Analysis Date | 2014-04-18 13:36:37 |
---|---|
MD5 | 1583e8e63eb27089e76564e5f856aa12 |
SHA1 | 1a368fcb94b122520dcc5bfbbba640d1b3ade37e |
Static Details:
File type | PE32 executable for MS Windows (GUI) Intel 80386 32-bit | |
---|---|---|
Section | .text md5: afae93b7d0dd6fd142b64d7b593176db sha1: 1cbcdf075f4c68683449bee497929631aab866a6 size: 119296 | |
Section | .rdata md5: 802b24bcef5dcc7528c46901d750c565 sha1: 3c199a31f06f20fdcd4eef4c0f025001b8585a16 size: 16384 | |
Section | .data md5: 561c9a40dfbb01ab6b880898e5ea454b sha1: 428cafa946122b2269a96e2f9692ce036790a403 size: 99840 | |
Timestamp | 2014-01-22 06:47:08 | |
PEhash | 92bb72c03327ad220119793b6a201b308f5ca793 | |
IMPhash | 79bf85e9214034442bb3a4275ebec0de | |
AV | avira | W32/Sality.AT |
AV | avg | Generic_r.DML |
AV | mcafee | W32/Sality.gen.z |
AV | msse | Virus:Win32/Sality.AT |
Runtime Details:
Screenshot | ![]() |
---|
Process
↳ C:\malware.exe
Registry | HKEY_CURRENT_USER\Software\Aasppapmmxkvs\A1_0 ➝ 2692894802 |
---|---|
Registry | HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\policies\system\EnableLUA ➝ NULL |
Registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Svc\AntiVirusOverride ➝ 1 |
Registry | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Hidden ➝ 2 |
Registry | HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall ➝ NULL |
Registry | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Framework Support Service Block Server ➝ C:\Documents and Settings\Administrator\Application Data\qeoywrpovv\impeifvsb.exe |
Registry | HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\malware.exe ➝ C:\malware.exe:*:Enabled:ipsec |
Registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusOverride ➝ 1 |
Registry | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\GlobalUserOffline ➝ NULL |
Registry | HKEY_CURRENT_USER\Software\Aasppapmmxkvs\-993627007\1768776769 ➝ 215 |
Creates File | PIPE\lsarpc |
Creates File | C:\Documents and Settings\Administrator\Application Data\qeoywrpovv\impeifvsb.exe |
Creates File | C:\WINDOWS\SYSTEM.INI |
Creates Process | C:\Documents and Settings\Administrator\Application Data\qeoywrpovv\impeifvsb.exe |
Creates Mutex | uxJLpe1m |
Creates Mutex | services.exeM_616_ |
Creates Mutex | explorer.exeM_360_ |
Creates Mutex | svchost.exeM_1192_ |
Creates Mutex | svchost.exeM_1092_ |
Creates Mutex | svchost.exeM_800_ |
Creates Mutex | lsass.exeM_628_ |
Creates Mutex | monitor.exeM_1232_ |
Creates Mutex | spoolsv.exeM_1312_ |
Creates Mutex | malware.exeM_1456_ |
Creates Mutex | alg.exeM_1876_ |
Creates Mutex | reader_sl.exeM_972_ |
Creates Mutex | svchost.exeM_1208_ |
Creates Mutex | csrss.exeM_548_ |
Creates Mutex | svchost.exeM_852_ |
Creates Mutex | smss.exeM_500_ |
Creates Mutex | winlogon.exeM_572_ |
Creates Mutex | userinit.exeM_268_ |
Creates Mutex | svchost.exeM_1020_ |
Process
↳ C:\Documents and Settings\Administrator\Application Data\qeoywrpovv\impeifvsb.exe
Creates File | C:\Documents and Settings\Administrator\Application Data\qeoywrpovv\ngcstauj.exe |
---|---|
Creates File | \Device\Afd\Endpoint |
Creates File | C:\Documents and Settings\Administrator\Application Data\qeoywrpovv\impeifvsb.yp |
