pdm.dll
Description: Process Debug Manager
Authors: © Microsoft Corporation. All rights reserved.
Version: 17.0.157.0
Architecture: 32-bit
Operating System: Windows
SHA256: 0e9536303faf6c5bae196235315ca0a0
File Size: 454.0 KB
Uploaded At: Dec. 2, 2025, 2:41 p.m.
Views: 5
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: OpenProcess
Exported Functions
- DllCanUnloadNow (Ordinal: 1, Address: 0x2e730)
- DllGetClassObject (Ordinal: 2, Address: 0x2e770)
- DllRegisterServer (Ordinal: 3, Address: 0x2e780)
- DllUnregisterServer (Ordinal: 4, Address: 0x2e790)
Imported DLLs & Functions
ADVAPI32.dll
- AddAce (Address: 0x1006a038)
- CopySid (Address: 0x1006a01c)
- EqualSid (Address: 0x1006a030)
- GetAclInformation (Address: 0x1006a008)
- GetLengthSid (Address: 0x1006a044)
- GetSecurityDescriptorControl (Address: 0x1006a018)
- GetSecurityDescriptorDacl (Address: 0x1006a004)
- GetSecurityDescriptorGroup (Address: 0x1006a00c)
- GetSecurityDescriptorOwner (Address: 0x1006a028)
- GetSecurityDescriptorSacl (Address: 0x1006a000)
- GetSidIdentifierAuthority (Address: 0x1006a074)
- GetSidLengthRequired (Address: 0x1006a014)
- GetSidSubAuthority (Address: 0x1006a010)
- GetSidSubAuthorityCount (Address: 0x1006a07c)
- GetTokenInformation (Address: 0x1006a024)
- InitializeAcl (Address: 0x1006a040)
- InitializeSecurityDescriptor (Address: 0x1006a03c)
- InitializeSid (Address: 0x1006a020)
- IsValidSid (Address: 0x1006a034)
- MakeAbsoluteSD (Address: 0x1006a048)
- OpenProcessToken (Address: 0x1006a078)
- RegCloseKey (Address: 0x1006a064)
- RegCreateKeyExW (Address: 0x1006a054)
- RegDeleteKeyW (Address: 0x1006a050)
- RegDeleteValueW (Address: 0x1006a060)
- RegEnumKeyExW (Address: 0x1006a058)
- RegEnumKeyW (Address: 0x1006a02c)
- RegOpenKeyExW (Address: 0x1006a068)
- RegQueryInfoKeyW (Address: 0x1006a04c)
- RegQueryValueExW (Address: 0x1006a06c)
- RegSetValueExW (Address: 0x1006a05c)
- SetSecurityDescriptorDacl (Address: 0x1006a080)
- SetSecurityDescriptorSacl (Address: 0x1006a070)
KERNEL32.dll
- CloseHandle (Address: 0x1006a204)
- CreateEventW (Address: 0x1006a0ec)
- CreateFileMappingW (Address: 0x1006a0cc)
- CreateFileW (Address: 0x1006a1ac)
- CreateMutexW (Address: 0x1006a088)
- CreateSemaphoreW (Address: 0x1006a1dc)
- CreateThread (Address: 0x1006a09c)
- DecodePointer (Address: 0x1006a1fc)
- DeleteCriticalSection (Address: 0x1006a1f4)
- DuplicateHandle (Address: 0x1006a0e4)
- EncodePointer (Address: 0x1006a0a4)
- EnterCriticalSection (Address: 0x1006a220)
- ExitProcess (Address: 0x1006a148)
- FindClose (Address: 0x1006a15c)
- FindFirstFileExW (Address: 0x1006a160)
- FindNextFileW (Address: 0x1006a164)
- FindResourceExW (Address: 0x1006a1c8)
- FindResourceW (Address: 0x1006a1c0)
- FlushFileBuffers (Address: 0x1006a198)
- FormatMessageA (Address: 0x1006a238)
- FormatMessageW (Address: 0x1006a240)
- FreeEnvironmentStringsW (Address: 0x1006a188)
- FreeLibrary (Address: 0x1006a120)
- FreeLibraryAndExitThread (Address: 0x1006a098)
- GetACP (Address: 0x1006a16c)
- GetCommandLineA (Address: 0x1006a178)
- GetCommandLineW (Address: 0x1006a17c)
- GetComputerNameW (Address: 0x1006a22c)
