dialog
initDialog
show
Overview
overview
7Static
static
37706bde331...18.exe
windows7-x64
77706bde331...18.exe
windows10-2004-x64
7$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...il.exe
windows7-x64
3$PLUGINSDI...il.exe
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...fo.dll
windows7-x64
3$PLUGINSDI...fo.dll
windows10-2004-x64
3Control.exe
windows7-x64
3Control.exe
windows10-2004-x64
3RegDump.exe
windows7-x64
1RegDump.exe
windows10-2004-x64
3Sandbox.sys
windows7-x64
1Sandbox.sys
windows10-2004-x64
1SandboxieD...ch.exe
windows7-x64
3SandboxieD...ch.exe
windows10-2004-x64
3SandboxieExplorer.exe
windows7-x64
3SandboxieExplorer.exe
windows10-2004-x64
3SandboxieHelper.dll
windows7-x64
3SandboxieHelper.dll
windows10-2004-x64
3SandboxieHelper32.dll
windows7-x64
3SandboxieHelper32.dll
windows10-2004-x64
3SandboxieRpcSs.exe
windows7-x64
3SandboxieRpcSs.exe
windows10-2004-x64
3SandboxieServer.exe
windows7-x64
3SandboxieServer.exe
windows10-2004-x64
3SandboxieToolbar.dll
windows7-x64
6SandboxieToolbar.dll
windows10-2004-x64
6Start.exe
windows7-x64
3Start.exe
windows10-2004-x64
3Static task
static1
Behavioral task
behavioral1
Sample
7706bde3316f14ff91e211a624b7f4ea_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7706bde3316f14ff91e211a624b7f4ea_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/KmdUtil.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/KmdUtil.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/UserInfo.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral11
Sample
Control.exe
Resource
win7-20240704-en
Behavioral task
behavioral12
Sample
Control.exe
Resource
win10v2004-20240704-en
Behavioral task
behavioral13
Sample
RegDump.exe
Resource
win7-20240708-en
Behavioral task
behavioral14
Sample
RegDump.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral15
Sample
Sandbox.sys
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
Sandbox.sys
Resource
win10v2004-20240709-en
Behavioral task
behavioral17
Sample
SandboxieDcomLaunch.exe
Resource
win7-20240704-en
Behavioral task
behavioral18
Sample
SandboxieDcomLaunch.exe
Resource
win10v2004-20240729-en
Behavioral task
behavioral19
Sample
SandboxieExplorer.exe
Resource
win7-20240729-en
Behavioral task
behavioral20
Sample
SandboxieExplorer.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral21
Sample
SandboxieHelper.dll
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
SandboxieHelper.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral23
Sample
SandboxieHelper32.dll
Resource
win7-20240705-en
Behavioral task
behavioral24
Sample
SandboxieHelper32.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral25
Sample
SandboxieRpcSs.exe
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
SandboxieRpcSs.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral27
Sample
SandboxieServer.exe
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
SandboxieServer.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral29
Sample
SandboxieToolbar.dll
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
SandboxieToolbar.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral31
Sample
Start.exe
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
Start.exe
Resource
win10v2004-20240729-en
Target
7706bde3316f14ff91e211a624b7f4ea_JaffaCakes118
Size
241KB
MD5
7706bde3316f14ff91e211a624b7f4ea
SHA1
7df712eb9da3d439dac48bf90ab90b18c336e3bc
SHA256
58c6571f99a22defc7233e0032491e55dff3fbdcc756a5f62bdae8c7f19a86ed
SHA512
db5241d84d8044909d22161504bf16a93064f680f9f44fdda4be9584535e2f5ee822091f8bc96fe030a48dc13b5924a14f90f62e4053f778271af49366bab515
SSDEEP
6144:mv9WWVkN5xxZjTWlt054gKjmFrPKQRU3KdeKs2fgUWjo05uVGdc5UDUeyD:VxxZHWlCVK8rPe3KdeKseoIVcUHD
Checks for missing Authenticode signature.
