Extended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Overview
overview
7Static
static
3SafeboxSetup.exe
windows7-x64
7SafeboxSetup.exe
windows10-2004-x64
7$1.exe
windows7-x64
1$1.exe
windows10-2004-x64
1$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$TEMP/$4.dll
windows7-x64
3$TEMP/$4.dll
windows10-2004-x64
3$TEMP/$5.dll
windows7-x64
3$TEMP/$5.dll
windows10-2004-x64
3360safebox.exe
windows7-x64
1360safebox.exe
windows10-2004-x64
1AntiDrv.sys
windows7-x64
1AntiDrv.sys
windows10-2004-x64
1新云软件.url
windows7-x64
1新云软件.url
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
SafeboxSetup.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
SafeboxSetup.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
$1.exe
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
$1.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240215-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240221-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral9
Sample
$TEMP/$4.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$TEMP/$4.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral11
Sample
$TEMP/$5.dll
Resource
win7-20240215-en
Behavioral task
behavioral12
Sample
$TEMP/$5.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral13
Sample
360safebox.exe
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
360safebox.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
AntiDrv.sys
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
AntiDrv.sys
Resource
win10v2004-20240226-en
Behavioral task
behavioral17
Sample
新云软件.url
Resource
win7-20240221-en
Behavioral task
behavioral18
Sample
新云软件.url
Resource
win10v2004-20240226-en
Target
cc3d9bbb51f6d58c75449d58b871d57c
Size
6.0MB
MD5
cc3d9bbb51f6d58c75449d58b871d57c
SHA1
c94b4028cf87e85294721655127815c2b3b64be2
SHA256
31ac80b39ba1aac926a1d8da9ef142237f44153c07b328b3e279d3b3474a63b1
SHA512
73768a1667bbe08ff4f05bd73c1a48b5f7bff5ab4ddd20461b93eb0bbce3c58104bdc6381aef1868ba1684e8dee5bc32a8882fa0a8fff41ead6dd0021b63198c
SSDEEP
98304:YVpwE3QbGkn8rqiEycsE6dfe4udBfSAsxJYNHHiaAyAo4s54sk/9WykeeBIwOEN6:Yn6Gk8rosE69e4udtSdJYBijsbO9h7pf
Checks for missing Authenticode signature.
resource |
---|
unpack002/$PLUGINSDIR/InstallOptions.dll |
unpack002/$PLUGINSDIR/System.dll |
unpack002/$TEMP/$4 |
unpack002/$TEMP/$5 |
resource | yara_rule |
---|---|
static1/unpack001/SafeboxSetup.exe | nsis_installer_1 |
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
GetTickCount
CreateFileA
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
SetFileTime
GetTempPathA
GetCommandLineA
SetErrorMode
LoadLibraryA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
GetTempFileNameA
lstrlenA
lstrcatA
GetSystemDirectoryA
GetVersion
CloseHandle
lstrcmpiA
lstrcmpA
ExpandEnvironmentStringsA
GlobalFree
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
GetModuleHandleA
LoadLibraryExA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
MulDiv
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetWindowsDirectoryA
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
RegisterClassA
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
DestroyWindow
CreateDialogParamA
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
OpenClipboard
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
ShowWindow
