Analysis Date2014-06-16 00:29:25
MD5be20c032194aed7c84ef852da84ba916
SHA1a624a781515c215be1f0beabc2bf5af8b02facc5

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386
Section.text md5: 7f149a6e120ae0ad60d913fd1b8e4f5a sha1: e6dade6da66a8833f7fc9f67b030166e1ea55d3b size: 89088
Section.rdata md5: ad1cde91010339d22167daee7ba14403 sha1: 434b400d1aacd5bc2de48df796e335fcbdf98c43 size: 5120
Section.data md5: 9da94bacd034e0ee2707335ab760ba9f sha1: d737342d38baa367c2ab888adb3dca33d23e96d1 size: 70656
Section.idive md5: 53f5e0b4cd5b2e746b3e2ec9f8125d58 sha1: 1907eeaff53d8b480659b61964007db9bb089462 size: 1024
Timestamp2005-10-12 16:11:50
VersionProductVersion: 1.0.0.3
FileVersion: 1.0.0.3
PrivateBuild: 1488
PEhashb2948b263a92ecfc47313c9648a729d914e25a9b
IMPhash34c44489eef42ad928fdd61094e0b282
AV360 SafeGen:Trojan.Heur.KS.1
AV360 SafeGen:Trojan.Heur.KS.1
AVAd-AwareGen:Trojan.Heur.KS.1
AVAd-AwareGen:Trojan.Heur.KS.1
AVAlwil (avast)Cybota [Trj]
AVAlwil (avast)Cybota [Trj]
AVArcabit (arcavir)no_virus
AVArcabit (arcavir)no_virus
AVAuthentiumW32/Goolbot.E.gen!Eldorado
AVAuthentiumW32/Goolbot.E.gen!Eldorado
AVAvira (antivir)BDS/Gbot.aida
AVAvira (antivir)BDS/Gbot.aida
AVCA (E-Trust Ino)Win32/Diple.A!generic
AVCA (E-Trust Ino)Win32/Diple.A!generic
AVCAT (quickheal)Backdoor.Cycbot.B
AVCAT (quickheal)Backdoor.Cycbot.B
AVClamAVW32.Trojan.Gbot-12
AVClamAVW32.Trojan.Gbot-12
AVDr. WebBackDoor.Gbot.21
AVDr. WebBackDoor.Gbot.21
AVEmsisoftGen:Trojan.Heur.KS.1
AVEmsisoftGen:Trojan.Heur.KS.1
AVEset (nod32)Win32/Cycbot.AF
AVEset (nod32)Win32/Cycbot.AF
AVFortinetW32/FraudLoad.MK!tr
AVFortinetW32/FraudLoad.MK!tr
AVFrisk (f-prot)W32/Goolbot.E.gen!Eldorado (generic, not disinfectable)
AVFrisk (f-prot)W32/Goolbot.E.gen!Eldorado (generic, not disinfectable)
AVF-SecureGen:Trojan.Heur.KS.1
AVF-SecureGen:Trojan.Heur.KS.1
AVGrisoft (avg)Cryptic.CMD
AVGrisoft (avg)Cryptic.CMD
AVIkarusBackdoor.Win32.Gbot
AVIkarusBackdoor.Win32.Gbot
AVKasperskyBackdoor.Win32.Gbot.aib
AVKasperskyBackdoor.Win32.Gbot.aib
AVMalwareBytesTrojan.Agent
AVMalwareBytesTrojan.Agent
AVMcafeeBackDoor-EXI.gen.i
AVMcafeeBackDoor-EXI.gen.i
AVMicrosoft Security EssentialsBackdoor:Win32/Cycbot.G
AVMicrosoft Security EssentialsBackdoor:Win32/Cycbot.G
AVMicroWorld (escan)Gen:Trojan.Heur.KS.1
AVMicroWorld (escan)Gen:Trojan.Heur.KS.1
AVNormanwinpe/Cycbot.BP
AVNormanwinpe/Cycbot.BP
AVRisingno_virus
AVRisingno_virus
AVSophosMal/FakeAV-IS
AVSophosMal/FakeAV-IS
AVSymantecBackdoor.Cycbot!gen3
AVSymantecBackdoor.Cycbot!gen3
AVTrend MicroBKDR_CYCBOT.SMX
AVTrend MicroBKDR_CYCBOT.SMX
AVVirusBlokAda (vba32)Backdoor.Gbot

