Alloc
Call
Copy
Free
Get
Int64Op
Store
Overview
overview
3Static
static
3Сʿ...me.exe
windows7-x64
1Сʿ...me.exe
windows10-2004-x64
1Сʿ...st.exe
windows7-x64
3Сʿ...st.exe
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Сʿ....1.exe
windows7-x64
3Сʿ....1.exe
windows10-2004-x64
3$APPDATA/X...dse.js
windows7-x64
3$APPDATA/X...dse.js
windows10-2004-x64
3$APPDATA/X...gue.js
windows7-x64
3$APPDATA/X...gue.js
windows10-2004-x64
3$APPDATA/X...all.js
windows7-x64
3$APPDATA/X...all.js
windows10-2004-x64
3$APPDATA/X...ase.js
windows7-x64
3$APPDATA/X...ase.js
windows10-2004-x64
3$APPDATA/X..._CN.js
windows7-x64
3$APPDATA/X..._CN.js
windows10-2004-x64
3$PLUGINSDI...ns.dll
windows7-x64
3$PLUGINSDI...ns.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3TaobaoAPI.dll
windows7-x64
1TaobaoAPI.dll
windows10-2004-x64
3detoured.dll
windows7-x64
1detoured.dll
windows10-2004-x64
1xttProxy.dll
windows7-x64
1xttProxy.dll
windows10-2004-x64
1xttbrowser.exe
windows7-x64
1xttbrowser.exe
windows10-2004-x64
1xttbrowser.exe
windows7-x64
1xttbrowser.exe
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
Сʿ4ң/R-Readme.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
Сʿ4ң/R-Readme.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral3
Sample
Сʿ4ң/uninst.exe
Resource
win7-20240215-en
Behavioral task
behavioral4
Sample
Сʿ4ң/uninst.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240508-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
Сʿ4ң/xttSetup2.1.exe
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
Сʿ4ң/xttSetup2.1.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral9
Sample
$APPDATA/XiTaotao/Page/addse.js
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
$APPDATA/XiTaotao/Page/addse.js
Resource
win10v2004-20240426-en
Behavioral task
behavioral11
Sample
$APPDATA/XiTaotao/Page/configue.js
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
$APPDATA/XiTaotao/Page/configue.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
$APPDATA/XiTaotao/Page/ext-all.js
Resource
win7-20240221-en
Behavioral task
behavioral14
Sample
$APPDATA/XiTaotao/Page/ext-all.js
Resource
win10v2004-20240226-en
Behavioral task
behavioral15
Sample
$APPDATA/XiTaotao/Page/ext-base.js
Resource
win7-20240419-en
Behavioral task
behavioral16
Sample
$APPDATA/XiTaotao/Page/ext-base.js
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
$APPDATA/XiTaotao/Page/ext-lang-zh_CN.js
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
$APPDATA/XiTaotao/Page/ext-lang-zh_CN.js
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win7-20240215-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral21
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240220-en
Behavioral task
behavioral22
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
TaobaoAPI.dll
Resource
win7-20240508-en
Behavioral task
behavioral24
Sample
TaobaoAPI.dll
Resource
win10v2004-20240426-en
Behavioral task
behavioral25
Sample
detoured.dll
Resource
win7-20240221-en
Behavioral task
behavioral26
Sample
detoured.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral27
Sample
xttProxy.dll
Resource
win7-20240221-en
Behavioral task
behavioral28
Sample
xttProxy.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral29
Sample
xttbrowser.exe
Resource
win7-20240508-en
Behavioral task
behavioral30
Sample
xttbrowser.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral31
Sample
xttbrowser.exe
Resource
win7-20240508-en
Behavioral task
behavioral32
Sample
xttbrowser.exe
Resource
win10v2004-20240426-en
Target
6c13929b73cb1665d13c5a9f778bee2a_JaffaCakes118
Size
21.6MB
MD5
6c13929b73cb1665d13c5a9f778bee2a
SHA1
11ca01e252b42ac8b50d0aaa2bcb166134148166
SHA256
35b92fe07234af65ca91e6d5e8edb5edccdf15fcd8cc21f6eea487ad8bc46236
SHA512
f3c574f94745925d32701d462eb754d5826be8682e0a911a47b5cc67c8782d68b90dd3c0f40666882bcb5376e0b0630381d10f09ab98d5b773a4815160031d38
SSDEEP
393216:CP8ziOjmND8q+M1jNDzb5+N68p8tonjWw6pLUGn627bmxe6M5De7oHxh5BGoP:CP8WOj2DD+whDzt+4l2Ww6pLUu7r6M5R
Checks for missing Authenticode signature.
