blb_ps.dll

Description: Microsoft® Block Level Backup proxy/stub

Authors: © Microsoft Corporation. All rights reserved.

Version: 10.0.19041.1

Architecture: 64-bit

Operating System: Windows NT

SHA256: 68ed227d4ceb4e7d3945672f64620cb1

File Size: 65.0 KB

Uploaded At: Dec. 1, 2025, 7:23 a.m.

Views: 15

Exported Functions

  • DllCanUnloadNow (Ordinal: 1, Address: 0x1270)
  • DllGetClassObject (Ordinal: 2, Address: 0x1220)
  • DllRegisterServer (Ordinal: 3, Address: 0x12e0)
  • DllUnregisterServer (Ordinal: 4, Address: 0x1320)
  • GetProxyDllInfo (Ordinal: 5, Address: 0x11f0)

Imported DLLs & Functions

combase.dll
  • (Address: 0x18000b9b0)
  • (Address: 0x18000b910)
  • (Address: 0x18000b918)
  • (Address: 0x18000b920)
  • (Address: 0x18000b928)
  • (Address: 0x18000b930)
  • (Address: 0x18000b938)
  • (Address: 0x18000b940)
  • (Address: 0x18000b948)
  • (Address: 0x18000b950)
  • (Address: 0x18000b958)
  • (Address: 0x18000b968)
  • (Address: 0x18000b970)
  • (Address: 0x18000b978)
  • (Address: 0x18000b980)
  • (Address: 0x18000b988)
  • (Address: 0x18000b990)
  • (Address: 0x18000b998)
  • (Address: 0x18000b9a0)
  • (Address: 0x18000b9a8)
  • (Address: 0x18000b960)
KERNEL32.dll
  • DisableThreadLibraryCalls (Address: 0x18000b860)
  • GetCurrentProcess (Address: 0x18000b808)
  • GetCurrentProcessId (Address: 0x18000b7f8)
  • GetCurrentThreadId (Address: 0x18000b848)
  • GetSystemTimeAsFileTime (Address: 0x18000b840)
  • GetTickCount (Address: 0x18000b838)
  • QueryPerformanceCounter (Address: 0x18000b850)
  • RtlCaptureContext (Address: 0x18000b830)
  • RtlLookupFunctionEntry (Address: 0x18000b828)
  • RtlVirtualUnwind (Address: 0x18000b820)
  • SetUnhandledExceptionFilter (Address: 0x18000b810)
  • Sleep (Address: 0x18000b858)
  • TerminateProcess (Address: 0x18000b800)
  • UnhandledExceptionFilter (Address: 0x18000b818)
msvcrt.dll
  • __C_specific_handler (Address: 0x18000b9e8)
  • _amsg_exit (Address: 0x18000b9d8)
  • _initterm (Address: 0x18000b9d0)
  • _XcptFilter (Address: 0x18000b9e0)
  • free (Address: 0x18000b9c0)
  • malloc (Address: 0x18000b9c8)
  • memcmp (Address: 0x18000b9f0)
RPCRT4.dll
  • CStdStubBuffer_AddRef (Address: 0x18000b870)
  • CStdStubBuffer_Connect (Address: 0x18000b8b8)
  • CStdStubBuffer_CountRefs (Address: 0x18000b880)
  • CStdStubBuffer_DebugServerQueryInterface (Address: 0x18000b8f0)
  • CStdStubBuffer_DebugServerRelease (Address: 0x18000b898)
  • CStdStubBuffer_Disconnect (Address: 0x18000b8a0)
  • CStdStubBuffer_Invoke (Address: 0x18000b900)
  • CStdStubBuffer_IsIIDSupported (Address: 0x18000b8b0)
  • CStdStubBuffer_QueryInterface (Address: 0x18000b888)
  • IUnknown_AddRef_Proxy (Address: 0x18000b8f8)
  • IUnknown_QueryInterface_Proxy (Address: 0x18000b8a8)
  • IUnknown_Release_Proxy (Address: 0x18000b878)
  • NdrCStdStubBuffer_Release (Address: 0x18000b8e0)
  • NdrDllCanUnloadNow (Address: 0x18000b8d8)
  • NdrDllGetClassObject (Address: 0x18000b8d0)
  • NdrDllRegisterProxy (Address: 0x18000b8c8)
  • NdrDllUnregisterProxy (Address: 0x18000b8c0)
  • NdrOleAllocate (Address: 0x18000b890)
  • NdrOleFree (Address: 0x18000b8e8)