Import table
kernel32.dll
OpenFileMappingW, MapViewOfFile, GetWindowsDirectoryW, HeapDestroy, QueueUserWorkItem, GetTempPathW, WriteFile, CreateFileA, CreateFileMappingW, SizeofResource, ReadFile, EnumResourceNamesW, LoadLibraryExW, GetVersionExW, FormatMessageW, SetLocaleInfoW, SetLocaleInfoA, PostQueuedCompletionStatus, GetLongPathNameW, GetFullPathNameW, GetProcessId, OpenMutexW, CreateMutexW, ReleaseMutex, WinExec, TerminateProcess, CreateProcessA, SetThreadPriority, ResumeThread, GetExitCodeProcess, OpenEventW, HeapFree, GetProcessHeap, HeapAlloc, VirtualAlloc, CreateThread, WaitForMultipleObjects, GetConsoleWindow, AllocConsole, SetConsoleTitleA, GetConsoleTitleA, GetConsoleTitleW, SetConsoleTitleW, GetStartupInfoW, FindResourceW, FindResourceA, LoadResource, LockResource, GetThreadTimes, MapViewOfFileEx, UnmapViewOfFile, GlobalFree, OpenThread, GlobalAddAtomW, GlobalSize, GlobalAlloc, GlobalLock, GlobalUnlock, GetCurrentThreadId, WideCharToMultiByte, GetSystemInfo, OpenProcess, Sleep, InitializeCriticalSection, MoveFileWithProgressW, ReplaceFileW, MoveFileExW, TryEnterCriticalSection, CreateFileW, DeleteFileW, GetCurrentThread, QueueUserAPC, GetEnvironmentStringsW, GetEnvironmentVariableW, GetSystemWindowsDirectoryW, GetFileAttributesW, CreateDirectoryW, SetEvent, InterlockedExchange, InterlockedCompareExchange, GetTickCount, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, TlsGetValue, TlsSetValue, TlsAlloc, VirtualFree, GetCurrentProcessId, VirtualProtect, GetCommandLineW, GetModuleFileNameW, SetEnvironmentVariableW, ExitProcess, CreateProcessW, WaitForSingleObject, LocalAlloc, LocalFree, GetSystemTimeAsFileTime, FreeLibrary, InterlockedDecrement, LoadLibraryW, ExpandEnvironmentStringsW, RaiseException, OutputDebugStringW, GetModuleHandleW, CreateEventW, CloseHandle, InterlockedIncrement, GetCurrentProcess, GetProcAddress, SetLastError, GetLastError, HeapCreate
ntdll.dll
NtOpenProcess, NtSetInformationJobObject, NtAssignProcessToJobObject, NtCreateJobObject, NtDuplicateObject, NtUnmapViewOfSection, NtMapViewOfSection, _strlwr, RtlUnwind, NtQuerySecurityObject, NtSetSecurityObject, NtSetInformationToken, NtAdjustPrivilegesToken, RtlConvertSidToUnicodeString, RtlCreateAcl, RtlAddAccessAllowedAceEx, RtlCreateSecurityDescriptor, RtlSetDaclSecurityDescriptor, RtlSetSaclSecurityDescriptor, sprintf, _vsnprintf, RtlNtStatusToDosError, NtQueryVirtualMemory, iswctype, NtYieldExecution, LdrLoadDll, LdrUnloadDll, LdrQueryImageFileExecutionOptions, NtLoadDriver, tolower, LdrQueryProcessModuleInformation, NtDeleteKey, NtEnumerateValueKey, NtQueryMultipleValueKey, NtNotifyChangeKey, NtNotifyChangeMultipleKeys, NtSaveKey, NtLoadKey, NtSetInformationKey, NtDeleteValueKey, NtQueryKey, NtCreatePort, NtSecureConnectPort, NtImpersonateClientOfPort, NtCreateEvent, NtOpenEvent, NtCreateMutant, NtOpenMutant, NtCreateSemaphore, NtOpenSemaphore, NtCreateSection, NtOpenSection, NtImpersonateAnonymousToken, NtImpersonateThread, NtOpenThreadToken, NtDuplicateToken, NtQueryInformationToken, NtOpenProcessToken, NtOpenThread, NtQueryInformationThread, RtlUnicodeStringToAnsiString, wcstoul, strchr, strncmp, RtlInitString, RtlAnsiStringToUnicodeString, RtlFreeUnicodeString, NtQueryInformationProcess, NtSetInformationThread, NtQueryAttributesFile, NtQueryFullAttributesFile, NtQueryInformationFile, NtSetInformationFile, NtCreateNamedPipeFile, NtCreateMailslotFile, NtFsControlFile, RtlGetFullPathName_U, RtlGetCurrentDirectory_U, RtlSetCurrentDirectory_U, NtQueryVolumeInformationFile, wcscmp, NtQuerySystemInformation, NtDeleteFile, NtReadFile, NtWriteFile, NtDeviceIoControlFile, NtCreateFile, NtOpenSymbolicLinkObject, NtQuerySymbolicLinkObject, NtOpenDirectoryObject, NtSetInformationProcess, NtQueryObject, _wtoi, NtOpenFile, NtQueryDirectoryFile, RtlCompareUnicodeString, wcsncpy, wcsrchr, wcstol, _wcslwr, NtEnumerateKey, wcsstr, LdrGetProcedureAddress, NtOpenKey, NtCreateKey, NtSetValueKey, wcsncmp, _wcsicmp, wcscat, wcschr, swprintf, _itow, memmove, NtQueryValueKey, towlower, wcslen, wcscpy, NtRequestWaitReplyPort, NtClose, RtlInitUnicodeString, NtConnectPort, NtRegisterThreadTerminatePort, strstr, _wcsnicmp
