pidgenx.dll

Description: Pid Generation

Authors: © Microsoft Corporation. All rights reserved.

Version: 10.0.19041.3636

Architecture: 64-bit

Operating System: Windows NT

SHA256: 66c6154af2836dfdd131ac4258057816

File Size: 1.0 MB

Uploaded At: Dec. 1, 2025, 7:36 a.m.

Views: 5

Exported Functions

  • (Ordinal: 117, Address: 0x1c10)
  • GetPKeyData (Ordinal: 118, Address: 0x2f10)
  • PidGenX (Ordinal: 119, Address: 0x1b70)
  • PidGenX2 (Ordinal: 120, Address: 0x14f0)

Imported DLLs & Functions

ADVAPI32.dll
  • CryptAcquireContextW (Address: 0x1800c8a58)
  • CryptCreateHash (Address: 0x1800c8a50)
  • CryptDecrypt (Address: 0x1800c8a18)
  • CryptDestroyHash (Address: 0x1800c8a40)
  • CryptDestroyKey (Address: 0x1800c8a38)
  • CryptEncrypt (Address: 0x1800c8a20)
  • CryptExportKey (Address: 0x1800c8a00)
  • CryptGenKey (Address: 0x1800c8a28)
  • CryptGenRandom (Address: 0x1800c8a68)
  • CryptGetHashParam (Address: 0x1800c89f8)
  • CryptHashData (Address: 0x1800c8a48)
  • CryptImportKey (Address: 0x1800c8a30)
  • CryptReleaseContext (Address: 0x1800c89f0)
  • CryptSignHashA (Address: 0x1800c8a10)
  • CryptVerifySignatureA (Address: 0x1800c8a08)
  • TraceMessage (Address: 0x1800c8a60)
bcrypt.dll
  • BCryptGenRandom (Address: 0x1800c8ce0)
KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x1800c8bd0)
  • CloseHandle (Address: 0x1800c8ab8)
  • CreateEventW (Address: 0x1800c8c48)
  • CreateFileMappingW (Address: 0x1800c8c60)
  • CreateFileW (Address: 0x1800c8ac0)
  • CreateSemaphoreW (Address: 0x1800c8c50)
  • CreateThread (Address: 0x1800c8c28)
  • DeleteCriticalSection (Address: 0x1800c8c40)
  • EnterCriticalSection (Address: 0x1800c8c30)
  • ExpandEnvironmentStringsW (Address: 0x1800c8af0)
  • FileTimeToSystemTime (Address: 0x1800c8c00)
  • FreeLibrary (Address: 0x1800c8c08)
  • FreeLibraryAndExitThread (Address: 0x1800c8c18)
  • GetCurrentProcess (Address: 0x1800c8b10)
  • GetCurrentProcessId (Address: 0x1800c8b78)
  • GetCurrentThread (Address: 0x1800c8b38)
  • GetCurrentThreadId (Address: 0x1800c8b80)
  • GetFileSize (Address: 0x1800c8ac8)
  • GetLastError (Address: 0x1800c8aa0)
  • GetLocalTime (Address: 0x1800c8be8)
  • GetModuleFileNameW (Address: 0x1800c8b28)
  • GetModuleHandleExW (Address: 0x1800c8bc8)
  • GetModuleHandleW (Address: 0x1800c8b48)
  • GetProcAddress (Address: 0x1800c8a80)
  • GetProcessAffinityMask (Address: 0x1800c8ca8)
  • GetProcessHeap (Address: 0x1800c8a88)
  • GetSystemDefaultLangID (Address: 0x1800c8bf8)
  • GetSystemTimeAsFileTime (Address: 0x1800c8b88)
  • GetThreadPriority (Address: 0x1800c8ca0)
  • GetTickCount (Address: 0x1800c8b90)
  • GetVersionExA (Address: 0x1800c8a98)
  • GetVersionExW (Address: 0x1800c8bf0)
  • HeapAlloc (Address: 0x1800c8a78)
  • HeapFree (Address: 0x1800c8bb0)
  • InitializeCriticalSection (Address: 0x1800c8ba8)