Creates Process | WATCHDOGPROC "C:\Documents and Settings\Administrator\Application Data\qeoywrpovv\impeifvsb.exe" |
Creates Mutex | uxJLpe1m |
Creates Mutex | impeifvsb.exeM_1424_ |
Process
↳ Pid 268
Process
↳ C:\WINDOWS\Explorer.EXE
Creates Mutex | uxJLpe1m |
---|
Process
↳ C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe
Creates Mutex | uxJLpe1m |
---|
Process
↳ WATCHDOGPROC "C:\Documents and Settings\Administrator\Application Data\qeoywrpovv\impeifvsb.exe"
Registry | HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\policies\system\EnableLUA ➝ NULL |
---|---|
Registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Svc\AntiVirusOverride ➝ 1 |
Registry | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Hidden ➝ 2 |
Registry | HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall ➝ NULL |
Registry | HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Documents and Settings\Administrator\Application Data\qeoywrpovv\ngcstauj.exe ➝ C:\Documents and Settings\Administrator\Application Data\qeoywrpovv\ngcstauj.exe:*:Enabled:ipsec |
Registry | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusOverride ➝ 1 |
Registry | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\GlobalUserOffline ➝ NULL |
Registry | HKEY_CURRENT_USER\Software\Aasppapmmxkvs\-993627007\1768776769 ➝ 215 |
Creates File | C:\TEMP\FILES\monitor.exe |
Creates File | C:\TEMP\FILES\ngcstauj.exe |
Creates File | C:\Documents and Settings\Administrator\Local Settings\Temp\00015975_Rar\ngcstauj.exe |
Creates File | C:\Documents and Settings\Administrator\Local Settings\Temp\nxsfqa.exe |
Creates File | PIPE\SfcApi |
Creates File | C:\Program Files\Adobe\Acrobat 7.0\Reader\AcroRd32.exe |
Creates File | C:\TEMP\FILES\ncfkr.exe |
Creates File | C:\TEMP\FILES\impeifvsb.exe |
Creates File | C:\TEMP\FILES\AcroRd32.exe |
Creates File | C:\Documents and Settings\Administrator\Local Settings\Temp\ncfkr.exe |
Creates File | C:\TEMP\monitor.exe |
Creates File | PIPE\lsarpc |
Creates File | \Device\Afd\Endpoint |
Creates File | C:\WINDOWS\system32\drivers\lukgn.sys |
Creates File | amsint32 |
Deletes File | C:\Documents and Settings\Administrator\Local Settings\Temp\00015975_Rar\ngcstauj.exe |
Deletes File | C:\Documents and Settings\Administrator\Local Settings\Temp\nxsfqa.exe |
Deletes File | C:\Documents and Settings\Administrator\Local Settings\Temp\ncfkr.exe |
Deletes File | C:\WINDOWS\system32\drivers\lukgn.sys |
Creates Mutex | uxJLpe1m |
Creates Mutex | services.exeM_616_ |
Creates Mutex | explorer.exeM_360_ |
Creates Mutex | svchost.exeM_1192_ |
Creates Mutex | svchost.exeM_1092_ |
Creates Mutex | svchost.exeM_800_ |
Creates Mutex | lsass.exeM_628_ |
Creates Mutex | monitor.exeM_1232_ |
Creates Mutex | spoolsv.exeM_1312_ |
Creates Mutex | alg.exeM_1876_ |
Creates Mutex | reader_sl.exeM_972_ |
Creates Mutex | svchost.exeM_1208_ |
Creates Mutex | csrss.exeM_548_ |
Creates Mutex | svchost.exeM_852_ |
Creates Mutex | smss.exeM_500_ |
Creates Mutex | winlogon.exeM_572_ |
Creates Mutex | userinit.exeM_268_ |
Creates Mutex | ngcstauj.exeM_3548_ |
Creates Mutex | svchost.exeM_1020_ |
Creates Mutex | impeifvsb.exeM_1424_ |
Creates Service | amsint32 - C:\WINDOWS\system32\drivers\lukgn.sys |
Starts Service | IPFILTERDRIVER |
Starts Service | amsint32 |
