pbcl.dll

Description:

Authors:

Version:

Architecture: 32-bit

Operating System:

SHA256: f7e2ae4c287c9048e661db8369420032

File Size: 874.4 KB

Uploaded At: Dec. 3, 2025, 2:34 a.m.

Views: 6

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • ca (Ordinal: 1, Address: 0x306a1)
  • cb (Ordinal: 2, Address: 0x30567)

Imported DLLs & Functions

ADVAPI32.dll
  • RegCloseKey (Address: 0x45e010)
  • RegEnumKeyExA (Address: 0x45e014)
  • RegEnumValueA (Address: 0x45e004)
  • RegOpenKeyExA (Address: 0x45e008)
  • RegQueryInfoKeyA (Address: 0x45e000)
  • RegQueryValueExA (Address: 0x45e00c)
DDRAW.dll
  • DirectDrawCreate (Address: 0x45e01c)
GDI32.dll
  • CreatePen (Address: 0x45e038)
  • DeleteObject (Address: 0x45e028)
  • GetSystemPaletteEntries (Address: 0x45e02c)
  • LineTo (Address: 0x45e024)
  • MoveToEx (Address: 0x45e030)
  • SelectObject (Address: 0x45e034)
KERNEL32.dll
  • CloseHandle (Address: 0x45e060)
  • CompareStringA (Address: 0x45e0cc)
  • CompareStringW (Address: 0x45e0d0)
  • CopyFileA (Address: 0x45e088)
  • CreateDirectoryA (Address: 0x45e0e8)
  • CreateFileA (Address: 0x45e0bc)
  • CreateMutexA (Address: 0x45e05c)
  • DeleteCriticalSection (Address: 0x45e14c)
  • DeleteFileA (Address: 0x45e118)
  • EnterCriticalSection (Address: 0x45e154)
  • ExitProcess (Address: 0x45e194)
  • FileTimeToLocalFileTime (Address: 0x45e10c)
  • FileTimeToSystemTime (Address: 0x45e108)
  • FindClose (Address: 0x45e0e4)
  • FindFirstFileA (Address: 0x45e110)
  • FindNextFileA (Address: 0x45e114)
  • FlushFileBuffers (Address: 0x45e174)
  • FreeEnvironmentStringsA (Address: 0x45e1a0)
  • FreeEnvironmentStringsW (Address: 0x45e1a8)
  • FreeLibrary (Address: 0x45e04c)
  • GetACP (Address: 0x45e0b0)
  • GetCommandLineA (Address: 0x45e120)
  • GetCPInfo (Address: 0x45e1bc)
  • GetCurrentDirectoryA (Address: 0x45e0dc)
  • GetCurrentProcess (Address: 0x45e07c)
  • GetCurrentProcessId (Address: 0x45e094)
  • GetCurrentThread (Address: 0x45e084)
  • GetCurrentThreadId (Address: 0x45e08c)
  • GetDriveTypeA (Address: 0x45e0d8)
  • GetEnvironmentStrings (Address: 0x45e1a4)
  • GetEnvironmentStringsW (Address: 0x45e1ac)
  • GetFileAttributesA (Address: 0x45e0fc)
  • GetFileType (Address: 0x45e184)
  • GetFullPathNameA (Address: 0x45e104)
  • GetLastError (Address: 0x45e078)
  • GetLocaleInfoA (Address: 0x45e0b4)
  • GetModuleFileNameA (Address: 0x45e068)
  • GetModuleHandleA (Address: 0x45e138)
  • GetOEMCP (Address: 0x45e0ac)
  • GetProcAddress (Address: 0x45e050)
  • GetStartupInfoA (Address: 0x45e188)
  • GetStdHandle (Address: 0x45e180)
  • GetStringTypeA (Address: 0x45e1b4)
  • GetStringTypeW (Address: 0x45e1b8)
  • GetSystemDirectoryA (Address: 0x45e0e0)
  • GetSystemInfo (Address: 0x45e098)