  • InitializeCriticalSectionAndSpinCount (Address: 0x1800c8c58)
  • LeaveCriticalSection (Address: 0x1800c8c38)
  • LoadLibraryExW (Address: 0x1800c8b58)
  • LocalAlloc (Address: 0x1800c8aa8)
  • LocalFree (Address: 0x1800c8ab0)
  • MapViewOfFile (Address: 0x1800c8c68)
  • MultiByteToWideChar (Address: 0x1800c8ae0)
  • QueryPerformanceCounter (Address: 0x1800c8b70)
  • RaiseException (Address: 0x1800c8c78)
  • ReadFile (Address: 0x1800c8ad0)
  • ReleaseSemaphore (Address: 0x1800c8c88)
  • ReleaseSRWLockExclusive (Address: 0x1800c8bd8)
  • RtlAddFunctionTable (Address: 0x1800c8b30)
  • RtlCaptureContext (Address: 0x1800c8b00)
  • RtlDeleteFunctionTable (Address: 0x1800c8b50)
  • RtlLookupFunctionEntry (Address: 0x1800c8b98)
  • RtlVirtualUnwind (Address: 0x1800c8ba0)
  • SetEvent (Address: 0x1800c8c90)
  • SetFilePointer (Address: 0x1800c8ad8)
  • SetLastError (Address: 0x1800c8a90)
  • SetThreadPriority (Address: 0x1800c8c10)
  • SetUnhandledExceptionFilter (Address: 0x1800c8b60)
  • Sleep (Address: 0x1800c8b68)
  • SleepConditionVariableSRW (Address: 0x1800c8bb8)
  • SystemTimeToFileTime (Address: 0x1800c8be0)
  • TerminateProcess (Address: 0x1800c8b20)
  • UnhandledExceptionFilter (Address: 0x1800c8b40)
  • UnmapViewOfFile (Address: 0x1800c8c70)
  • VirtualAlloc (Address: 0x1800c8b18)
  • VirtualFree (Address: 0x1800c8b08)
  • VirtualProtect (Address: 0x1800c8af8)
  • VirtualQuery (Address: 0x1800c8c20)
  • WaitForMultipleObjects (Address: 0x1800c8c98)
  • WaitForSingleObject (Address: 0x1800c8c80)
  • WakeAllConditionVariable (Address: 0x1800c8bc0)
  • WideCharToMultiByte (Address: 0x1800c8ae8)
msvcrt.dll
  • __C_specific_handler (Address: 0x1800c8d50)
  • __dllonexit (Address: 0x1800c8d38)
  • _amsg_exit (Address: 0x1800c8d70)
  • _initterm (Address: 0x1800c8d58)
  • _itow (Address: 0x1800c8d20)
  • _itow_s (Address: 0x1800c8cf0)
  • _lock (Address: 0x1800c8d48)
  • _onexit (Address: 0x1800c8d10)
  • _purecall (Address: 0x1800c8d80)
  • _ui64tow_s (Address: 0x1800c8d28)
  • _unlock (Address: 0x1800c8d40)
  • _vsnwprintf (Address: 0x1800c8d88)
  • _wcsicmp (Address: 0x1800c8d30)
  • _wcsnicmp (Address: 0x1800c8d18)
  • _wtoi (Address: 0x1800c8d08)
  • _XcptFilter (Address: 0x1800c8d78)
  • free (Address: 0x1800c8d68)
  • log10 (Address: 0x1800c8da0)
  • malloc (Address: 0x1800c8d60)
  • memcmp (Address: 0x1800c8da8)
  • memcpy (Address: 0x1800c8db0)
  • memmove (Address: 0x1800c8db8)
  • memset (Address: 0x1800c8d00)
  • wcschr (Address: 0x1800c8d90)
  • wcscmp (Address: 0x1800c8dc0)
  • wcsncmp (Address: 0x1800c8cf8)
  • wcsstr (Address: 0x1800c8d98)
RPCRT4.dll
  • I_RpcMapWin32Status (Address: 0x1800c8cc0)
  • RpcStringFreeW (Address: 0x1800c8cd0)
  • UuidFromStringW (Address: 0x1800c8cb8)
  • UuidToStringW (Address: 0x1800c8cc8)