resource |
---|
unpack001/Сʿ4ң/R-Readme.exe |
unpack001/Сʿ4ң/uninst.exe |
unpack002/$PLUGINSDIR/System.dll |
unpack003/$PLUGINSDIR/InstallOptions.dll |
unpack003/$PLUGINSDIR/System.dll |
unpack001/Сʿ4ң/Сʿ4ң.exe |
resource | yara_rule |
---|---|
static1/unpack001/Сʿ4ң/uninst.exe | nsis_installer_1 |
static1/unpack001/Сʿ4ң/uninst.exe | nsis_installer_2 |
static1/unpack001/Сʿ4ң/xttSetup2.1.exe | nsis_installer_1 |
static1/unpack001/Сʿ4ң/xttSetup2.1.exe | nsis_installer_2 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
htonl
gethostbyname
htons
WSACleanup
WSAStartup
ioctlsocket
setsockopt
CoInitialize
CoUninitialize
CoCreateInstance
CoFreeUnusedLibraries
CoTaskMemAlloc
CoTaskMemFree
SysFreeString
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
GlobalLock
GlobalUnlock
SetFilePointer
ExitProcess
GetModuleHandleA
GetCommandLineA
GetProcessTimes
SetEndOfFile
CopyFileA
CreateEventA
CreateThread
ExitThread
InterlockedDecrement
ResetEvent
WaitForMultipleObjects
GetCurrentThreadId
FreeLibrary
GetThreadPriority
GetCurrentThread
Sleep
GetModuleFileNameA
WaitForSingleObject
GetTickCount
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
ReleaseMutex
CreateMutexA
SetErrorMode
LoadLibraryA
GetProcAddress
FindClose
FindNextFileA
FindFirstFileA
GetFileSize
WriteFile
ReadFile
CreateFileA
CreateDirectoryA
RemoveDirectoryA
MoveFileA
DeleteFileA
GetFileAttributesA
SystemTimeToFileTime
GetSystemTime
GetTimeZoneInformation
GetUserDefaultLangID
GetLastError
GetVersionExA
GetStartupInfoA
CreateProcessA
CloseHandle
QueryPerformanceCounter
QueryPerformanceFrequency
IsDBCSLeadByte
GetACP
GetCPInfo
GlobalFree
GlobalAlloc
DeleteCriticalSection
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
InterlockedIncrement
GetCurrentProcess
SetThreadPriority
SetEvent
DestroyWindow
SetClipboardData
EmptyClipboard
SetWindowPos
GetWindowRect
GetWindow
UnregisterClassA
DispatchMessageA
TranslateMessage
TranslateAcceleratorA
GetMessageA
LoadAcceleratorsA
RegisterClassA
LoadIconA
UpdateWindow
ShowWindow
PostQuitMessage
DialogBoxParamA
EndDialog
MoveWindow
GetDesktopWindow
SetDlgItemTextA
EnableWindow
GetDlgItemTextA
GetWindowTextLengthA
GetDlgItem
SetMenu
PostThreadMessageA
GetQueueStatus
PeekMessageA
MsgWaitForMultipleObjects
RegisterWindowMessageA
IsClipboardFormatAvailable
GetClipboardData
CloseClipboard
GetWindowLongA
DefWindowProcA
IsWindow
CreateWindowExA
OpenClipboard
GetMenu
BeginPaint
EndPaint
LoadCursorA
SetCursor
KillTimer
SetTimer
PostMessageA
FillRect
GetSubMenu
ReleaseCapture
GetCapture
LoadMenuA
GetMenuItemID
DeleteMenu
ClientToScreen
TrackPopupMenu
SetCapture
GetCursorPos
ScreenToClient
GetClientRect
LoadStringA
MessageBoxA
EnableMenuItem
CheckMenuItem
InvalidateRect
SetWindowLongA
WaitForInputIdle
MapVirtualKeyA
GetKeyState
GetSystemMetrics
DdeInitializeA
DdeCreateStringHandleA
DdeConnect
DdeClientTransaction
DdeDisconnect
DdeFreeStringHandle
DdeUninitialize
GetDC
ReleaseDC
GetDoubleClickTime
SetFocus
DestroyMenu
WindowFromPoint
GetFocus
StartDocA
GetClipBox
CreateSolidBrush
BeginPath
FillPath
ExtCreatePen
StrokePath
EndPath
PolyBezierTo
SelectClipPath
RestoreDC
SaveDC
EndPage
StartPage
GdiFlush
DeleteObject
SelectObject
StretchDIBits
SetDIBitsToDevice
CreateCompatibleBitmap
GetObjectA
DeleteDC
CreateDIBSection
GetDeviceCaps
CreateCompatibleDC
BitBlt
RealizePalette
SelectPalette
MoveToEx
LineTo
EnumFontFamiliesA
SetBkMode
LPtoDP
SetTextAlign
IntersectClipRect
SelectClipRgn
ExtTextOutA
ExtTextOutW
SetTextColor
GetTextMetricsA
CreateFontIndirectA
CreatePen
GetClipRgn
CreateRectRgn
GetTextAlign
GetBkMode
GetTextColor
DPtoLP
GetTextExtentPoint32A
GetTextExtentPoint32W
GetCurrentObject
SetBkColor
GetBkColor
CreatePalette
SetPolyFillMode
EndDoc
GetSystemPaletteEntries
GetOpenFileNameA
GetSaveFileNameA
PrintDlgA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegSetValueA
RegCreateKeyA
RegSetValueExA
DragQueryFileA
DragAcceptFiles
timeGetDevCaps
waveInGetDevCapsA
waveInReset
waveInUnprepareHeader
waveInClose
waveInOpen
waveInPrepareHeader
waveInStop
waveInAddBuffer
waveInStart
waveInGetNumDevs
timeBeginPeriod
