pbcl.dll
Description:
Authors:
Version:
Architecture: 32-bit
Operating System:
SHA256: f7e2ae4c287c9048e661db8369420032
File Size: 874.4 KB
Uploaded At: Dec. 3, 2025, 2:34 a.m.
Views: 6
Security Warning
This file has been flagged as potentially dangerous.
Reason: Detected potentially dangerous functions used for process injection: OpenProcess
Exported Functions
- ca (Ordinal: 1, Address: 0x306a1)
- cb (Ordinal: 2, Address: 0x30567)
Imported DLLs & Functions
ADVAPI32.dll
- RegCloseKey (Address: 0x45e010)
- RegEnumKeyExA (Address: 0x45e014)
- RegEnumValueA (Address: 0x45e004)
- RegOpenKeyExA (Address: 0x45e008)
- RegQueryInfoKeyA (Address: 0x45e000)
- RegQueryValueExA (Address: 0x45e00c)
DDRAW.dll
- DirectDrawCreate (Address: 0x45e01c)
GDI32.dll
- CreatePen (Address: 0x45e038)
- DeleteObject (Address: 0x45e028)
- GetSystemPaletteEntries (Address: 0x45e02c)
- LineTo (Address: 0x45e024)
- MoveToEx (Address: 0x45e030)
- SelectObject (Address: 0x45e034)
KERNEL32.dll
- CloseHandle (Address: 0x45e060)
- CompareStringA (Address: 0x45e0cc)
- CompareStringW (Address: 0x45e0d0)
- CopyFileA (Address: 0x45e088)
- CreateDirectoryA (Address: 0x45e0e8)
- CreateFileA (Address: 0x45e0bc)
- CreateMutexA (Address: 0x45e05c)
- DeleteCriticalSection (Address: 0x45e14c)
- DeleteFileA (Address: 0x45e118)
- EnterCriticalSection (Address: 0x45e154)
- ExitProcess (Address: 0x45e194)
- FileTimeToLocalFileTime (Address: 0x45e10c)
- FileTimeToSystemTime (Address: 0x45e108)
- FindClose (Address: 0x45e0e4)
- FindFirstFileA (Address: 0x45e110)
- FindNextFileA (Address: 0x45e114)
- FlushFileBuffers (Address: 0x45e174)
- FreeEnvironmentStringsA (Address: 0x45e1a0)
- FreeEnvironmentStringsW (Address: 0x45e1a8)
- FreeLibrary (Address: 0x45e04c)
- GetACP (Address: 0x45e0b0)
- GetCommandLineA (Address: 0x45e120)
- GetCPInfo (Address: 0x45e1bc)
- GetCurrentDirectoryA (Address: 0x45e0dc)
- GetCurrentProcess (Address: 0x45e07c)
- GetCurrentProcessId (Address: 0x45e094)
- GetCurrentThread (Address: 0x45e084)
- GetCurrentThreadId (Address: 0x45e08c)
- GetDriveTypeA (Address: 0x45e0d8)
- GetEnvironmentStrings (Address: 0x45e1a4)
- GetEnvironmentStringsW (Address: 0x45e1ac)
- GetFileAttributesA (Address: 0x45e0fc)
- GetFileType (Address: 0x45e184)
- GetFullPathNameA (Address: 0x45e104)
- GetLastError (Address: 0x45e078)
- GetLocaleInfoA (Address: 0x45e0b4)
- GetModuleFileNameA (Address: 0x45e068)
- GetModuleHandleA (Address: 0x45e138)
- GetOEMCP (Address: 0x45e0ac)
- GetProcAddress (Address: 0x45e050)
- GetStartupInfoA (Address: 0x45e188)
- GetStdHandle (Address: 0x45e180)
- GetStringTypeA (Address: 0x45e1b4)
- GetStringTypeW (Address: 0x45e1b8)
