jpg.dll

Description:

Authors:

Version: 1.0.0.0

Architecture: 32-bit

Operating System: Windows NT

SHA256: dd5476ca0a793be6ea5ebdf0459cd966

File Size: 764.0 KB

Uploaded At: Feb. 2, 2026, 2:29 p.m.

Views: 17

Exported Functions

  • ijlGetLibVersion (Ordinal: 1, Address: 0x13aa0)
  • ijlInit (Ordinal: 2, Address: 0x11b70)
  • ijlFree (Ordinal: 3, Address: 0x122d0)
  • ijlRead (Ordinal: 4, Address: 0x12a60)
  • ijlWrite (Ordinal: 5, Address: 0x132d0)
  • ijlErrorStr (Ordinal: 6, Address: 0x13ab0)
  • GetPicture (Ordinal: 7, Address: 0x20430)
  • GetPictureInfo (Ordinal: 8, Address: 0x202f0)
  • GetPluginInfo (Ordinal: 9, Address: 0x20230)
  • GetPreview (Ordinal: 10, Address: 0x206c0)
  • IsSupported (Ordinal: 11, Address: 0x20270)

Imported DLLs & Functions

KERNEL32.dll
  • CloseHandle (Address: 0x100a5000)
  • CreateFileA (Address: 0x100a5018)
  • DeleteCriticalSection (Address: 0x100a5078)
  • EnterCriticalSection (Address: 0x100a5080)
  • ExitProcess (Address: 0x100a5040)
  • FreeEnvironmentStringsA (Address: 0x100a50b4)
  • FreeEnvironmentStringsW (Address: 0x100a50bc)
  • FreeLibrary (Address: 0x100a503c)
  • GetACP (Address: 0x100a50f0)
  • GetCommandLineA (Address: 0x100a5054)
  • GetCPInfo (Address: 0x100a50f8)
  • GetCurrentProcess (Address: 0x100a50a0)
  • GetCurrentProcessId (Address: 0x100a506c)
  • GetCurrentThreadId (Address: 0x100a504c)
  • GetEnvironmentStrings (Address: 0x100a50b8)
  • GetEnvironmentStringsW (Address: 0x100a50c4)
  • GetFileSize (Address: 0x100a5014)
  • GetFileType (Address: 0x100a50ac)
  • GetLastError (Address: 0x100a5004)
  • GetLocaleInfoA (Address: 0x100a50fc)
  • GetModuleFileNameA (Address: 0x100a5074)
  • GetModuleHandleA (Address: 0x100a5098)
  • GetOEMCP (Address: 0x100a50f4)
  • GetProcAddress (Address: 0x100a5038)
  • GetStartupInfoA (Address: 0x100a50b0)
  • GetStdHandle (Address: 0x100a50a8)
  • GetStringTypeA (Address: 0x100a5100)
  • GetStringTypeW (Address: 0x100a5108)
  • GetSystemInfo (Address: 0x100a5118)
  • GetSystemTimeAsFileTime (Address: 0x100a5070)
  • GetTickCount (Address: 0x100a5068)
  • GetVersionExA (Address: 0x100a5058)
  • HeapAlloc (Address: 0x100a505c)
  • HeapCreate (Address: 0x100a50cc)
  • HeapDestroy (Address: 0x100a50c8)
  • HeapFree (Address: 0x100a5060)
  • HeapReAlloc (Address: 0x100a50d8)
  • HeapSize (Address: 0x100a50e0)
  • InitializeCriticalSection (Address: 0x100a50e4)
  • IsBadCodePtr (Address: 0x100a50ec)
  • IsBadReadPtr (Address: 0x100a50e8)
  • IsBadWritePtr (Address: 0x100a50dc)
  • LCMapStringA (Address: 0x100a510c)
  • LCMapStringW (Address: 0x100a5110)
  • LeaveCriticalSection (Address: 0x100a507c)
  • LoadLibraryA (Address: 0x100a5034)
  • LocalAlloc (Address: 0x100a5030)
  • LocalFree (Address: 0x100a5024)
  • LocalLock (Address: 0x100a502c)
  • LocalUnlock (Address: 0x100a5028)
  • lstrcpynA (Address: 0x100a5020)
  • lstrlenA (Address: 0x100a501c)
  • MultiByteToWideChar (Address: 0x100a5104)
  • QueryPerformanceCounter (Address: 0x100a5064)
  • RaiseException (Address: 0x100a5048)
  • ReadFile (Address: 0x100a500c)
  • RtlUnwind (Address: 0x100a5044)
  • SetFilePointer (Address: 0x100a5008)
  • SetHandleCount (Address: 0x100a50a4)
  • SetLastError (Address: 0x100a508c)
  • SetUnhandledExceptionFilter (Address: 0x100a5084)
  • TerminateProcess (Address: 0x100a509c)
  • TlsAlloc (Address: 0x100a5094)
  • TlsFree (Address: 0x100a5088)
  • TlsGetValue (Address: 0x100a5090)
  • TlsSetValue (Address: 0x100a5050)
  • VirtualAlloc (Address: 0x100a50d4)
  • VirtualFree (Address: 0x100a50d0)
  • VirtualProtect (Address: 0x100a5114)
  • VirtualQuery (Address: 0x100a511c)
  • WideCharToMultiByte (Address: 0x100a50c0)
  • WriteFile (Address: 0x100a5010)