sbeio.dll

Description: Stream Buffer IO DLL

Authors: © Microsoft Corporation. All rights reserved.

Version: 12.0.19041.1

Architecture: 64-bit

Operating System: Windows NT

SHA256: 609be2915d4f32317999c56b69d26c46

File Size: 193.5 KB

Uploaded At: Dec. 1, 2025, 7:38 a.m.

Views: 4

Security Warning

This file has been flagged as potentially dangerous.


Reason: Detected potentially dangerous functions used for process injection: OpenProcess

Exported Functions

  • DVRCreateDVRFileSink (Ordinal: 1, Address: 0x18d0)
  • DVRCreateDVRFileSource (Ordinal: 2, Address: 0x4670)

Imported DLLs & Functions

ADVAPI32.dll
  • CryptAcquireContextA (Address: 0x18002b980)
  • CryptGenRandom (Address: 0x18002b978)
  • CryptReleaseContext (Address: 0x18002b948)
  • InitializeSecurityDescriptor (Address: 0x18002b968)
  • RegQueryValueExW (Address: 0x18002b970)
  • RegSetValueExW (Address: 0x18002b960)
  • SetEntriesInAclW (Address: 0x18002b958)
  • SetSecurityDescriptorDacl (Address: 0x18002b950)
KERNEL32.dll
  • CloseHandle (Address: 0x18002ba98)
  • CreateEventW (Address: 0x18002baf0)
  • CreateFileMappingW (Address: 0x18002bac0)
  • CreateFileW (Address: 0x18002ba58)
  • CreateMutexW (Address: 0x18002ba40)
  • DeleteCriticalSection (Address: 0x18002bb08)
  • DeleteFileW (Address: 0x18002b9f8)
  • DisableThreadLibraryCalls (Address: 0x18002bb18)
  • DuplicateHandle (Address: 0x18002ba78)
  • EnterCriticalSection (Address: 0x18002ba10)
  • GetCurrentProcess (Address: 0x18002ba20)
  • GetCurrentProcessId (Address: 0x18002bb60)
  • GetCurrentThreadId (Address: 0x18002bb28)
  • GetFileInformationByHandle (Address: 0x18002ba80)
  • GetFileType (Address: 0x18002ba00)
  • GetFullPathNameW (Address: 0x18002ba18)
  • GetLastError (Address: 0x18002ba88)
  • GetModuleHandleW (Address: 0x18002b9d0)
  • GetProcAddress (Address: 0x18002b9d8)
  • GetProcessHeap (Address: 0x18002b9a0)
  • GetSystemInfo (Address: 0x18002baa0)
  • GetSystemTimeAsFileTime (Address: 0x18002bb30)
  • GetTempPathW (Address: 0x18002b9c0)
  • GetTickCount (Address: 0x18002bb38)
  • GetVersion (Address: 0x18002b9c8)
  • GetVersionExW (Address: 0x18002b9b0)
  • GlobalMemoryStatus (Address: 0x18002b9f0)
  • HeapAlloc (Address: 0x18002b990)
  • HeapFree (Address: 0x18002b998)
  • InitializeCriticalSection (Address: 0x18002bad8)
  • LeaveCriticalSection (Address: 0x18002ba30)
  • LocalAlloc (Address: 0x18002ba50)
  • LocalFree (Address: 0x18002bab0)
  • MapViewOfFile (Address: 0x18002bac8)
  • OpenEventW (Address: 0x18002ba60)
  • OpenFileMappingW (Address: 0x18002bae0)
  • OpenMutexW (Address: 0x18002bb10)
  • OpenProcess (Address: 0x18002bae8)
  • QueryPerformanceCounter (Address: 0x18002bb20)
  • ReadFile (Address: 0x18002ba08)
  • ReleaseMutex (Address: 0x18002ba68)
  • ResetEvent (Address: 0x18002bb00)
  • RtlCaptureContext (Address: 0x18002bb40)
  • RtlLookupFunctionEntry (Address: 0x18002bb48)
  • RtlVirtualUnwind (Address: 0x18002bb50)
  • SetEvent (Address: 0x18002ba90)
  • SetFilePointer (Address: 0x18002ba38)
  • SetFilePointerEx (Address: 0x18002baa8)
  • SetUnhandledExceptionFilter (Address: 0x18002bab8)
  • Sleep (Address: 0x18002baf8)
  • TerminateProcess (Address: 0x18002b9b8)
  • UnhandledExceptionFilter (Address: 0x18002bb58)
  • UnmapViewOfFile (Address: 0x18002ba70)
  • VirtualAlloc (Address: 0x18002b9e0)
  • VirtualFree (Address: 0x18002b9a8)
  • WaitForMultipleObjects (Address: 0x18002bad0)
  • WaitForSingleObject (Address: 0x18002ba48)
  • WaitForSingleObjectEx (Address: 0x18002b9e8)
  • WriteFile (Address: 0x18002ba28)
msvcrt.dll
  • __C_specific_handler (Address: 0x18002bbf8)
  • __dllonexit (Address: 0x18002bb80)
  • _amsg_exit (Address: 0x18002bbe0)
  • _callnewh (Address: 0x18002bbb8)
  • _initterm (Address: 0x18002bb98)
  • _lock (Address: 0x18002bb90)
  • _onexit (Address: 0x18002bba0)
  • _purecall (Address: 0x18002bbc8)
  • _unlock (Address: 0x18002bb88)
  • _vsnwprintf (Address: 0x18002bbf0)
  • _wcsicmp (Address: 0x18002bbe8)
  • _XcptFilter (Address: 0x18002bba8)
  • free (Address: 0x18002bbb0)
  • malloc (Address: 0x18002bbc0)
  • memcpy (Address: 0x18002bbd8)
  • memmove (Address: 0x18002bbd0)
  • memset (Address: 0x18002bc00)
ole32.dll
  • CoTaskMemAlloc (Address: 0x18002bc10)
  • CoTaskMemFree (Address: 0x18002bc20)
  • StringFromGUID2 (Address: 0x18002bc18)
RPCRT4.dll
  • UuidCreate (Address: 0x18002bb70)