Here is the beginning of the dump
kbhook.dll: file format pei-x86-64
kbhook.dll
architecture: i386:x86-64, flags 0x0000013b:
HAS_RELOC, EXEC_P, HAS_DEBUG, HAS_SYMS, HAS_LOCALS, D_PAGED
start address 0x000000006cb01420
Characteristics 0x2026
executable
line numbers stripped
large address aware
DLL
Time/Date Tue Sep 20 09:37:02 2011
Magic 020b (PE32+)
MajorLinkerVersion 2
MinorLinkerVersion 21
SizeOfCode 00003000
SizeOfInitializedData 00004800
SizeOfUninitializedData 00000a00
AddressOfEntryPoint 0000000000001420
BaseOfCode 0000000000001000
ImageBase 000000006cb00000
SectionAlignment 0000000000001000
FileAlignment 0000000000000200
MajorOSystemVersion 4
MinorOSystemVersion 0
MajorImageVersion 0
MinorImageVersion 0
MajorSubsystemVersion 5
MinorSubsystemVersion 2
Win32Version 00000000
SizeOfImage 00023000
SizeOfHeaders 00000600
CheckSum 000265ba
Subsystem 00000003 (Windows CUI)
DllCharacteristics 00000000
SizeOfStackReserve 0000000000200000
SizeOfStackCommit 0000000000001000
SizeOfHeapReserve 0000000000100000
SizeOfHeapCommit 0000000000001000
LoaderFlags 00000000
NumberOfRvaAndSizes 00000010
The Data Directory
Entry 0 0000000000007000 0000016a Export Directory [.edata (or where ever we
found it)]
Entry 1 0000000000008000 0000093c Import Directory [parts of .idata]
Entry 2 0000000000000000 00000000 Resource Directory [.rsrc]
Entry 3 0000000000000000 00000000 Exception Directory [.pdata]
Entry 4 0000000000000000 00000000 Security Directory
Entry 5 000000000000b000 00000030 Base Relocation Directory [.reloc]
Entry 6 0000000000000000 00000000 Debug Directory
Entry 7 0000000000000000 00000000 Description Directory
Entry 8 0000000000000000 00000000 Special Directory
Entry 9 000000000000a000 00000028 Thread Storage Directory [.tls]
Entry a 0000000000000000 00000000 Load Configuration Directory
Entry b 0000000000000000 00000000 Bound Import Directory
Entry c 0000000000008260 000001e8 Import Address Table Directory
Entry d 0000000000000000 00000000 Delay Import Directory
Entry e 0000000000000000 00000000 CLR Runtime Header
Entry f 0000000000000000 00000000 Reserved
There is an import table in .idata at 0x6cb08000
The Import Tables (interpreted .idata section contents)
vma: Hint Time Forward DLL First
Table Stamp Chain Name Thunk
00008000 00008078 00000000 00000000 0000881c 00008260
DLL Name: libgcc_s_sjlj-1.dll
vma: Hint/Ord Member-Name Bound-To
8448 16 _Unwind_SjLj_Register
8460 17 _Unwind_SjLj_Resume
8478 19 _Unwind_SjLj_Unregister
00008014 00008098 00000000 00000000 00008834 00008280
DLL Name: libstdc++-6.dll
vma: Hint/Ord Member-Name Bound-To
8494 3417 __gxx_personality_sj0
00008028 000080a8 00000000 00000000 000088a4 00008290
DLL Name: KERNEL32.dll
vma: Hint/Ord Member-Name Bound-To
84ac 215 DeleteCriticalSection
84c4 247 EnterCriticalSection
84dc 460 GetCurrentProcess
84f0 461 GetCurrentProcessId
8506 465 GetCurrentThreadId
851c 527 GetLastError
852c 547 GetModuleHandleA
8540 649 GetSystemTimeAsFileTime
855a 675 GetTickCount
856a 759 InitializeCriticalSection
8586 841 LeaveCriticalSection