waveOutGetNumDevs
waveOutReset
waveOutUnprepareHeader
waveOutPrepareHeader
waveOutWrite
timeSetEvent
timeGetTime
timeEndPeriod
waveOutOpen
waveOutGetDevCapsA
timeKillEvent
waveOutClose
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
GetTickCount
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
GetWindowsDirectoryA
SetFileTime
GetCommandLineA
SetErrorMode
LoadLibraryA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
CreateFileA
GetTempFileNameA
lstrlenA
lstrcatA
GetSystemDirectoryA
GetVersion
CloseHandle
lstrcmpiA
lstrcmpA
ExpandEnvironmentStringsA
GlobalFree
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
GetModuleHandleA
LoadLibraryExA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
MulDiv
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetTempPathA
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
RegisterClassA
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
DestroyWindow
CreateDialogParamA
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
OpenClipboard
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
ShowWindow
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
GetLastError
lstrcpyA
lstrcpynA
FreeLibrary
lstrcatA
GetProcAddress
LoadLibraryA
GetModuleHandleA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
VirtualAlloc
VirtualProtect
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
SetCurrentDirectoryA
GetFileAttributesA
GetLastError
CreateDirectoryA
SetFileAttributesA
Sleep
GetTickCount
GetFileSize
GetModuleFileNameA
GetCurrentProcess
CopyFileA
ExitProcess
GetWindowsDirectoryA
SetFileTime
GetCommandLineA
SetErrorMode
LoadLibraryA
lstrcpynA
GetDiskFreeSpaceA
GlobalUnlock
GlobalLock
CreateThread
CreateProcessA
RemoveDirectoryA
CreateFileA
GetTempFileNameA
lstrlenA
lstrcatA
GetSystemDirectoryA
GetVersion
CloseHandle
lstrcmpiA
lstrcmpA
ExpandEnvironmentStringsA
GlobalFree
GlobalAlloc
WaitForSingleObject
GetExitCodeProcess
GetModuleHandleA
LoadLibraryExA
GetProcAddress
FreeLibrary
MultiByteToWideChar
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
MulDiv
SetFilePointer
FindClose
FindNextFileA
FindFirstFileA
DeleteFileA
GetTempPathA
EndDialog
ScreenToClient
GetWindowRect
EnableMenuItem
GetSystemMenu
SetClassLongA
IsWindowEnabled
SetWindowPos
GetSysColor
GetWindowLongA
SetCursor
LoadCursorA
CheckDlgButton
GetMessagePos
LoadBitmapA
CallWindowProcA
IsWindowVisible
CloseClipboard
SetClipboardData
EmptyClipboard
RegisterClassA
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
MessageBoxIndirectA
CharPrevA
DispatchMessageA
PeekMessageA
DestroyWindow
CreateDialogParamA
SetTimer
SetWindowTextA
PostQuitMessage
SetForegroundWindow
wsprintfA
SendMessageTimeoutA
FindWindowExA
SystemParametersInfoA
CreateWindowExA
GetClassInfoA
DialogBoxParamA
CharNextA
OpenClipboard
ExitWindowsEx
IsWindow
GetDlgItem
SetWindowLongA
LoadImageA
GetDC
EnableWindow
InvalidateRect
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
DrawTextA
EndPaint
ShowWindow
SetBkColor
GetDeviceCaps
DeleteObject
CreateBrushIndirect
CreateFontIndirectA
SetBkMode
SetTextColor
SelectObject
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetFileInfoA
ShellExecuteA
SHFileOperationA
SHGetSpecialFolderLocation
RegQueryValueExA
RegSetValueExA
RegEnumKeyA
RegEnumValueA
RegOpenKeyExA
RegDeleteKeyA
RegDeleteValueA
RegCloseKey
RegCreateKeyExA
ImageList_AddMasked
ImageList_Destroy
ord17
ImageList_Create
CoTaskMemFree
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
SetCurrentDirectoryA
GetCurrentDirectoryA
GetTickCount
MultiByteToWideChar
GetPrivateProfileIntA
GlobalLock
GetModuleHandleA
lstrcmpiA
GetPrivateProfileStringA
lstrcatA
lstrcpynA
WritePrivateProfileStringA
lstrlenA
lstrcpyA
GlobalFree
GlobalUnlock
GlobalAlloc
LoadCursorA
PtInRect
MapWindowPoints
GetDlgCtrlID
CloseClipboard
SetCursor
OpenClipboard
GetClientRect
SetWindowRgn
LoadIconA
LoadImageA
SetWindowLongA
CreateWindowExA
MapDialogRect
SetWindowPos
GetWindowRect
CreateDialogParamA
ShowWindow
EnableMenuItem
GetSystemMenu
EnableWindow
GetDlgItem
DestroyIcon
DestroyWindow
DispatchMessageA
TranslateMessage
GetMessageA
