The existing code in the fopen() call aways fails with an invalid
argument, so the if clause following it has never been run since this
version of the code was in place.
Fixing this bug may expose other side effects as it is assuming that the
first 4 bytes of an executable are not printable.
In the code path below, the execution of the HEK_FLAGS(hek) causes the
memory for a different allocated structure to be modified, which then
causes an access violation when the corrupted value is used as an index.
This is in the module HV, routine S_share_hek_flags().
len has a value if 19 in