859e 847 LoadLibraryW
85ae 952 QueryPerformanceCounter
85c8 1024 RtlAddFunctionTable
85de 1025 RtlCaptureContext
85f2 1032 RtlLookupFunctionEntry
860c 1039 RtlVirtualUnwind
8620 1182 SetUnhandledExceptionFilter
863e 1195 Sleep
8646 1209 TerminateProcess
865a 1216 TlsGetValue
8668 1229 UnhandledExceptionFilter
8684 1259 VirtualProtect
8696 1261 VirtualQuery
0000803c 00008170 00000000 00000000 00008900 00008358
DLL Name: msvcrt.dll
vma: Hint/Ord Member-Name Bound-To
86a6 78 __dllonexit
86b4 83 __iob_func
86c2 121 _amsg_exit
86d0 297 _initterm
86dc 400 _lock
86e4 566 _onexit
86ee 734 _unlock
86f8 934 abort
8700 948 calloc
870a 980 free
8712 991 fwrite
871c 1036 malloc
8726 1044 memcpy
8730 1048 memset
873a 1056 puts
8742 1074 signal
874c 1094 strlen
8756 1097 strncmp
8760 1129 vfprintf
00008050 00008210 00000000 00000000 00008930 000083f8
DLL Name: USER32.dll
vma: Hint/Ord Member-Name Bound-To
876c 26 CallNextHookEx
877e 162 DispatchMessageA
8792 317 GetMessageA
87a0 523 PostThreadMessageA
87b6 578 SendInput
87c2 662 SetWindowsHookExA
87d6 694 TranslateMessage
87ea 698 UnhookWindowsHookEx
8800 724 VkKeyScanA
00008064 00000000 00000000 00000000 00000000 00000000
There is an export table in .edata at 0x6cb07000
The Export Tables (interpreted .edata section contents)
Export Flags 0
Time/Date stamp 4e78429e
Major/Minor 0/0
Name 000000000000705a kbhook.dll
Ordinal Base 1
Number in:
Export Address Table 00000005
[Name Pointer/Ordinal] Table 00000005
Table Addresses
Export Address Table 0000000000007028
Name Pointer Table 000000000000703c
Ordinal Table 0000000000007050
Export Address Table -- Ordinal Base 1
[ 0] +base[ 1] 1f06 Export RVA
[ 1] +base[ 2] 23da Export RVA
[ 2] +base[ 3] 1e56 Export RVA
[ 3] +base[ 4] 1e77 Export RVA
[ 4] +base[ 5] 24fd Export RVA
[Ordinal/Name Pointer] Table
[ 0] Java_ch_unifr_dokpe_shortkeys_KbHook_pastFromClpb
[ 1] Java_ch_unifr_dokpe_shortkeys_KbHook_registerHook
[ 2] Java_ch_unifr_dokpe_shortkeys_KbHook_releaseExtendedKeys
[ 3] Java_ch_unifr_dokpe_shortkeys_KbHook_sendToKeyboard
[ 4] Java_ch_unifr_dokpe_shortkeys_KbHook_unRegisterHook
PE File Base Relocations (interpreted .reloc section contents)
Virtual Address: 00004000 Chunk size 16 (0x10) Number of fixups 4
reloc 0 offset 10 [4010] DIR64
reloc 1 offset 20 [4020] DIR64
reloc 2 offset 30 [4030] DIR64
reloc 3 offset 38 [4038] DIR64
Virtual Address: 00009000 Chunk size 16 (0x10) Number of fixups 4
reloc 0 offset 18 [9018] DIR64
reloc 1 offset 30 [9030] DIR64
reloc 2 offset 38 [9038] DIR64
reloc 3 offset 0 [9000] ABSOLUTE
Virtual Address: 0000a000 Chunk size 16 (0x10) Number of fixups 4
reloc 0 offset 0 [a000] DIR64
reloc 1 offset 8 [a008] DIR64
reloc 2 offset 10 [a010] DIR64
reloc 3 offset 18 [a018] DIR64
Sections:
Idx Name Size VMA LMA File off Algn
0 .text 00002fa4 000000006cb01000 000000006cb01000 00000600 2**4
CONTENTS, ALLOC, LOAD, READONLY, CODE, DATA
1 .data 00000070 000000006cb04000 000000006cb04000 00003600 2**4
CONTENTS, ALLOC, LOAD, DATA
2 .rdata 000002c0 000000006cb05000 000000006cb05000 00003800 2**4