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
e:\build\ccnettest\build\source\safebox420_1004\Release\360safebox.pdb
SfcIsFileProtected
MiniDumpWriteDump
MoveFileW
SuspendThread
GetProcessId
GlobalHandle
OpenFileMappingW
GetSystemDirectoryW
GetShortPathNameW
GetPrivateProfileSectionNamesW
GlobalMemoryStatus
CreateProcessW
SystemTimeToTzSpecificLocalTime
FlushFileBuffers
lstrcpyA
VirtualQuery
VirtualAlloc
GetSystemInfo
GetFileAttributesA
OutputDebugStringA
CreateDirectoryA
CreateThread
ConnectNamedPipe
DisconnectNamedPipe
WriteFileEx
ReadFileEx
PeekNamedPipe
TransactNamedPipe
GetNamedPipeHandleStateW
GetNamedPipeInfo
SetNamedPipeHandleState
CreateNamedPipeW
CallNamedPipeW
WaitNamedPipeW
SetUnhandledExceptionFilter
GetEnvironmentVariableW
GetFileType
DuplicateHandle
DosDateTimeToFileTime
GetCurrentDirectoryW
SetFileTime
FileTimeToDosDateTime
GetFileInformationByHandle
GetTempPathW
SetFileAttributesW
ResumeThread
TerminateThread
SetThreadLocale
GetThreadLocale
VirtualFree
GetFullPathNameA
SetEndOfFile
QueryPerformanceCounter
InterlockedCompareExchange
UnlockFile
LockFile
GetSystemTimeAsFileTime
FormatMessageA
LockFileEx
GetDiskFreeSpaceW
LoadLibraryA
GetDiskFreeSpaceA
GetVersionExA
GetTempPathA
AreFileApisANSI
DeleteFileA
HeapReAlloc
HeapDestroy
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
GetLogicalDriveStringsW
GetDriveTypeW
GetDiskFreeSpaceExW
GetTickCount
ReleaseMutex
RtlUnwind
UnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
ExitThread
GetConsoleCP
HeapSize
LocalFree
GetTempFileNameW
RemoveDirectoryW
GetSystemWow64DirectoryW
CopyFileW
InterlockedExchange
GetConsoleMode
LCMapStringA
LCMapStringW
GetCPInfo
GetStringTypeW
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThread
HeapCreate
FatalAppExitA
GetACP
GetOEMCP
LocalAlloc
GetLastError
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
lstrcpynW
ResetEvent
GetSystemTime
CreateEventW
WaitForSingleObject
SetEvent
GetWindowsDirectoryW
OutputDebugStringW
GetVersionExW
MultiByteToWideChar
WideCharToMultiByte
lstrcmpiW
lstrlenW
RaiseException
EnterCriticalSection
LeaveCriticalSection
CloseHandle
OpenProcess
GetCurrentProcess
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
FindClose
FindFirstFileW
ReadFile
GetFileSize
CreateFileW
IsValidCodePage
GetModuleHandleA
SetConsoleCtrlHandler
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetLocaleInfoA
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
CompareStringA
CompareStringW
GetModuleFileNameA
SetEnvironmentVariableA
TerminateProcess
LoadLibraryExW
GlobalLock
GlobalUnlock
MulDiv
lstrcmpW
SetErrorMode
InterlockedDecrement
InterlockedIncrement
VirtualProtectEx
GetCurrentProcessId
DeleteCriticalSection
InitializeCriticalSection
CompareFileTime
lstrlenA
Sleep
ExpandEnvironmentStringsW
CreateDirectoryW
GetModuleHandleW
DeleteFileW
MoveFileExW
GetLocalTime
GetModuleFileNameW
GetPrivateProfileStringW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
WriteFile
GetVersion
GetCurrentThreadId
CreateFileA
SetFilePointer
GetLongPathNameW
WritePrivateProfileStringW
GetFullPathNameW
SetLastError
GetFileAttributesW
FreeResource
FindNextFileW
GlobalAlloc
GlobalReAlloc
GlobalFree
FlushInstructionCache
lstrcpyW
CreateMutexW
GetPrivateProfileIntW
FreeLibrary
FileTimeToSystemTime
