dialog
initDialog
show
Overview
overview
7Static
static
328d73f78ea...18.exe
windows7-x64
728d73f78ea...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...il.exe
windows7-x64
1$PLUGINSDI...il.exe
windows10-2004-x64
1$PLUGINSDI...LL.dll
windows7-x64
3$PLUGINSDI...LL.dll
windows10-2004-x64
3$PLUGINSDI...sg.dll
windows7-x64
1$PLUGINSDI...sg.dll
windows10-2004-x64
1$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3SandboxieBITS.exe
windows7-x64
1SandboxieBITS.exe
windows10-2004-x64
1SandboxieCrypto.exe
windows7-x64
1SandboxieCrypto.exe
windows10-2004-x64
1SandboxieD...ch.exe
windows7-x64
1SandboxieD...ch.exe
windows10-2004-x64
1SandboxieEventSys.exe
windows7-x64
1SandboxieEventSys.exe
windows10-2004-x64
1SandboxieRpcSs.exe
windows7-x64
1SandboxieRpcSs.exe
windows10-2004-x64
1SandboxieWUAU.exe
windows7-x64
1SandboxieWUAU.exe
windows10-2004-x64
1SbieCtrl.exe
windows7-x64
1SbieCtrl.exe
windows10-2004-x64
1SbieDll.dll
windows7-x64
1SbieDll.dll
windows10-2004-x64
3SbieDllX.dll
windows7-x64
1SbieDllX.dll
windows10-2004-x64
3SbieDrv.sys
windows7-x64
1SbieDrv.sys
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
28d73f78ea6371309ffd38fa5d160506_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
28d73f78ea6371309ffd38fa5d160506_JaffaCakes118.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/KmdUtil.exe
Resource
win7-20240220-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/KmdUtil.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/SbieMsg.dll
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/SbieMsg.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
SandboxieBITS.exe
Resource
win7-20240705-en
Behavioral task
behavioral14
Sample
SandboxieBITS.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral15
Sample
SandboxieCrypto.exe
Resource
win7-20240704-en
Behavioral task
behavioral16
Sample
SandboxieCrypto.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
SandboxieDcomLaunch.exe
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
SandboxieDcomLaunch.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral19
Sample
SandboxieEventSys.exe
Resource
win7-20240705-en
Behavioral task
behavioral20
Sample
SandboxieEventSys.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral21
Sample
SandboxieRpcSs.exe
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
SandboxieRpcSs.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral23
Sample
SandboxieWUAU.exe
Resource
win7-20240704-en
Behavioral task
behavioral24
Sample
SandboxieWUAU.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral25
Sample
SbieCtrl.exe
Resource
win7-20240220-en
Behavioral task
behavioral26
Sample
SbieCtrl.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral27
Sample
SbieDll.dll
Resource
win7-20240704-en
Behavioral task
behavioral28
Sample
SbieDll.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral29
Sample
SbieDllX.dll
Resource
win7-20240705-en
Behavioral task
behavioral30
Sample
SbieDllX.dll
Resource
win10v2004-20240704-en
Behavioral task
behavioral31
Sample
SbieDrv.sys
Resource
win7-20240705-en
Behavioral task
behavioral32
Sample
SbieDrv.sys
Resource
win10v2004-20240508-en
Target
28d73f78ea6371309ffd38fa5d160506_JaffaCakes118
Size
475KB
MD5
28d73f78ea6371309ffd38fa5d160506
SHA1
8f4a015260fc09ce1421f04bad1a2f905b5d3c8d
SHA256
1cc4750e037202a080a1b596cb114a21975bca271965de2fb03f032c4da30ba1
SHA512
75a0a69c61ecd5f2c941f884fb0e5b1c8015f5866d0133556b31a8a814a20aa370472ea28547951ac3a8afa2b1a357cc433868db9e41251130714ddfc1e3f47f
SSDEEP
12288:UEuD5rWnMCvjLkGb+bIurB5LUUZ/nah3honQe6:UEQ5rKM2jLpb+curBuknOUQX
Checks for missing Authenticode signature.
resource |
---|
28d73f78ea6371309ffd38fa5d160506_JaffaCakes118 |
unpack001/$PLUGINSDIR/InstallOptions.dll |
unpack001/$PLUGINSDIR/KmdUtil.exe |
unpack001/$PLUGINSDIR/LangDLL.dll |
unpack001/$PLUGINSDIR/SbieMsg.dll |
unpack001/$PLUGINSDIR/System.dll |
unpack001/SandboxieBITS.exe |
unpack001/SandboxieCrypto.exe |
unpack001/SandboxieDcomLaunch.exe |
unpack001/SandboxieEventSys.exe |
unpack001/SandboxieRpcSs.exe |
unpack001/SandboxieWUAU.exe |
unpack001/SbieCtrl.exe |
unpack001/SbieDll.dll |
unpack001/SbieDllX.dll |
unpack001/SbieDrv.sys |
unpack001/SbieMsg.dll |
unpack001/SbieSvc.exe |
unpack001/Start.exe |
resource | yara_rule |
---|---|
sample | nsis_installer_1 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SetFileTime
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
CreateFileA
GetFileSize
GetModuleFileNameA
GetTickCount
GetCurrentProcess
CopyFileA
ExitProcess
lstrcpynA
CloseHandle
GetWindowsDirectoryA
GetTempPathA
GetUserDefaultLangID
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
GetTempFileNameA
SetEndOfFile
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
lstrcpyA
lstrlenA
lstrcatA
GetSystemDirectoryA
lstrcmpiA
GetEnvironmentVariableA
ExpandEnvironmentStringsA
GlobalFree
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
SetErrorMode
GetModuleHandleA
LoadLibraryA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
MulDiv
GetPrivateProfileStringA
WriteFile
ReadFile