- GetConsoleMode (Address: 0x1006a1a4)
- GetConsoleOutputCP (Address: 0x1006a1a0)
- GetCPInfo (Address: 0x1006a174)
- GetCurrentProcess (Address: 0x1006a0d8)
- GetCurrentProcessId (Address: 0x1006a094)
- GetCurrentThread (Address: 0x1006a0fc)
- GetCurrentThreadId (Address: 0x1006a08c)
- GetEnvironmentStringsW (Address: 0x1006a184)
- GetFileAttributesW (Address: 0x1006a100)
- GetFileType (Address: 0x1006a158)
- GetLastError (Address: 0x1006a20c)
- GetModuleFileNameW (Address: 0x1006a228)
- GetModuleHandleExW (Address: 0x1006a14c)
- GetModuleHandleW (Address: 0x1006a1b4)
- GetOEMCP (Address: 0x1006a170)
- GetProcAddress (Address: 0x1006a1b8)
- GetProcessHeap (Address: 0x1006a1f0)
- GetStartupInfoW (Address: 0x1006a118)
- GetStdHandle (Address: 0x1006a154)
- GetStringTypeW (Address: 0x1006a24c)
- GetSystemInfo (Address: 0x1006a138)
- GetSystemTimeAsFileTime (Address: 0x1006a248)
- GetThreadLocale (Address: 0x1006a0a0)
- GetTickCount (Address: 0x1006a0d4)
- GetVersion (Address: 0x1006a234)
- GlobalAlloc (Address: 0x1006a0b0)
- GlobalFree (Address: 0x1006a0b4)
- GlobalLock (Address: 0x1006a0b8)
- GlobalUnlock (Address: 0x1006a0bc)
- HeapAlloc (Address: 0x1006a200)
- HeapDestroy (Address: 0x1006a1f8)
- HeapFree (Address: 0x1006a224)
- HeapReAlloc (Address: 0x1006a208)
- HeapSize (Address: 0x1006a210)
- InitializeCriticalSectionAndSpinCount (Address: 0x1006a134)
- InitializeCriticalSectionEx (Address: 0x1006a214)
- InitializeSListHead (Address: 0x1006a124)
- InterlockedFlushSList (Address: 0x1006a12c)
- IsDebuggerPresent (Address: 0x1006a114)
- IsProcessorFeaturePresent (Address: 0x1006a110)
- IsValidCodePage (Address: 0x1006a168)
- LCMapStringW (Address: 0x1006a150)
- LeaveCriticalSection (Address: 0x1006a218)
- LoadLibraryExA (Address: 0x1006a244)
- LoadLibraryExW (Address: 0x1006a0ac)
- LoadLibraryW (Address: 0x1006a190)
- LoadResource (Address: 0x1006a1c4)
- LocalFree (Address: 0x1006a23c)
- LockResource (Address: 0x1006a1cc)
- lstrcmpiW (Address: 0x1006a0a8)
- MapViewOfFile (Address: 0x1006a0d0)
- MultiByteToWideChar (Address: 0x1006a1bc)
- OpenEventW (Address: 0x1006a0e0)
- OpenFileMappingW (Address: 0x1006a0c0)
- OpenProcess (Address: 0x1006a0e8)
- OutputDebugStringW (Address: 0x1006a1a8)
- ProcessIdToSessionId (Address: 0x1006a230)
- QueryPerformanceCounter (Address: 0x1006a11c)
- RaiseException (Address: 0x1006a1e0)
- RegisterWaitForSingleObject (Address: 0x1006a0dc)
- ReleaseMutex (Address: 0x1006a090)
- ReleaseSemaphore (Address: 0x1006a21c)
- RtlUnwind (Address: 0x1006a128)
- SetEvent (Address: 0x1006a0f0)
- SetFilePointerEx (Address: 0x1006a18c)
- SetLastError (Address: 0x1006a130)
- SetStdHandle (Address: 0x1006a194)
- SetUnhandledExceptionFilter (Address: 0x1006a108)
- SizeofResource (Address: 0x1006a1d0)
- Sleep (Address: 0x1006a0c8)
- TerminateProcess (Address: 0x1006a10c)
- TlsAlloc (Address: 0x1006a1e4)
- TlsFree (Address: 0x1006a1d4)
- TlsGetValue (Address: 0x1006a1d8)
- TlsSetValue (Address: 0x1006a1ec)
- UnhandledExceptionFilter (Address: 0x1006a104)
- UnmapViewOfFile (Address: 0x1006a0c4)
- UnregisterWaitEx (Address: 0x1006a0f4)