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

RegistryHKEY_CURRENT_CONFIG\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable ➝
1
RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load ➝
C:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe
Creates FileC:\Documents and Settings\Administrator\Local Settings\History\History.IE5\index.dat
Creates FileC:\Documents and Settings\Administrator\Cookies\index.dat
Creates FilePIPE\lsarpc
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe
Creates FileC:\Documents and Settings\Administrator\Application Data\75DE.FFC
Creates File\Device\Afd\Endpoint
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\index.dat
Creates ProcessC:\malware.exe startC:\Documents and Settings\Administrator\Application Data\dwm.exe%C:\Documents and Settings\Administrator\Application Data
Creates ProcessC:\Documents and Settings\Administrator\Application Data\dwm.exe
Creates ProcessC:\malware.exe startC:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe%C:\Documents and Settings\Administrator\Application Data\Microsoft
Creates Mutex{4D92BB9F-9A66-458f-ACA4-66172A7016D4}
Creates MutexWininetConnectionMutex
Creates Mutexc:!documents and settings!administrator!cookies!
Creates Mutex{61B98B86-5F44-42b3-BCA1-33904B067B81}
Creates Mutex{EEEB680D-AE62-4375-B93E-E9AE5FF585C1}
Creates Mutexc:!documents and settings!administrator!local settings!history!history.ie5!
Creates Mutex{B37C48AF-B05C-4520-8B38-2FE181D5DC78}
Creates Mutexc:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Winsock DNS127.0.0.1
Winsock DNSonemouseklick.com
Winsock DNSfreecdvideo.com
Winsock DNSnationsautoelectric.com

Process
↳ C:\malware.exe startC:\Documents and Settings\Administrator\Application Data\dwm.exe%C:\Documents and Settings\Administrator\Application Data

Creates ProcessC:\Documents and Settings\Administrator\Application Data\dwm.exe

Process
↳ C:\malware.exe startC:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe%C:\Documents and Settings\Administrator\Application Data\Microsoft

Creates ProcessC:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe

Process
↳ C:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe

Network Details:

DNSnationsautoelectric.com
Type: A
98.139.135.198
DNSzonetf.com
Type: A
208.73.211.177
DNSzonetf.com
Type: A
208.73.211.182
DNSzonetf.com
Type: A
208.73.211.236
DNSzonetf.com
Type: A
208.73.211.249
DNSzonetf.com
Type: A
208.73.211.164
DNSzonetf.com
Type: A
208.73.211.177
DNSzonetf.com
Type: A
208.73.211.182
DNSzonetf.com
Type: A
208.73.211.236
DNSzonetf.com
Type: A
208.73.211.249
DNSzonetf.com
Type: A
208.73.211.164
DNSfreecdvideo.com
Type: A
DNSonemouseklick.com
Type: A
HTTP GEThttp://nationsautoelectric.com/images/50-217-1_F_2_.jpg?v56=25&tq=gJ4WK%2FSUh7TFlER8oY%2BQtMWTUj26kJH7yZRQK%2B%2FbxWq1SfkIYUBM
User-Agent: mozilla/2.0
HTTP POSThttp://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNuX%2BP9h%2BI0sDkX9PiwrWL2GUr0%2BbGpfvRsX%2BaIwb51gW1f447GrXf0eU2S%2BsSodOFuTLiv0agDh2xP6PLEqwaCGkrl%2F7LdBPNpPpTuxq00sD0OpLjRqAOhLgjh%2FMe%2BcoJuX%2BSNxFKv975Xlm5G
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
HTTP POSThttp://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNuX%2BP9h%2BI0sDkX9PiwrWL2GUr0%2BbGpfvRsX%2BaIwb51gW1f447GrXf0eU2S%2BsSodOFuTLiv0agDh2xP6PLEqwaCGkrl%2F7LdBPNpPpTuxq00sD0OpLjRqAOhLgjh88y%2BcoJsX%2BSNxFKv975Xlm5G
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
HTTP POSThttp://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNuX%2BP9h%2BI0sDkX9PiwrWL2GUr0%2BbGpfvRsX%2BaIwb51gW1f447GrXf0eU2S%2BsSodOFuTLiv0agDh2xP6PLEqwaCGkrl%2F7LdBPNpPpTuxq00sD0OpLjRqAOhLgjh88y%2BcoJtX%2BSNxFKv975Xlm5G
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
HTTP POSThttp://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfNuX%2BP9h%2BI0sDkX9PiwrWL2GUr0%2BbGpfvRsX%2BaIwb51gW1f447GrXf0eU2S%2BsSodOFuTLiv0agDh2xP6PLEqwaCGkrl%2F7LdBPNpPpTuxq00sD0OpLjRqAOhLgjh%2FMe%2BcoJuX%2BSNxVKv975Xlm5G
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Flows TCP192.168.1.1:1031 ➝ 98.139.135.198:80
Flows TCP192.168.1.1:1033 ➝ 208.73.211.177:80
Flows TCP192.168.1.1:1034 ➝ 208.73.211.177:80
Flows TCP192.168.1.1:1035 ➝ 208.73.211.177:80
Flows TCP192.168.1.1:1036 ➝ 208.73.211.177:80