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetCommandLineA
ScreenToClient
GetWindowRect
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
LoadCursorA
SetCursor
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
EndDialog
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxA
CharPrevA
DispatchMessageA
PeekMessageA
CreateDialogParamA
DestroyWindow
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
ShowWindow
wsprintfA
SendMessageTimeoutA
RegisterClassA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
TrackPopupMenu
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
FindWindowExA
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetMalloc
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetCurrentDirectoryA
GetCurrentDirectoryA
GetPrivateProfileIntA
GetModuleHandleA
lstrcmpiA
GetPrivateProfileStringA
lstrcatA
lstrcpynA
WritePrivateProfileStringA
lstrlenA
lstrcpyA
GlobalFree
MultiByteToWideChar
GlobalAlloc
GetDlgCtrlID
GetClientRect
SetWindowRgn
MapWindowPoints
LoadImageA
SetWindowLongA
CreateWindowExA
MapDialogRect
SetWindowPos
GetWindowRect
CreateDialogParamA
ShowWindow
EnableWindow
GetDlgItem
DestroyIcon
DestroyWindow
DispatchMessageA
TranslateMessage
GetMessageA
IsDialogMessageA
PtInRect
LoadCursorA
SetCursor
DrawTextA
GetWindowLongA
DrawFocusRect
CallWindowProcA
PostMessageA
MessageBoxA
CharNextA
wsprintfA
GetWindowTextA
SetWindowTextA
SendMessageA
LoadIconA
SetTextColor
GetObjectA
SelectObject
GetDIBits
CreateRectRgn
CombineRgn
DeleteObject
CreateCompatibleDC
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetDesktopFolder
SHGetMalloc
ShellExecuteA
GetOpenFileNameA
GetSaveFileNameA
CommDlgExtendedError
dialog
initDialog
show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
c:\work\sbie\install\kmdutil\obj\i386\KmdUtil.pdb
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_cexit
_XcptFilter
_exit
_c_exit
wcscat
wcslen
memcpy
_wtoi
_wcsicmp
_wcsnicmp
memset
wcsrchr
exit
wcscpy
swprintf
StartServiceW
RegSetValueExW
CreateServiceW
RegOpenKeyExW
RegCloseKey
RegDeleteKeyW
OpenServiceW
DeleteService
ControlService
OpenSCManagerW
AdjustTokenPrivileges
OpenProcessToken
LookupPrivilegeValueW
RegCreateKeyExW
GetCommandLineW
GetLastError
GetModuleFileNameW
Sleep
FormatMessageW
LocalAlloc
SetLastError
CloseHandle
GetCurrentProcess
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoA
LoadLibraryW
MessageBoxW
NtClose
NtUnloadDriver
NtDeviceIoControlFile
RtlInitUnicodeString
NtOpenFile
CommandLineToArgvW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalFree
lstrcpynA
lstrcmpA
lstrlenA
GetModuleHandleA
MulDiv
lstrcpyA
GlobalAlloc
SetWindowTextA
SetDlgItemTextA
SendDlgItemMessageA
EndDialog
DialogBoxParamA
LoadIconA
SendMessageA
ShowWindow
GetDC
CreateFontIndirectA
GetDeviceCaps
DeleteObject
LangDialog
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
c:\work\sbie\msgs\obj\i386\SbieMsg.pdb
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
lstrcpyA
lstrcpynA
FreeLibrary
lstrcatA
GetProcAddress
LoadLibraryA
GetModuleHandleA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
GetLastError
VirtualAlloc
VirtualProtect
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
c:\work\sbie\apps\com\bits\obj\i386\SandboxieBITS.pdb
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
_except_handler3
_acmdln
exit
_cexit
_XcptFilter
_controlfp
_wcsicmp
swprintf
__getmainargs
_exit
_c_exit
wcslen
wcscpy
wcscat
OpenProcessToken
AccessCheckByType
LogonUserW
DuplicateTokenEx
SetThreadToken
StartServiceCtrlDispatcherW
QueryPerformanceCounter
GetCurrentProcess
GetTickCount
GetCurrentProcessId
ExitProcess
LoadLibraryW
GetCurrentThreadId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoA
HeapAlloc
GetProcessHeap
SetEvent
OpenEventW
Sleep
SetLastError
CreateThread
CloseHandle
GetProcAddress
wsprintfW
MessageBoxW
CoImpersonateClient
WTSQueryUserToken
_SbieApi_QueryProcess@20
_SbieApi_EnumProcessEx@16
_SbieDll_KillOne@4
_SbieApi_QueryConf@20
_SbieDll_Hook@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
c:\work\sbie\apps\com\crypto\obj\i386\SandboxieCrypto.pdb
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
_initterm
__getmainargs
_acmdln
exit
_cexit
_XcptFilter
__setusermatherr
_exit
_c_exit
wcslen
wcscpy
wcscat
swprintf
_wcsicmp
StartServiceCtrlDispatcherW
AccessCheckByType
SetThreadToken
DuplicateToken
OpenProcessToken
GetTokenInformation
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetSystemTimeAsFileTime
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetLastError
GetStartupInfoA
SetLastError
CreateThread
GetProcAddress
LoadLibraryW
ExitProcess
GetCurrentProcessId
DuplicateHandle
CloseHandle
Sleep
HeapAlloc
GetProcessHeap
SetEvent
OpenEventW
MessageBoxW
wsprintfW
_SbieApi_QueryProcess@20
_SbieApi_EnumProcessEx@16
_SbieDll_KillOne@4
_SbieApi_QueryConf@20
_SbieDll_Hook@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
c:\work\sbie\apps\com\dcomlaunch\obj\i386\SandboxieDcomLaunch.pdb
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
_initterm
__getmainargs
_acmdln