Process
↳ C:\WINDOWS\system32\svchost.exe
Process
↳ C:\WINDOWS\system32\svchost.exe
Process
↳ C:\WINDOWS\system32\svchost.exe
Process
↳ C:\WINDOWS\system32\svchost.exe
Creates File | WMIDataDevice |
---|
Process
↳ C:\WINDOWS\system32\svchost.exe
Process
↳ C:\WINDOWS\system32\svchost.exe
Process
↳ C:\WINDOWS\System32\svchost.exe
Registry | HKEY_LOCAL_MACHINE\Software\Microsoft\WBEM\CIMOM\List of event-active namespaces ➝ NULL |
---|---|
Creates File | PIPE\lsarpc |
Creates File | C:\WINDOWS\system32\WBEM\Repository\$WinMgmt.CFG |
Creates File | \Device\Afd\Endpoint |
Process
↳ C:\WINDOWS\system32\svchost.exe
Creates File | WMIDataDevice |
---|
Process
↳ C:\WINDOWS\system32\svchost.exe
Process
↳ C:\WINDOWS\system32\spoolsv.exe
Creates File | PIPE\lsarpc |
---|
Process
↳ C:\WINDOWS\System32\alg.exe
Process
↳ C:\WINDOWS\system32\svchost.exe
Process
↳ C:\WINDOWS\system32\svchost.exe
Process
↳ C:\WINDOWS\system32\svchost.exe
Process
↳ C:\WINDOWS\system32\svchost.exe
Process
↳ C:\WINDOWS\system32\svchost.exe
Creates File | WMIDataDevice |
---|
Process
↳ C:\WINDOWS\system32\svchost.exe
Process
↳ C:\WINDOWS\system32\svchost.exe
Process
↳ C:\WINDOWS\System32\svchost.exe
Registry | HKEY_LOCAL_MACHINE\Software\Microsoft\WBEM\CIMOM\List of event-active namespaces ➝ NULL |
---|---|
Creates File | PIPE\lsarpc |
Creates File | C:\WINDOWS\system32\WBEM\Repository\$WinMgmt.CFG |
Creates File | \Device\Afd\Endpoint |
Process
↳ C:\WINDOWS\system32\svchost.exe
Creates File | WMIDataDevice |
---|
Process
↳ C:\WINDOWS\system32\svchost.exe
Process
↳ C:\WINDOWS\system32\spoolsv.exe
Creates File | PIPE\lsarpc |
---|
Process
↳ C:\WINDOWS\System32\alg.exe
Process
↳ C:\WINDOWS\system32\svchost.exe
Process
↳ C:\WINDOWS\system32\svchost.exe
Process
↳ C:\WINDOWS\system32\svchost.exe
Process
↳ C:\WINDOWS\system32\svchost.exe
Process
↳ C:\WINDOWS\system32\svchost.exe
Creates File | WMIDataDevice |
---|
Process
↳ C:\WINDOWS\system32\svchost.exe
Process
↳ C:\WINDOWS\system32\svchost.exe
Process
↳ C:\WINDOWS\System32\svchost.exe
Registry | HKEY_LOCAL_MACHINE\Software\Microsoft\WBEM\CIMOM\List of event-active namespaces ➝ NULL |
---|---|
Creates File | PIPE\lsarpc |
Creates File | C:\WINDOWS\system32\WBEM\Repository\$WinMgmt.CFG |
Creates File | \Device\Afd\Endpoint |
Process
↳ C:\WINDOWS\system32\svchost.exe
Creates File | WMIDataDevice |
---|
Process
↳ C:\WINDOWS\system32\svchost.exe
Process
↳ C:\WINDOWS\system32\spoolsv.exe
Creates File | PIPE\lsarpc |
---|
Process
↳ C:\WINDOWS\System32\alg.exe
Process
↳ C:\WINDOWS\system32\svchost.exe
Network Details:
DNS | nightmaster.net Type: A 83.143.81.38 |
---|---|
DNS | recordcontinue.net Type: A 98.139.135.198 |
DNS | melbourneit.hotkeysparking.com Type: A 8.5.1.16 |
DNS | recordmaster.net Type: A 209.54.54.125 |
DNS | streetmaster.net Type: A 74.220.215.228 |
DNS | trademaster.net Type: A 72.46.65.6 |
DNS | quietmaster.net Type: A 216.21.239.197 |
DNS | seasonmaster.net Type: A 72.21.91.60 |
DNS | breadcaught.net Type: A |
DNS | quietstrong.net Type: A |
DNS | seasonstrong.net Type: A |
DNS | quiettrouble.net Type: A |
DNS | seasontrouble.net Type: A |
DNS | quietpresident.net Type: A |
DNS | seasonpresident.net Type: A |
DNS | quietcaught.net Type: A |