SystemTimeToFileTime
LoadLibraryW
GetProcAddress
GetStartupInfoW
ValidateRect
TrackMouseEvent
SetScrollInfo
GetScrollPos
SetScrollPos
CopyRect
GetScrollInfo
DrawIcon
LookupIconIdFromDirectoryEx
IsWindowVisible
LoadBitmapW
SetRect
GetIconInfo
DestroyIcon
RegisterWindowMessageW
IsDialogMessageW
RegisterClassExW
GetClassInfoExW
SetFocus
GetFocus
DestroyAcceleratorTable
GetClassNameW
GetDlgItem
IsChild
RedrawWindow
InvalidateRgn
MoveWindow
CreateDialogIndirectParamW
GetSysColor
CharNextW
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
GetClassInfoW
PostThreadMessageW
WaitForInputIdle
GetActiveWindow
GetWindow
MonitorFromWindow
GetMonitorInfoW
SetWindowTextW
MapWindowPoints
GetCursorPos
ScreenToClient
EndDialog
SetWindowRgn
OffsetRect
GetClassLongW
LoadMenuW
MonitorFromPoint
DestroyMenu
TrackPopupMenu
GetSubMenu
PostQuitMessage
EnumWindows
EnableMenuItem
ModifyMenuW
IsRectEmpty
ShowScrollBar
FrameRect
CreateDialogParamW
EnumChildWindows
EnableWindow
CheckDlgButton
IsDlgButtonChecked
SetDlgItemTextW
SetParent
MapDialogRect
SetWindowContextHelpId
CreateAcceleratorTableW
MessageBoxA
FillRect
IsIconic
ShowWindow
SetForegroundWindow
LoadIconW
IntersectRect
LoadCursorW
SetCursor
DialogBoxIndirectParamW
DrawIconEx
GetDC
ReleaseDC
LoadImageW
LoadStringW
MessageBoxW
WindowFromPoint
ExitWindowsEx
FindWindowW
PostMessageW
GetDesktopWindow
FindWindowExW
GetWindowThreadProcessId
DrawTextW
EndPaint
BeginPaint
PtInRect
ReleaseCapture
CallWindowProcW
SendMessageW
GetCapture
SystemParametersInfoW
IsWindow
AdjustWindowRectEx
GetDlgCtrlID
GetParent
SetCapture
KillTimer
SetTimer
InvalidateRect
UpdateWindow
MsgWaitForMultipleObjects
GetKeyState
EqualRect
RegisterClassW
ClientToScreen
GetWindowRect
SetWindowPos
GetMenu
DestroyWindow
CreateWindowExW
GetWindowLongW
SetWindowLongW
GetWindowTextLengthW
GetWindowTextW
DefWindowProcW
GetSystemMetrics
InflateRect
DrawEdge
DrawFocusRect
IsWindowEnabled
GetClientRect
UnregisterClassA
CreateIconFromResourceEx
SelectClipRgn
CreateFontW
DeleteObject
SelectObject
SetBkMode
SetTextColor
DeleteDC
GetObjectW
CreateDIBSection
StretchBlt
SetStretchBltMode
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
CreateFontIndirectW
CreateSolidBrush
CreatePen
GetStockObject
TextOutW
GetTextColor
GetTextExtentPoint32W
GetClipBox
ExcludeClipRect
OffsetViewportOrgEx
SetViewportOrgEx
IntersectClipRect
CreateRectRgn
CombineRgn
CreateRoundRectRgn
ExtTextOutW
SetBkColor
GetDeviceCaps
GetDIBits
GetBitmapBits
LineTo
MoveToEx
SetPixel
SetMapMode
GetMapMode
CreateBitmap
DPtoLP
RoundRect
Rectangle
GetTextMetricsW
GetBkColor
GetOpenFileNameW
GetSaveFileNameW
LookupPrivilegeValueW
GetExplicitEntriesFromAclW
LookupAccountSidW
LookupAccountNameW
SetNamedSecurityInfoW
SetEntriesInAclW
BuildExplicitAccessWithNameW
GetNamedSecurityInfoW
GetUserNameW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegEnumValueW
RegOpenKeyW
GetTokenInformation
RegEnumKeyExW
RegQueryInfoKeyW
RegCreateKeyExW
RegDeleteKeyW
RegSetValueExW
RegDeleteValueW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
OpenProcessToken
AdjustTokenPrivileges
OpenSCManagerW
OpenServiceW
CloseServiceHandle
QueryServiceStatus
DeleteAce
SHGetMalloc
ShellExecuteExW
ord165
SHChangeNotify
ShellExecuteW
ExtractIconExW
ord680
SHGetSpecialFolderPathW