- GetSystemDirectoryA (Address: 0x45e0e0)
- GetSystemInfo (Address: 0x45e098)
- GetSystemTimeAsFileTime (Address: 0x45e0f4)
- GetTickCount (Address: 0x45e064)
- GetTimeZoneInformation (Address: 0x45e178)
- GetVersionExA (Address: 0x45e09c)
- HeapAlloc (Address: 0x45e0ec)
- HeapCreate (Address: 0x45e15c)
- HeapDestroy (Address: 0x45e158)
- HeapFree (Address: 0x45e0f0)
- HeapReAlloc (Address: 0x45e168)
- HeapSize (Address: 0x45e19c)
- InitializeCriticalSection (Address: 0x45e040)
- InterlockedExchange (Address: 0x45e080)
- IsBadCodePtr (Address: 0x45e070)
- IsBadReadPtr (Address: 0x45e06c)
- IsBadWritePtr (Address: 0x45e16c)
- LCMapStringA (Address: 0x45e13c)
- LCMapStringW (Address: 0x45e148)
- LeaveCriticalSection (Address: 0x45e150)
- LoadLibraryA (Address: 0x45e048)
- MoveFileA (Address: 0x45e11c)
- MultiByteToWideChar (Address: 0x45e144)
- OpenProcess (Address: 0x45e074)
- QueryPerformanceCounter (Address: 0x45e0c4)
- ReadFile (Address: 0x45e190)
- ReadProcessMemory (Address: 0x45e0a0)
- ReleaseMutex (Address: 0x45e058)
- RtlUnwind (Address: 0x45e100)
- SetEndOfFile (Address: 0x45e0c8)
- SetEnvironmentVariableA (Address: 0x45e0d4)
- SetFileAttributesA (Address: 0x45e0f8)
- SetFilePointer (Address: 0x45e18c)
- SetHandleCount (Address: 0x45e17c)
- SetLastError (Address: 0x45e128)
- SetStdHandle (Address: 0x45e0b8)
- SetUnhandledExceptionFilter (Address: 0x45e0c0)
- Sleep (Address: 0x45e044)
- TerminateProcess (Address: 0x45e198)
- TlsAlloc (Address: 0x45e124)
- TlsFree (Address: 0x45e12c)
- TlsGetValue (Address: 0x45e134)
- TlsSetValue (Address: 0x45e130)
- UnhandledExceptionFilter (Address: 0x45e1b0)
- VirtualAlloc (Address: 0x45e164)
- VirtualFree (Address: 0x45e160)
- VirtualProtect (Address: 0x45e0a8)
- VirtualQuery (Address: 0x45e0a4)
- VirtualQueryEx (Address: 0x45e090)
- WaitForSingleObject (Address: 0x45e054)
- WideCharToMultiByte (Address: 0x45e140)
- WriteFile (Address: 0x45e170)
USER32.dll
- EnumWindows (Address: 0x45e1c4)
- GetDC (Address: 0x45e1cc)
- GetForegroundWindow (Address: 0x45e1d4)
- GetWindowLongA (Address: 0x45e1c8)
- GetWindowPlacement (Address: 0x45e1dc)
- GetWindowThreadProcessId (Address: 0x45e1d8)
- ReleaseDC (Address: 0x45e1d0)
WSOCK32.dll
- bind (Address: 0x45e1f4)
- closesocket (Address: 0x45e1e8)
- gethostbyname (Address: 0x45e218)
- htons (Address: 0x45e208)
- inet_addr (Address: 0x45e214)
- inet_ntoa (Address: 0x45e200)
- ioctlsocket (Address: 0x45e1ec)
- ntohs (Address: 0x45e204)
- recv (Address: 0x45e1fc)
- recvfrom (Address: 0x45e1f8)
- sendto (Address: 0x45e20c)
- setsockopt (Address: 0x45e1f0)
- socket (Address: 0x45e210)
- WSAStartup (Address: 0x45e1e4)