DNS | seasoncaught.net Type: A |
DNS | againstcontinue.net Type: A |
DNS | doubtcontinue.net Type: A |
DNS | againstmaster.net Type: A |
DNS | doubtmaster.net Type: A |
DNS | againstwonder.net Type: A |
DNS | doubtwonder.net Type: A |
DNS | againstdiscover.net Type: A |
DNS | doubtdiscover.net Type: A |
DNS | nightcontinue.net Type: A |
DNS | decidecontinue.net Type: A |
DNS | decidemaster.net Type: A |
DNS | nightwonder.net Type: A |
DNS | decidewonder.net Type: A |
DNS | nightdiscover.net Type: A |
DNS | decidediscover.net Type: A |
DNS | largecontinue.net Type: A |
DNS | captaincontinue.net Type: A |
DNS | largemaster.net Type: A |
DNS | captainmaster.net Type: A |
DNS | largewonder.net Type: A |
DNS | captainwonder.net Type: A |
DNS | largediscover.net Type: A |
DNS | captaindiscover.net Type: A |
DNS | electriccontinue.net Type: A |
DNS | electricmaster.net Type: A |
DNS | recordwonder.net Type: A |
DNS | electricwonder.net Type: A |
DNS | recorddiscover.net Type: A |
DNS | electricdiscover.net Type: A |
DNS | streetcontinue.net Type: A |
DNS | tradecontinue.net Type: A |
DNS | streetwonder.net Type: A |
DNS | tradewonder.net Type: A |
DNS | streetdiscover.net Type: A |
DNS | tradediscover.net Type: A |
DNS | bettercontinue.net Type: A |
DNS | gathercontinue.net Type: A |
DNS | bettermaster.net Type: A |
DNS | gathermaster.net Type: A |
DNS | betterwonder.net Type: A |
DNS | gatherwonder.net Type: A |
DNS | betterdiscover.net Type: A |
DNS | gatherdiscover.net Type: A |
DNS | fliercontinue.net Type: A |
DNS | breadcontinue.net Type: A |
DNS | fliermaster.net Type: A |
DNS | breadmaster.net Type: A |
DNS | flierwonder.net Type: A |
DNS | breadwonder.net Type: A |
DNS | flierdiscover.net Type: A |
DNS | breaddiscover.net Type: A |
DNS | quietcontinue.net Type: A |
DNS | seasoncontinue.net Type: A |
DNS | quietwonder.net Type: A |
DNS | seasonwonder.net Type: A |
DNS | quietdiscover.net Type: A |
DNS | seasondiscover.net Type: A |
DNS | againstindustry.net Type: A |
DNS | doubtindustry.net Type: A |
DNS | againstbecame.net Type: A |
DNS | doubtbecame.net Type: A |
DNS | againstcontain.net Type: A |
DNS | doubtcontain.net Type: A |
DNS | againstbasket.net Type: A |
DNS | doubtbasket.net Type: A |
DNS | nightindustry.net Type: A |
DNS | decideindustry.net Type: A |
DNS | nightbecame.net Type: A |
DNS | decidebecame.net Type: A |
HTTP GET | http://nightmaster.net/forum/search.php?email=lia_stancu66@yahoo.com&method=post User-Agent: |
HTTP GET | http://recordcontinue.net/forum/search.php?email=lia_stancu66@yahoo.com&method=post User-Agent: |
HTTP GET | http://electriccontinue.net/forum/search.php?email=lia_stancu66@yahoo.com&method=post User-Agent: |
HTTP GET | http://recordmaster.net/forum/search.php?email=lia_stancu66@yahoo.com&method=post User-Agent: |
HTTP GET | http://streetmaster.net/forum/search.php?email=lia_stancu66@yahoo.com&method=post User-Agent: |
HTTP GET | http://trademaster.net/forum/search.php?email=lia_stancu66@yahoo.com&method=post User-Agent: |
HTTP GET | http://quietmaster.net/forum/search.php?email=lia_stancu66@yahoo.com&method=post User-Agent: |
HTTP GET | http://seasonmaster.net/forum/search.php?email=lia_stancu66@yahoo.com&method=post User-Agent: |