SHGetPathFromIDListW
SHBrowseForFolderW
DragAcceptFiles
DragFinish
DragQueryFileW
SHGetFolderPathW
SHCreateDirectoryExW
SHGetFileInfoW
CoCreateInstance
CreateBindCtx
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
CoTaskMemFree
StringFromGUID2
CoUninitialize
CoTaskMemRealloc
CoTaskMemAlloc
CoInitialize
CoCreateGuid
StringFromCLSID
OleLockRunning
VarUI4FromStr
VariantInit
VariantClear
OleCreateFontIndirect
LoadRegTypeLi
LoadTypeLi
SafeArrayGetVartype
VarBstrCmp
SysAllocStringLen
SafeArrayDestroy
SafeArrayCreate
SysStringByteLen
VariantChangeType
DispCallFunc
VariantCopy
OleLoadPicture
SysAllocString
SysFreeString
SysStringLen
SafeArrayCopy
GetErrorInfo
SetErrorInfo
CreateErrorInfo
StrStrIW
PathCombineW
PathFindFileNameW
SHSetValueW
SHDeleteValueW
PathAddBackslashW
PathAppendW
StrCmpNIW
PathFindExtensionW
PathIsDirectoryW
UrlGetPartW
PathRemoveFileSpecW
StrStrW
PathStripPathW
PathFileExistsW
PathIsURLW
StrCmpIW
StrChrW
PathStripToRootW
StrCpyNW
PathCombineA
SHGetValueW
ImageList_Destroy
ImageList_Draw
ImageList_GetIconSize
_TrackMouseEvent
InitCommonControlsEx
ImageList_Create
ImageList_Add
ImageList_GetImageCount
ImageList_AddMasked
ImageList_ReplaceIcon
AlphaBlend
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
InternetConnectW
InternetGetConnectedState
HttpSendRequestExW
InternetWriteFile
HttpEndRequestW
InternetAttemptConnect
InternetSetOptionW
InternetOpenW
HttpAddRequestHeadersW
HttpOpenRequestW
HttpSendRequestW
InternetCloseHandle
InternetReadFile
InternetCrackUrlW
HttpQueryInfoW
GetAdaptersInfo
SendARP
DeleteIpNetEntry
GetIpNetTable
Netbios
EnumProcessModules
GetModuleFileNameExW
GetProcessImageFileNameW
GetProcessMemoryInfo
CreateURLMoniker
RegisterBindStatusCallback
inet_addr
inet_ntoa
ord23
ord21
ord22
ord20
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetCurrentDirectoryA
GetCurrentDirectoryA
MultiByteToWideChar
GetPrivateProfileIntA
GlobalLock
GetModuleHandleA
lstrcmpiA
GetPrivateProfileStringA
lstrcatA
lstrcpynA
WritePrivateProfileStringA
lstrlenA
lstrcpyA
GlobalFree
GlobalUnlock
GlobalAlloc
MapWindowPoints
GetDlgCtrlID
CloseClipboard
GetClipboardData
OpenClipboard
PtInRect
SetWindowRgn
LoadIconA
LoadImageA
SetWindowLongA
CreateWindowExA
MapDialogRect
SetWindowPos
GetWindowRect
CreateDialogParamA
ShowWindow
EnableMenuItem
GetSystemMenu
EnableWindow
GetDlgItem
DestroyIcon
DestroyWindow
DispatchMessageA
TranslateMessage
GetMessageA
IsDialogMessageA
LoadCursorA
SetCursor
DrawTextA
GetWindowLongA
DrawFocusRect
CallWindowProcA
PostMessageA
MessageBoxA
CharNextA
wsprintfA
GetWindowTextA
SetWindowTextA
SendMessageA
GetClientRect
SetTextColor
CreateCompatibleDC
GetObjectA
GetDIBits
CreateRectRgn
CombineRgn
DeleteObject
SelectObject
SHBrowseForFolderA
SHGetDesktopFolder
SHGetPathFromIDListA
ShellExecuteA
GetOpenFileNameA
GetSaveFileNameA
CommDlgExtendedError
CoTaskMemFree
dialog
initDialog
show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
lstrcpyA
lstrcpynA
FreeLibrary
lstrcatA
GetProcAddress
LoadLibraryA
GetModuleHandleA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
GetLastError
VirtualAlloc
VirtualProtect
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetVersionExA
TerminateProcess
OpenProcess
LoadLibraryA
CloseHandle
GetProcAddress
FreeLibrary
GlobalFree
lstrcpyA