IsDialogMessageA
DrawTextA
GetWindowLongA
DrawFocusRect
MessageBoxA
CallWindowProcA
PostMessageA
SetTimer
KillTimer
CharNextA
wsprintfA
GetWindowTextA
SetWindowTextA
SendMessageA
GetClipboardData
SetTextColor
CreateCompatibleDC
GetObjectA
GetDIBits
CreateRectRgn
CombineRgn
DeleteObject
SelectObject
SHBrowseForFolderA
SHGetDesktopFolder
SHGetPathFromIDListA
ShellExecuteA
GetOpenFileNameA
GetSaveFileNameA
CommDlgExtendedError
CoTaskMemFree
dialog
initDialog
show
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
GlobalAlloc
GlobalFree
GlobalSize
GetLastError
lstrcpyA
lstrcpynA
FreeLibrary
lstrcatA
GetProcAddress
LoadLibraryA
GetModuleHandleA
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
VirtualAlloc
VirtualProtect
wsprintfA
StringFromGUID2
CLSIDFromString
Alloc
Call
Copy
Free
Get
Int64Op
Store
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
D:\XiTaoTao\TaobaoAPI\Release\TaobaoAPI.pdb
WaitForSingleObject
SetEvent
InitializeCriticalSection
WideCharToMultiByte
LeaveCriticalSection
MultiByteToWideChar
EnterCriticalSection
CreateEventW
CreateThread
FlushFileBuffers
CloseHandle
CreateFileA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
InitializeCriticalSectionAndSpinCount
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCurrentThreadId
GetCommandLineA
RaiseException
RtlUnwind
GetLastError
HeapFree
HeapAlloc
GetModuleHandleW
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
Sleep
HeapSize
ExitProcess
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
SetFilePointer
WriteFile
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LoadLibraryA
IsWindow
SendMessageW
WSAEnumNetworkEvents
htons
WSAEventSelect
recv
WSAGetLastError
WSACreateEvent
closesocket
gethostbyname
send
WSAWaitForMultipleEvents
WSAStartup
connect
ioctlsocket
WSACloseEvent
socket
_TaobaoSearch@8
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
D:\Program Files\Microsoft Research\Detours Express 2.1\bin\detoured.pdb
DisableThreadLibraryCalls
Detoured
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageDigitalSignature
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
d:\XiTaoTao\XiTaoTaoProxy\Release\xttProxy.pdb
InterlockedIncrement
InterlockedDecrement
lstrlenW
GetModuleHandleA
GetLastError
IsDBCSLeadByte
lstrcmpiA
RaiseException
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
SetThreadLocale
GetThreadLocale
WideCharToMultiByte
LoadLibraryExA
GetProcAddress
GetModuleHandleW
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
FindResourceExA
LoadResource
LockResource
SizeofResource
FindResourceA
GetModuleFileNameA
lstrlenA
MultiByteToWideChar
InitializeCriticalSection
FreeLibrary
lstrcpyA
InitializeCriticalSectionAndSpinCount
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetLocaleInfoA
LoadLibraryA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
RtlUnwind
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetCurrentThreadId
GetCommandLineA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
WriteFile
GetStdHandle
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapCreate
VirtualFree
Sleep
ExitProcess
SetHandleCount
GetFileType
GetStartupInfoA
CharNextW
CharNextA
RegDeleteValueA
RegCreateKeyExA
RegDeleteKeyA
RegEnumKeyExA
RegSetValueExA
RegOpenKeyExA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegQueryInfoKeyA
StringFromCLSID
CoTaskMemFree
CoTaskMemRealloc
StringFromGUID2
CoCreateInstance
CoTaskMemAlloc
SHGetFileInfoA
UnRegisterTypeLi
SysAllocString
RegisterTypeLi
SysStringLen
LoadRegTypeLi
VarUI4FromStr
GetErrorInfo
VariantChangeType
VariantCopy
VariantClear
LoadTypeLi
VariantInit
SysAllocStringLen
SysFreeString
DllCanUnloadNow
DllGetClassObject
DllMain
DllRegisterServer
DllUnregisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\XiTaoTao\XiTaoTao\Release\xttbrowser.pdb
GdiplusShutdown
GdipLoadImageFromFile
GdipSaveImageToFile
GdiplusStartup
GdipBitmapSetPixel
GdipCreateBitmapFromHBITMAP
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipBitmapGetPixel
GdipDrawImageRectI
GdipSetImageAttributesWrapMode
GdipDisposeImageAttributes
GdipCreateImageAttributes