Flows TCP | 192.168.1.1:1038 ➝ 83.143.81.38:80 |
Flows TCP | 192.168.1.1:1039 ➝ 98.139.135.198:80 |
Flows TCP | 192.168.1.1:1040 ➝ 8.5.1.16:80 |
Flows TCP | 192.168.1.1:1041 ➝ 209.54.54.125:80 |
Flows TCP | 192.168.1.1:1042 ➝ 74.220.215.228:80 |
Flows TCP | 192.168.1.1:1043 ➝ 72.46.65.6:80 |
Flows TCP | 192.168.1.1:1044 ➝ 216.21.239.197:80 |
Flows TCP | 192.168.1.1:1045 ➝ 72.21.91.60:80 |
Raw Pcap
0x00000000 (00000) 47455420 2f666f72 756d2f73 65617263 GET /forum/searc 0x00000010 (00016) 682e7068 703f656d 61696c3d 6c69615f h.php?email=lia_ 0x00000020 (00032) 7374616e 63753636 40796168 6f6f2e63 stancu66@yahoo.c 0x00000030 (00048) 6f6d266d 6574686f 643d706f 73742048 om&method=post H 0x00000040 (00064) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000050 (00080) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000060 (00096) 3a20636c 6f73650d 0a486f73 743a206e : close..Host: n 0x00000070 (00112) 69676874 6d617374 65722e6e 65740d0a ightmaster.net.. 0x00000080 (00128) 0d0a .. 0x00000000 (00000) 47455420 2f666f72 756d2f73 65617263 GET /forum/searc 0x00000010 (00016) 682e7068 703f656d 61696c3d 6c69615f h.php?email=lia_ 0x00000020 (00032) 7374616e 63753636 40796168 6f6f2e63 stancu66@yahoo.c 0x00000030 (00048) 6f6d266d 6574686f 643d706f 73742048 om&method=post H 0x00000040 (00064) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000050 (00080) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000060 (00096) 3a20636c 6f73650d 0a486f73 743a2072 : close..Host: r 0x00000070 (00112) 65636f72 64636f6e 74696e75 652e6e65 ecordcontinue.ne 0x00000080 (00128) 740d0a0d 0a t.... 0x00000000 (00000) 47455420 2f666f72 756d2f73 65617263 GET /forum/searc 0x00000010 (00016) 682e7068 703f656d 61696c3d 6c69615f h.php?email=lia_ 0x00000020 (00032) 7374616e 63753636 40796168 6f6f2e63 stancu66@yahoo.c 0x00000030 (00048) 6f6d266d 6574686f 643d706f 73742048 om&method=post H 0x00000040 (00064) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000050 (00080) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000060 (00096) 3a20636c 6f73650d 0a486f73 743a2065 : close..Host: e 0x00000070 (00112) 6c656374 72696363 6f6e7469 6e75652e lectriccontinue. 0x00000080 (00128) 6e65740d 0a0d0a net.... 0x00000000 (00000) 47455420 2f666f72 756d2f73 65617263 GET /forum/searc 0x00000010 (00016) 682e7068 703f656d 61696c3d 6c69615f h.php?email=lia_ 0x00000020 (00032) 7374616e 63753636 40796168 6f6f2e63 stancu66@yahoo.c 0x00000030 (00048) 6f6d266d 6574686f 643d706f 73742048 om&method=post H 0x00000040 (00064) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000050 (00080) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000060 (00096) 3a20636c 6f73650d 0a486f73 743a2072 : close..Host: r 0x00000070 (00112) 65636f72 646d6173 7465722e 6e65740d ecordmaster.net. 0x00000080 (00128) 0a0d0a0d 0a0d0a ....... 0x00000000 (00000) 47455420 2f666f72 756d2f73 65617263 GET /forum/searc 0x00000010 (00016) 682e7068 703f656d 61696c3d 6c69615f h.php?email=lia_ 0x00000020 (00032) 7374616e 63753636 40796168 6f6f2e63 stancu66@yahoo.c 0x00000030 (00048) 6f6d266d 6574686f 643d706f 73742048 om&method=post H 0x00000040 (00064) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000050 (00080) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000060 (00096) 3a20636c 6f73650d 0a486f73 743a2073 : close..Host: s 0x00000070 (00112) 74726565 746d6173 7465722e 6e65740d treetmaster.net. 0x00000080 (00128) 0a0d0a0d 0a0d0a ....... 