DisableThreadLibraryCalls
strcmp
_strupr
toupper
strlen
free
_initterm
malloc
_adjust_fdiv
strcpy
_itoa
KillProc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetProcAddress
lstrcmpA
OpenProcess
lstrcpyA
LoadLibraryA
CloseHandle
FreeLibrary
GetVersionExA
lstrlenA
GlobalFree
wsprintfA
FindProc
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
e:\build\ccnettest\build\source\safebox420_1004\Release\360safebox.pdb
SfcIsFileProtected
MiniDumpWriteDump
MoveFileW
SuspendThread
GetProcessId
GlobalHandle
OpenFileMappingW
GetSystemDirectoryW
GetShortPathNameW
GetPrivateProfileSectionNamesW
GlobalMemoryStatus
CreateProcessW
SystemTimeToTzSpecificLocalTime
FlushFileBuffers
lstrcpyA
VirtualQuery
VirtualAlloc
GetSystemInfo
GetFileAttributesA
OutputDebugStringA
CreateDirectoryA
CreateThread
ConnectNamedPipe
DisconnectNamedPipe
WriteFileEx
ReadFileEx
PeekNamedPipe
TransactNamedPipe
GetNamedPipeHandleStateW
GetNamedPipeInfo
SetNamedPipeHandleState
CreateNamedPipeW
CallNamedPipeW
WaitNamedPipeW
SetUnhandledExceptionFilter
GetEnvironmentVariableW
GetFileType
DuplicateHandle
DosDateTimeToFileTime
GetCurrentDirectoryW
SetFileTime
FileTimeToDosDateTime
GetFileInformationByHandle
GetTempPathW
SetFileAttributesW
ResumeThread
TerminateThread
SetThreadLocale
GetThreadLocale
VirtualFree
GetFullPathNameA
SetEndOfFile
QueryPerformanceCounter
InterlockedCompareExchange
UnlockFile
LockFile
GetSystemTimeAsFileTime
FormatMessageA
LockFileEx
GetDiskFreeSpaceW
LoadLibraryA
GetDiskFreeSpaceA
GetVersionExA
GetTempPathA
AreFileApisANSI
DeleteFileA
HeapReAlloc
HeapDestroy
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
GetLogicalDriveStringsW
GetDriveTypeW
GetDiskFreeSpaceExW
GetTickCount
ReleaseMutex
RtlUnwind
UnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
ExitThread
GetConsoleCP
HeapSize
LocalFree
GetTempFileNameW
RemoveDirectoryW
GetSystemWow64DirectoryW
CopyFileW
InterlockedExchange
GetConsoleMode
LCMapStringA
LCMapStringW
GetCPInfo
GetStringTypeW
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThread
HeapCreate
FatalAppExitA
GetACP
GetOEMCP
LocalAlloc
GetLastError
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
lstrcpynW
ResetEvent
GetSystemTime
CreateEventW
WaitForSingleObject
SetEvent
GetWindowsDirectoryW
OutputDebugStringW
GetVersionExW
MultiByteToWideChar
WideCharToMultiByte
lstrcmpiW
lstrlenW
RaiseException
EnterCriticalSection
LeaveCriticalSection
CloseHandle
OpenProcess
GetCurrentProcess
SizeofResource
LockResource
LoadResource
FindResourceW
FindResourceExW
FindClose
FindFirstFileW
ReadFile
GetFileSize
CreateFileW
IsValidCodePage
GetModuleHandleA
SetConsoleCtrlHandler
InitializeCriticalSectionAndSpinCount
GetTimeZoneInformation
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetLocaleInfoA
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
CompareStringA
CompareStringW
GetModuleFileNameA
SetEnvironmentVariableA
TerminateProcess
LoadLibraryExW
GlobalLock
GlobalUnlock
MulDiv
lstrcmpW
SetErrorMode
InterlockedDecrement
InterlockedIncrement
VirtualProtectEx
GetCurrentProcessId
DeleteCriticalSection
InitializeCriticalSection
CompareFileTime
lstrlenA
Sleep
ExpandEnvironmentStringsW
CreateDirectoryW
GetModuleHandleW
DeleteFileW
MoveFileExW
GetLocalTime
GetModuleFileNameW