Raw Pcap
0x00000000 (00000)   47455420 2f696d61 6765732f 35302d32   GET /images/50-2
0x00000010 (00016)   31372d31 5f465f32 5f2e6a70 673f7635   17-1_F_2_.jpg?v5
0x00000020 (00032)   363d3235 2674713d 674a3457 4b253246   6=25&tq=gJ4WK%2F
0x00000030 (00048)   53556837 54466c45 52386f59 25324251   SUh7TFlER8oY%2BQ
0x00000040 (00064)   744d5754 556a3236 6b4a4837 795a5251   tMWTUj26kJH7yZRQ
0x00000050 (00080)   4b253242 25324662 78577131 53666b49   K%2B%2FbxWq1SfkI
0x00000060 (00096)   5955424d 20485454 502f312e 300d0a43   YUBM HTTP/1.0..C
0x00000070 (00112)   6f6e6e65 6374696f 6e3a2063 6c6f7365   onnection: close
0x00000080 (00128)   0d0a486f 73743a20 6e617469 6f6e7361   ..Host: nationsa
0x00000090 (00144)   75746f65 6c656374 7269632e 636f6d0d   utoelectric.com.
0x000000a0 (00160)   0a416363 6570743a 202a2f2a 0d0a5573   .Accept: */*..Us
0x000000b0 (00176)   65722d41 67656e74 3a206d6f 7a696c6c   er-Agent: mozill
0x000000c0 (00192)   612f322e 300d0a0d 0a                  a/2.0....