exit
_cexit
_XcptFilter
__setusermatherr
_wcsicmp
swprintf
wcscat
_exit
_c_exit
wcslen
wcscpy
wcscmp
QueryServiceStatusEx
SetServiceStatus
OpenServiceW
CloseServiceHandle
QueryServiceStatus
StartServiceW
ControlService
AccessCheckByType
SetThreadToken
DuplicateToken
StartServiceCtrlDispatcherW
OpenProcessToken
GetTokenInformation
ConvertSidToStringSidW
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
CreateFileMappingW
GetSystemTimeAsFileTime
TlsGetValue
TlsSetValue
SuspendThread
GetCurrentThread
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetLastError
SetUnhandledExceptionFilter
GetStartupInfoA
OpenEventW
Sleep
SetLastError
CreateThread
GetProcAddress
LoadLibraryW
ExitProcess
TlsAlloc
CloseHandle
LocalFree
HeapFree
SetEvent
OpenProcess
HeapAlloc
GetProcessHeap
GetCurrentProcessId
MessageBoxW
wsprintfW
NtSetInformationProcess
RtlAdjustPrivilege
_SbieApi_QueryProcess@20
_SbieApi_EnumProcessEx@16
_SbieDll_IsBoxedService@4
_Scm_StartBoxedService@4
_SbieDll_KillOne@4
_SbieApi_QueryConf@20
_SbieDll_Hook@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
c:\work\sbie\apps\com\eventsys\obj\i386\SandboxieEventSys.pdb
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
_initterm
__getmainargs
_acmdln
exit
_cexit
_XcptFilter
__setusermatherr
_exit
_c_exit
wcslen
wcscpy
wcscat
swprintf
_wcsicmp
AccessCheckByType
LogonUserW
StartServiceCtrlDispatcherW
OpenProcessToken
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetCurrentProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
ExitProcess
LoadLibraryW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoA
HeapAlloc
GetProcessHeap
SetEvent
OpenEventW
Sleep
SetLastError
CreateThread
GetProcAddress
MessageBoxW
wsprintfW
_SbieApi_QueryProcess@20
_SbieApi_EnumProcessEx@16
_SbieDll_KillOne@4
_SbieApi_QueryConf@20
_SbieDll_Hook@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
c:\work\sbie\apps\com\rpcss\obj\i386\SandboxieRpcSs.pdb
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_adjust_fdiv
_XcptFilter
__p__commode
__p__fmode
_wcsicmp
swprintf
wcscat
__set_app_type
_except_handler3
_controlfp
_cexit
_exit
_c_exit
wcslen
wcscpy
wcscmp
DuplicateToken
SetServiceStatus
OpenServiceW
CloseServiceHandle
QueryServiceStatus
StartServiceW
ControlService
RegOpenKeyExW
RegQueryValueExW
OpenThreadToken
AccessCheckByType
SetThreadToken
StartServiceCtrlDispatcherW
QueryServiceStatusEx
OpenProcessToken
GetTokenInformation
ConvertSidToStringSidW
CreateFileMappingW
TlsAlloc
TlsGetValue
QueryPerformanceCounter
SuspendThread
GetCurrentThread
GetTickCount
GetCurrentThreadId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
HeapAlloc
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoA
OpenEventW
Sleep
SetLastError
CreateThread
GetProcAddress
LoadLibraryW
ExitProcess
TlsSetValue
CloseHandle
LocalFree
HeapFree
GetLastError
OpenProcess
SetEvent
GetProcessHeap
GetCurrentProcessId
MessageBoxW
wsprintfW
NtSetInformationProcess
RtlAdjustPrivilege
WSASocketW
WSASetLastError
listen
bind
WSAStartup
_SbieApi_QueryProcess@20
_SbieApi_EnumProcessEx@16
_SbieDll_IsBoxedService@4
_Scm_StartBoxedService@4
_SbieDll_KillOne@4
_SbieApi_QueryConf@20
_SbieDll_Hook@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
c:\work\sbie\apps\com\wuau\obj\i386\SandboxieWUAU.pdb
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
__getmainargs
_acmdln
exit
_cexit
_XcptFilter
_exit
_c_exit
_initterm
wcschr
_wcsnicmp
wcslen
wcscpy
wcscat
swprintf
_wcsicmp
wcscmp
ConvertSidToStringSidW
AccessCheckByType
StartServiceCtrlDispatcherW
OpenProcessToken
GetTokenInformation
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetCurrentProcess
GetVersionExW
GetCurrentProcessId
ExitProcess
LoadLibraryW
LocalFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoA
HeapAlloc
GetProcessHeap
SetEvent
OpenEventW
Sleep
SetLastError
CreateThread
CreateProcessW
CloseHandle
OpenProcess
HeapFree
GetLastError
GetProcAddress
MessageBoxW
wsprintfW
_SbieApi_QueryProcess@20
_SbieApi_EnumProcessEx@16
_SbieDll_KillOne@4
_SbieApi_QueryConf@20
_SbieDll_Hook@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
c:\work\sbie\apps\control\obj\i386\SbieCtrl.pdb
ord6278
ord3312
ord491
ord5426
ord6211
ord6193
ord5856
ord1165
ord772
ord5602
ord500
ord5977
ord1662
ord2644
ord5949
ord6563
ord5945
ord3356
ord3090
ord5947
ord3658
ord3621
ord2406
ord3566
ord1634
ord1633
ord5781
ord2858
ord2371
ord6051
ord1768
ord5286
ord3393
ord4418
ord3728
ord567
ord810
ord2966
ord5755
ord6188
ord5752
ord6182
ord4324
ord6185
ord6168
ord5869
ord5785
ord5790
ord5674
ord5732
ord5575
ord5567
ord6057
ord5860
ord3591
ord640
ord6190
ord6017
ord323
ord4266
ord4532
ord2115
ord3282
ord3291
ord6266
ord3909
ord1084
ord4688
ord3749
ord5142
ord3016
ord4847
ord6376
ord2078
ord326
ord4270
ord3737
ord818
ord2144
ord773
ord5603
ord6373
ord3614
ord4215
ord2576
ord3649
ord1637
ord1143
ord5677
ord6371
ord4480
ord2546
ord2504
ord5727
ord3917
ord1089
ord5193
ord2388
ord3341
ord5296
ord5298
ord4074
ord4692
ord5303
ord5285
ord5710
ord3396
ord4616
ord3733
ord561
ord815
ord2430
ord2613