  • GetSystemTimeAsFileTime (Address: 0x45e0f4)
  • GetTickCount (Address: 0x45e064)
  • GetTimeZoneInformation (Address: 0x45e178)
  • GetVersionExA (Address: 0x45e09c)
  • HeapAlloc (Address: 0x45e0ec)
  • HeapCreate (Address: 0x45e15c)
  • HeapDestroy (Address: 0x45e158)
  • HeapFree (Address: 0x45e0f0)
  • HeapReAlloc (Address: 0x45e168)
  • HeapSize (Address: 0x45e19c)
  • InitializeCriticalSection (Address: 0x45e040)
  • InterlockedExchange (Address: 0x45e080)
  • IsBadCodePtr (Address: 0x45e070)
  • IsBadReadPtr (Address: 0x45e06c)
  • IsBadWritePtr (Address: 0x45e16c)
  • LCMapStringA (Address: 0x45e13c)
  • LCMapStringW (Address: 0x45e148)
  • LeaveCriticalSection (Address: 0x45e150)
  • LoadLibraryA (Address: 0x45e048)
  • MoveFileA (Address: 0x45e11c)
  • MultiByteToWideChar (Address: 0x45e144)
  • OpenProcess (Address: 0x45e074)
  • QueryPerformanceCounter (Address: 0x45e0c4)
  • ReadFile (Address: 0x45e190)
  • ReadProcessMemory (Address: 0x45e0a0)
  • ReleaseMutex (Address: 0x45e058)
  • RtlUnwind (Address: 0x45e100)
  • SetEndOfFile (Address: 0x45e0c8)
  • SetEnvironmentVariableA (Address: 0x45e0d4)
  • SetFileAttributesA (Address: 0x45e0f8)
  • SetFilePointer (Address: 0x45e18c)
  • SetHandleCount (Address: 0x45e17c)
  • SetLastError (Address: 0x45e128)
  • SetStdHandle (Address: 0x45e0b8)
  • SetUnhandledExceptionFilter (Address: 0x45e0c0)
  • Sleep (Address: 0x45e044)
  • TerminateProcess (Address: 0x45e198)
  • TlsAlloc (Address: 0x45e124)
  • TlsFree (Address: 0x45e12c)
  • TlsGetValue (Address: 0x45e134)
  • TlsSetValue (Address: 0x45e130)
  • UnhandledExceptionFilter (Address: 0x45e1b0)
  • VirtualAlloc (Address: 0x45e164)
  • VirtualFree (Address: 0x45e160)
  • VirtualProtect (Address: 0x45e0a8)
  • VirtualQuery (Address: 0x45e0a4)
  • VirtualQueryEx (Address: 0x45e090)
  • WaitForSingleObject (Address: 0x45e054)
  • WideCharToMultiByte (Address: 0x45e140)
  • WriteFile (Address: 0x45e170)
USER32.dll
  • EnumWindows (Address: 0x45e1c4)
  • GetDC (Address: 0x45e1cc)
  • GetForegroundWindow (Address: 0x45e1d4)
  • GetWindowLongA (Address: 0x45e1c8)
  • GetWindowPlacement (Address: 0x45e1dc)
  • GetWindowThreadProcessId (Address: 0x45e1d8)
  • ReleaseDC (Address: 0x45e1d0)
WSOCK32.dll
  • bind (Address: 0x45e1f4)
  • closesocket (Address: 0x45e1e8)
  • gethostbyname (Address: 0x45e218)
  • htons (Address: 0x45e208)
  • inet_addr (Address: 0x45e214)
  • inet_ntoa (Address: 0x45e200)
  • ioctlsocket (Address: 0x45e1ec)
  • ntohs (Address: 0x45e204)
  • recv (Address: 0x45e1fc)
  • recvfrom (Address: 0x45e1f8)
  • sendto (Address: 0x45e20c)
  • setsockopt (Address: 0x45e1f0)
  • socket (Address: 0x45e210)
  • WSAStartup (Address: 0x45e1e4)