (Address: 0x1800111d0)
  • UnmapViewOfFile (Address: 0x180011170)
  • VerSetConditionMask (Address: 0x180011230)
  • WaitForSingleObject (Address: 0x180011128)
  • WaitForSingleObjectEx (Address: 0x180011200)
ntdll.dll
  • RtlCaptureContext (Address: 0x180011438)
  • RtlLookupFunctionEntry (Address: 0x180011428)
  • RtlVirtualUnwind (Address: 0x180011430)
ole32.dll
  • CoCreateInstance (Address: 0x180011468)
  • CoGetApartmentType (Address: 0x180011450)
  • CoLockObjectExternal (Address: 0x180011470)
  • CoTaskMemAlloc (Address: 0x180011448)
  • CoTaskMemFree (Address: 0x180011458)
  • CoTaskMemRealloc (Address: 0x180011478)
  • StringFromGUID2 (Address: 0x180011460)
OLEAUT32.dll
  • LoadTypeLib (Address: 0x180011270)
  • RegisterTypeLib (Address: 0x180011258)
  • SysAllocString (Address: 0x180011268)
  • SysFreeString (Address: 0x180011278)
  • SysStringLen (Address: 0x180011248)
  • UnRegisterTypeLib (Address: 0x180011260)
  • VarUI4FromStr (Address: 0x180011250)
RPCRT4.dll
  • CStdStubBuffer_AddRef (Address: 0x1800112a0)
  • CStdStubBuffer_Connect (Address: 0x1800112e0)
  • CStdStubBuffer_CountRefs (Address: 0x1800112c0)
  • CStdStubBuffer_DebugServerQueryInterface (Address: 0x1800112b8)
  • CStdStubBuffer_DebugServerRelease (Address: 0x180011318)
  • CStdStubBuffer_Disconnect (Address: 0x180011300)
  • CStdStubBuffer_Invoke (Address: 0x180011290)
  • CStdStubBuffer_IsIIDSupported (Address: 0x1800112f0)
  • CStdStubBuffer_QueryInterface (Address: 0x1800112c8)
  • IUnknown_AddRef_Proxy (Address: 0x180011298)
  • IUnknown_QueryInterface_Proxy (Address: 0x1800112f8)
  • IUnknown_Release_Proxy (Address: 0x1800112b0)
  • NdrCStdStubBuffer_Release (Address: 0x1800112d8)
  • NdrDllCanUnloadNow (Address: 0x1800112e8)
  • NdrDllGetClassObject (Address: 0x180011308)
  • NdrDllRegisterProxy (Address: 0x180011310)
  • NdrDllUnregisterProxy (Address: 0x1800112a8)
  • NdrOleAllocate (Address: 0x1800112d0)
  • NdrOleFree (Address: 0x180011288)
SHELL32.dll
  • ShellExecuteExW (Address: 0x180011328)
ucrtbase_clr0400.dll
  • __stdio_common_vswprintf (Address: 0x1800114e0)
  • _callnewh (Address: 0x180011498)
  • _cexit (Address: 0x1800114a0)
  • _configure_narrow_argv (Address: 0x1800114c8)
  • _crt_atexit (Address: 0x1800114a8)
  • _errno (Address: 0x180011500)
  • _execute_onexit_table (Address: 0x180011528)
  • _initialize_narrow_environment (Address: 0x1800114c0)
  • _initialize_onexit_table (Address: 0x1800114b8)
  • _initterm (Address: 0x180011490)
  • _initterm_e (Address: 0x180011488)
  • _invalid_parameter_noinfo (Address: 0x180011508)
  • _recalloc (Address: 0x1800114f8)
  • _register_onexit_function (Address: 0x1800114b0)
  • _seh_filter_dll (Address: 0x1800114d0)
  • free (Address: 0x180011510)
  • malloc (Address: 0x180011518)
  • realloc (Address: 0x1800114d8)
  • wcscat_s (Address: 0x1800114e8)
  • wcscpy_s (Address: 0x1800114f0)
  • wcsncpy_s (Address: 0x180011520)
USER32.dll
  • CallNextHookEx (Address: 0x180011350)
  • CharNextW (Address: 0x180011390)
  • EqualRect (Address: 0x180011340)
  • GetDesktopWindow (Address: 0x1800113b0)
  • GetMonitorInfoW (Address: 0x180011388)
  • GetParent (Address: 0x180011360)
  • GetSystemMetrics (Address: 0x180011380)
  • GetWindow (Address: 0x180011338)
  • GetWindowRect (Address: 0x180011348)
  • GetWindowThreadProcessId (Address: 0x180011368)
  • IsWindow (Address: 0x1800113a0)
  • MonitorFromWindow (Address: 0x1800113a8)
  • MsgWaitForMultipleObjectsEx (Address: 0x180011398)
  • PeekMessageW (Address: 0x180011370)
  • SetWindowsHookExW (Address: 0x180011358)
  • UnhookWindowsHookEx (Address: 0x180011378)
VCRUNTIME140_1_CLR0400.dll
  • __CxxFrameHandler4 (Address: 0x1800113c0)
VCRUNTIME140_CLR0400.dll
  • __C_specific_handler (Address: 0x180011400)
  • __std_exception_copy (Address: 0x1800113d8)
  • __std_exception_destroy (Address: 0x1800113e0)
  • __std_type_info_destroy_list (Address: 0x180011410)
  • _CxxThrowException (Address: 0x180011418)
  • _purecall (Address: 0x1800113e8)
  • memcmp (Address: 0x1800113f0)
  • memcpy (Address: 0x1800113f8)
  • memset (Address: 0x1800113d0)
  • wcsstr (Address: 0x180011408)