resource |
---|
7706bde3316f14ff91e211a624b7f4ea_JaffaCakes118 |
unpack001/$PLUGINSDIR/InstallOptions.dll |
unpack001/$PLUGINSDIR/KmdUtil.exe |
unpack001/$PLUGINSDIR/System.dll |
unpack001/$PLUGINSDIR/UserInfo.dll |
unpack001/Control.exe |
unpack001/RegDump.exe |
unpack001/Sandbox.sys |
unpack001/SandboxieDcomLaunch.exe |
unpack001/SandboxieExplorer.exe |
unpack001/SandboxieHelper.dll |
unpack001/SandboxieHelper32.dll |
unpack001/SandboxieRpcSs.exe |
unpack001/SandboxieServer.exe |
unpack001/SandboxieToolbar.dll |
unpack001/Start.exe |
resource | yara_rule |
---|---|
sample | nsis_installer_1 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
SetFileTime
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
CreateFileA
GetFileSize
GetModuleFileNameA
GetTickCount
GetCurrentProcess
CopyFileA
ExitProcess
lstrcpynA
CloseHandle
GetWindowsDirectoryA
GetTempPathA
GetUserDefaultLangID
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
GetTempFileNameA
SetEndOfFile
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
lstrcpyA
lstrlenA
lstrcatA
GetSystemDirectoryA
lstrcmpiA
GetEnvironmentVariableA
ExpandEnvironmentStringsA
GlobalFree
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
SetErrorMode
GetModuleHandleA
LoadLibraryA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
MulDiv
GetPrivateProfileStringA
WriteFile
ReadFile
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetCommandLineA
ScreenToClient
GetWindowRect
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
LoadCursorA
SetCursor
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
EndDialog
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxA
CharPrevA
DispatchMessageA
PeekMessageA
CreateDialogParamA
DestroyWindow
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
ShowWindow
wsprintfA
SendMessageTimeoutA
RegisterClassA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
TrackPopupMenu
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
FindWindowExA
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetMalloc
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetCurrentDirectoryA
GetCurrentDirectoryA
GetPrivateProfileIntA
GetModuleHandleA
lstrcmpiA
GetPrivateProfileStringA
lstrcatA
lstrcpynA
WritePrivateProfileStringA
lstrlenA
lstrcpyA
GlobalFree
MultiByteToWideChar
GlobalAlloc
GetDlgCtrlID
GetClientRect
SetWindowRgn
MapWindowPoints
LoadImageA
SetWindowLongA
CreateWindowExA
MapDialogRect
SetWindowPos
GetWindowRect
CreateDialogParamA
ShowWindow
EnableWindow
GetDlgItem
DestroyIcon
DestroyWindow
DispatchMessageA
TranslateMessage
GetMessageA
IsDialogMessageA
PtInRect
LoadCursorA
SetCursor
DrawTextA
GetWindowLongA
DrawFocusRect
CallWindowProcA
PostMessageA
MessageBoxA
CharNextA
wsprintfA
GetWindowTextA
SetWindowTextA
SendMessageA
LoadIconA
SetTextColor
GetObjectA
SelectObject
GetDIBits
CreateRectRgn
CombineRgn
DeleteObject
CreateCompatibleDC
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetDesktopFolder
SHGetMalloc
ShellExecuteA
GetOpenFileNameA
GetSaveFileNameA
CommDlgExtendedError
dialog
initDialog
show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
c:\work\sandbox\kmdutil\obj\i386\KmdUtil.pdb
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
_acmdln
exit
_cexit
_XcptFilter
_exit
_c_exit
wcslen
_wcsicmp
_wcsnicmp
wcscpy
__getmainargs
wcscat
swprintf
RegCloseKey
RegDeleteKeyW
OpenServiceW
DeleteService
CreateServiceW
RegSetValueExW
RegCreateKeyExW
StartServiceW
ControlService
OpenSCManagerW
RegOpenKeyExW
QueryPerformanceCounter
Sleep
GetTickCount
GetLastError
FormatMessageW
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoA
GetCommandLineW
MessageBoxW
CommandLineToArgvW
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
lstrcpyA
lstrcpynA
FreeLibrary
lstrcatA
GetProcAddress
LoadLibraryA
GetModuleHandleA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
GetLastError