0x00000000 (00000)   504f5354 202f696e 6465782e 68746d6c   POST /index.html
0x00000010 (00016)   3f74713d 674b5930 73486f4c 374c2532   ?tq=gKY0sHoL7L%2
0x00000020 (00032)   424e3679 4c68627a 36323773 48644d66   BN6yLhbz627sHdMf
0x00000030 (00048)   4e755825 32425039 68253242 49307344   NuX%2BP9h%2BI0sD
0x00000040 (00064)   6b583950 69777257 4c324755 72302532   kX9PiwrWL2GUr0%2
0x00000050 (00080)   42624770 66765273 58253242 61497762   BbGpfvRsX%2BaIwb
0x00000060 (00096)   35316757 31663434 37477258 66306555   51gW1f447GrXf0eU
0x00000070 (00112)   32532532 4273536f 644f4675 544c6976   2S%2BsSodOFuTLiv
0x00000080 (00128)   30616744 68327850 36504c45 71776143   0agDh2xP6PLEqwaC
0x00000090 (00144)   476b726c 25324637 4c644250 4e705070   Gkrl%2F7LdBPNpPp
0x000000a0 (00160)   54757871 30307344 304f704c 6a527141   Tuxq00sD0OpLjRqA
0x000000b0 (00176)   4f684c67 6a682532 464d6525 3242636f   OhLgjh%2FMe%2Bco
0x000000c0 (00192)   4a755825 3242534e 78464b76 39373558   JuX%2BSNxFKv975X
0x000000d0 (00208)   6c6d3547 20485454 502f312e 310d0a48   lm5G HTTP/1.1..H
0x000000e0 (00224)   6f73743a 207a6f6e 6574662e 636f6d0d   ost: zonetf.com.
0x000000f0 (00240)   0a557365 722d4167 656e743a 204d6f7a   .User-Agent: Moz
0x00000100 (00256)   696c6c61 2f342e30 2028636f 6d706174   illa/4.0 (compat
0x00000110 (00272)   69626c65 3b204d53 49452036 2e303b20   ible; MSIE 6.0; 
0x00000120 (00288)   57696e64 6f777320 4e542035 2e31290d   Windows NT 5.1).
0x00000130 (00304)   0a436f6e 74656e74 2d4c656e 6774683a   .Content-Length:
0x00000140 (00320)   20300d0a 436f6e6e 65637469 6f6e3a20    0..Connection: 
0x00000150 (00336)   636c6f73 650d0a0d 0a                  close....

0x00000000 (00000)   504f5354 202f696e 6465782e 68746d6c   POST /index.html
0x00000010 (00016)   3f74713d 674b5930 73486f4c 374c2532   ?tq=gKY0sHoL7L%2
0x00000020 (00032)   424e3679 4c68627a 36323773 48644d66   BN6yLhbz627sHdMf
0x00000030 (00048)   4e755825 32425039 68253242 49307344   NuX%2BP9h%2BI0sD
0x00000040 (00064)   6b583950 69777257 4c324755 72302532   kX9PiwrWL2GUr0%2
0x00000050 (00080)   42624770 66765273 58253242 61497762   BbGpfvRsX%2BaIwb
0x00000060 (00096)   35316757 31663434 37477258 66306555   51gW1f447GrXf0eU
0x00000070 (00112)   32532532 4273536f 644f4675 544c6976   2S%2BsSodOFuTLiv
0x00000080 (00128)   30616744 68327850 36504c45 71776143   0agDh2xP6PLEqwaC
0x00000090 (00144)   476b726c 25324637 4c644250 4e705070   Gkrl%2F7LdBPNpPp
0x000000a0 (00160)   54757871 30307344 304f704c 6a527141   Tuxq00sD0OpLjRqA
0x000000b0 (00176)   4f684c67 6a683838 79253242 636f4a73   OhLgjh88y%2BcoJs
0x000000c0 (00192)   58253242 534e7846 4b763937 35586c6d   X%2BSNxFKv975Xlm
0x000000d0 (00208)   35472048 5454502f 312e310d 0a486f73   5G HTTP/1.1..Hos
0x000000e0 (00224)   743a207a 6f6e6574 662e636f 6d0d0a55   t: zonetf.com..U
0x000000f0 (00240)   7365722d 4167656e 743a204d 6f7a696c   ser-Agent: Mozil
0x00000100 (00256)   6c612f34 2e302028 636f6d70 61746962   la/4.0 (compatib
0x00000110 (00272)   6c653b20 4d534945 20362e30 3b205769   le; MSIE 6.0; Wi
0x00000120 (00288)   6e646f77 73204e54 20352e31 290d0a43   ndows NT 5.1)..C
0x00000130 (00304)   6f6e7465 6e742d4c 656e6774 683a2030   ontent-Length: 0
0x00000140 (00320)   0d0a436f 6e6e6563 74696f6e 3a20636c   ..Connection: cl
0x00000150 (00336)   6f73650d 0a0d0a3c 6872202f 3e0a2020   ose....<hr />.  
0x00000160 (00352)   3c616464 72657373 3e4d6963 726f736f   <address>Microso
0x00000170 (00368)   66742d49 49532f37 2e303c2f 61646472   ft-IIS/7.0</addr
0x00000180 (00384)   6573733e 0a20203c 2f626f64 793e0a3c   ess>.  </body>.<
0x00000190 (00400)   2f68746d 6c3e0a                       /html>.

