Analysis Date2014-06-21 07:59:42
MD5345380ed52ab97bf96793324ec0c53e2
SHA10c1c1d3ec6ccd483194952c4766b109c2ec2cae7

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: b1b186fbe841455d5ab777df9fbb713b sha1: 52624148ec4c9cb7b4f349acd0aa34fa04c28b7f size: 12288
Section.rdata md5: 0f343b0931126a20f133d67c2b018a3b sha1: 60cacbf3d72e1e7834203da608037b1bf83b40e8 size: 1024
Section.data md5: 594e1020a7049f59e9e3830299183359 sha1: 48a8bef1c16915b19177ba25d45e74323536a963 size: 113152
Section.rsrc md5: d9ecc755db4ecf1e706c3e636dd5e141 sha1: 28529f10fb22be1f8d548d1657e0ad06139b50bd size: 5120
Timestamp2009-04-26 17:21:27
VersionLegalCopyright: Copyright © 2010 l PC Tools. All rights reserved. 2m
InternalName: tdama5
FileVersion: 7.0.0.61
CompanyName: PC Tools
LegalTrademarks:
Comments:
ProductName:
ProductVersion: 7.0.0.61
FileDescription: TMSpyware Doctor Component
OriginalFilename: tdama5
PEhash6f96f6b8fcf0f1605f0d9b5647b50cb2931db08a
IMPhashcefb05cae6fd6d53686dc1593922b63d

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates ProcessC:\malware.exe
Creates MutexGlobal\{F5CC5A0A-B9E5-411f-BF7E-EACE3BBC2BF1}
Creates Mutex{A14B1A1D-023F-40dc-BBFE-208B1DAD2F82}

Process
↳ C:\malware.exe

RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\0ESKOMO9JO ➝
C:\malware.exe
RegistryHKEY_CURRENT_CONFIG\Software\Microsoft\windows\CurrentVersion\Internet Settings\ProxyEnable ➝
NULL
RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\\\x03\1601 ➝
NULL
RegistryHKEY_CURRENT_USER\Software\0ESKOMO9JO\OteH ➝
xC7aKZ+O6wyPlq1krRM4sG7m2LFGsYtHjHOagBf10Uk/n4gL8s8xs9LeD5KQVh3/j+XFa0mnr175UElKKyciA2gn6tUEA721Fj4P\\x00
RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ProxyBypass ➝
1
Creates FileC:\WINDOWS\Tasks\{22116563-108C-42c0-A7CE-60161B75E508}.job
Creates FileC:\Documents and Settings\Administrator\Local Settings\History\History.IE5\index.dat
Creates FileC:\Documents and Settings\Administrator\Cookies\index.dat
Creates FilePIPE\lsarpc
Creates File\Device\Afd\Endpoint
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temporary Internet Files\Content.IE5\index.dat
Creates Mutexc:!documents and settings!administrator!local settings!history!history.ie5!
Creates MutexGlobal\{F5CC5A0A-B9E5-411f-BF7E-EACE3BBC2BF1}
Creates MutexWininetConnectionMutex
Creates Mutexc:!documents and settings!administrator!cookies!
Creates Mutexc:!documents and settings!administrator!local settings!temporary internet files!content.ie5!
Creates Mutex{A14B1A1D-023F-40dc-BBFE-208B1DAD2F82}
Winsock DNSfalallen.com
Winsock DNStopkio.com

Network Details:

DNSwsj.com
Type: A
205.203.132.65
DNSwsj.com
Type: A
205.203.140.1
DNSwsj.com
Type: A
205.203.140.65
DNSwsj.com
Type: A
205.203.132.1
DNSfastclick.com
Type: A
64.156.167.84
DNSnifty.com
Type: A
210.131.4.217
DNSfalallen.com
Type: A
69.43.161.146
DNStopkio.com
Type: A
DNSphreeway.com
Type: A
DNStirefondn.com
Type: A
HTTP POSThttp://falallen.com/borders.php
User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)
Flows TCP192.168.1.1:1031 ➝ 69.43.161.146:80