GdipDisposeImage
GdipCloneImage
GdipAlloc
GdipGetImageHeight
GdipFree
GdipCreateBitmapFromResource
GdipGetImageWidth
GdipDrawImageRectRectI
GdipDeleteGraphics
GdipCreateFromHDC
GdipCreateBitmapFromFileICM
FindCloseUrlCache
InternetSetOptionW
InternetOpenW
InternetOpenUrlW
InternetCloseHandle
FindNextUrlCacheEntryW
DeleteUrlCacheEntryW
FindFirstUrlCacheEntryW
DragAcceptFiles
SHGetSpecialFolderPathW
ShellExecuteW
Shell_NotifyIconW
CommandLineToArgvW
ShellExecuteExW
DragQueryFileW
SHGetFolderPathW
SHGetDesktopFolder
EnumProcessModules
GetModuleBaseNameW
EnumProcesses
GetAdaptersInfo
_TaobaoSearch@8
WinVerifyTrust
CryptCATAdminReleaseCatalogContext
CryptCATAdminCalcHashFromFileHandle
CryptCATAdminAcquireContext
CryptCATAdminEnumCatalogFromHash
CryptCATCatalogInfoFromContext
CryptCATAdminReleaseContext
Detoured
FindResourceExW
FileTimeToLocalFileTime
FileTimeToSystemTime
HeapAlloc
GetProcessHeap
HeapFree
SetUnhandledExceptionFilter
GlobalFindAtomW
GlobalAddAtomW
LoadLibraryW
GetCommandLineW
GetCurrentThread
RaiseException
GlobalDeleteAtom
CreateMutexW
FreeLibrary
GetProcAddress
GetModuleHandleW
lstrcmpiW
LoadLibraryExW
GetModuleFileNameW
DeleteCriticalSection
InitializeCriticalSection
GetPrivateProfileIntW
SetLastError
GlobalFree
lstrlenA
DebugBreak
OutputDebugStringW
WideCharToMultiByte
lstrcpyW
GetPrivateProfileStringW
FindFirstFileW
FindNextFileW
FindClose
GetFileAttributesW
GetVersionExW
GlobalLock
GlobalUnlock
LockResource
OpenProcess
TerminateProcess
lstrcpynW
CreateProcessW
OpenFileMappingW
MapViewOfFile
UnmapViewOfFile
ReleaseMutex
CreateFileMappingW
lstrcmpiA
RemoveDirectoryW
SetFileAttributesW
CopyFileW
FileTimeToDosDateTime
GetSystemTime
GetLocalTime
lstrcmpW
CompareStringW
GlobalAlloc
MulDiv
CreateFileW
FindResourceW
GetFileSize
SystemTimeToFileTime
VirtualAllocEx
ReadProcessMemory
VirtualFreeEx
ExpandEnvironmentStringsW
GetTempPathW
Sleep
LocalFree
LoadLibraryA
CompareFileTime
lstrcatW
VirtualQuery
VirtualProtect
VirtualAlloc
InterlockedCompareExchange
ResumeThread
GetThreadContext
SetThreadContext
SuspendThread
SizeofResource
GetLastError
CreateDirectoryW
DeleteFileW
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
MultiByteToWideChar
SetEvent
SetThreadPriority
CreateEventW
CloseHandle
GetTickCount
WaitForSingleObject
CreateThread
InterlockedIncrement
lstrlenW
InterlockedDecrement
LCMapStringW
GetCPInfo
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
ExitProcess
IsProcessorFeaturePresent
VirtualFree
HeapDestroy
HeapReAlloc
HeapSize
UnhandledExceptionFilter
IsDebuggerPresent
MoveFileW
GetStartupInfoW
RtlUnwind
LCMapStringA
HeapCreate
WriteFile
ReadFile
LoadResource
GetStdHandle
GetModuleFileNameA
GetACP
GetOEMCP
IsValidCodePage
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
InitializeCriticalSectionAndSpinCount
SetFilePointer
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
FlushFileBuffers
CreateFileA
CompareStringA
SetEnvironmentVariableA
GetCurrentProcessId
SetMenuDefaultItem
CallNextHookEx
TranslateAcceleratorW
SetWindowRgn
CreateAcceleratorTableW
SetRectEmpty
IsMenu
GetMenuInfo
SetMenuInfo
IsWindowEnabled
FillRect
GetDlgCtrlID
GetCapture
DrawFocusRect
GetDesktopWindow
InvalidateRgn
RegisterWindowMessageW
FindWindowExW
wsprintfW
InsertMenuW
DeleteMenu
EnableWindow
AttachThreadInput
IntersectRect
IsRectEmpty
CharUpperW
EnableMenuItem
GetCursor
DestroyCursor
EmptyClipboard
SetClipboardData
GetDoubleClickTime
GetClassNameW
GetFocus
ReleaseCapture
SetCapture
ShowCursor
SetCursor
GetMenuItemInfoW
CheckMenuItem
LoadMenuW
GetSubMenu
GetMenuStringW
GetMenuState
CreatePopupMenu
MonitorFromPoint
TrackPopupMenu
SetActiveWindow
DestroyAcceleratorTable
InflateRect
SetMenu
GetSystemMenu
RedrawWindow
GetAsyncKeyState
WindowFromPoint
GetSystemMetrics
GetWindowDC
OffsetRect
GetForegroundWindow
GetKeyState
UnregisterClassA
AppendMenuW
GetMenuItemID
GetMenuItemCount
DestroyMenu
IsZoomed
ScreenToClient
GetMessagePos
PostThreadMessageW
EndDialog
DialogBoxParamW
SetMenuItemInfoW
IsIconic
CloseClipboard
GetClipboardData
OpenClipboard
GetWindowTextLengthW
IsClipboardFormatAvailable