0x00000000 (00000)   504f5354 202f696e 6465782e 68746d6c   POST /index.html
0x00000010 (00016)   3f74713d 674b5930 73486f4c 374c2532   ?tq=gKY0sHoL7L%2
0x00000020 (00032)   424e3679 4c68627a 36323773 48644d66   BN6yLhbz627sHdMf
0x00000030 (00048)   4e755825 32425039 68253242 49307344   NuX%2BP9h%2BI0sD
0x00000040 (00064)   6b583950 69777257 4c324755 72302532   kX9PiwrWL2GUr0%2
0x00000050 (00080)   42624770 66765273 58253242 61497762   BbGpfvRsX%2BaIwb
0x00000060 (00096)   35316757 31663434 37477258 66306555   51gW1f447GrXf0eU
0x00000070 (00112)   32532532 4273536f 644f4675 544c6976   2S%2BsSodOFuTLiv
0x00000080 (00128)   30616744 68327850 36504c45 71776143   0agDh2xP6PLEqwaC
0x00000090 (00144)   476b726c 25324637 4c644250 4e705070   Gkrl%2F7LdBPNpPp
0x000000a0 (00160)   54757871 30307344 304f704c 6a527141   Tuxq00sD0OpLjRqA
0x000000b0 (00176)   4f684c67 6a683838 79253242 636f4a74   OhLgjh88y%2BcoJt
0x000000c0 (00192)   58253242 534e7846 4b763937 35586c6d   X%2BSNxFKv975Xlm
0x000000d0 (00208)   35472048 5454502f 312e310d 0a486f73   5G HTTP/1.1..Hos
0x000000e0 (00224)   743a207a 6f6e6574 662e636f 6d0d0a55   t: zonetf.com..U
0x000000f0 (00240)   7365722d 4167656e 743a204d 6f7a696c   ser-Agent: Mozil
0x00000100 (00256)   6c612f34 2e302028 636f6d70 61746962   la/4.0 (compatib
0x00000110 (00272)   6c653b20 4d534945 20362e30 3b205769   le; MSIE 6.0; Wi
0x00000120 (00288)   6e646f77 73204e54 20352e31 290d0a43   ndows NT 5.1)..C
0x00000130 (00304)   6f6e7465 6e742d4c 656e6774 683a2030   ontent-Length: 0
0x00000140 (00320)   0d0a436f 6e6e6563 74696f6e 3a20636c   ..Connection: cl
0x00000150 (00336)   6f73650d 0a0d0a0d 0a                  ose......