GetPrivateProfileStringW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
WriteFile
GetVersion
GetCurrentThreadId
CreateFileA
SetFilePointer
GetLongPathNameW
WritePrivateProfileStringW
GetFullPathNameW
SetLastError
GetFileAttributesW
FreeResource
FindNextFileW
GlobalAlloc
GlobalReAlloc
GlobalFree
FlushInstructionCache
lstrcpyW
CreateMutexW
GetPrivateProfileIntW
FreeLibrary
FileTimeToSystemTime
SystemTimeToFileTime
LoadLibraryW
GetProcAddress
GetStartupInfoW
ValidateRect
TrackMouseEvent
SetScrollInfo
GetScrollPos
SetScrollPos
CopyRect
GetScrollInfo
DrawIcon
LookupIconIdFromDirectoryEx
IsWindowVisible
LoadBitmapW
SetRect
GetIconInfo
DestroyIcon
RegisterWindowMessageW
IsDialogMessageW
RegisterClassExW
GetClassInfoExW
SetFocus
GetFocus
DestroyAcceleratorTable
GetClassNameW
GetDlgItem
IsChild
RedrawWindow
InvalidateRgn
MoveWindow
CreateDialogIndirectParamW
GetSysColor
CharNextW
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
GetClassInfoW
PostThreadMessageW
WaitForInputIdle
GetActiveWindow
GetWindow
MonitorFromWindow
GetMonitorInfoW
SetWindowTextW
MapWindowPoints
GetCursorPos
ScreenToClient
EndDialog
SetWindowRgn
OffsetRect
GetClassLongW
LoadMenuW
MonitorFromPoint
DestroyMenu
TrackPopupMenu
GetSubMenu
PostQuitMessage
EnumWindows
EnableMenuItem
ModifyMenuW
IsRectEmpty
ShowScrollBar
FrameRect
CreateDialogParamW
EnumChildWindows
EnableWindow
CheckDlgButton
IsDlgButtonChecked
SetDlgItemTextW
SetParent
MapDialogRect
SetWindowContextHelpId
CreateAcceleratorTableW
MessageBoxA
FillRect
IsIconic
ShowWindow
SetForegroundWindow
LoadIconW
IntersectRect
LoadCursorW
SetCursor
DialogBoxIndirectParamW
DrawIconEx
GetDC
ReleaseDC
LoadImageW
LoadStringW
MessageBoxW
WindowFromPoint
ExitWindowsEx
FindWindowW
PostMessageW
GetDesktopWindow
FindWindowExW
GetWindowThreadProcessId
DrawTextW
EndPaint
BeginPaint
PtInRect
ReleaseCapture
CallWindowProcW
SendMessageW
GetCapture
SystemParametersInfoW
IsWindow
AdjustWindowRectEx
GetDlgCtrlID
GetParent
SetCapture
KillTimer
SetTimer
InvalidateRect
UpdateWindow
MsgWaitForMultipleObjects
GetKeyState
EqualRect
RegisterClassW
ClientToScreen
GetWindowRect
SetWindowPos
GetMenu
DestroyWindow
CreateWindowExW
GetWindowLongW
SetWindowLongW
GetWindowTextLengthW
GetWindowTextW
DefWindowProcW
GetSystemMetrics
InflateRect
DrawEdge
DrawFocusRect
IsWindowEnabled
GetClientRect
UnregisterClassA
CreateIconFromResourceEx
SelectClipRgn
CreateFontW
DeleteObject
SelectObject
SetBkMode
SetTextColor
DeleteDC
GetObjectW
CreateDIBSection
StretchBlt
SetStretchBltMode
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
CreateFontIndirectW
CreateSolidBrush
CreatePen
GetStockObject
TextOutW
GetTextColor
GetTextExtentPoint32W
GetClipBox
ExcludeClipRect
OffsetViewportOrgEx
SetViewportOrgEx
IntersectClipRect
CreateRectRgn
CombineRgn
CreateRoundRectRgn
ExtTextOutW
SetBkColor
GetDeviceCaps
GetDIBits
GetBitmapBits
LineTo
MoveToEx
SetPixel
SetMapMode
GetMapMode
CreateBitmap
DPtoLP
RoundRect
Rectangle
GetTextMetricsW
GetBkColor
GetOpenFileNameW
GetSaveFileNameW
LookupPrivilegeValueW
GetExplicitEntriesFromAclW
LookupAccountSidW
LookupAccountNameW
SetNamedSecurityInfoW
SetEntriesInAclW
BuildExplicitAccessWithNameW
GetNamedSecurityInfoW
GetUserNameW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegEnumValueW
RegOpenKeyW
GetTokenInformation
RegEnumKeyExW