GetSysColor
GetActiveWindow
GetDlgItem
MonitorFromWindow
GetMonitorInfoW
MapWindowPoints
IsWindowVisible
SetWindowTextW
wvsprintfW
GetWindowRect
GetParent
GetWindow
DrawIconEx
LoadImageW
DestroyIcon
PtInRect
SetWindowPos
ReleaseDC
GetDC
ClientToScreen
DrawTextW
KillTimer
SetTimer
SetFocus
IsWindow
InvalidateRect
EndPaint
BeginPaint
MoveWindow
GetClientRect
GetClassInfoExW
RegisterClassExW
CreateWindowExW
MsgWaitForMultipleObjects
SendMessageTimeoutW
AllowSetForegroundWindow
FindWindowW
PostQuitMessage
UnhookWindowsHookEx
UnregisterHotKey
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
SetWindowsHookExW
RegisterHotKey
SetForegroundWindow
UpdateWindow
SetWindowPlacement
GetWindowPlacement
GetWindowThreadProcessId
IsChild
LoadCursorW
MessageBoxW
CharNextW
DestroyWindow
CallWindowProcW
DefWindowProcW
SetWindowLongW
GetWindowLongW
CopyRect
SystemParametersInfoW
PostMessageW
ShowWindow
LoadStringW
CharLowerW
SendMessageW
ShowWindowAsync
EqualRect
GetWindowTextW
GetCursorPos
CreateCompatibleBitmap
CreatePen
ExtTextOutW
DPtoLP
BitBlt
SetBkColor
LPtoDP
Rectangle
SetTextColor
CreateSolidBrush
SetBkMode
SelectObject
DeleteObject
CreateBitmapIndirect
CreateCompatibleDC
GetTextExtentPoint32W
GetStockObject
DeleteDC
StretchBlt
GetCurrentObject
GetDeviceCaps
GetObjectW
SetViewportOrgEx
GetClipBox
RestoreDC
SaveDC
SetWindowOrgEx
CombineRgn
CreateRectRgn
LineTo
MoveToEx
CreateFontIndirectW
CreateDCW
GetOpenFileNameW
GetSaveFileNameW
RegCreateKeyW
GetNamedSecurityInfoW
SetNamedSecurityInfoW
SetEntriesInAclW
LookupPrivilegeValueW
RegCloseKey
RegCreateKeyExW
RegSetValueExW
OpenProcessToken
GetTokenInformation
GetLengthSid
CopySid
GetSidIdentifierAuthority
GetSidSubAuthorityCount
GetSidSubAuthority
RegOpenKeyExW
RegGetKeySecurity
AllocateAndInitializeSid
InitializeAcl
AddAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
FreeSid
RegSetKeySecurity
RegQueryInfoKeyW
RegEnumKeyW
GetUserNameW
RegDeleteKeyW
RegEnumKeyExW
RegDeleteValueW
RegOpenKeyW
RegQueryValueExW
AdjustTokenPrivileges
CoInitialize
CoUninitialize
CoTaskMemFree
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CoRegisterClassObject
CoRevokeClassObject
OleUninitialize
StringFromGUID2
OleLockRunning
CreateStreamOnHGlobal
CoGetClassObject
CLSIDFromProgID
CLSIDFromString
OleInitialize
ReleaseStgMedium
CoMarshalInterThreadInterfaceInStream
CoGetMalloc
CreateBindCtx
CoGetMarshalSizeMax
CoMarshalInterface
CoGetInterfaceAndReleaseStream
CoUnmarshalInterface
CoInitializeEx
SysStringByteLen
SysAllocStringByteLen
VarUI4FromStr
SysFreeString
SysAllocString
OleCreateFontIndirect
SysStringLen
LoadRegTypeLi
LoadTypeLi
VariantClear
VariantInit
SysAllocStringLen
DispCallFunc
VarBstrCmp
StrCmpLogicalW
SHGetValueW
SHDeleteKeyW
SHSetValueW
URLDownloadToFileW
UrlMkGetSessionOption
UrlMkSetSessionOption
ImageList_Create
ImageList_DragMove
ImageList_DragLeave
ImageList_EndDrag
_TrackMouseEvent
InitCommonControlsEx
ImageList_DragEnter
ImageList_BeginDrag
ImageList_Destroy
ImageList_ReplaceIcon
ImageList_DragShowNolock
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageClientAuth
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
KeyUsageDigitalSignature
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
D:\XiTaoTao\XiTaoTao\Release\xttbrowser.pdb
GdiplusShutdown
GdipLoadImageFromFile
GdipSaveImageToFile
GdiplusStartup
GdipBitmapSetPixel
GdipCreateBitmapFromHBITMAP
GdipGetImageEncoders
GdipGetImageEncodersSize
GdipBitmapGetPixel
GdipDrawImageRectI
GdipSetImageAttributesWrapMode
GdipDisposeImageAttributes
GdipCreateImageAttributes
GdipDisposeImage
GdipCloneImage
GdipAlloc
GdipGetImageHeight
GdipFree
GdipCreateBitmapFromResource
GdipGetImageWidth
GdipDrawImageRectRectI
GdipDeleteGraphics
GdipCreateFromHDC
GdipCreateBitmapFromFileICM
FindCloseUrlCache
InternetSetOptionW
InternetOpenW
InternetOpenUrlW
InternetCloseHandle
FindNextUrlCacheEntryW
DeleteUrlCacheEntryW
FindFirstUrlCacheEntryW
DragAcceptFiles
SHGetSpecialFolderPathW
ShellExecuteW
Shell_NotifyIconW
CommandLineToArgvW
ShellExecuteExW
DragQueryFileW
SHGetFolderPathW
SHGetDesktopFolder
EnumProcessModules