0x00000000 (00000)   504f5354 202f696e 6465782e 68746d6c   POST /index.html
0x00000010 (00016)   3f74713d 674b5930 73486f4c 374c2532   ?tq=gKY0sHoL7L%2
0x00000020 (00032)   424e3679 4c68627a 36323773 48644d66   BN6yLhbz627sHdMf
0x00000030 (00048)   4e755825 32425039 68253242 49307344   NuX%2BP9h%2BI0sD
0x00000040 (00064)   6b583950 69777257 4c324755 72302532   kX9PiwrWL2GUr0%2
0x00000050 (00080)   42624770 66765273 58253242 61497762   BbGpfvRsX%2BaIwb
0x00000060 (00096)   35316757 31663434 37477258 66306555   51gW1f447GrXf0eU
0x00000070 (00112)   32532532 4273536f 644f4675 544c6976   2S%2BsSodOFuTLiv
0x00000080 (00128)   30616744 68327850 36504c45 71776143   0agDh2xP6PLEqwaC
0x00000090 (00144)   476b726c 25324637 4c644250 4e705070   Gkrl%2F7LdBPNpPp
0x000000a0 (00160)   54757871 30307344 304f704c 6a527141   Tuxq00sD0OpLjRqA
0x000000b0 (00176)   4f684c67 6a682532 464d6525 3242636f   OhLgjh%2FMe%2Bco
0x000000c0 (00192)   4a755825 3242534e 78564b76 39373558   JuX%2BSNxVKv975X
0x000000d0 (00208)   6c6d3547 20485454 502f312e 310d0a48   lm5G HTTP/1.1..H
0x000000e0 (00224)   6f73743a 207a6f6e 6574662e 636f6d0d   ost: zonetf.com.
0x000000f0 (00240)   0a557365 722d4167 656e743a 204d6f7a   .User-Agent: Moz
0x00000100 (00256)   696c6c61 2f342e30 2028636f 6d706174   illa/4.0 (compat
0x00000110 (00272)   69626c65 3b204d53 49452036 2e303b20   ible; MSIE 6.0; 
0x00000120 (00288)   57696e64 6f777320 4e542035 2e31290d   Windows NT 5.1).
0x00000130 (00304)   0a436f6e 74656e74 2d4c656e 6774683a   .Content-Length:
0x00000140 (00320)   20300d0a 436f6e6e 65637469 6f6e3a20    0..Connection: 
0x00000150 (00336)   636c6f73 650d0a0d 0a202058 25324253   close....  X%2BS
0x00000160 (00352)   4e78464b 76393735 586c6d0a            NxFKv975Xlm.


Strings
.....!W...)~.x
?..
.ChC^/.
c%.
,j..!7K.:R....UL[/..&.....,..|.
.
..'
}Z.2
q
u..
..
.
.......d.
..j/f.
tq
.
.