ord5568
ord2910
ord4237
ord4718
ord2715
ord2382
ord3054
ord5094
ord5097
ord4461
ord4298
ord3345
ord5006
ord975
ord5468
ord3398
ord2874
ord2873
ord4146
ord4072
ord5278
ord2641
ord1658
ord4430
ord5248
ord4421
ord3618
ord674
ord3865
ord2455
ord6279
ord2447
ord2550
ord366
ord1105
ord4219
ord291
ord910
ord2574
ord4396
ord3635
ord693
ord2857
ord4238
ord697
ord395
ord4181
ord6896
ord3281
ord3905
ord6688
ord686
ord3991
ord2445
ord2088
ord384
ord2092
ord5625
ord3431
ord4118
ord2855
ord3397
ord3716
ord795
ord2567
ord4390
ord3569
ord609
ord1764
ord6362
ord2405
ord2016
ord4214
ord2573
ord4395
ord3634
ord692
ord6316
ord2769
ord3084
ord5639
ord2070
ord2091
ord2108
ord4282
ord4279
ord6867
ord6865
ord6238
ord1644
ord913
ord700
ord398
ord3434
ord2776
ord909
ord3638
ord696
ord3930
ord394
ord5586
ord3430
ord4180
ord1172
ord3568
ord5706
ord283
ord5871
ord4128
ord4292
ord2746
ord2836
ord2099
ord4199
ord5446
ord6390
ord5436
ord6379
ord613
ord3490
ord4078
ord1834
ord289
ord3688
ord2705
ord3995
ord6004
ord2579
ord4400
ord3389
ord3724
ord804
ord6777
ord4254
ord1900
ord1683
ord2520
ord5284
ord4433
ord2046
ord4425
ord771
ord497
ord2400
ord6868
ord2606
ord6655
ord4120
ord3470
ord3285
ord3298
ord5845
ord2876
ord6451
ord2877
ord6437
ord1258
ord2111
ord1761
ord4709
ord2629
ord1230
ord5784
ord472
ord755
ord470
ord2036
ord2440
ord1569
ord2634
ord3871
ord2756
ord926
ord860
ord6024
ord768
ord4253
ord2854
ord414
ord3979
ord713
ord3657
ord5817
ord5600
ord5855
ord924
ord5617
ord859
ord4124
ord927
ord6654
ord539
ord501
ord1083
ord536
ord4273
ord941
ord715
ord415
ord1081
ord1008
ord5597
ord2010
ord5616
ord1085
ord2757
ord6565
ord5605
ord3694
ord4829
ord5283
ord4371
ord4352
ord4942
ord4970
ord4899
ord5154
ord5156
ord5155
ord823
ord5618
ord542
ord3798
ord802
ord5679
ord4272
ord2755
ord4197
ord3087
ord6195
ord535
ord540
ord2810
ord922
ord940
ord925
ord825
ord2637
ord324
ord538
ord537
ord800
ord942
ord861
ord858
ord641
ord3592
ord4419
ord4621
ord4075
ord3074
ord3820
ord3826
ord3825
ord2971
ord3076
ord2980
ord3257
ord3131
ord4459
ord3254
ord3142
ord2977
ord5273
ord2116
ord2438
ord5257
ord1720
ord5059
ord3744
ord6372
ord2047
ord2640
ord4435
ord4831
ord3793
ord5276
ord4347
ord6370
ord5157
ord2377
ord5237
ord4401
ord1767
ord4073
ord6048
ord2506
ord4992
ord4370
ord5261
ord4229
ord2859
ord3133
ord1135
ord4294
ord5830
wcscat
malloc
wcscpy
_wcsicmp
wcscmp
__CxxFrameHandler
_wcsnicmp
wcschr
towlower
free
memcpy
memset
_wtoi64
wcslen
_controlfp
?terminate@@YAXXZ
_onexit
__dllonexit
wcstol
swprintf
wcsrchr
wcsncpy
memcmp
exit
_wtoi
time
wcsstr
memmove
atof
strchr
toupper
_purecall
__RTDynamicCast
_c_exit
_exit
_XcptFilter
_cexit
_wcmdln
__wgetmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
??1type_info@@UAE@XZ
OpenEventLogW
LsaOpenPolicy
LsaQueryInformationPolicy
LsaFreeMemory
LsaClose
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
CloseEventLog
ReadEventLogW
RegEnumValueW
RegOpenKeyW
RegDeleteValueW
RegSetValueExW
InterlockedDecrement
GetModuleHandleW
FindFirstFileW
ExpandEnvironmentStringsW
GetSystemWindowsDirectoryW
GetDriveTypeW
GetModuleFileNameW
DeleteFileW
CopyFileW
UnmapViewOfFile
InterlockedIncrement
CreateFileMappingW
RemoveDirectoryW
CreateDirectoryW
WriteFile
GetTempPathW
GetProcAddress
GetProcessTimes
OpenProcess
LoadLibraryW
GetStartupInfoW
GlobalUnlock
GlobalFree
GlobalLock
GlobalAlloc
LockResource
LoadResource
SizeofResource
FindResourceW
LeaveCriticalSection
GetCurrentThreadId
EnterCriticalSection
InitializeCriticalSection
LocalAlloc
LocalFree
CloseHandle
GetFileTime
GetWindowsDirectoryW
GetLastError
CreateFileW
GetCurrentProcessId
CreateThread
HeapFree
GetProcessHeap
ProcessIdToSessionId
HeapAlloc
GetShortPathNameW
GetVersionExW
CreateMutexW
OpenMutexW
GetCommandLineW
WaitForSingleObject
GetFileAttributesW
FindClose
MapViewOfFile
FindNextFileW
FreeLibrary
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
Sleep
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentObject
SetTextColor
GetClipBox
CreateFontIndirectW
GetObjectW
CreatePen
GetTextMetricsW
GetPixel
Rectangle
CreatePatternBrush
GetStockObject
Ellipse
BitBlt
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
PatBlt
LPtoDP
DPtoLP
GetWindowExtEx
GetViewportExtEx
GetMapMode
CreateSolidBrush
CreatePolygonRgn
CreateCompatibleDC
CreateCompatibleBitmap
SetPixel
DeleteDC
SelectObject
GetTextExtentPoint32W
DeleteObject
GetTextColor
GetWindowLongW
SendMessageW
UnhookWindowsHookEx
SetCursor
ReleaseCapture
GetParent
CallNextHookEx
PostMessageW
IsWindowVisible
PtInRect
EnumChildWindows
WindowFromPoint
CallWindowProcW
SetWindowsHookExW
SetCapture
SetWindowLongW
SetWindowPos
MoveWindow
GetDC
CreateWindowExW
SetFocus
ScreenToClient
GetDlgItem
SetWindowTextW
ShowWindow
GetDlgCtrlID
GetWindow
SendDlgItemMessageW
MessageBoxW
EnableWindow
DestroyWindow
DestroyCursor
SetClassLongW
GetCursorPos
GetAsyncKeyState
GetWindowThreadProcessId
IsIconic
GetForegroundWindow
LoadBitmapW
SetTimer
SetLayeredWindowAttributes
RegisterClassExW
LoadIconW
DefWindowProcW
CopyRect
EnableMenuItem
GetSubMenu
BeginPaint
EndPaint