Export table
_SbieApi_ActivateLicense@8
_SbieApi_CallOne@8
_SbieApi_CallTwo@12
_SbieApi_CallZero@4
_SbieApi_CheckInternetAccess@12
_SbieApi_DisableForceProcess@8
_SbieApi_EnumBoxes@8
_SbieApi_EnumBoxesEx@12
_SbieApi_EnumProcessEx@16
_SbieApi_GetFileName@12
_SbieApi_GetHomePath@16
_SbieApi_GetUnmountHive@4
_SbieApi_GetVersion@4
_SbieApi_GetWork@12
_SbieApi_HookTramp@8
_SbieApi_IsBoxEnabled@4
_SbieApi_MonitorControl@8
_SbieApi_MonitorGet@8
_SbieApi_MonitorPut@8
_SbieApi_OpenProcess@8
_SbieApi_QueryBoxPath@28
_SbieApi_QueryConf@20
_SbieApi_QueryConfBool@12
_SbieApi_QueryLicense@8
_SbieApi_QueryPathList@16
_SbieApi_QueryProcess@20
_SbieApi_QueryProcessEx@24
_SbieApi_QueryProcessEx2@28
_SbieApi_QueryProcessInfo@8
_SbieApi_QueryProcessPath@28
_SbieApi_ReloadConf@4
_SbieApi_SessionLeader@8
_SbieApi_SetUserName@8
_SbieApi_vLogEx@16
_SbieDll_AssocQueryCommand@4
_SbieDll_AssocQueryProgram@4
_SbieDll_CallServer@4
_SbieDll_ComCreateProxy@16
_SbieDll_ComCreateStub@16
_SbieDll_DeviceChange@8
_SbieDll_DisableElevationHook@0
_SbieDll_ExpandAndRunProgram@4
_SbieDll_FormatMessage@8
_SbieDll_FormatMessage0@4
_SbieDll_FormatMessage1@8
_SbieDll_FormatMessage2@12
_SbieDll_FreeMem@4
_SbieDll_GetDrivePath@4
_SbieDll_GetHandlePath@12
_SbieDll_GetLanguage@4
_SbieDll_GetServiceRegistryValue@12
_SbieDll_GetStartError@0
_SbieDll_GetTokenElevationType@0
_SbieDll_GetUserPathEx@4
_SbieDll_Hook@12
_SbieDll_InitPStore@0
_SbieDll_IsBoxedService@4
_SbieDll_IsDirectory@4
_SbieDll_IsOpenClsid@12
_SbieDll_IsOpenCOM@0
_SbieDll_KillAll@8
_SbieDll_KillOne@4
_SbieDll_PortName@0
_SbieDll_QueueCreate@8
_SbieDll_QueueGetReq@24
_SbieDll_QueueGetRpl@16
_SbieDll_QueuePutReq@20
_SbieDll_QueuePutRpl@16
_SbieDll_RegisterDllCallback@4
_SbieDll_RunFromHome@16
_SbieDll_RunSandboxed@24
_SbieDll_StartBoxedService@8
_SbieDll_StartCOM@4
_SbieDll_StartSbieSvc@4
_SbieDll_TranslateNtToDosPath@4
_SbieDll_UpdateConf@20
SbieApi_ActivateLicense
SbieApi_CallOne
SbieApi_CallTwo
SbieApi_CallZero
SbieApi_CheckInternetAccess
SbieApi_DisableForceProcess
SbieApi_EnumBoxes
SbieApi_EnumProcessEx
SbieApi_GetFileName
SbieApi_GetHomePath
SbieApi_GetUnmountHive
SbieApi_GetVersion
SbieApi_GetWork
SbieApi_HookTramp
SbieApi_IsBoxEnabled
SbieApi_Log
SbieApi_LogEx
SbieApi_MonitorControl
SbieApi_MonitorGet
SbieApi_MonitorPut
SbieApi_OpenProcess
SbieApi_QueryBoxPath
SbieApi_QueryConf
SbieApi_QueryConfBool
SbieApi_QueryLicense
SbieApi_QueryPathList
SbieApi_QueryProcess
SbieApi_QueryProcessEx
SbieApi_QueryProcessInfo
SbieApi_QueryProcessPath
SbieApi_ReloadConf
SbieApi_SessionLeader
SbieApi_SetUserName
SbieDll_AssocQueryCommand
SbieDll_AssocQueryProgram
SbieDll_CallServer
SbieDll_ComCreateProxy
SbieDll_ComCreateStub
SbieDll_DeviceChange
SbieDll_DisableElevationHook
SbieDll_ExpandAndRunProgram
SbieDll_FormatMessage
SbieDll_FormatMessage0
SbieDll_FormatMessage1
SbieDll_FormatMessage2
SbieDll_FreeMem
SbieDll_GetDrivePath
SbieDll_GetHandlePath
SbieDll_GetLanguage
SbieDll_GetServiceRegistryValue
SbieDll_GetStartError
SbieDll_GetTokenElevationType
SbieDll_GetUserPathEx
SbieDll_Hook
SbieDll_InitPStore
SbieDll_IsBoxedService
SbieDll_IsDirectory
SbieDll_IsOpenClsid
SbieDll_IsOpenCOM
SbieDll_KillAll
SbieDll_KillOne
SbieDll_PortName
SbieDll_QueueCreate
SbieDll_QueueGetReq
SbieDll_QueueGetRpl
SbieDll_QueuePutReq
SbieDll_QueuePutRpl
SbieDll_RegisterDllCallback
SbieDll_RunFromHome
SbieDll_RunSandboxed
SbieDll_StartBoxedService
SbieDll_StartCOM
SbieDll_StartSbieSvc
SbieDll_TranslateNtToDosPath
SbieDll_UpdateConf