040904b0
1.0.0.3
1488
Ab Q
$A %q
FileVersion
PrivateBuild
ProductVersion
QD2&
"%Rr
sC&q
StringFileInfo
TIMES NEW ROMAN
Translation
VarFileInfo
VS_VERSION_INFO
0Z0!#57
{1:DMg
1DQ\}h
1J,cP	
(1%R1S0
(2F9^3
}2l_W3T
3GGI&YuS
4gDRF3
4L_DL2
{5-wAEF
67QC10
6gt}fm
.^6=-S
7UjWH}u
91!vC`1Do:t-H
!9oYWP
9s@6|I
9S\nm6
9:z})n
ADVAPI32.dll
A}_KmJ
AppendMenuW
!=B2S0|
][B<4&7
*ba}6@
BeginPaint
B{X@B4i
c16|;G
CallWindowProcW
c[$gP5
CharNextA
CharNextW
CharPrevW
CharUpperW
CheckDlgButton
CloseClipboard
CloseHandle
CoCreateInstance
COMCTL32.dll
CompareFileTime
CopyFileW
CoTaskMemFree
|c@ R\1
CreateBrushIndirect
CreateDialogParamW
CreateDirectoryW
CreateFileW
CreateFontIndirectW
CreatePopupMenu
CreateProcessW
CreateStdAccessibleObject
CreateThread
CreateWindowExW
cye^\p
D3[!e?
@.data
DefWindowProcW
DeleteFileW
DeleteObject
DestroyWindow
DialogBoxParamW
dipHIJe
DispatchMessageW
DrawTextW
EiWg1zy
EmptyClipboard
EnableMenuItem
EnableWindow
EndDialog
EndPaint
EnumResourceNamesA
ExitProcess
ExitWindowsEx
ExpandEnvironmentStringsW
F4JksY
;fBo2&
fh<6p"r
	F}hPQ4_
FillRect
FindClose
FindFirstFileW
FindNextFileW
FindWindowExW
FMp,-;
f`&NkD
FreeEnvironmentStringsW
FreeLibrary
g\4m9at+
GDI32.dll
GetClassInfoW
GetClientRect
GetCommandLineW
GetCurrentProcess
GetDeviceCaps
GetDiskFreeSpaceW
GetDlgItem
GetDlgItemTextW
GetExitCodeProcess
GetFileAttributesW
GetFileSize
GetFileVersionInfoSizeW
GetFileVersionInfoW
GetFullPathNameW
GetLastError
GetMessagePos
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetPrivateProfileStringW
GetProcAddress
GetProcessHandleCount
GetShortPathNameW
GetSysColor
GetSystemDirectoryW
GetSystemMenu
GetSystemMetrics
GetTempFileNameW
GetTempPathW
GetTickCount
GetVersion
GetVersionExW
GetWindowModuleFileNameW
GetWindowRect
GetWindowsDirectoryW
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
"gW1_L)IXn
HK6,<zl
I^9u,P
IaaDuww
I.a:[H
i~	d3@R
.idive
iEhZtE
	;ieya
ImageList_AddMasked
ImageList_Create
ImageList_Destroy
InvalidateRect
isKFv3
IsWindow
IsWindowEnabled
IsWindowVisible
i|t5Oq
Ixd:+-
|iX*TM
J2%rE]WA
>j(+5d
\	jM-w
?/	*k9
KERNEL32.dll
k:RichG
Ktn)XG
)lLw[=
LoadBitmapW
LoadCursorW
LoadImageW
LoadLibraryA
LoadLibraryExW
LoadLibraryW
LresultFromObject
lstrcatW
lstrcmpiA
lstrcmpiW
lstrcmpW
lstrcpyA
lstrcpynA
lstrcpynW
lstrcpyW
lstrlenA
lstrlenW
@lVGX7
lV.w:ON]4
MessageBoxIndirectW
^MJhs&;
MoveFileW
%~mqxo
m+RCMkB
MulDiv
MultiByteToWideChar
neL0b"o@+
N-o>q$
nTkGWy
O7njEP=f
o/$[gO
ole32.dll
OLEACC.dll
OleInitialize
OleUninitialize
OpenClipboard
OpenProcess
~,o(w\
O;XciO5A
$\}oXw
PeekMessageW
PHI?^H6lz
PostQuitMessage
PqN2CER
Q4 9PLT
qaaA~*
QFrug*
qJ(9u-
q(UM02
`.rdata
ReadFile
RegCloseKey
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyW
RegEnumValueW
RegisterClassW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
RemoveDirectoryW
rj(~`?\
ScreenToClient
SearchPathW
SelectObject
SendMessageTimeoutW
SendMessageW
SetBkColor
SetBkMode
SetClassLongW
SetClipboardData
SetCurrentDirectoryW
SetCursor
SetDlgItemTextW
SetErrorMode
SetFileAttributesW
SetFilePointer
SetFileTime
SetForegroundWindow
SetTextColor
SetTimer
SetWindowLongW
SetWindowPos
SetWindowTextW
SHBrowseForFolderW
SHELL32.dll
ShellExecuteW
SHFileOperationW
SHGetFileInfoW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShowWindow
SI`h,#Z
SystemParametersInfoW
#sZrW!
T3'7wn
\(T/cJ
TD>'At
_&Tg]r
!This program cannot be run in DOS mode.
Th`rBe./
"@|##Tj
tjA?v^R
tJZ':G
"~tr5}=B
TrackPopupMenu
TW~y	x
UGJ?DC
Us5U$wa
USER32.dll
UU>@oo
&?u*<v`
v|B$B{
VerQueryValueW
VERSION.dll
v]g5UE
Virp-p4
v<qw4=h
(>V:xJ
WaitForSingleObject
whj\L[B
)whO< ;
WideCharToMultiByte
WIxkY%r
:|(WMA
`Wm-X(
WriteConsoleInputVDMA
WriteFile
WritePrivateProfileStringW
wsprintfA
wsprintfW
wvyhfm
^W#>]Y)
x))c<"p/%
xnt,`Q
xQWQ=:b
XWi}-+
%(&y`;
{`^_;(Y
y_92V>
>Yp_kc[
YVfn^%R^
z60WG3
Zea2'x
Z.f(UxO
Zi`&6s
<zIHJCx
zpoFD>