Raw Pcap
0x00000000 (00000)   504f5354 202f626f 72646572 732e7068   POST /borders.ph
0x00000010 (00016)   70204854 54502f31 2e310d0a 41636365   p HTTP/1.1..Acce
0x00000020 (00032)   70743a20 2a2f2a0d 0a436f6e 74656e74   pt: */*..Content
0x00000030 (00048)   2d547970 653a2061 70706c69 63617469   -Type: applicati
0x00000040 (00064)   6f6e2f78 2d777777 2d666f72 6d2d7572   on/x-www-form-ur
0x00000050 (00080)   6c656e63 6f646564 0d0a5573 65722d41   lencoded..User-A
0x00000060 (00096)   67656e74 3a204d6f 7a696c6c 612f342e   gent: Mozilla/4.
0x00000070 (00112)   30202863 6f6d7061 7469626c 653b204d   0 (compatible; M
0x00000080 (00128)   53494520 362e303b 2057696e 646f7773   SIE 6.0; Windows
0x00000090 (00144)   204e5420 352e3029 0d0a486f 73743a20    NT 5.0)..Host: 
0x000000a0 (00160)   66616c61 6c6c656e 2e636f6d 0d0a436f   falallen.com..Co
0x000000b0 (00176)   6e74656e 742d4c65 6e677468 3a203334   ntent-Length: 34
0x000000c0 (00192)   310d0a43 6f6e6e65 6374696f 6e3a204b   1..Connection: K
0x000000d0 (00208)   6565702d 416c6976 650d0a43 61636865   eep-Alive..Cache
0x000000e0 (00224)   2d436f6e 74726f6c 3a206e6f 2d636163   -Control: no-cac
0x000000f0 (00240)   68650d0a 0d0a6461 74613d2f 436a4566   he....data=/CjEf
0x00000100 (00256)   5a445376 78714369 4b306c74 554d3175   ZDSvxqCiK0ltUM1u
0x00000110 (00272)   79322f79 75345535 59704e6d 31762f2f   y2/yu4U5YpNm1v//
0x00000120 (00288)   6a546e67 56632b77 4d732b2b 5a426a37   jTngVc+wMs++ZBj7
0x00000130 (00304)   5a535954 72336942 6b472f67 2b375643   ZSYTr3iBkG/g+7VC
0x00000140 (00320)   432f3070 55336b4f 48703765 52634850   C/0pU3kOHp7eRcHP
0x00000150 (00336)   69596f39 39304d55 756a6755 57346276   iYo990MUujgUW4bv
0x00000160 (00352)   5449644e 2f6a5058 7547506a 61427a78   TIdN/jPXuGPjaBzx
0x00000170 (00368)   6c636335 6d704e30 31613674 2f516953   lcc5mpN01a6t/QiS
0x00000180 (00384)   58587770 7a39486d 306b7a39 66426661   XXwpz9Hm0kz9fBfa
0x00000190 (00400)   556e3130 782f474c 636f6652 6948344c   Un10x/GLcofRiH4L
0x000001a0 (00416)   76467341 69475946 7361696f 4d573037   vFsAiGYFsaioMW07
0x000001b0 (00432)   4b304533 726b6b33 4d655a55 79674465   K0E3rkk3MeZUygDe
0x000001c0 (00448)   4c477732 7331322b 6f504d4e 726e4a5a   LGw2s12+oPMNrnJZ
0x000001d0 (00464)   637a687a 5a387869 4e577535 54674f68   czhzZ8xiNWu5TgOh
0x000001e0 (00480)   71344f71 55533042 4d54644b 32625a79   q4OqUS0BMTdK2bZy
0x000001f0 (00496)   2f687833 546e6d47 7954464c 48684c63   /hx3TnmGyTFLHhLc
0x00000200 (00512)   52662b76 417a494f 424e6d76 34334344   Rf+vAzIOBNmv43CD
0x00000210 (00528)   4b325130 35415663 6d413832 4b685466   K2Q05AVcmA82KhTf
0x00000220 (00544)   5573732f 476f6c77 786c6d39 6b4c6e72   Uss/Golwxlm9kLnr
0x00000230 (00560)   6e6c4936 7034366e 3336642f 33346b70   nlI6p46n36d/34kp
0x00000240 (00576)   56563262 7151672f 513d3d              VV2bqQg/Q==


