pbkmigr.dll

Description: Microsoft Connection Manager Migration Lib

Authors: © Microsoft Corporation. All rights reserved.

Version: 7.2.19041.6328

Architecture: 64-bit

Operating System: Windows NT

SHA256: 0ccf2ac4bf5e64cb381ca338f380918c

File Size: 70.4 KB

Uploaded At: Dec. 1, 2025, 7:50 a.m.

Views: 5

Exported Functions

  • DllCanUnloadNow (Ordinal: 1, Address: 0x6b60)
  • DllGetClassObject (Ordinal: 2, Address: 0x68b0)
  • DllMain (Ordinal: 3, Address: 0x6520)
  • DllRegisterServer (Ordinal: 4, Address: 0x69f0)
  • DllUnregisterServer (Ordinal: 5, Address: 0x6af0)

Imported DLLs & Functions

ADVAPI32.dll
  • AdjustTokenPrivileges (Address: 0x18000b598)
  • LookupPrivilegeValueW (Address: 0x18000b5a0)
  • OpenProcessToken (Address: 0x18000b560)
  • RegCloseKey (Address: 0x18000b580)
  • RegCreateKeyExW (Address: 0x18000b568)
  • RegEnumKeyExW (Address: 0x18000b578)
  • RegOpenKeyExW (Address: 0x18000b570)
  • RegQueryInfoKeyW (Address: 0x18000b590)
  • RegSetValueExW (Address: 0x18000b588)
KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x18000b700)
  • CloseHandle (Address: 0x18000b5b0)
  • CreateFileW (Address: 0x18000b720)
  • DeleteCriticalSection (Address: 0x18000b5d0)
  • EnterCriticalSection (Address: 0x18000b738)
  • ExpandEnvironmentStringsW (Address: 0x18000b5c8)
  • FindResourceExW (Address: 0x18000b618)
  • FreeLibrary (Address: 0x18000b5c0)
  • GetCurrentProcess (Address: 0x18000b6b8)
  • GetCurrentProcessId (Address: 0x18000b6d0)
  • GetCurrentThreadId (Address: 0x18000b6d8)
  • GetEnvironmentVariableW (Address: 0x18000b638)
  • GetLastError (Address: 0x18000b5e8)
  • GetModuleFileNameW (Address: 0x18000b5f0)
  • GetModuleHandleW (Address: 0x18000b5e0)
  • GetProcAddress (Address: 0x18000b620)
  • GetProcessHeap (Address: 0x18000b688)
  • GetSystemDirectoryW (Address: 0x18000b728)
  • GetSystemInfo (Address: 0x18000b6f8)
  • GetSystemTimeAsFileTime (Address: 0x18000b6e0)
  • GetThreadLocale (Address: 0x18000b658)
  • GetTickCount (Address: 0x18000b6e8)
  • GlobalAlloc (Address: 0x18000b640)
  • GlobalFree (Address: 0x18000b648)
  • HeapAlloc (Address: 0x18000b680)
  • HeapDestroy (Address: 0x18000b690)
  • HeapFree (Address: 0x18000b678)
  • HeapReAlloc (Address: 0x18000b670)
  • HeapSize (Address: 0x18000b668)
  • InitializeCriticalSection (Address: 0x18000b650)
  • LeaveCriticalSection (Address: 0x18000b630)
  • LoadLibraryExA (Address: 0x18000b710)
  • LoadLibraryExW (Address: 0x18000b628)
  • LoadResource (Address: 0x18000b610)
  • LocalFree (Address: 0x18000b698)
  • LockResource (Address: 0x18000b608)
  • lstrcmpiW (Address: 0x18000b5f8)
  • OutputDebugStringA (Address: 0x18000b6f0)
  • QueryPerformanceCounter (Address: 0x18000b6c8)
  • RaiseException (Address: 0x18000b5d8)
  • ReleaseSRWLockExclusive (Address: 0x18000b708)
  • SetFileShortNameW (Address: 0x18000b730)
  • SetThreadLocale (Address: 0x18000b660)
  • SetUnhandledExceptionFilter (Address: 0x18000b6b0)
  • SizeofResource (Address: 0x18000b600)
  • Sleep (Address: 0x18000b6a0)
  • TerminateProcess (Address: 0x18000b6c0)
  • UnhandledExceptionFilter (Address: 0x18000b6a8)
  • VirtualProtect (Address: 0x18000b718)
  • VirtualQuery (Address: 0x18000b5b8)
msvcrt.dll
  • __C_specific_handler (Address: 0x18000b858)
  • __dllonexit (Address: 0x18000b7d0)
  • _amsg_exit (Address: 0x18000b800)
  • _callnewh (Address: 0x18000b818)
  • _CxxThrowException (Address: 0x18000b810)
  • _errno (Address: 0x18000b8a8)
  • _initterm (Address: 0x18000b7f8)
  • _lock (Address: 0x18000b7e0)
  • _onexit (Address: 0x18000b7c8)
  • _purecall (Address: 0x18000b860)
  • _unlock (Address: 0x18000b7d8)
  • _vsnwprintf (Address: 0x18000b870)
  • _wcsicmp (Address: 0x18000b868)
  • _XcptFilter (Address: 0x18000b808)
  • ??0exception@@QEAA@AEBQEBDH@Z (Address: 0x18000b838)
  • ??0exception@@QEAA@AEBV0@@Z (Address: 0x18000b830)
  • ??1exception@@UEAA@XZ (Address: 0x18000b828)
  • ??1type_info@@UEAA@XZ (Address: 0x18000b7f0)
  • ?what@exception@@UEBAPEBDXZ (Address: 0x18000b820)
  • free (Address: 0x18000b8a0)
  • malloc (Address: 0x18000b888)
  • memcmp (Address: 0x18000b850)
  • memcpy_s (Address: 0x18000b880)
  • memmove_s (Address: 0x18000b878)
  • memset (Address: 0x18000b8b0)
  • realloc (Address: 0x18000b7e8)
  • wcscat_s (Address: 0x18000b848)
  • wcscpy_s (Address: 0x18000b898)
  • wcsncpy_s (Address: 0x18000b890)
  • wprintf (Address: 0x18000b840)
ntdll.dll
  • RtlCaptureContext (Address: 0x18000b8c0)
  • RtlLookupFunctionEntry (Address: 0x18000b8c8)
  • RtlVirtualUnwind (Address: 0x18000b8d0)
RASAPI32.dll
  • GetAutoTriggerProfileInfo (Address: 0x18000b750)
  • RasEnumEntriesW (Address: 0x18000b770)
  • RasGetCustomAuthDataW (Address: 0x18000b768)
  • RasGetEntryPropertiesW (Address: 0x18000b778)
  • RasGetSubEntryPropertiesW (Address: 0x18000b788)
  • RasSetAutoTriggerProfile (Address: 0x18000b748)
  • RasSetCustomAuthDataW (Address: 0x18000b760)
  • RasSetEntryPropertiesW (Address: 0x18000b780)
  • RasSetSubEntryPropertiesW (Address: 0x18000b758)
SHELL32.dll
  • SHFileOperationW (Address: 0x18000b798)
  • SHGetFileInfoW (Address: 0x18000b7a0)
USER32.dll
  • CharNextW (Address: 0x18000b7b0)
  • UnregisterClassA (Address: 0x18000b7b8)