Quick & dirty script for pulling info out of the Borland samples helped to provide the following statistics for libraries being used by malware:
29458 SysInit
29068 System
28330 Windows
24572 Types
20368 Messages
17403 ActiveX
16312 SysUtils
15845 SysConst
15516 ShellAPI
14179 WinInet
13267 UrlMon
12689 Classes
12594 TypInfo
11574 Variants
11574 VarUtils
10892 WinSock
10836 Consts
10801 Registry
10745 RTLConsts
10704 ShlObj
10704 RegStr
10662 IniFiles
10515 Graphics
10358 Imm
10273 CommDlg
10256 Math
10037 WinSpool
10033 Forms
10032 Controls
10031 Printers
10031 Menus
10025 StdCtrls
10007 ExtCtrls
9933 Dlgs
9907 Dialogs
9704 Clipbrd
9647 CommCtrl
9632 ImgList
9632 FlatSB
9631 StdActns
9630 ActnList
9626 MultiMon
9344 Contnrs
8858 SyncObjs
8799 StrUtils
8751 RichEdit
8739 TlHelp32
8441 Buttons
8376 HelpIntfs
8090 ComCtrls
8086 ToolWin
8086 ComStrs
7792 WinHelpViewer
7276 Mapi
7261 ListActns
7257 ExtDlgs
7165 ExtActns
7074 Themes
7071 UxTheme
6270
5086 WinSvc
5063 IdResourceStrings
5063 IdException
5061 IdGlobal
5043 IdStackConsts
5043 IdStack
5042 IdBaseComponent
5028 IdAntiFreezeBase
5013 IdComponent
5001 IdSocketHandle
4964 IdURI
4898 IdTCPClient
4871 IdIntercept
4870 IdTCPConnection
4866 IdSocks
4783 IdStackWindows
4666 IdAssignedNumbers
4648 IdStream
4645 IdIOHandler
4644 IdIOHandlerSocket
4642 IdWinSock2
4392 MMSystem
4364 jpeg
4222 IdTCPStream
4155 IdRFCReply
4103 Unit1
3997 ComObj
3931 ComConst
3868 JConsts
3177 ScktComp
3092 IdCoder
3071 IdHeaderList
2906 IdCoder3to4
2903 IdCoderMIME
2880 Reg
2706 Project1
2679 Main
2641 IdStrings
2619 ImageHlp
2509 WinSvcEx