Strings
!.
...u.%
.m
^
040904E4
 2010 l PC Tools.  All rights reserved. 2m
7.0.0.61
BBABORT
Cannot open file "%s". %s
Comments
CompanyName
Copyright 
DVCLAL
Error reading %s%s%s: %s
Failed to get data for '%s'
FileDescription
FileVersion
gINJx
GWPv
InternalName
Invalid argument to date encode
Invalid argument to time encode
Invalid data type for '%s' List capacity out of bounds (%d)
Invalid property element: %s
Invalid property path
Invalid property type: %s
Invalid property value
Invalid stream format$''%s'' is not a valid component name
K0xC
LegalCopyright
LegalTrademarks
List count out of bounds (%d)
List index out of bounds (%d)+Out of memory while expanding memory stream
MS Sans Serif
OLE error %.8x.Method '%s' not supported by automation object/Variant does not reference an automation object7Dispatch methods do not support more than 64 parameters!'%s' is not a valid integer value('%s' is not a valid floating point value
OriginalFilename
Out of memory
PC Tools
ProductName
ProductVersion
Property is read-only
Property %s does not exist
Resource %s not found
%s.Seek not implemented$Operation not allowed on sorted list$%s not in a class registration group
Stream read error
Stream write error
StringFileInfo
tdama5
TEXTFILEDLG
TMSpyware Doctor Component
Translation
VarFileInfo
VS_VERSION_INFO
}WxwR
Z7NM
032Nwx
0*>4.Y
[0$AW	
(13L24
1pKfe(
1ToW2d
2w}kuJ
3?$+19
33333333?333333
333333333333333333
3333333333333338
3333339
333338
33333833
333838
3G2[sE
@3*=kQ
3t>kKj
42tHBa
46]3|#
4EU5kwj
4JeJ# 
52Ku^_
5D;kEc
5n#e73p
5&^V%j
5\W4$j
5&z!fZ
6&;}*/
6=9+7g8
)6c"Apr 
~6#nS=
6<>V/%
6X74Ve
6x78r\
7f>9u]
7G46WB
7nvvGbmwq
7`?($q
8	E}x\b
)8_$tAA
90)o,(
=9&1Y*
943Cy6x
9t:kOwd
!A,9CP$
_^a]gW
:-A<+kg
as3Erso
!^%b7`
BBf7Pc
~bc,QB
b.KNut
BR$*V`
[>B&-W`6
b\X"j0
C8kEWy
cev-8]
CF&uV{
cG&CLS
}|=c/l
CloseHandle
CompareStringA
CreateEventA
CreateFileA
CreateIcon
CreateMenu
CreatePopupMenu
CreateThread
c<R(rh
CwLLfDw
CxVHkyRj
D{4Uw4
d6qJHO
@.data
DefMDIChildProcA
D_faul
d+Ju-e
&-*D>L'T
d^\uW@
|E?~1M
e5@s2J
^e =M$
eNYBFG
ep'B,3'	
ExitProcess
e'^`YF
EzZ*cC*
!&;F\}<
f=}1omo
f7".tH
#.f9g}
F,&A>}
FfZ;.+
FpM^sky%2
F@poG2j|
f>SY;*
GetACP
GetDesktopWindow
GetMenu
GetMenuItemCount
GetOEMCP
GetThreadLocale
gh3NLw
gh	k`B?M
Gmm5{n
gm;	pD~
GqhziN$M
GrO7c46
\GV`m/
Gw6WIN+E	
GwQl9zg
}Heusd
H#F=)a
H	G^hu
hHrWhMD
HM'u-@
HqmEP7A
hYT_DB8V@12
i3.</\O:
!img'a
IsDlgButtonChecked
iSH}Y|X
IsWindowEnabled
j1*5j@
j9IBt=
j[g&{m
Jh';Ag
|'jw0t
JwRh.M|w8
>K~>({>
K\#]=`
k'$5DRj
_!KERNCL
KERNEL32.dll
ki7riNCi
%>:k?inh
#K[:ua
k&uKX0,c
@K.[Wn
L2oad)ibr
L4%g=u&~V
>L|<K9Pz6
llEx ay
LoadBitmapA
LoadLibraryA
LocalAlloc
LXrgDc
M9]=t2P
m>b"182
mExRj!
mj?m&$
Mo[Pp'
M>@u3$3	
mVWNW_T
mWcO:t
/mXva@
n{;0u6
^n9 =>*$
nAx0fM
N/@CPml
?_*NdyQ|
N~J01]
ohMofu
 ^OR!?@
p29sd4
pOOLEA
PoygzOv
P _uw9
qJ]j	p
QMw?=2
 .)`.rdat
`.rdata
Rq+Lf,
rWs xH
&%;\SD
SD^6,VR
s%EsmRTq)A
sioKn3C
SLNtwq
=SPnltN
SS`fGr
@s=wVeDW
_t8hilG9oa0MnD@4
t8"VS-k
tdama5
=tdPyz
TFswYQL
tgPtO1
This program must be run under Win32
tI LCIw
TJ8vIcPoiQ
Tj:h(S
tN9NnI
tQNs1bYf
tu)A75
t&>uN+
	-{.}U
>u*5jyF
u .AD+&P
:UC"kV
u<|eRt~K
UNIQSTR
UOUgS,}
urtpC3M
user32.dll
uU9sXW
uWhNrZ6
#v@6mrd
V7ePf6T
V8&'Od
vCPLzz4
VirtualAllocEx
_VP*jh
>W"'3?
{wft@f
wQvS>f
WRQPSja
wVxef9
WW0yijDU
=&:WX~oK
x2;*yu?
;x3B2 F
Xb7rFz
&xBdH3N
xB]FQg
xecQgf
Xf\ivT
XKwNu@iL
xm?AH]=T
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"><assemblyIdentity version="1.0.0.0" processorArchitecture="X86" name="Nullsoft.NSIS.exehead" type="win32"/><description>Nullsoft Install System v2.46</description><dependency><dependentAssembly><assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="X86" publicKeyToken="6595b64144ccf1df" language="*" /></dependentAssembly></dependency><trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"><security><requestedPrivileges><requestedExecutionLevel level="requireAdministrator" uiAccess="false"/></requestedPrivileges></security></trustInfo><compatibility xmlns="urn:schemas-microsoft-com:compatibility.v1"><application><supportedOS Id="{35138b9a-5d96-4fbd-8e2d-a2440225f93a}"/><supportedOS Id="{e2011457-1546-43c5-a5fe-008deee3d3f0}"/></application></compatibility></assembly>
xRj4Mvxxvl
%&XvX+
Xz3Fos
Y7'd1j
y82D*u
y8]E4R
_ygGR.
^YQCu.
Ys::<u
>Z0h>a
$	z	cy
ZU7AQPsSR
Zv"W^]
.z\y7H2