pdm.dll

Description: Process Debug Manager

Authors: © Microsoft Corporation. All rights reserved.

Version: 17.0.157.0

Architecture: 32-bit

Operating System: Windows

SHA256: 0e9536303faf6c5bae196235315ca0a0

File Size: 454.0 KB

Uploaded At: Dec. 2, 2025, 2:41 p.m.

Views: 5

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • DllCanUnloadNow (Ordinal: 1, Address: 0x2e730)
  • DllGetClassObject (Ordinal: 2, Address: 0x2e770)
  • DllRegisterServer (Ordinal: 3, Address: 0x2e780)
  • DllUnregisterServer (Ordinal: 4, Address: 0x2e790)

Imported DLLs & Functions

ADVAPI32.dll
  • AddAce (Address: 0x1006a038)
  • CopySid (Address: 0x1006a01c)
  • EqualSid (Address: 0x1006a030)
  • GetAclInformation (Address: 0x1006a008)
  • GetLengthSid (Address: 0x1006a044)
  • GetSecurityDescriptorControl (Address: 0x1006a018)
  • GetSecurityDescriptorDacl (Address: 0x1006a004)
  • GetSecurityDescriptorGroup (Address: 0x1006a00c)
  • GetSecurityDescriptorOwner (Address: 0x1006a028)
  • GetSecurityDescriptorSacl (Address: 0x1006a000)
  • GetSidIdentifierAuthority (Address: 0x1006a074)
  • GetSidLengthRequired (Address: 0x1006a014)
  • GetSidSubAuthority (Address: 0x1006a010)
  • GetSidSubAuthorityCount (Address: 0x1006a07c)
  • GetTokenInformation (Address: 0x1006a024)
  • InitializeAcl (Address: 0x1006a040)
  • InitializeSecurityDescriptor (Address: 0x1006a03c)
  • InitializeSid (Address: 0x1006a020)
  • IsValidSid (Address: 0x1006a034)
  • MakeAbsoluteSD (Address: 0x1006a048)
  • OpenProcessToken (Address: 0x1006a078)
  • RegCloseKey (Address: 0x1006a064)
  • RegCreateKeyExW (Address: 0x1006a054)
  • RegDeleteKeyW (Address: 0x1006a050)
  • RegDeleteValueW (Address: 0x1006a060)
  • RegEnumKeyExW (Address: 0x1006a058)
  • RegEnumKeyW (Address: 0x1006a02c)
  • RegOpenKeyExW (Address: 0x1006a068)
  • RegQueryInfoKeyW (Address: 0x1006a04c)
  • RegQueryValueExW (Address: 0x1006a06c)
  • RegSetValueExW (Address: 0x1006a05c)
  • SetSecurityDescriptorDacl (Address: 0x1006a080)
  • SetSecurityDescriptorSacl (Address: 0x1006a070)
KERNEL32.dll
  • CloseHandle (Address: 0x1006a204)
  • CreateEventW (Address: 0x1006a0ec)
  • CreateFileMappingW (Address: 0x1006a0cc)
  • CreateFileW (Address: 0x1006a1ac)
  • CreateMutexW (Address: 0x1006a088)
  • CreateSemaphoreW (Address: 0x1006a1dc)
  • CreateThread (Address: 0x1006a09c)
  • DecodePointer (Address: 0x1006a1fc)
  • DeleteCriticalSection (Address: 0x1006a1f4)
  • DuplicateHandle (Address: 0x1006a0e4)
  • EncodePointer (Address: 0x1006a0a4)
  • EnterCriticalSection (Address: 0x1006a220)
  • ExitProcess (Address: 0x1006a148)
  • FindClose (Address: 0x1006a15c)
  • FindFirstFileExW (Address: 0x1006a160)
  • FindNextFileW (Address: 0x1006a164)
  • FindResourceExW (Address: 0x1006a1c8)
  • FindResourceW (Address: 0x1006a1c0)
  • FlushFileBuffers (Address: 0x1006a198)
  • FormatMessageA (Address: 0x1006a238)
  • FormatMessageW (Address: 0x1006a240)
  • FreeEnvironmentStringsW (Address: 0x1006a188)
  • FreeLibrary (Address: 0x1006a120)
  • FreeLibraryAndExitThread (Address: 0x1006a098)
  • GetACP (Address: 0x1006a16c)
  • GetCommandLineA (Address: 0x1006a178)
  • GetCommandLineW (Address: 0x1006a17c)
  • GetComputerNameW (Address: 0x1006a22c)
  • GetConsoleMode (Address: 0x1006a1a4)