VirtualAlloc
VirtualProtect
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GetVersion
GetCurrentThread
GetCurrentProcess
GetLastError
GlobalFree
CloseHandle
lstrcpynA
GlobalAlloc
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
FreeSid
GetUserNameA
OpenThreadToken
GetAccountType
GetName
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
c:\work\sandbox\control\obj\i386\Control.pdb
exit
_wcsupr
iswdigit
_wtoi
swprintf
atof
strchr
wcsncpy
wcschr
_wcsnicmp
_c_exit
_exit
_XcptFilter
wcslen
wcscat
wcsrchr
??2@YAPAXI@Z
free
_cexit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_purecall
??3@YAXPAX@Z
_wcsicmp
wcscpy
wcscmp
realloc
_except_handler3
memmove
_vsnprintf
sprintf
InitializeSecurityDescriptor
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetFileSecurityW
CloseEventLog
OpenEventLogW
ReadEventLogW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegDeleteValueW
RegCloseKey
AllocateAndInitializeSid
HeapCreate
CreateThread
GetFileTime
GetSystemTimeAsFileTime
OutputDebugStringW
DebugBreak
lstrlenA
ExitProcess
WriteFile
Sleep
GetCurrentProcessId
GetFileAttributesW
DeleteFileW
CopyFileW
CreateProcessW
GetWindowsDirectoryW
GetExitCodeProcess
LoadLibraryW
CreateFileW
GetLastError
GetProcAddress
GetTickCount
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoA
WaitNamedPipeW
ReadFile
VirtualAlloc
VirtualFree
LoadLibraryA
WaitForSingleObject
CreateDirectoryW
SetLastError
QueryPerformanceCounter
RaiseException
DeleteCriticalSection
InitializeCriticalSection
HeapDestroy
EnterCriticalSection
LeaveCriticalSection
GetFullPathNameW
GetCommandLineW
GetCurrentThreadId
GetVersionExW
lstrcpynA
lstrcpynW
lstrlenW
CreateMutexW
OpenMutexW
FlushInstructionCache
GetCurrentProcess
InterlockedDecrement
HeapFree
FormatMessageW
HeapAlloc
GetProcessHeap
FindClose
FindNextFileW
FindFirstFileW
InterlockedIncrement
CloseHandle
TrackPopupMenu
SendDlgItemMessageW
CharNextW
wvsprintfW
IsDlgButtonChecked
GetDlgItemTextW
GetWindowTextW
EndDialog
GetDlgItem
SetDlgItemTextW
InvalidateRect
GetSystemMetrics
LoadAcceleratorsW
GetActiveWindow
DialogBoxParamW
CreateWindowExW
DeleteMenu
UpdateWindow
InsertMenuW
DispatchMessageW
TranslateMessage
GetMessageW
PeekMessageW
DefWindowProcW
DestroyWindow
SetWindowLongW
GetWindowLongW
CallWindowProcW
SetMenuItemInfoW
GetMenuItemInfoW
SetMenuDefaultItem
PostQuitMessage
SetFocus
LoadStringW
SendMessageW
LoadStringA
SetWindowPos
GetClientRect
GetWindowRect
TrackPopupMenuEx
IsWindow
MapWindowPoints
MessageBeep
DestroyMenu
AppendMenuW
GetMenuItemCount
CreatePopupMenu
PtInRect
RemoveMenu
GetMenuItemID
PostMessageW
RegisterWindowMessageW
SetForegroundWindow
GetCursorPos
GetSubMenu
LoadMenuW
SetWindowTextW
MoveWindow
ShowWindow
IsWindowVisible
RedrawWindow
SetTimer
KillTimer
MessageBoxW
RegisterClassExW
LoadImageW
wsprintfW
LoadCursorW
GetClassInfoExW
TranslateAcceleratorW
ModifyMenuW
CheckMenuItem
ZwClose
NtQuerySymbolicLinkObject
NtQueryDirectoryFile
RtlInitUnicodeString
NtCreateFile
NtOpenSymbolicLinkObject
NtDeviceIoControlFile
NtOpenFile
NtClose
SHFileOperationW
SHBrowseForFolderW
SHBindToParent
SHGetPathFromIDListW
ord165
CommandLineToArgvW
DragAcceptFiles
DragQueryFileW
SHGetFolderPathW
ShellExecuteW
Shell_NotifyIconW
InitCommonControlsEx
InternetOpenUrlW
InternetCloseHandle
InternetReadFile
InternetOpenW
CoTaskMemFree
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
c:\work\sandbox\regdump\obj\i386\RegDump.pdb
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_initterm
_except_handler3
_controlfp
__getmainargs
__initenv
exit
_cexit
_XcptFilter
_exit
_c_exit
free
malloc
swprintf
wprintf
__set_app_type
wcslen
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
CreateFileW
GetProcessHeap
HeapAlloc
HeapFree
GetTickCount
SetUnhandledExceptionFilter
ZwReadFile
ZwClose
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
c:\work\sandbox\driver\obj\i386\Sandbox.pdb
