Looks like EP_X0FF and I had the same idea :). I updated my initial posting with string dumps of the 32bit and 64bit unpacked DLL, the content of the cfg.ini and a dump of all files from the encrypted file system. All string dumps were obtained from an infected Windows 7 x64 machine which is why the dumps may differ with EP_X0FF's ones.
Thanks for update :)
Looks like rootkit needs some tweaks, infected test machine is now cannot boot :)