  • GetConsoleOutputCP (Address: 0x1006a1a0)
  • GetCPInfo (Address: 0x1006a174)
  • GetCurrentProcess (Address: 0x1006a0d8)
  • GetCurrentProcessId (Address: 0x1006a094)
  • GetCurrentThread (Address: 0x1006a0fc)
  • GetCurrentThreadId (Address: 0x1006a08c)
  • GetEnvironmentStringsW (Address: 0x1006a184)
  • GetFileAttributesW (Address: 0x1006a100)
  • GetFileType (Address: 0x1006a158)
  • GetLastError (Address: 0x1006a20c)
  • GetModuleFileNameW (Address: 0x1006a228)
  • GetModuleHandleExW (Address: 0x1006a14c)
  • GetModuleHandleW (Address: 0x1006a1b4)
  • GetOEMCP (Address: 0x1006a170)
  • GetProcAddress (Address: 0x1006a1b8)
  • GetProcessHeap (Address: 0x1006a1f0)
  • GetStartupInfoW (Address: 0x1006a118)
  • GetStdHandle (Address: 0x1006a154)
  • GetStringTypeW (Address: 0x1006a24c)
  • GetSystemInfo (Address: 0x1006a138)
  • GetSystemTimeAsFileTime (Address: 0x1006a248)
  • GetThreadLocale (Address: 0x1006a0a0)
  • GetTickCount (Address: 0x1006a0d4)
  • GetVersion (Address: 0x1006a234)
  • GlobalAlloc (Address: 0x1006a0b0)
  • GlobalFree (Address: 0x1006a0b4)
  • GlobalLock (Address: 0x1006a0b8)
  • GlobalUnlock (Address: 0x1006a0bc)
  • HeapAlloc (Address: 0x1006a200)
  • HeapDestroy (Address: 0x1006a1f8)
  • HeapFree (Address: 0x1006a224)
  • HeapReAlloc (Address: 0x1006a208)
  • HeapSize (Address: 0x1006a210)
  • InitializeCriticalSectionAndSpinCount (Address: 0x1006a134)
  • InitializeCriticalSectionEx (Address: 0x1006a214)
  • InitializeSListHead (Address: 0x1006a124)
  • InterlockedFlushSList (Address: 0x1006a12c)
  • IsDebuggerPresent (Address: 0x1006a114)
  • IsProcessorFeaturePresent (Address: 0x1006a110)
  • IsValidCodePage (Address: 0x1006a168)
  • LCMapStringW (Address: 0x1006a150)
  • LeaveCriticalSection (Address: 0x1006a218)
  • LoadLibraryExA (Address: 0x1006a244)
  • LoadLibraryExW (Address: 0x1006a0ac)
  • LoadLibraryW (Address: 0x1006a190)
  • LoadResource (Address: 0x1006a1c4)
  • LocalFree (Address: 0x1006a23c)
  • LockResource (Address: 0x1006a1cc)
  • lstrcmpiW (Address: 0x1006a0a8)
  • MapViewOfFile (Address: 0x1006a0d0)
  • MultiByteToWideChar (Address: 0x1006a1bc)
  • OpenEventW (Address: 0x1006a0e0)
  • OpenFileMappingW (Address: 0x1006a0c0)
  • OpenProcess (Address: 0x1006a0e8)
  • OutputDebugStringW (Address: 0x1006a1a8)
  • ProcessIdToSessionId (Address: 0x1006a230)
  • QueryPerformanceCounter (Address: 0x1006a11c)
  • RaiseException (Address: 0x1006a1e0)
  • RegisterWaitForSingleObject (Address: 0x1006a0dc)
  • ReleaseMutex (Address: 0x1006a090)
  • ReleaseSemaphore (Address: 0x1006a21c)
  • RtlUnwind (Address: 0x1006a128)
  • SetEvent (Address: 0x1006a0f0)
  • SetFilePointerEx (Address: 0x1006a18c)
  • SetLastError (Address: 0x1006a130)
  • SetStdHandle (Address: 0x1006a194)
  • SetUnhandledExceptionFilter (Address: 0x1006a108)
  • SizeofResource (Address: 0x1006a1d0)
  • Sleep (Address: 0x1006a0c8)
  • TerminateProcess (Address: 0x1006a10c)
  • TlsAlloc (Address: 0x1006a1e4)
  • TlsFree (Address: 0x1006a1d4)
  • TlsGetValue (Address: 0x1006a1d8)
  • TlsSetValue (Address: 0x1006a1ec)
  • UnhandledExceptionFilter (Address: 0x1006a104)
  • UnmapViewOfFile (Address: 0x1006a0c4)
  • UnregisterWaitEx (Address: 0x1006a0f4)