- VirtualAlloc (Address: 0x1006a13c)
- VirtualProtect (Address: 0x1006a140)
- VirtualQuery (Address: 0x1006a144)
- WaitForMultipleObjects (Address: 0x1006a0f8)
- WaitForSingleObject (Address: 0x1006a1e8)
- WideCharToMultiByte (Address: 0x1006a180)
- WriteConsoleW (Address: 0x1006a1b0)
- WriteFile (Address: 0x1006a19c)
ole32.dll
- CLSIDFromString (Address: 0x1006a358)
- CoCreateInstance (Address: 0x1006a35c)
- CoGetObjectContext (Address: 0x1006a318)
- CoInitializeEx (Address: 0x1006a33c)
- CoMarshalInterface (Address: 0x1006a350)
- CoQueryProxyBlanket (Address: 0x1006a32c)
- CoRegisterClassObject (Address: 0x1006a328)
- CoRegisterMessageFilter (Address: 0x1006a334)
- CoRegisterPSClsid (Address: 0x1006a330)
- CoReleaseMarshalData (Address: 0x1006a354)
- CoSetProxyBlanket (Address: 0x1006a324)
- CoTaskMemAlloc (Address: 0x1006a320)
- CoTaskMemFree (Address: 0x1006a340)
- CoTaskMemRealloc (Address: 0x1006a344)
- CoUninitialize (Address: 0x1006a338)
- CoUnmarshalInterface (Address: 0x1006a34c)
- CoWaitForMultipleHandles (Address: 0x1006a314)
- CreateStreamOnHGlobal (Address: 0x1006a348)
- StringFromGUID2 (Address: 0x1006a31c)
OLEAUT32.dll
- SafeArrayGetDim (Address: 0x1006a294)
- SafeArrayGetLBound (Address: 0x1006a25c)
- SafeArrayGetUBound (Address: 0x1006a258)
- SafeArrayPtrOfIndex (Address: 0x1006a288)
- SysAllocString (Address: 0x1006a268)
- SysAllocStringByteLen (Address: 0x1006a270)
- SysAllocStringLen (Address: 0x1006a278)
- SysFreeString (Address: 0x1006a26c)
- SysStringByteLen (Address: 0x1006a274)
- SysStringLen (Address: 0x1006a27c)
- VarBstrCat (Address: 0x1006a28c)
- VariantChangeType (Address: 0x1006a280)
- VariantClear (Address: 0x1006a264)
- VariantCopy (Address: 0x1006a260)
- VariantCopyInd (Address: 0x1006a284)
- VariantInit (Address: 0x1006a254)
- VarUI4FromStr (Address: 0x1006a290)
RPCRT4.dll
- CStdStubBuffer_AddRef (Address: 0x1006a2a4)
- CStdStubBuffer_Connect (Address: 0x1006a2c8)
- CStdStubBuffer_CountRefs (Address: 0x1006a2ac)
- CStdStubBuffer_DebugServerQueryInterface (Address: 0x1006a29c)
- CStdStubBuffer_DebugServerRelease (Address: 0x1006a2b8)
- CStdStubBuffer_Disconnect (Address: 0x1006a2bc)
- CStdStubBuffer_Invoke (Address: 0x1006a2d4)
- CStdStubBuffer_IsIIDSupported (Address: 0x1006a2c4)
- CStdStubBuffer_QueryInterface (Address: 0x1006a2b0)
- IUnknown_AddRef_Proxy (Address: 0x1006a2d8)
- IUnknown_QueryInterface_Proxy (Address: 0x1006a2c0)
- IUnknown_Release_Proxy (Address: 0x1006a2a8)
- NdrCStdStubBuffer_Release (Address: 0x1006a2d0)
- NdrDllGetClassObject (Address: 0x1006a2cc)
- NdrOleAllocate (Address: 0x1006a2b4)
- NdrOleFree (Address: 0x1006a2a0)
USER32.dll
- CharNextW (Address: 0x1006a2e4)
- CreateWindowExW (Address: 0x1006a2f8)
- DefWindowProcW (Address: 0x1006a304)
- DestroyWindow (Address: 0x1006a2fc)
- GetWindowLongW (Address: 0x1006a308)
- IsWindow (Address: 0x1006a2e0)
- MsgWaitForMultipleObjects (Address: 0x1006a30c)
- PostMessageW (Address: 0x1006a300)
- RegisterClassW (Address: 0x1006a2ec)
- SendMessageW (Address: 0x1006a2f4)
- SetWindowLongW (Address: 0x1006a2e8)
- UnregisterClassW (Address: 0x1006a2f0)