UpdateWindow
InvalidateRect
TabbedTextOutW
DrawTextW
GrayStringW
GetMessagePos
SetForegroundWindow
DispatchMessageW
TranslateMessage
GetMessageW
OpenClipboard
CloseClipboard
SetClipboardData
EmptyClipboard
GetMenuItemCount
LoadMenuW
MsgWaitForMultipleObjects
PeekMessageW
SetMenuItemInfoW
GetMenuItemInfoW
RegisterWindowMessageW
SystemParametersInfoW
FindWindowW
CreatePopupMenu
DeleteMenu
AppendMenuW
SetMenuDefaultItem
GetMenuItemID
GetMenuStringW
InsertMenuW
ModifyMenuW
GetMenu
SetMenu
PostQuitMessage
wsprintfW
GetSystemMetrics
GetKeyState
FindWindowExW
DestroyIcon
EnumWindows
DrawStateW
GetSysColor
GetMenuItemRect
GetClassNameW
IsMenu
IsRectEmpty
GetDesktopWindow
IsWindow
GetSysColorBrush
GetIconInfo
LoadCursorW
GetWindowRect
GetClientRect
ClientToScreen
OffsetRect
GetWindowDC
SetRect
InvertRect
ReleaseDC
KillTimer
SetWindowRgn
NtCreateFile
NtQueryDirectoryFile
GetModuleFileNameExW
SHBrowseForFolderW
SHGetPathFromIDListW
Shell_NotifyIconW
DragQueryFileW
ShellExecuteExW
SHFileOperationW
ord165
SHGetFolderPathW
ShellExecuteW
ExtractIconExW
ImageList_ReplaceIcon
ImageList_SetBkColor
ImageList_Draw
ImageList_GetIcon
ImageList_GetImageCount
ImageList_Remove
ImageList_GetImageInfo
ChooseColorW
GetOpenFileNameW
GdipDisposeImage
GdipCreateBitmapFromStream
GdipCreateHBITMAPFromBitmap
GdiplusStartup
InternetOpenW
InternetOpenUrlW
InternetReadFile
InternetCloseHandle
CreateStreamOnHGlobal
CoTaskMemFree
CoInitialize
CoCreateInstance
_SbieApi_MonitorControl@8
_SbieApi_GetWork@12
_SbieDll_GetStartError@0
_SbieDll_StartSbieSvc@4
_SbieApi_CallServer@4
_SbieApi_FreeReply@4
_SbieApi_GetVersion@4
_SbieDll_StartSbieDrv@4
_SbieDll_FormatMessage0@4
_SbieDll_FormatMessage1@8
_SbieApi_EnumBoxes@8
_SbieApi_ReloadConf@4
_SbieDll_KillAll@8
_SbieApi_QueryConf@20
_SbieApi_QueryBoxPath@28
_SbieDll_TranslateNtToDosPath@4
_SbieDll_GetAllUsersPath@0
_SbieDll_GetUserPath@0
_SbieDll_GetDrivePath@4
_SbieApi_EnumProcessEx@16
_SbieApi_QueryProcess@20
_SbieApi_MonitorGet@8
_SbieDll_GetLanguage@4
_SbieApi_SetLicense@8
_SbieApi_GetLicense@4
_SbieDll_FormatMessage@8
_SbieDll_FormatMessage2@12
_SbieDll_KillOne@4
_SbieDll_DeviceChange@8
_SbieApi_DisableForceProcess@8
_SbieDll_CanElevateOnVista@0
_SbieApi_CallZero@4
_SbieDll_RunFromHome@16
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
c:\work\sbie\core\dll\obj\i386\SbieDll.pdb
RtlCreateProcessParameters
NtDeviceIoControlFile
_vsnprintf
NtRegisterThreadTerminatePort
NtRequestWaitReplyPort
NtAdjustPrivilegesToken
NtSetSecurityObject
LdrGetProcedureAddress
NtDuplicateObject
NtOpenThread
NtOpenProcess
NtQuerySystemInformation
RtlUnwind
NtQueryVirtualMemory
NtAssignProcessToJobObject
RtlFreeAnsiString
LdrLoadDll
NtLoadDriver
LdrUnloadDll
NtDeleteKey
NtEnumerateKey
NtEnumerateValueKey
NtQueryMultipleValueKey
NtNotifyChangeKey
NtNotifyChangeMultipleKeys
NtSaveKey
NtSetInformationKey
NtCreatePort
NtConnectPort
NtCreateEvent
NtOpenEvent
NtCreateMutant
NtOpenMutant
NtCreateSemaphore
NtOpenSemaphore
NtCreateSection
NtOpenSection
RtlInitString
RtlAnsiStringToUnicodeString
RtlFreeUnicodeString
strchr
sprintf
_stricmp
RtlUnicodeStringToAnsiString
strncmp
_wtoi
NtQueryAttributesFile
NtQueryInformationFile
NtSetInformationFile
NtCreateNamedPipeFile
NtCreateMailslotFile
NtFsControlFile
RtlGetCurrentDirectory_U
RtlSetCurrentDirectory_U
RtlGetFullPathName_U
NtQueryVolumeInformationFile
NtDeleteFile
RtlRaiseStatus
NtReadFile
NtWriteFile
NtOpenProcessToken
NtQueryInformationToken
RtlConvertSidToUnicodeString
NtQueryObject
RtlQueryRegistryValues
RtlCompareUnicodeString
RtlCreateRegistryKey
NtCreateFile
NtQueryFullAttributesFile
NtOpenSymbolicLinkObject
NtQuerySymbolicLinkObject
NtOpenDirectoryObject
NtSetInformationProcess
NtOpenFile
wcsrchr
NtQueryDirectoryFile
wcscmp
wcsncpy
RtlCompareMemory
_wcslwr
RtlCreateAcl
RtlAddAccessAllowedAce
RtlCreateSecurityDescriptor
RtlSetDaclSecurityDescriptor
NtProtectVirtualMemory
wcsstr
NtDeleteValueKey
NtQueryKey
NtOpenKey
NtCreateKey
NtClose
NtSetValueKey
towlower
wcsncmp
_wcsicmp
wcscat
wcschr
swprintf
_itow
wcscpy
wcslen
memmove
RtlInitUnicodeString
NtQueryValueKey
NtQuerySecurityObject
_wcsnicmp
CreateMutexW
CreateFileMappingW
ReleaseMutex
HeapDestroy
GlobalSize
GetTempPathW
CreateDirectoryW
GlobalFree
WriteFile
GlobalAlloc
GlobalLock
GlobalUnlock
OpenProcess
CreateFileA
FormatMessageW
SetLocaleInfoW
SetLocaleInfoA
QueueUserWorkItem
GetLongPathNameW
GetFullPathNameW
OpenFileMappingW
MapViewOfFile
CreateThread
GetSystemWindowsDirectoryW
WinExec
GetWindowsDirectoryW
CreateProcessA
GetCurrentDirectoryW
GetEnvironmentStringsW
GetTickCount
CreateEventW
OpenEventW
HeapFree
GetProcessHeap
HeapAlloc
VirtualFree
GetCommandLineW
Sleep
FindResourceW
FindResourceA
LoadResource
LockResource
GetCurrentThreadId
OpenThread
GetThreadTimes
WideCharToMultiByte
GetModuleFileNameW
GlobalAddAtomW
SetConsoleTitleA
SetConsoleTitleW
WaitNamedPipeW
MoveFileWithProgressW
GetCurrentThread
QueueUserAPC
CreateFileW
InitializeCriticalSectionAndSpinCount
GetSystemTimeAsFileTime
GetEnvironmentVariableW
SetEnvironmentVariableW