KeDelayExecutionThread
ZwYieldExecution
swprintf
RtlFreeUnicodeString
RtlAnsiStringToUnicodeString
RtlInitAnsiString
ProbeForWrite
ProbeForRead
_except_handler3
MmMapLockedPagesSpecifyCache
MmProbeAndLockPages
MmBuildMdlForNonPagedPool
ZwUnmapViewOfSection
ZwClose
ZwMapViewOfSection
ZwCreateSection
ZwQueryInformationFile
ZwCreateFile
RtlInitUnicodeString
wcscpy
_wcsicmp
DbgPrint
KeServiceDescriptorTable
ZwAccessCheckAndAuditAlarm
RtlCompareMemory
wcstombs
IoWriteErrorLogEntry
IoAllocateErrorLogEntry
wcsncat
wcscat
ZwOpenDirectoryObject
_wcsnicmp
ZwQueryDirectoryObject
memmove
ZwQuerySymbolicLinkObject
ZwOpenSymbolicLinkObject
ZwQueryObject
ExGetPreviousMode
wcscmp
ZwSetValueKey
KeQuerySystemTime
ZwCreateKey
ZwReadFile
IoCreateFile
ZwQueryValueKey
ZwOpenKey
wcsncpy
RtlQueryRegistryValues
wcslen
RtlUnicodeStringToInteger
ZwTerminateProcess
PsIsThreadTerminating
KeGetCurrentThread
PsGetCurrentProcessId
ZwOpenProcess
_aulldiv
PsSetCreateProcessNotifyRoutine
RtlIntegerToUnicodeString
ZwCreateDirectoryObject
ZwCreateSymbolicLinkObject
wcsrchr
ZwQueryInformationProcess
RtlConvertSidToUnicodeString
ZwQueryInformationToken
ZwOpenProcessToken
ZwOpenThreadToken
PsGetCurrentThreadId
PsSetCreateThreadNotifyRoutine
_stricmp
ZwQuerySystemInformation
KeEnterCriticalRegion
ZwQueryKey
RtlPrefixUnicodeString
ZwEnumerateValueKey
ZwEnumerateKey
ZwSetInformationFile
ZwWriteFile
ZwFreeVirtualMemory
ZwAllocateVirtualMemory
ZwQueryDirectoryFile
ZwSetInformationThread
wcsncmp
RtlCompareUnicodeString
ZwOpenEvent
ZwCreateEvent
ZwOpenSection
IofCompleteRequest
ZwDuplicateToken
IoCreateDevice
IoDeleteDevice
PsGetVersion
RtlSetDaclSecurityDescriptor
SePublicDefaultDacl
RtlCreateSecurityDescriptor
ZwAdjustPrivilegesToken
KeTickCount
ExFreePoolWithTag
KeBugCheckEx
wcschr
ExAllocatePoolWithTag
KeRaiseIrqlToDpcLevel
KfLowerIrql
KeGetCurrentIrql
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
c:\work\sandbox\services\dcomlaunch\obj\i386\SandboxieDcomLaunch.pdb
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
_except_handler3
_acmdln
exit
_cexit
_XcptFilter
_exit
_c_exit
_controlfp
__getmainargs
wcscpy
_wcsicmp
wcscmp
SetServiceStatus
RegisterServiceCtrlHandlerW
RegisterServiceCtrlHandlerExW
StartServiceCtrlDispatcherW
OpenServiceW
CloseServiceHandle
QueryServiceStatus
StartServiceW
ControlService
QueryServiceStatusEx
OpenProcessToken
GetTokenInformation
ConvertSidToStringSidW
OpenSCManagerW
TerminateProcess
ExitProcess
Sleep
GetProcAddress
CreateThread
SuspendThread
GetCurrentThread
CreateFileMappingW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoA
LoadLibraryW
LocalFree
HeapFree
CloseHandle
SetLastError
OpenProcess
HeapAlloc
GetProcessHeap
GetCurrentProcess
MessageBoxW
wsprintfW
_Sandboxie_Helper_Hook@12
NtOpenFile
RtlInitUnicodeString
NtDeviceIoControlFile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
c:\work\sandbox\explorer\obj\i386\SandboxieExplorer.pdb
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_cexit
_XcptFilter
_exit
_c_exit
wcslen
wcschr
free
_wcsicmp
wcscpy
_wcsdup
_except_handler3
memcpy
realloc
memcmp
??3@YAXPAX@Z
wcscat
_purecall
memset
memmove
_wcsnicmp
??2@YAPAXI@Z
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
GetStartupInfoA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
VirtualAlloc
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GlobalFree
CreateFileW
CloseHandle
GlobalAlloc
GlobalLock
GlobalUnlock
GetCommandLineW
GetProcessHeap
VirtualFree
LoadLibraryA
TerminateProcess
GetVersionExW
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
RaiseException
lstrcpynA
lstrcpynW
MulDiv
lstrlenW
FlushInstructionCache
GetCurrentProcess
SetLastError
ExitProcess
DeleteCriticalSection
InitializeCriticalSection
HeapDestroy
InterlockedDecrement
OutputDebugStringW
GetProcAddress
LoadLibraryW
FindNextChangeNotification
WaitForMultipleObjects
