jpg.dll
Description:
Authors:
Version: 1.0.0.0
Architecture: 32-bit
Operating System: Windows NT
SHA256: dd5476ca0a793be6ea5ebdf0459cd966
File Size: 764.0 KB
Uploaded At: Feb. 2, 2026, 2:29 p.m.
Views: 17
Exported Functions
- ijlGetLibVersion (Ordinal: 1, Address: 0x13aa0)
- ijlInit (Ordinal: 2, Address: 0x11b70)
- ijlFree (Ordinal: 3, Address: 0x122d0)
- ijlRead (Ordinal: 4, Address: 0x12a60)
- ijlWrite (Ordinal: 5, Address: 0x132d0)
- ijlErrorStr (Ordinal: 6, Address: 0x13ab0)
- GetPicture (Ordinal: 7, Address: 0x20430)
- GetPictureInfo (Ordinal: 8, Address: 0x202f0)
- GetPluginInfo (Ordinal: 9, Address: 0x20230)
- GetPreview (Ordinal: 10, Address: 0x206c0)
- IsSupported (Ordinal: 11, Address: 0x20270)
Imported DLLs & Functions
KERNEL32.dll
- CloseHandle (Address: 0x100a5000)
- CreateFileA (Address: 0x100a5018)
- DeleteCriticalSection (Address: 0x100a5078)
- EnterCriticalSection (Address: 0x100a5080)
- ExitProcess (Address: 0x100a5040)
- FreeEnvironmentStringsA (Address: 0x100a50b4)
- FreeEnvironmentStringsW (Address: 0x100a50bc)
- FreeLibrary (Address: 0x100a503c)
- GetACP (Address: 0x100a50f0)
- GetCommandLineA (Address: 0x100a5054)
- GetCPInfo (Address: 0x100a50f8)
- GetCurrentProcess (Address: 0x100a50a0)
- GetCurrentProcessId (Address: 0x100a506c)
- GetCurrentThreadId (Address: 0x100a504c)
- GetEnvironmentStrings (Address: 0x100a50b8)
- GetEnvironmentStringsW (Address: 0x100a50c4)
- GetFileSize (Address: 0x100a5014)
- GetFileType (Address: 0x100a50ac)
- GetLastError (Address: 0x100a5004)
- GetLocaleInfoA (Address: 0x100a50fc)
- GetModuleFileNameA (Address: 0x100a5074)
- GetModuleHandleA (Address: 0x100a5098)
- GetOEMCP (Address: 0x100a50f4)
- GetProcAddress (Address: 0x100a5038)
- GetStartupInfoA (Address: 0x100a50b0)
- GetStdHandle (Address: 0x100a50a8)
- GetStringTypeA (Address: 0x100a5100)
- GetStringTypeW (Address: 0x100a5108)
- GetSystemInfo (Address: 0x100a5118)
- GetSystemTimeAsFileTime (Address: 0x100a5070)
- GetTickCount (Address: 0x100a5068)
- GetVersionExA (Address: 0x100a5058)
- HeapAlloc (Address: 0x100a505c)
- HeapCreate (Address: 0x100a50cc)
- HeapDestroy (Address: 0x100a50c8)
- HeapFree (Address: 0x100a5060)
- HeapReAlloc (Address: 0x100a50d8)
- HeapSize (Address: 0x100a50e0)
- InitializeCriticalSection (Address: 0x100a50e4)
- IsBadCodePtr (Address: 0x100a50ec)
- IsBadReadPtr (Address: 0x100a50e8)
- IsBadWritePtr (Address: 0x100a50dc)
- LCMapStringA (Address: 0x100a510c)
- LCMapStringW (Address: 0x100a5110)
- LeaveCriticalSection (Address: 0x100a507c)
- LoadLibraryA (Address: 0x100a5034)
- LocalAlloc (Address: 0x100a5030)
- LocalFree (Address: 0x100a5024)
- LocalLock (Address: 0x100a502c)
- LocalUnlock (Address: 0x100a5028)
- lstrcpynA (Address: 0x100a5020)
- lstrlenA (Address: 0x100a501c)
- MultiByteToWideChar (Address: 0x100a5104)
- QueryPerformanceCounter (Address: 0x100a5064)
- RaiseException (Address: 0x100a5048)
- ReadFile (Address: 0x100a500c)
- RtlUnwind (Address: 0x100a5044)
- SetFilePointer (Address: 0x100a5008)
- SetHandleCount (Address: 0x100a50a4)
- SetLastError (Address: 0x100a508c)
- SetUnhandledExceptionFilter (Address: 0x100a5084)
- TerminateProcess (Address: 0x100a509c)
- TlsAlloc (Address: 0x100a5094)
- TlsFree (Address: 0x100a5088)
- TlsGetValue (Address: 0x100a5090)
- TlsSetValue (Address: 0x100a5050)
- VirtualAlloc (Address: 0x100a50d4)
- VirtualFree (Address: 0x100a50d0)
- VirtualProtect (Address: 0x100a5114)
- VirtualQuery (Address: 0x100a511c)
- WideCharToMultiByte (Address: 0x100a50c0)
- WriteFile (Address: 0x100a5010)