SetEvent
InterlockedCompareExchange
TlsGetValue
TlsSetValue
IsDebuggerPresent
TlsAlloc
InitializeCriticalSection
DisableThreadLibraryCalls
GetCurrentProcessId
GetCurrentProcess
EnterCriticalSection
VirtualAlloc
LeaveCriticalSection
VirtualProtect
ExitProcess
CreateProcessW
WaitForSingleObject
CloseHandle
LocalAlloc
LocalFree
SetLastError
ExpandEnvironmentStringsW
InterlockedDecrement
InterlockedIncrement
RaiseException
LoadLibraryW
FreeLibrary
OutputDebugStringW
GetModuleHandleW
GetProcAddress
GetLastError
HeapCreate
SbieApi_Log
SbieApi_LogEx
_SbieApi_CallServer@4
_SbieApi_CallZero@4
_SbieApi_CreateDirOrLink@8
_SbieApi_DisableForceProcess@8
_SbieApi_DuplicateObject@20
_SbieApi_EnumBoxes@8
_SbieApi_EnumProcessEx@16
_SbieApi_FreeReply@4
_SbieApi_GetInjectSaveArea@12
_SbieApi_GetLicense@4
_SbieApi_GetSetDeviceMap@4
_SbieApi_GetVersion@4
_SbieApi_GetWork@12
_SbieApi_HookTramp@8
_SbieApi_MonitorControl@8
_SbieApi_MonitorGet@8
_SbieApi_MonitorPut@8
_SbieApi_PortName@0
_SbieApi_QueryBoxPath@28
_SbieApi_QueryConf@20
_SbieApi_QueryPathList@12
_SbieApi_QueryProcess@20
_SbieApi_QueryProcessPath@28
_SbieApi_ReloadConf@4
_SbieApi_RenameFile@16
_SbieApi_SetLicense@8
_SbieApi_SetUserName@8
_SbieApi_StartProcess@16
_SbieDll_AssocQueryCommand@4
_SbieDll_AssocQueryProgram@4
_SbieDll_CanElevateOnVista@0
_SbieDll_ComCreateProxy@16
_SbieDll_ComCreateStub@16
_SbieDll_DeviceChange@8
_SbieDll_FormatMessage0@4
_SbieDll_FormatMessage1@8
_SbieDll_FormatMessage2@12
_SbieDll_FormatMessage@8
_SbieDll_GetAllUsersPath@0
_SbieDll_GetDrivePath@4
_SbieDll_GetHandlePath@12
_SbieDll_GetLanguage@4
_SbieDll_GetStartError@0
_SbieDll_GetUserPath@0
_SbieDll_Hook@12
_SbieDll_InitPStore@0
_SbieDll_InitProcess@0
_SbieDll_IsBoxedService@4
_SbieDll_IsDirectory@4
_SbieDll_IsOpenClsid@12
_SbieDll_IsWow64@0
_SbieDll_KillAll@8
_SbieDll_KillOne@4
_SbieDll_RunFromHome@16
_SbieDll_StartCOM@0
_SbieDll_StartSbieDrv@4
_SbieDll_StartSbieSvc@4
_SbieDll_TranslateNtToDosPath@4
_Scm_StartBoxedService@4
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
c:\work\sbie\core\dll\obj\i386\SbieDll.pdb
RtlCreateProcessParameters
NtDeviceIoControlFile
_vsnprintf
NtRegisterThreadTerminatePort
NtRequestWaitReplyPort
NtAdjustPrivilegesToken
NtSetSecurityObject
LdrGetProcedureAddress
NtDuplicateObject
NtOpenThread
NtOpenProcess
NtQuerySystemInformation
RtlUnwind
NtQueryVirtualMemory
NtAssignProcessToJobObject
RtlFreeAnsiString
LdrLoadDll
NtLoadDriver
LdrUnloadDll
NtDeleteKey
NtEnumerateKey
NtEnumerateValueKey
NtQueryMultipleValueKey
NtNotifyChangeKey
NtNotifyChangeMultipleKeys
NtSaveKey
NtSetInformationKey
NtCreatePort
NtConnectPort
NtCreateEvent
NtOpenEvent
NtCreateMutant
NtOpenMutant
NtCreateSemaphore
NtOpenSemaphore
NtCreateSection
NtOpenSection
RtlInitString
RtlAnsiStringToUnicodeString
RtlFreeUnicodeString
strchr
sprintf
_stricmp
RtlUnicodeStringToAnsiString
strncmp
_wtoi
NtQueryAttributesFile
NtQueryInformationFile
NtSetInformationFile
NtCreateNamedPipeFile
NtCreateMailslotFile
NtFsControlFile
RtlGetCurrentDirectory_U
RtlSetCurrentDirectory_U
RtlGetFullPathName_U
NtQueryVolumeInformationFile
NtDeleteFile
RtlRaiseStatus
NtReadFile
NtWriteFile
NtOpenProcessToken
NtQueryInformationToken
RtlConvertSidToUnicodeString
NtQueryObject
RtlQueryRegistryValues
RtlCompareUnicodeString
RtlCreateRegistryKey
NtCreateFile
NtQueryFullAttributesFile
NtOpenSymbolicLinkObject
NtQuerySymbolicLinkObject
NtOpenDirectoryObject
NtSetInformationProcess
NtOpenFile
wcsrchr
NtQueryDirectoryFile
wcscmp
wcsncpy
RtlCompareMemory
_wcslwr
RtlCreateAcl
RtlAddAccessAllowedAce
RtlCreateSecurityDescriptor
RtlSetDaclSecurityDescriptor
NtProtectVirtualMemory
wcsstr
NtDeleteValueKey
NtQueryKey
NtOpenKey
NtCreateKey
NtClose
NtSetValueKey
towlower
wcsncmp
_wcsicmp
wcscat
wcschr
swprintf
_itow
wcscpy
wcslen
memmove
RtlInitUnicodeString
NtQueryValueKey
NtQuerySecurityObject
_wcsnicmp
CreateMutexW
CreateFileMappingW
ReleaseMutex
HeapDestroy
GlobalSize
GetTempPathW
CreateDirectoryW
GlobalFree
WriteFile
GlobalAlloc
GlobalLock
GlobalUnlock
OpenProcess
CreateFileA
FormatMessageW
SetLocaleInfoW
SetLocaleInfoA
QueueUserWorkItem
GetLongPathNameW
GetFullPathNameW
OpenFileMappingW
MapViewOfFile
CreateThread
GetSystemWindowsDirectoryW
WinExec
GetWindowsDirectoryW
CreateProcessA
GetCurrentDirectoryW
GetEnvironmentStringsW
GetTickCount
CreateEventW
OpenEventW
HeapFree
GetProcessHeap
HeapAlloc
VirtualFree
GetCommandLineW
Sleep
FindResourceW
FindResourceA
LoadResource
LockResource
GetCurrentThreadId
OpenThread
GetThreadTimes
WideCharToMultiByte
GetModuleFileNameW
GlobalAddAtomW
SetConsoleTitleA
SetConsoleTitleW
WaitNamedPipeW
MoveFileWithProgressW
GetCurrentThread
QueueUserAPC
CreateFileW
InitializeCriticalSectionAndSpinCount
GetSystemTimeAsFileTime
GetEnvironmentVariableW
SetEnvironmentVariableW
SetEvent
InterlockedCompareExchange
TlsGetValue
TlsSetValue
IsDebuggerPresent
TlsAlloc
InitializeCriticalSection
DisableThreadLibraryCalls
GetCurrentProcessId
GetCurrentProcess
EnterCriticalSection
VirtualAlloc
LeaveCriticalSection
VirtualProtect
ExitProcess