CreateThread
FindFirstChangeNotificationW
HeapFree
GetFullPathNameW
HeapAlloc
CreateBitmap
CreatePatternBrush
DeleteObject
PatBlt
SelectObject
DeleteDC
ShowWindow
LoadMenuW
LoadAcceleratorsW
GetMessageW
TranslateMessage
DispatchMessageW
ClientToScreen
GetCursorPos
TrackPopupMenu
CreateWindowExW
LoadImageW
SetWindowLongW
SetMenuItemInfoW
GetMenuItemInfoW
SetMenuDefaultItem
SendMessageW
GetParent
GetClientRect
SetWindowTextW
DrawEdge
PostQuitMessage
PostMessageW
SetFocus
GetFocus
wsprintfW
MessageBoxW
TranslateAcceleratorW
DestroyWindow
RegisterClassExW
LoadCursorW
GetClassInfoExW
DefWindowProcW
SetRectEmpty
LoadStringW
GetWindowLongW
LoadStringA
SetWindowPos
InvalidateRect
MessageBeep
TrackPopupMenuEx
IsWindow
MapWindowPoints
PtInRect
PeekMessageW
BeginPaint
EndPaint
GetMessagePos
ScreenToClient
SetCursor
GetCapture
UpdateWindow
SetCapture
ReleaseCapture
GetWindowRect
CallWindowProcW
GetWindowDC
ReleaseDC
SystemParametersInfoW
GetSystemMetrics
CreatePopupMenu
DestroyMenu
AppendMenuW
GetMenuItemCount
RemoveMenu
FillRect
GetWindowTextW
_Sandboxie_Helper_Hook@12
DragQueryFileW
CommandLineToArgvW
ord190
ord524
SHGetSpecialFolderLocation
SHGetDesktopFolder
SHGetFileInfoW
InitCommonControlsEx
OleUninitialize
OleInitialize
CoTaskMemAlloc
OleSetClipboard
CoTaskMemFree
NtDeviceIoControlFile
NtOpenSymbolicLinkObject
NtQuerySymbolicLinkObject
NtClose
RtlInitUnicodeString
NtOpenFile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
c:\work\sandbox\helper\obj\i386\SandboxieHelper.pdb
ZwWriteFile
ZwReadFile
_chkstk
LdrLoadDll
LdrUnloadDll
NtOpenFile
NtClose
memmove
strchr
sprintf
strncmp
_stricmp
wcsncmp
RtlInitString
RtlAnsiStringToUnicodeString
RtlFreeUnicodeString
NtCreatePort
NtConnectPort
NtSecureConnectPort
wcscat
RtlCreateProcessParameters
RtlFreeAnsiString
RtlUnicodeStringToAnsiString
wcscpy
wcschr
wcsrchr
_wcsicmp
wcsstr
ZwSetValueKey
RtlInitUnicodeString
NtOpenKey
ZwClose
ZwCreateKey
wcscmp
RtlUnwind
NtQueryVirtualMemory
NtDeviceIoControlFile
_vsnprintf
NtQuerySymbolicLinkObject
NtOpenSymbolicLinkObject
_wcsnicmp
wcslen
swprintf
SendMessageTimeoutA
SendMessageTimeoutW
DdeInitializeA
DdeInitializeW
GetAncestor
GetDesktopWindow
GetWindowLongW
SetWindowLongW
CallWindowProcW
PostMessageA
PostMessageW
SendNotifyMessageA
SendNotifyMessageW
SendMessageCallbackA
SendMessageCallbackW
SetWindowsHookExA
SetWindowsHookExW
SendInput
GetShellWindow
CreateDialogParamA
CreateDialogParamW
CreateDialogIndirectParamA
CreateDialogIndirectParamW
DialogBoxParamA
DialogBoxParamW
DialogBoxIndirectParamA
DialogBoxIndirectParamW
CreateWindowExA
CreateWindowExW
DefWindowProcA
DefWindowProcW
DefFrameProcA
DefFrameProcW
DefDlgProcA
SendMessageW
SetWindowTextA
SetWindowTextW
GetWindowTextA
GetWindowTextW
FindWindowA
FindWindowW
FindWindowExA
FindWindowExW
EmptyClipboard
SetClipboardData
RegisterClassExA
RegisterClassExW
RegisterClassA
RegisterClassW
UnregisterClassA
UnregisterClassW
GetClassInfoExA
GetClassInfoExW
GetClassInfoA
GetClassInfoW
GetClassNameA
GetPropA
GetPropW
SetPropA
SetPropW
EnumWindows
EnumChildWindows
EnumThreadWindows
EnumDesktopWindows
GetThreadDesktop
GetClassNameW
GetParent
GetWindowThreadProcessId
wsprintfW
MessageBoxW
SendMessageA
DefDlgProcW
LeaveCriticalSection
WriteFile
HeapCreate
CreateMutexW
WaitForSingleObject
ReleaseMutex
HeapDestroy
TerminateProcess
ResumeThread
ReadFile
VirtualAllocEx
ReadProcessMemory
WriteProcessMemory
GetWindowsDirectoryW
CreateFileMappingW
UnmapViewOfFile
LocalAlloc
InterlockedExchange
InterlockedIncrement
LoadLibraryW
CreateFileA
GetModuleFileNameW
GetTickCount
GetModuleHandleW
GetProcAddress
FindResourceW
FindResourceA
LoadResource
LockResource
SetConsoleTitleA
SetConsoleTitleW
GetCurrentThreadId
IsDebuggerPresent
OpenFileMappingW
MapViewOfFile
GetCurrentProcessId
SuspendThread
GetCurrentThread
Sleep
TlsAlloc
CreateProcessW
WinExec
CreateProcessA