CONTENTS, ALLOC, LOAD, READONLY, DATA
3 .bss 000009a0 000000006cb06000 000000006cb06000 00000000 2**5
ALLOC
4 .edata 0000016a 000000006cb07000 000000006cb07000 00003c00 2**2
CONTENTS, ALLOC, LOAD, READONLY, DATA
5 .idata 0000093c 000000006cb08000 000000006cb08000 00003e00 2**2
CONTENTS, ALLOC, LOAD, DATA
6 .CRT 00000058 000000006cb09000 000000006cb09000 00004800 2**3
CONTENTS, ALLOC, LOAD, DATA
7 .tls 00000048 000000006cb0a000 000000006cb0a000 00004a00 2**5
CONTENTS, ALLOC, LOAD, DATA
8 .reloc 00000030 000000006cb0b000 000000006cb0b000 00004c00 2**2
CONTENTS, ALLOC, LOAD, READONLY, DATA
9 .debug_aranges 00000270 000000006cb0c000 000000006cb0c000 00004e00 2**4
CONTENTS, READONLY, DEBUGGING
10 .debug_pubnames 0000069b 000000006cb0d000 000000006cb0d000 00005200 2**0
CONTENTS, READONLY, DEBUGGING
11 .debug_pubtypes 00000d45 000000006cb0e000 000000006cb0e000 00005a00 2**0
CONTENTS, READONLY, DEBUGGING
12 .debug_info 00008175 000000006cb0f000 000000006cb0f000 00006800 2**0
CONTENTS, READONLY, DEBUGGING
13 .debug_abbrev 00001092 000000006cb18000 000000006cb18000 0000ea00 2**0
CONTENTS, READONLY, DEBUGGING
14 .debug_line 000016f6 000000006cb1a000 000000006cb1a000 0000fc00 2**0
CONTENTS, READONLY, DEBUGGING
15 .debug_frame 00000890 000000006cb1c000 000000006cb1c000 00011400 2**3
CONTENTS, READONLY, DEBUGGING
16 .debug_str 000002c9 000000006cb1d000 000000006cb1d000 00011e00 2**0
CONTENTS, READONLY, DEBUGGING
17 .debug_loc 00003997 000000006cb1e000 000000006cb1e000 00012200 2**0
CONTENTS, READONLY, DEBUGGING
18 .debug_ranges 00000680 000000006cb22000 000000006cb22000 00015c00 2**0
CONTENTS, READONLY, DEBUGGING
SYMBOL TABLE:
.....
François
-----Original Message-----
From: Kai Tietz [mailto:[email protected]]
Sent: mardi, 20. septembre 2011 09:59
To: [email protected]
Subject: Re: [Mingw-w64-public] Compiling a dll for JNI and java 64 bits
So,
Hmm, could you show me the dump of this DLL with objdump?
Call for this 'x86_64-w64-mingw32-objdump -x <dll-name> >dump.txt', and attach
me this file to mail. I am mainly interested in the export-section of this DLL.
Thanks,
Kai
------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure contains a
definitive record of customers, application performance, security threats,
fraudulent activity and more. Splunk takes this data and makes sense of it.
Business sense. IT sense. Common sense.
http://p.sf.net/sfu/splunk-d2dcopy1
_______________________________________________
Mingw-w64-public mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/mingw-w64-public
------------------------------------------------------------------------------
All the data continuously generated in your IT infrastructure contains a
definitive record of customers, application performance, security
threats, fraudulent activity and more. Splunk takes this data and makes
sense of it. Business sense. IT sense. Common sense.
http://p.sf.net/sfu/splunk-d2dcopy1
_______________________________________________
Mingw-w64-public mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/mingw-w64-public