CreateProcessW
WaitForSingleObject
CloseHandle
LocalAlloc
LocalFree
SetLastError
ExpandEnvironmentStringsW
InterlockedDecrement
InterlockedIncrement
RaiseException
LoadLibraryW
FreeLibrary
OutputDebugStringW
GetModuleHandleW
GetProcAddress
GetLastError
HeapCreate
SbieApi_Log
SbieApi_LogEx
_SbieApi_CallServer@4
_SbieApi_CallZero@4
_SbieApi_CreateDirOrLink@8
_SbieApi_DisableForceProcess@8
_SbieApi_DuplicateObject@20
_SbieApi_EnumBoxes@8
_SbieApi_EnumProcessEx@16
_SbieApi_FreeReply@4
_SbieApi_GetInjectSaveArea@12
_SbieApi_GetLicense@4
_SbieApi_GetSetDeviceMap@4
_SbieApi_GetVersion@4
_SbieApi_GetWork@12
_SbieApi_HookTramp@8
_SbieApi_MonitorControl@8
_SbieApi_MonitorGet@8
_SbieApi_MonitorPut@8
_SbieApi_PortName@0
_SbieApi_QueryBoxPath@28
_SbieApi_QueryConf@20
_SbieApi_QueryPathList@12
_SbieApi_QueryProcess@20
_SbieApi_QueryProcessPath@28
_SbieApi_ReloadConf@4
_SbieApi_RenameFile@16
_SbieApi_SetLicense@8
_SbieApi_SetUserName@8
_SbieApi_StartProcess@16
_SbieDll_AssocQueryCommand@4
_SbieDll_AssocQueryProgram@4
_SbieDll_CanElevateOnVista@0
_SbieDll_ComCreateProxy@16
_SbieDll_ComCreateStub@16
_SbieDll_DeviceChange@8
_SbieDll_FormatMessage0@4
_SbieDll_FormatMessage1@8
_SbieDll_FormatMessage2@12
_SbieDll_FormatMessage@8
_SbieDll_GetAllUsersPath@0
_SbieDll_GetDrivePath@4
_SbieDll_GetHandlePath@12
_SbieDll_GetLanguage@4
_SbieDll_GetStartError@0
_SbieDll_GetUserPath@0
_SbieDll_Hook@12
_SbieDll_InitPStore@0
_SbieDll_InitProcess@0
_SbieDll_IsBoxedService@4
_SbieDll_IsDirectory@4
_SbieDll_IsOpenClsid@12
_SbieDll_IsWow64@0
_SbieDll_KillAll@8
_SbieDll_KillOne@4
_SbieDll_RunFromHome@16
_SbieDll_StartCOM@0
_SbieDll_StartSbieDrv@4
_SbieDll_StartSbieSvc@4
_SbieDll_TranslateNtToDosPath@4
_Scm_StartBoxedService@4
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
c:\work\sbie\core\drv\obj\i386\SbieDrv.pdb
_except_handler3
ProbeForWrite
wcslen
ZwClose
ZwSetEvent
ZwOpenEvent
RtlInitUnicodeString
ExReleaseResourceLite
ExAcquireResourceExclusiveLite
wcsncpy
ExRaiseStatus
IoCreateDevice
IoDeleteDevice
wcscpy
RtlFreeUnicodeString
memmove
RtlCompareUnicodeString
wcschr
wcscat
_wcsicmp
ExAcquireResourceSharedLite
KeDelayExecutionThread
RtlQueryRegistryValues
_itow
_wcsnicmp
ExFreePoolWithTag
ExAllocatePoolWithTag
RtlUnicodeStringToInteger
swprintf
ZwUnmapViewOfSection
ZwMapViewOfSection
ZwCreateSection
ZwQueryInformationFile
ZwCreateFile
PsGetVersion
RtlSetDaclSecurityDescriptor
RtlCreateSecurityDescriptor
RtlAddAccessAllowedAce
RtlCreateAcl
ObfDereferenceObject
ObReferenceObjectByHandle
wcsrchr
ZwQueryValueKey
ZwOpenKey
ZwAdjustPrivilegesToken
ZwDuplicateToken
ZwOpenProcessToken
ZwOpenProcess
ExInitializeResourceLite
ExDeleteResourceLite
wcscmp
ZwSetInformationFile
ZwQuerySymbolicLinkObject
ZwOpenSymbolicLinkObject
MmGetSystemRoutineAddress
KeGetCurrentThread
PsLookupThreadByThreadId
ZwQuerySystemInformation
ExGetPreviousMode
ZwAllocateVirtualMemory
PsGetCurrentProcessId
KeInsertQueueDpc
KeSetTargetProcessorDpc
KeSetImportanceDpc
KeInitializeDpc
KeQueryActiveProcessors
PsGetCurrentThreadId
MmMapLockedPagesSpecifyCache
MmProbeAndLockPages
MmBuildMdlForNonPagedPool
KeServiceDescriptorTable
ZwYieldExecution
ZwAccessCheckAndAuditAlarm
RtlCompareMemory
wcstombs
IoCreateFile
ZwReadFile
wcsstr
_wcslwr
ZwCreateDirectoryObject
RtlCheckRegistryKey
ZwQueryInformationProcess
ZwCreateSymbolicLinkObject
ZwLoadKey
ZwUnloadKey
ZwSetValueKey
KeQuerySystemTime
ZwCreateKey
IoWriteErrorLogEntry
IoAllocateErrorLogEntry
DbgPrint
ObOpenObjectByName
ObQueryNameString
RtlCaptureStackBackTrace
PsSetLoadImageNotifyRoutine
PsSetCreateProcessNotifyRoutine
wcsncmp
RtlIntegerToUnicodeString
PsLookupProcessByProcessId
_stricmp
strncpy
ZwSetSecurityObject
ZwQueryInformationToken
SeQueryInformationToken
IoGetRequestorProcessId
ZwSetInformationProcess
IoGetCurrentProcess
NtDuplicateObject
SeSinglePrivilegeCheck
IoThreadToProcess
SeTokenIsAdmin
PsReferencePrimaryToken
_alldiv
RtlConvertSidToUnicodeString
ZwOpenThreadToken
ProbeForRead
KeBugCheckEx
ZwOpenThread
IofCompleteRequest
KfLowerIrql
KeGetCurrentIrql
KfRaiseIrql
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
c:\work\sbie\msgs\obj\i386\SbieMsg.pdb
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
c:\work\sbie\core\svc\obj\i386\SbieSvc.pdb
wcsstr
wcscat
wcscpy
_except_handler3
wcscmp
??3@YAXPAX@Z
_wcslwr
towlower
_wcsnicmp
wcschr
wcsrchr
_wtoi
_c_exit
??2@YAPAXI@Z
_wcsicmp
_exit
_XcptFilter
_cexit
exit
_acmdln
__getmainargs
_initterm
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
wcslen
ReportEventW
SetThreadToken
DuplicateTokenEx
SetTokenInformation
CreateProcessAsUserW
EnumServicesStatusW
QueryServiceConfigW
QueryServiceConfig2W
QueryServiceStatusEx
CloseServiceHandle
StartServiceW
OpenThreadToken
CheckTokenMembership
FreeSid
ConvertStringSidToSidW
LookupAccountSidW
LookupPrivilegeValueW
AdjustTokenPrivileges
RevertToSelf
InitializeSecurityDescriptor
SetSecurityDescriptorOwner
SetEntriesInAclW
SetSecurityDescriptorDacl
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerExW
SetServiceStatus
OpenSCManagerW