  • VirtualAlloc (Address: 0x1006a13c)
  • VirtualProtect (Address: 0x1006a140)
  • VirtualQuery (Address: 0x1006a144)
  • WaitForMultipleObjects (Address: 0x1006a0f8)
  • WaitForSingleObject (Address: 0x1006a1e8)
  • WideCharToMultiByte (Address: 0x1006a180)
  • WriteConsoleW (Address: 0x1006a1b0)
  • WriteFile (Address: 0x1006a19c)
ole32.dll
  • CLSIDFromString (Address: 0x1006a358)
  • CoCreateInstance (Address: 0x1006a35c)
  • CoGetObjectContext (Address: 0x1006a318)
  • CoInitializeEx (Address: 0x1006a33c)
  • CoMarshalInterface (Address: 0x1006a350)
  • CoQueryProxyBlanket (Address: 0x1006a32c)
  • CoRegisterClassObject (Address: 0x1006a328)
  • CoRegisterMessageFilter (Address: 0x1006a334)
  • CoRegisterPSClsid (Address: 0x1006a330)
  • CoReleaseMarshalData (Address: 0x1006a354)
  • CoSetProxyBlanket (Address: 0x1006a324)
  • CoTaskMemAlloc (Address: 0x1006a320)
  • CoTaskMemFree (Address: 0x1006a340)
  • CoTaskMemRealloc (Address: 0x1006a344)
  • CoUninitialize (Address: 0x1006a338)
  • CoUnmarshalInterface (Address: 0x1006a34c)
  • CoWaitForMultipleHandles (Address: 0x1006a314)
  • CreateStreamOnHGlobal (Address: 0x1006a348)
  • StringFromGUID2 (Address: 0x1006a31c)
OLEAUT32.dll
  • SafeArrayGetDim (Address: 0x1006a294)
  • SafeArrayGetLBound (Address: 0x1006a25c)
  • SafeArrayGetUBound (Address: 0x1006a258)
  • SafeArrayPtrOfIndex (Address: 0x1006a288)
  • SysAllocString (Address: 0x1006a268)
  • SysAllocStringByteLen (Address: 0x1006a270)
  • SysAllocStringLen (Address: 0x1006a278)
  • SysFreeString (Address: 0x1006a26c)
  • SysStringByteLen (Address: 0x1006a274)
  • SysStringLen (Address: 0x1006a27c)
  • VarBstrCat (Address: 0x1006a28c)
  • VariantChangeType (Address: 0x1006a280)
  • VariantClear (Address: 0x1006a264)
  • VariantCopy (Address: 0x1006a260)
  • VariantCopyInd (Address: 0x1006a284)
  • VariantInit (Address: 0x1006a254)
  • VarUI4FromStr (Address: 0x1006a290)
RPCRT4.dll
  • CStdStubBuffer_AddRef (Address: 0x1006a2a4)
  • CStdStubBuffer_Connect (Address: 0x1006a2c8)
  • CStdStubBuffer_CountRefs (Address: 0x1006a2ac)
  • CStdStubBuffer_DebugServerQueryInterface (Address: 0x1006a29c)
  • CStdStubBuffer_DebugServerRelease (Address: 0x1006a2b8)
  • CStdStubBuffer_Disconnect (Address: 0x1006a2bc)
  • CStdStubBuffer_Invoke (Address: 0x1006a2d4)
  • CStdStubBuffer_IsIIDSupported (Address: 0x1006a2c4)
  • CStdStubBuffer_QueryInterface (Address: 0x1006a2b0)
  • IUnknown_AddRef_Proxy (Address: 0x1006a2d8)
  • IUnknown_QueryInterface_Proxy (Address: 0x1006a2c0)
  • IUnknown_Release_Proxy (Address: 0x1006a2a8)
  • NdrCStdStubBuffer_Release (Address: 0x1006a2d0)
  • NdrDllGetClassObject (Address: 0x1006a2cc)
  • NdrOleAllocate (Address: 0x1006a2b4)
  • NdrOleFree (Address: 0x1006a2a0)
USER32.dll
  • CharNextW (Address: 0x1006a2e4)
  • CreateWindowExW (Address: 0x1006a2f8)
  • DefWindowProcW (Address: 0x1006a304)
  • DestroyWindow (Address: 0x1006a2fc)
  • GetWindowLongW (Address: 0x1006a308)
  • IsWindow (Address: 0x1006a2e0)
  • MsgWaitForMultipleObjects (Address: 0x1006a30c)
  • PostMessageW (Address: 0x1006a300)
  • RegisterClassW (Address: 0x1006a2ec)
  • SendMessageW (Address: 0x1006a2f4)
  • SetWindowLongW (Address: 0x1006a2e8)
  • UnregisterClassW (Address: 0x1006a2f0)