CreateFileW
TlsGetValue
TlsSetValue
ExpandEnvironmentStringsW
GetLongPathNameW
OpenProcess
HeapFree
DisableThreadLibraryCalls
SetLastError
ExitProcess
InitializeCriticalSection
GetCommandLineW
GetCurrentProcess
CloseHandle
GetProcessHeap
HeapAlloc
WideCharToMultiByte
EnterCriticalSection
VirtualAlloc
WaitNamedPipeW
VirtualProtect
GetLastError
FormatMessageW
OutputDebugStringW
StartServiceCtrlDispatcherW
RegOpenKeyExA
RegSetKeySecurity
RegQueryValueExA
OpenSCManagerA
OpenSCManagerW
OpenServiceA
OpenServiceW
CloseServiceHandle
QueryServiceConfigA
QueryServiceLockStatusA
QueryServiceLockStatusW
ControlService
StartServiceA
StartServiceW
EnumServicesStatusA
EnumServicesStatusW
EnumServicesStatusExA
EnumServicesStatusExW
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
RegisterServiceCtrlHandlerW
RegisterServiceCtrlHandlerExA
RegisterServiceCtrlHandlerExW
SetServiceStatus
RegisterEventSourceA
RegisterEventSourceW
ReportEventA
ReportEventW
DeregisterEventSource
QueryServiceStatus
QueryServiceConfigW
QueryServiceStatusEx
CreateProcessAsUserA
CreateProcessAsUserW
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
RegOpenCurrentUser
GetModuleBaseNameW
EnumProcessModules
_SandboxieHelper_PStoreInit@0
_Sandboxie_Helper_CreateProcessW@44
_Sandboxie_Helper_Hook@12
_Sandboxie_Helper_Init_OpenKey@0
_Sandboxie_Helper_Init_SCM@0
_Sandboxie_Helper_IsDirectory@4
_Sandboxie_Helper_Start_Servers@0
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
c:\work\sandbox\helper\obj\i386\SandboxieHelper.pdb
ZwWriteFile
ZwReadFile
_chkstk
LdrLoadDll
LdrUnloadDll
NtOpenFile
NtClose
memmove
strchr
sprintf
strncmp
_stricmp
wcsncmp
RtlInitString
RtlAnsiStringToUnicodeString
RtlFreeUnicodeString
NtCreatePort
NtConnectPort
NtSecureConnectPort
wcscat
RtlCreateProcessParameters
RtlFreeAnsiString
RtlUnicodeStringToAnsiString
wcscpy
wcschr
wcsrchr
_wcsicmp
wcsstr
ZwSetValueKey
RtlInitUnicodeString
NtOpenKey
ZwClose
ZwCreateKey
wcscmp
RtlUnwind
NtQueryVirtualMemory
NtDeviceIoControlFile
_vsnprintf
NtQuerySymbolicLinkObject
NtOpenSymbolicLinkObject
_wcsnicmp
wcslen
swprintf
SendMessageTimeoutA
SendMessageTimeoutW
DdeInitializeA
DdeInitializeW
GetAncestor
GetDesktopWindow
GetWindowLongW
SetWindowLongW
CallWindowProcW
PostMessageA
PostMessageW
SendNotifyMessageA
SendNotifyMessageW
SendMessageCallbackA
SendMessageCallbackW
SetWindowsHookExA
SetWindowsHookExW
SendInput
GetShellWindow
CreateDialogParamA
CreateDialogParamW
CreateDialogIndirectParamA
CreateDialogIndirectParamW
DialogBoxParamA
DialogBoxParamW
DialogBoxIndirectParamA
DialogBoxIndirectParamW
CreateWindowExA
CreateWindowExW
DefWindowProcA
DefWindowProcW
DefFrameProcA
DefFrameProcW
DefDlgProcA
SendMessageW
SetWindowTextA
SetWindowTextW
GetWindowTextA
GetWindowTextW
FindWindowA
FindWindowW
FindWindowExA
FindWindowExW
EmptyClipboard
SetClipboardData
RegisterClassExA
RegisterClassExW
RegisterClassA
RegisterClassW
UnregisterClassA
UnregisterClassW
GetClassInfoExA
GetClassInfoExW
GetClassInfoA
GetClassInfoW
GetClassNameA
GetPropA
GetPropW
SetPropA
SetPropW
EnumWindows
EnumChildWindows
EnumThreadWindows
EnumDesktopWindows
GetThreadDesktop
GetClassNameW
GetParent
GetWindowThreadProcessId
wsprintfW
MessageBoxW
SendMessageA
DefDlgProcW
LeaveCriticalSection
WriteFile
HeapCreate
CreateMutexW
WaitForSingleObject
ReleaseMutex
HeapDestroy
TerminateProcess
ResumeThread
ReadFile
VirtualAllocEx
ReadProcessMemory
WriteProcessMemory
GetWindowsDirectoryW
CreateFileMappingW
UnmapViewOfFile
LocalAlloc
InterlockedExchange
InterlockedIncrement
LoadLibraryW
CreateFileA
GetModuleFileNameW
GetTickCount
GetModuleHandleW
GetProcAddress
FindResourceW
FindResourceA
LoadResource
LockResource
SetConsoleTitleA
SetConsoleTitleW
GetCurrentThreadId
IsDebuggerPresent
OpenFileMappingW
MapViewOfFile
GetCurrentProcessId
SuspendThread
GetCurrentThread
Sleep
TlsAlloc
CreateProcessW