OpenServiceW
ControlService
OpenEventLogW
WriteFile
CreateFileW
CopyFileW
SetFileAttributesW
SetEndOfFile
HeapReAlloc
GetSystemWindowsDirectoryW
CancelIo
GetProcAddress
LoadLibraryW
DeleteFileW
GetFileAttributesW
GetWindowsDirectoryW
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
UnmapViewOfFile
ReleaseMutex
CreateMutexW
OpenEventW
GetCurrentProcessId
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoA
TerminateProcess
VirtualAlloc
ExitProcess
RaiseException
VirtualFree
InitializeCriticalSectionAndSpinCount
TlsAlloc
LeaveCriticalSection
OutputDebugStringW
EnterCriticalSection
TlsSetValue
TlsGetValue
GetLastError
QueueUserWorkItem
Sleep
GetCommandLineW
CloseHandle
HeapAlloc
GetProcessHeap
GetCurrentProcess
HeapFree
SetLastError
MapViewOfFile
CreateFileMappingW
OpenFileMappingW
HeapDestroy
HeapCreate
WaitForMultipleObjects
TerminateThread
WaitForSingleObject
SetEvent
InterlockedExchange
CreateEventW
SetThreadPriority
GetCurrentThread
InterlockedIncrement
CreateThread
GetVersionExW
OpenProcess
LocalFree
GetTickCount
ProcessIdToSessionId
InitializeCriticalSection
wsprintfW
NtOpenThreadToken
NtOpenProcessToken
NtQueryInformationToken
NtFilterToken
NtDuplicateToken
NtSetInformationThread
RtlCreateSecurityDescriptor
RtlSetDaclSecurityDescriptor
NtClose
NtCompleteConnectPort
NtAcceptConnectPort
NtImpersonateClientOfPort
NtReplyWaitReceivePort
NtCreatePort
RtlInitUnicodeString
NtLoadDriver
NtReadFile
NtWriteFile
NtQueryInformationFile
NtQueryFullAttributesFile
NtSetInformationFile
NtQueryDirectoryFile
NtCreateFile
SetupDiClassNameFromGuidExW
SetupDiBuildClassInfoList
CM_Get_Device_ID_ListW
CM_Get_Device_ID_List_SizeW
SetupDiDestroyDeviceInfoList
SetupDiOpenDeviceInfoW
SetupDiCreateDeviceInfoList
CM_Get_Device_Interface_ListA
CM_Get_Device_Interface_ListW
CM_Get_Device_Interface_List_SizeA
CM_Get_Device_Interface_List_SizeW
CM_Get_Device_Interface_Alias_ExW
CryptUnprotectData
CryptProtectData
CryptCATAdminCalcHashFromFileHandle
CoInitializeEx
CoUninitialize
CoCopyProxy
CoSetProxyBlanket
CoQueryProxyBlanket
CoMarshalInterface
CreateStreamOnHGlobal
CoUnmarshalInterface
CoGetClassObject
CoTaskMemFree
CoInitializeSecurity
SbieApi_Log
_SbieApi_PortName@0
_SbieApi_CallZero@4
_SbieApi_GetVersion@4
SbieApi_LogEx
_SbieApi_EnumProcessEx@16
_SbieApi_SetUserName@8
_SbieApi_QueryProcess@20
_SbieApi_GetWork@12
_SbieApi_QueryConf@20
_SbieDll_RunFromHome@16
_SbieApi_ReloadConf@4
_SbieApi_QueryProcessPath@28
_SbieDll_ComCreateStub@16
_SbieDll_IsOpenClsid@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
c:\work\sbie\apps\start\obj\i386\Start.pdb
SetThreadToken
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
CreateProcessAsUserW
ExpandEnvironmentStringsW
HeapAlloc
GetProcessHeap
ExitProcess
GetCommandLineW
MapViewOfFile
GetCurrentProcessId
FindClose
FindNextFileW
FindFirstFileW
HeapFree
HeapReAlloc
HeapDestroy
HeapCreate
GetSystemWindowsDirectoryW
GetFullPathNameW
GetPrivateProfileStringW
GetExitCodeProcess
WaitForSingleObject
GetModuleFileNameW
GetSystemTimeAsFileTime
RemoveDirectoryW
CreateProcessW
GetModuleHandleW
OpenMutexW
CloseHandle
Sleep
GetStdHandle
WriteFile
SetLastError
GetLastError
LocalFree
FormatMessageW
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
PatBlt
SetBkColor
SetTextColor
GetObjectW
CreateFontIndirectW
DefWindowProcW
MessageBoxW
wsprintfW
SetTimer
SendMessageW
SetWindowPos
EndDialog
SetFocus
ShowWindow
SendDlgItemMessageW
KillTimer
EnableWindow
GetSysColorBrush
GetSysColor
GetDlgItem
DialogBoxParamW
LoadImageW
CreateWindowExW
GetWindowInfo
GetWindowRect
SetDlgItemTextW
SetWindowTextW
GetWindowTextW
GetClientRect
GetDesktopWindow
DestroyIcon
DrawIconEx
GetDC
CreateMenu
GetMenuItemCount
InsertMenuItemW
SetMenuInfo
GetMenuInfo
DestroyWindow
CreatePopupMenu
RegisterClassW
TrackPopupMenu
DestroyMenu
NtTerminateProcess
wcscpy
_chkstk
_wcsnicmp
RtlUnwind
NtQueryVirtualMemory
NtCreateFile
NtQueryInformationFile
NtSetInformationFile
RtlNtStatusToDosError
iswspace
wcscmp
wcscat
iswctype
_wcsicmp
wcsncmp
_wtoi
wcsrchr
memmove
wcslen
memcpy
wcsncpy
RtlInitUnicodeString
NtOpenDirectoryObject
NtQueryObject
NtClose
strcmp
memset
towlower
sprintf
strlen
NtTerminateThread
SHAutoComplete
AssocQueryStringW
ShellExecuteExW
ShellExecuteW
SHGetFolderPathW
ExtractIconExW
CoTaskMemFree
CoInitialize
CoCreateInstance
GetOpenFileNameW
InitCommonControlsEx
_SbieDll_StartCOM@0
_SbieDll_FormatMessage1@8
SbieApi_Log
_SbieApi_GetSetDeviceMap@4
_SbieApi_StartProcess@16
_SbieDll_InitProcess@0
_SbieApi_QueryProcess@20
_SbieDll_RunFromHome@16
_SbieApi_CallServer@4
_SbieDll_StartSbieSvc@4
_SbieDll_StartSbieDrv@4
_SbieApi_QueryConf@20
_SbieApi_FreeReply@4
_SbieApi_EnumProcessEx@16
_SbieApi_SetLicense@8
_SbieDll_FormatMessage@8
_SbieDll_FormatMessage0@4
_SbieDll_GetLanguage@4
_SbieDll_CanElevateOnVista@0
_SbieApi_DisableForceProcess@8
_SbieDll_KillAll@8
_SbieApi_ReloadConf@4
_SbieDll_InitPStore@0
_SbieApi_EnumBoxes@8
_SbieDll_IsDirectory@4
_SbieDll_TranslateNtToDosPath@4
_SbieApi_QueryBoxPath@28
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