GetModuleBaseNameW
EnumProcesses
GetAdaptersInfo
_TaobaoSearch@8
WinVerifyTrust
CryptCATAdminReleaseCatalogContext
CryptCATAdminCalcHashFromFileHandle
CryptCATAdminAcquireContext
CryptCATAdminEnumCatalogFromHash
CryptCATCatalogInfoFromContext
CryptCATAdminReleaseContext
Detoured
FindResourceExW
FileTimeToLocalFileTime
FileTimeToSystemTime
HeapAlloc
GetProcessHeap
HeapFree
SetUnhandledExceptionFilter
GlobalFindAtomW
GlobalAddAtomW
LoadLibraryW
GetCommandLineW
GetCurrentThread
RaiseException
GlobalDeleteAtom
CreateMutexW
FreeLibrary
GetProcAddress
GetModuleHandleW
lstrcmpiW
LoadLibraryExW
GetModuleFileNameW
DeleteCriticalSection
InitializeCriticalSection
GetPrivateProfileIntW
SetLastError
GlobalFree
lstrlenA
DebugBreak
OutputDebugStringW
WideCharToMultiByte
lstrcpyW
GetPrivateProfileStringW
FindFirstFileW
FindNextFileW
FindClose
GetFileAttributesW
GetVersionExW
GlobalLock
GlobalUnlock
LockResource
OpenProcess
TerminateProcess
lstrcpynW
CreateProcessW
OpenFileMappingW
MapViewOfFile
UnmapViewOfFile
ReleaseMutex
CreateFileMappingW
lstrcmpiA
RemoveDirectoryW
SetFileAttributesW
CopyFileW
FileTimeToDosDateTime
GetSystemTime
GetLocalTime
lstrcmpW
CompareStringW
GlobalAlloc
MulDiv
CreateFileW
FindResourceW
GetFileSize
SystemTimeToFileTime
VirtualAllocEx
ReadProcessMemory
VirtualFreeEx
ExpandEnvironmentStringsW
GetTempPathW
Sleep
LocalFree
LoadLibraryA
CompareFileTime
lstrcatW
VirtualQuery
VirtualProtect
VirtualAlloc
InterlockedCompareExchange
ResumeThread
GetThreadContext
SetThreadContext
SuspendThread
SizeofResource
GetLastError
CreateDirectoryW
DeleteFileW
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
MultiByteToWideChar
SetEvent
SetThreadPriority
CreateEventW
CloseHandle
GetTickCount
WaitForSingleObject
CreateThread
InterlockedIncrement
lstrlenW
InterlockedDecrement
LCMapStringW
GetCPInfo
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
ExitProcess
IsProcessorFeaturePresent
VirtualFree
HeapDestroy
HeapReAlloc
HeapSize
UnhandledExceptionFilter
IsDebuggerPresent
MoveFileW
GetStartupInfoW
RtlUnwind
LCMapStringA
HeapCreate
WriteFile
ReadFile
LoadResource
GetStdHandle
GetModuleFileNameA
GetACP
GetOEMCP
IsValidCodePage
GetConsoleCP
GetConsoleMode
GetTimeZoneInformation
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
InitializeCriticalSectionAndSpinCount
SetFilePointer
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
FlushFileBuffers
CreateFileA
CompareStringA
SetEnvironmentVariableA
GetCurrentProcessId
SetMenuDefaultItem
CallNextHookEx
TranslateAcceleratorW
SetWindowRgn
CreateAcceleratorTableW
SetRectEmpty
IsMenu
GetMenuInfo
SetMenuInfo
IsWindowEnabled
FillRect
GetDlgCtrlID
GetCapture
DrawFocusRect
GetDesktopWindow
InvalidateRgn
RegisterWindowMessageW
FindWindowExW
wsprintfW
InsertMenuW
DeleteMenu
EnableWindow
AttachThreadInput
IntersectRect
IsRectEmpty
CharUpperW
EnableMenuItem
GetCursor
DestroyCursor
EmptyClipboard
SetClipboardData
GetDoubleClickTime
GetClassNameW
GetFocus
ReleaseCapture
SetCapture
ShowCursor
SetCursor
GetMenuItemInfoW
CheckMenuItem
LoadMenuW
GetSubMenu
GetMenuStringW
GetMenuState
CreatePopupMenu
MonitorFromPoint
TrackPopupMenu
SetActiveWindow
DestroyAcceleratorTable
InflateRect
SetMenu
GetSystemMenu
RedrawWindow
GetAsyncKeyState
WindowFromPoint
GetSystemMetrics
GetWindowDC
OffsetRect
GetForegroundWindow
GetKeyState
UnregisterClassA
AppendMenuW
GetMenuItemID
GetMenuItemCount
DestroyMenu
IsZoomed
ScreenToClient
GetMessagePos
PostThreadMessageW
EndDialog
DialogBoxParamW
SetMenuItemInfoW
IsIconic
CloseClipboard
GetClipboardData
OpenClipboard
GetWindowTextLengthW
IsClipboardFormatAvailable
GetSysColor
GetActiveWindow
GetDlgItem
MonitorFromWindow
GetMonitorInfoW
MapWindowPoints
IsWindowVisible
SetWindowTextW
wvsprintfW
GetWindowRect
GetParent
GetWindow
DrawIconEx
LoadImageW
DestroyIcon
PtInRect
SetWindowPos
ReleaseDC
GetDC
ClientToScreen
DrawTextW
KillTimer
SetTimer
SetFocus
IsWindow
InvalidateRect
EndPaint
BeginPaint
MoveWindow
GetClientRect
GetClassInfoExW
RegisterClassExW
CreateWindowExW
MsgWaitForMultipleObjects
SendMessageTimeoutW
AllowSetForegroundWindow
FindWindowW
