pbag.dll
Description:
Authors:
Version:
Architecture: 32-bit
Operating System:
SHA256: dca5eb7fcb53455e4ecc53c6ff035af1
File Size: 64.0 KB
Uploaded At: Dec. 3, 2025, 2:34 a.m.
Views: 6
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: OpenProcess
Exported Functions
- a (Ordinal: 1, Address: 0x1b20)
Imported DLLs & Functions
KERNEL32.dll
- CloseHandle (Address: 0x10009000)
- DeleteCriticalSection (Address: 0x1000902c)
- EnterCriticalSection (Address: 0x10009034)
- ExitProcess (Address: 0x10009010)
- FlushFileBuffers (Address: 0x100090f8)
- FreeEnvironmentStringsA (Address: 0x100090a4)
- FreeEnvironmentStringsW (Address: 0x100090ac)
- GetACP (Address: 0x100090e8)
- GetCommandLineA (Address: 0x10009018)
- GetCPInfo (Address: 0x100090d4)
- GetCurrentProcess (Address: 0x1000908c)
- GetCurrentProcessId (Address: 0x1000907c)
- GetCurrentThreadId (Address: 0x10009014)
- GetEnvironmentStrings (Address: 0x100090a8)
- GetEnvironmentStringsW (Address: 0x100090b0)
- GetFileType (Address: 0x1000909c)
- GetLastError (Address: 0x10009050)
- GetLocaleInfoA (Address: 0x100090d0)
- GetModuleFileNameA (Address: 0x10009084)
- GetModuleHandleA (Address: 0x10009070)
- GetOEMCP (Address: 0x100090ec)
- GetProcAddress (Address: 0x1000906c)
- GetStartupInfoA (Address: 0x100090a0)
- GetStdHandle (Address: 0x10009098)
- GetStringTypeA (Address: 0x100090e0)
- GetStringTypeW (Address: 0x100090e4)
- GetSystemInfo (Address: 0x100090dc)
- GetSystemTimeAsFileTime (Address: 0x10009080)
- GetTickCount (Address: 0x10009078)
- GetVersionExA (Address: 0x1000901c)
- HeapAlloc (Address: 0x10009038)
- HeapCreate (Address: 0x10009024)
- HeapDestroy (Address: 0x10009020)
- HeapFree (Address: 0x1000900c)
- HeapReAlloc (Address: 0x10009040)
- HeapSize (Address: 0x10009090)
- InitializeCriticalSection (Address: 0x100090c0)
- InterlockedExchange (Address: 0x100090c8)
- LCMapStringA (Address: 0x10009044)
- LCMapStringW (Address: 0x10009054)
- LeaveCriticalSection (Address: 0x10009030)
- LoadLibraryA (Address: 0x100090f0)
- MultiByteToWideChar (Address: 0x1000904c)
- OpenProcess (Address: 0x10009004)
- QueryPerformanceCounter (Address: 0x10009074)
- ReadProcessMemory (Address: 0x10009008)
- RtlUnwind (Address: 0x100090c4)
- SetFilePointer (Address: 0x100090bc)
- SetHandleCount (Address: 0x10009094)
- SetLastError (Address: 0x1000905c)
- SetStdHandle (Address: 0x100090f4)
- TerminateProcess (Address: 0x10009088)
- TlsAlloc (Address: 0x10009058)
- TlsFree (Address: 0x10009060)
- TlsGetValue (Address: 0x10009068)
- TlsSetValue (Address: 0x10009064)
- UnhandledExceptionFilter (Address: 0x100090b4)
- VirtualAlloc (Address: 0x1000903c)
- VirtualFree (Address: 0x10009028)
- VirtualProtect (Address: 0x100090d8)
- VirtualQuery (Address: 0x100090cc)
- WideCharToMultiByte (Address: 0x10009048)
- WriteFile (Address: 0x100090b8)