WinExec
CreateProcessA
CreateFileW
TlsGetValue
TlsSetValue
ExpandEnvironmentStringsW
GetLongPathNameW
OpenProcess
HeapFree
DisableThreadLibraryCalls
SetLastError
ExitProcess
InitializeCriticalSection
GetCommandLineW
GetCurrentProcess
CloseHandle
GetProcessHeap
HeapAlloc
WideCharToMultiByte
EnterCriticalSection
VirtualAlloc
WaitNamedPipeW
VirtualProtect
GetLastError
FormatMessageW
OutputDebugStringW
StartServiceCtrlDispatcherW
RegOpenKeyExA
RegSetKeySecurity
RegQueryValueExA
OpenSCManagerA
OpenSCManagerW
OpenServiceA
OpenServiceW
CloseServiceHandle
QueryServiceConfigA
QueryServiceLockStatusA
QueryServiceLockStatusW
ControlService
StartServiceA
StartServiceW
EnumServicesStatusA
EnumServicesStatusW
EnumServicesStatusExA
EnumServicesStatusExW
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
RegisterServiceCtrlHandlerW
RegisterServiceCtrlHandlerExA
RegisterServiceCtrlHandlerExW
SetServiceStatus
RegisterEventSourceA
RegisterEventSourceW
ReportEventA
ReportEventW
DeregisterEventSource
QueryServiceStatus
QueryServiceConfigW
QueryServiceStatusEx
CreateProcessAsUserA
CreateProcessAsUserW
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
RegOpenCurrentUser
GetModuleBaseNameW
EnumProcessModules
_SandboxieHelper_PStoreInit@0
_Sandboxie_Helper_CreateProcessW@44
_Sandboxie_Helper_Hook@12
_Sandboxie_Helper_Init_OpenKey@0
_Sandboxie_Helper_Init_SCM@0
_Sandboxie_Helper_IsDirectory@4
_Sandboxie_Helper_Start_Servers@0
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
c:\work\sandbox\services\rpcss\obj\i386\SandboxieRpcSs.pdb
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_adjust_fdiv
_XcptFilter
_exit
_c_exit
__p__commode
__p__fmode
__set_app_type
wcscpy
_wcsicmp
_except_handler3
_controlfp
_cexit
wcscmp
SetServiceStatus
RegisterServiceCtrlHandlerW
RegisterServiceCtrlHandlerExW
StartServiceCtrlDispatcherW
OpenServiceW
CloseServiceHandle
QueryServiceStatus
StartServiceW
ControlService
QueryServiceStatusEx
OpenProcessToken
GetTokenInformation
ConvertSidToStringSidW
OpenSCManagerW
TerminateProcess
ExitProcess
Sleep
GetProcAddress
CreateThread
SuspendThread
GetCurrentThread
CreateFileMappingW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoA
LoadLibraryW
GetProcessHeap
HeapFree
CloseHandle
LocalFree
OpenProcess
HeapAlloc
SetLastError
GetCurrentProcess
wsprintfW
MessageBoxW
RtlAdjustPrivilege
NtSetInformationProcess
NtDeviceIoControlFile
NtOpenFile
RtlInitUnicodeString
listen
bind
WSAStartup
_Sandboxie_Helper_Hook@12
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
c:\work\sandbox\server\obj\i386\SandboxieServer.pdb
_initterm
__getmainargs
_acmdln
exit
_cexit
__setusermatherr
_exit
_c_exit
wcscmp
wcslen
wcsrchr
__p__commode
_adjust_fdiv
__p__fmode
__set_app_type
_controlfp
_XcptFilter
_except_handler3
wcscpy
wcscat
memcpy
memset
??2@YAPAXI@Z
StartServiceCtrlDispatcherW
QueryServiceStatusEx
QueryServiceConfigW
ImpersonateNamedPipeClient
OpenServiceW
StartServiceW
RevertToSelf
RegOpenKeyExW
RegQueryInfoKeyW
RegEnumKeyExW
RegCloseKey
OpenSCManagerW
EnumServicesStatusW
CloseServiceHandle
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
InitializeSecurityDescriptor
SetSecurityDescriptorOwner
SetEntriesInAclW
SetSecurityDescriptorDacl
ReportEventW
OpenEventLogW
RegisterServiceCtrlHandlerExW
SetServiceStatus
GetFileTime
QueueUserWorkItem
Sleep
FlushFileBuffers
TerminateProcess
OpenProcess
GetProcAddress
LoadLibraryW
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoA
CreateFileW
LocalFree
GetModuleFileNameW
HeapDestroy
GetLastError
HeapFree
HeapAlloc
GetProcessHeap
CloseHandle
GetCurrentProcess
SetLastError
OutputDebugStringW
MapViewOfFile
CreateFileMappingW
ReadFileEx
HeapCreate
SetEvent
CreateThread
CreateEventW
CreateWaitableTimerW
GetOverlappedResult
WaitForMultipleObjectsEx
ExitThread
ConnectNamedPipe
CreateNamedPipeW
DisconnectNamedPipe
CancelIo
CancelWaitableTimer