PostQuitMessage
UnhookWindowsHookEx
UnregisterHotKey
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
SetWindowsHookExW
RegisterHotKey
SetForegroundWindow
UpdateWindow
SetWindowPlacement
GetWindowPlacement
GetWindowThreadProcessId
IsChild
LoadCursorW
MessageBoxW
CharNextW
DestroyWindow
CallWindowProcW
DefWindowProcW
SetWindowLongW
GetWindowLongW
CopyRect
SystemParametersInfoW
PostMessageW
ShowWindow
LoadStringW
CharLowerW
SendMessageW
ShowWindowAsync
EqualRect
GetWindowTextW
GetCursorPos
CreateCompatibleBitmap
CreatePen
ExtTextOutW
DPtoLP
BitBlt
SetBkColor
LPtoDP
Rectangle
SetTextColor
CreateSolidBrush
SetBkMode
SelectObject
DeleteObject
CreateBitmapIndirect
CreateCompatibleDC
GetTextExtentPoint32W
GetStockObject
DeleteDC
StretchBlt
GetCurrentObject
GetDeviceCaps
GetObjectW
SetViewportOrgEx
GetClipBox
RestoreDC
SaveDC
SetWindowOrgEx
CombineRgn
CreateRectRgn
LineTo
MoveToEx
CreateFontIndirectW
CreateDCW
GetOpenFileNameW
GetSaveFileNameW
RegCreateKeyW
GetNamedSecurityInfoW
SetNamedSecurityInfoW
SetEntriesInAclW
LookupPrivilegeValueW
RegCloseKey
RegCreateKeyExW
RegSetValueExW
OpenProcessToken
GetTokenInformation
GetLengthSid
CopySid
GetSidIdentifierAuthority
GetSidSubAuthorityCount
GetSidSubAuthority
RegOpenKeyExW
RegGetKeySecurity
AllocateAndInitializeSid
InitializeAcl
AddAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
FreeSid
RegSetKeySecurity
RegQueryInfoKeyW
RegEnumKeyW
GetUserNameW
RegDeleteKeyW
RegEnumKeyExW
RegDeleteValueW
RegOpenKeyW
RegQueryValueExW
AdjustTokenPrivileges
CoInitialize
CoUninitialize
CoTaskMemFree
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
CoRegisterClassObject
CoRevokeClassObject
OleUninitialize
StringFromGUID2
OleLockRunning
CreateStreamOnHGlobal
CoGetClassObject
CLSIDFromProgID
CLSIDFromString
OleInitialize
ReleaseStgMedium
CoMarshalInterThreadInterfaceInStream
CoGetMalloc
CreateBindCtx
CoGetMarshalSizeMax
CoMarshalInterface
CoGetInterfaceAndReleaseStream
CoUnmarshalInterface
CoInitializeEx
SysStringByteLen
SysAllocStringByteLen
VarUI4FromStr
SysFreeString
SysAllocString
OleCreateFontIndirect
SysStringLen
LoadRegTypeLi
LoadTypeLi
VariantClear
VariantInit
SysAllocStringLen
DispCallFunc
VarBstrCmp
StrCmpLogicalW
SHGetValueW
SHDeleteKeyW
SHSetValueW
URLDownloadToFileW
UrlMkGetSessionOption
UrlMkSetSessionOption
ImageList_Create
ImageList_DragMove
ImageList_DragLeave
ImageList_EndDrag
_TrackMouseEvent
InitCommonControlsEx
ImageList_DragEnter
ImageList_BeginDrag
ImageList_Destroy
ImageList_ReplaceIcon
ImageList_DragShowNolock
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sleep
OutputDebugStringA
MultiByteToWideChar
VirtualAlloc
FlushFileBuffers
HeapCreate
HeapDestroy
VirtualFree
GetLastError
GetProcAddress
CloseHandle
GetVersion
GetCommandLineA
ExitProcess
HeapFree
RtlUnwind
GetStartupInfoA
HeapReAlloc
IsBadWritePtr
HeapAlloc
GetCurrentProcess
UnhandledExceptionFilter
TerminateProcess
FreeEnvironmentStringsA
FreeEnvironmentStringsW
SetEndOfFile
GetModuleHandleA
lstrlenA
GetStringTypeW
GetStringTypeA
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
CreateFileA
WriteFile
GetModuleFileNameA
GetFileType
LCMapStringW
ReadFile
SetStdHandle
SetFilePointer
WideCharToMultiByte
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
LCMapStringA
ShowWindow
LoadImageA
SetRect
MessageBoxA
DestroyWindow
RegisterClassA
UpdateWindow
CreateWindowExA
GetSystemMetrics
LoadCursorA
LoadIconA
GetKeyState
PostMessageA
TranslateMessage
PeekMessageA
GetMessageA
GetClientRect
DispatchMessageA
InvalidateRect
DefWindowProcA
ClientToScreen
SetCursor
PostQuitMessage
TextOutA
SetTextColor
SetBkColor
DeleteObject
StretchBlt
GetObjectA
SelectObject
CreateCompatibleDC
DeleteDC
CoInitialize
DirectDrawCreate
mmioRead
mmioClose
mmioAscend
mmioOpenA
timeGetTime
mmioDescend
joySetCapture
joySetThreshold
joyGetDevCapsA
joyGetPosEx
joyGetNumDevs
ord1
WSAStartup
closesocket
socket
WSAAsyncSelect
sendto
accept
WSACleanup
recv
gethostbyaddr
inet_ntoa
connect
bind
ioctlsocket
listen
gethostname
gethostbyname
send
inet_addr
htons
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