RegQueryInfoKeyW
RegCreateKeyExW
RegDeleteKeyW
RegSetValueExW
RegDeleteValueW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
OpenProcessToken
AdjustTokenPrivileges
OpenSCManagerW
OpenServiceW
CloseServiceHandle
QueryServiceStatus
DeleteAce
SHGetMalloc
ShellExecuteExW
ord165
SHChangeNotify
ShellExecuteW
ExtractIconExW
ord680
SHGetSpecialFolderPathW
SHGetPathFromIDListW
SHBrowseForFolderW
DragAcceptFiles
DragFinish
DragQueryFileW
SHGetFolderPathW
SHCreateDirectoryExW
SHGetFileInfoW
CoCreateInstance
CreateBindCtx
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
CoTaskMemFree
StringFromGUID2
CoUninitialize
CoTaskMemRealloc
CoTaskMemAlloc
CoInitialize
CoCreateGuid
StringFromCLSID
OleLockRunning
VarUI4FromStr
VariantInit
VariantClear
OleCreateFontIndirect
LoadRegTypeLi
LoadTypeLi
SafeArrayGetVartype
VarBstrCmp
SysAllocStringLen
SafeArrayDestroy
SafeArrayCreate
SysStringByteLen
VariantChangeType
DispCallFunc
VariantCopy
OleLoadPicture
SysAllocString
SysFreeString
SysStringLen
SafeArrayCopy
GetErrorInfo
SetErrorInfo
CreateErrorInfo
StrStrIW
PathCombineW
PathFindFileNameW
SHSetValueW
SHDeleteValueW
PathAddBackslashW
PathAppendW
StrCmpNIW
PathFindExtensionW
PathIsDirectoryW
UrlGetPartW
PathRemoveFileSpecW
StrStrW
PathStripPathW
PathFileExistsW
PathIsURLW
StrCmpIW
StrChrW
PathStripToRootW
StrCpyNW
PathCombineA
SHGetValueW
ImageList_Destroy
ImageList_Draw
ImageList_GetIconSize
_TrackMouseEvent
InitCommonControlsEx
ImageList_Create
ImageList_Add
ImageList_GetImageCount
ImageList_AddMasked
ImageList_ReplaceIcon
AlphaBlend
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
InternetConnectW
InternetGetConnectedState
HttpSendRequestExW
InternetWriteFile
HttpEndRequestW
InternetAttemptConnect
InternetSetOptionW
InternetOpenW
HttpAddRequestHeadersW
HttpOpenRequestW
HttpSendRequestW
InternetCloseHandle
InternetReadFile
InternetCrackUrlW
HttpQueryInfoW
GetAdaptersInfo
SendARP
DeleteIpNetEntry
GetIpNetTable
Netbios
EnumProcessModules
GetModuleFileNameExW
GetProcessImageFileNameW
GetProcessMemoryInfo
CreateURLMoniker
RegisterBindStatusCallback
inet_addr
inet_ntoa
ord23
ord21
ord22
ord20
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
e:\build\ccnettest\build\source\safebox410_1001\safeboxantidrv\objfre_wxp_x86\i386\AntiDrv.pdb
memset
wcsstr
memcpy
PsGetCurrentProcessId
RtlCompareMemory
_wcsnicmp
ZwQueryInformationProcess
MmGetSystemRoutineAddress
RtlInitUnicodeString
ObReferenceObjectByHandle
PsThreadType
ExFreePoolWithTag
ExAllocatePoolWithTag
ObOpenObjectByPointer
PsProcessType
KeUnstackDetachProcess
ProbeForRead
KeStackAttachProcess
IoGetCurrentProcess
ZwQueryObject
_wcsupr
ZwClose
ZwQueryKey
IofCompleteRequest
IoReleaseCancelSpinLock
MmIsAddressValid
MmMapLockedPagesSpecifyCache
KeWaitForSingleObject
ExfInterlockedInsertTailList
KeInitializeEvent
PsGetCurrentThreadId
_allmul
KeSetEvent
IoGetDeviceObjectPointer
IofCallDriver
IoBuildDeviceIoControlRequest
strstr
ZwQuerySystemInformation
_wcslwr
KeServiceDescriptorTable
IoDeleteSymbolicLink
IoDeleteDevice
IoCreateSymbolicLink
IoCreateDevice
KeTickCount
KeBugCheckEx
PsGetVersion
PsLookupProcessByProcessId
ExGetPreviousMode
ObfDereferenceObject
RtlUnwind
KfReleaseSpinLock
KeGetCurrentIrql
KfAcquireSpinLock
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