SetWaitableTimer
WriteFileEx
wsprintfW
CM_Get_Device_ID_List_SizeW
CM_Get_Device_ID_ListW
SetupDiBuildClassInfoList
SetupDiClassNameFromGuidExW
CM_Get_Device_Interface_List_SizeW
CM_Get_Device_Interface_ListW
CryptUnprotectData
CryptProtectData
IIDFromString
CoTaskMemFree
RtlInitUnicodeString
NtOpenFile
NtDeviceIoControlFile
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
c:\work\sandbox\toolbar\obj\i386\SandboxieToolbar.pdb
wcscat
_except_handler3
??3@YAXPAX@Z
wcsstr
_wcslwr
_wcsnicmp
memmove
wcscmp
_wcsicmp
strstr
strchr
swprintf
wcsrchr
wcsncpy
wcscpy
free
wcslen
??2@YAPAXI@Z
_purecall
_vsnprintf
sprintf
NtClose
NtQueryObject
NtDeviceIoControlFile
NtQuerySymbolicLinkObject
NtOpenSymbolicLinkObject
NtOpenFile
RtlInitUnicodeString
SHGetFolderPathW
CoCreateInstance
RegisterTypeLi
SysAllocString
SysFreeString
LoadTypeLi
SysStringLen
LoadRegTypeLi
VariantInit
ImageList_Create
ImageList_ReplaceIcon
ImageList_Destroy
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegCloseKey
CreatePopupMenu
SetMenuInfo
GetMenuItemCount
InsertMenuItemW
DestroyMenu
GetClientRect
CreateMenu
SetWindowLongW
DestroyWindow
ShowWindow
GetClassInfoExW
LoadCursorW
wsprintfW
IsWindow
CharNextW
TrackPopupMenu
LoadStringW
CallWindowProcW
GetWindowLongW
DefWindowProcW
LoadImageW
SendMessageW
MessageBoxW
CreateWindowExW
GetWindowRect
RegisterClassExW
DeleteObject
GetTickCount
QueryPerformanceCounter
FindFirstFileW
FindNextFileW
FindClose
CreateFileW
GetFileInformationByHandle
ReadFile
HeapFree
GetProcessHeap
HeapAlloc
CreateProcessW
RaiseException
GetCurrentProcess
CloseHandle
SetLastError
GetCurrentProcessId
DisableThreadLibraryCalls
LoadLibraryW
GetProcAddress
FreeLibrary
lstrlenW
GetModuleFileNameW
HeapDestroy
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
LoadLibraryA
VirtualFree
VirtualAlloc
WriteFile
EnterCriticalSection
LeaveCriticalSection
GetCurrentThreadId
InterlockedDecrement
InterlockedIncrement
DeleteCriticalSection
InitializeCriticalSection
GetLastError
lstrcpyW
FlushInstructionCache
WaitNamedPipeW
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
c:\work\sandbox\start\obj\i386\Start.pdb
RegOpenKeyExW
SetThreadToken
RegCloseKey
RegQueryValueExW
Sleep
CreateProcessW
OpenMutexW
CloseHandle
SetLastError
TerminateThread
GetCurrentThread
GetModuleHandleW
FindClose
FindNextFileW
GetCommandLineW
HeapDestroy
HeapCreate
HeapFree
SetCurrentDirectoryW
GetFileAttributesW
GetFullPathNameW
GetSystemTimeAsFileTime
GetExitCodeProcess
WaitForSingleObject
ExpandEnvironmentStringsW
GetProcessHeap
HeapAlloc
GetSystemDirectoryW
GetLastError
ExitProcess
WaitNamedPipeW
WriteFile
ReadFile
FormatMessageW
FindFirstFileW
CreateFileW
CreateCompatibleDC
CreateCompatibleBitmap
PatBlt
SelectObject
CreateMenu
GetMenuItemCount
InsertMenuItemW
SetMenuInfo
DestroyMenu
GetDC
CreatePopupMenu
GetWindowTextW
EndDialog
SetWindowTextW
SetFocus
GetSysColorBrush
DrawIconEx
DestroyIcon
LoadImageW
DialogBoxParamW
TrackPopupMenu
DestroyWindow
SetWindowPos
SendDlgItemMessageW
GetDlgItem
GetWindowRect
CreateWindowExW
SendMessageW
wsprintfW
MessageBoxW
GetWindowInfo
ZwEnumerateKey
NtOpenKey
ZwDeleteKey
NtClose
NtQueryVirtualMemory
NtCreateFile
NtOpenSymbolicLinkObject
NtQuerySymbolicLinkObject
sprintf
_vsnprintf
RtlInitUnicodeString
RtlUnwind
NtSetInformationFile
RtlNtStatusToDosError
wcsrchr
_wcsicmp
wcscmp
_wcsnicmp
iswctype
wcsncpy
wcslen
wcsncmp
wcscat
swprintf
wcscpy
NtDeviceIoControlFile
NtOpenFile
memmove
SHAutoComplete
AssocQueryStringW
SHGetPathFromIDListW
SHGetFolderPathW
ExtractIconExW
CoTaskMemFree
CoInitialize
CoCreateInstance
GetOpenFileNameW
InitCommonControlsEx
_Sandboxie_Helper_CreateProcessW@44
_Sandboxie_Helper_Init_OpenKey@0
_Sandboxie_Helper_Init_SCM@0
_SandboxieHelper_PStoreInit@0
_Sandboxie_Helper_IsDirectory@4
_Sandboxie_Helper_Start_Servers@0
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