0x00000000 (00000) 47455420 2f666f72 756d2f73 65617263 GET /forum/searc 0x00000010 (00016) 682e7068 703f656d 61696c3d 6c69615f h.php?email=lia_ 0x00000020 (00032) 7374616e 63753636 40796168 6f6f2e63 stancu66@yahoo.c 0x00000030 (00048) 6f6d266d 6574686f 643d706f 73742048 om&method=post H 0x00000040 (00064) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000050 (00080) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000060 (00096) 3a20636c 6f73650d 0a486f73 743a2074 : close..Host: t 0x00000070 (00112) 72616465 6d617374 65722e6e 65740d0a rademaster.net.. 0x00000080 (00128) 0d0a0a0d 0a0d0a ....... 0x00000000 (00000) 47455420 2f666f72 756d2f73 65617263 GET /forum/searc 0x00000010 (00016) 682e7068 703f656d 61696c3d 6c69615f h.php?email=lia_ 0x00000020 (00032) 7374616e 63753636 40796168 6f6f2e63 stancu66@yahoo.c 0x00000030 (00048) 6f6d266d 6574686f 643d706f 73742048 om&method=post H 0x00000040 (00064) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000050 (00080) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000060 (00096) 3a20636c 6f73650d 0a486f73 743a2071 : close..Host: q 0x00000070 (00112) 75696574 6d617374 65722e6e 65740d0a uietmaster.net.. 0x00000080 (00128) 0d0a0a0d 0a0d0a ....... 0x00000000 (00000) 47455420 2f666f72 756d2f73 65617263 GET /forum/searc 0x00000010 (00016) 682e7068 703f656d 61696c3d 6c69615f h.php?email=lia_ 0x00000020 (00032) 7374616e 63753636 40796168 6f6f2e63 stancu66@yahoo.c 0x00000030 (00048) 6f6d266d 6574686f 643d706f 73742048 om&method=post H 0x00000040 (00064) 5454502f 312e300d 0a416363 6570743a TTP/1.0..Accept: 0x00000050 (00080) 202a2f2a 0d0a436f 6e6e6563 74696f6e */*..Connection 0x00000060 (00096) 3a20636c 6f73650d 0a486f73 743a2073 : close..Host: s 0x00000070 (00112) 6561736f 6e6d6173 7465722e 6e65740d easonmaster.net. 0x00000080 (00128) 0a0d0a0d 0a0d0a .......
Strings
. -E- -0 -0010+-0 0 -0 CC00-+ . . -e- . \ 00 . :\ :.. ...........?- 0 0 0 0 - .u(.O . . 1 ANAYA H ((((( H h(((( H jjjjh jjjjj KERNEL32.DLL mscoree.dll (null) !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~ !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~ !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~ 0A@@Ju +0KnQlP 0SSSSS 0WWWWW 1H8$sW4 [1n&6D]_i7 1{N>k= 1#QNAN 1#SNAN 26?`*mM & 2dvm= 2m"*\FDB 3[AC6v{O +3.(fs 3oq|LY< [~)3!se "\5Eml #6%]]7O ^6^h"50 6r`\sW 6x}17W 6ZO<dx ]*7A / 8D$Bt@ 8G#+J+* 8P/40O 8'vav" 8VVVVV ][9!10hbG .9hE{T a2'0.q abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ ACs\'r ADVAPI32.dll An application has made an attempt to load the C runtime library incorrectly. A*Ny"e <at9<rt,<wt - Attempt to initialize the CRT more than once. - Attempt to use MSIL code from this assembly during native code initialization August .?AVbad_alloc@std@@ .?AVbad_exception@std@@ .?AVexception@std@@ .?AVlength_error@std@@ .?AVlogic_error@std@@ .?AVout_of_range@std@@ .?AVtype_info@@ ;b3d)3 B3xNC&Ta |$B8\$A bad allocation bad exception Base Class Array' Base Class Descriptor at ( __based( /B,d%4 BeginPaint Bg<QV_ +BpE(0 b~pp@x -c(5*D -C?6V# __cdecl CIEi>A C{{j3L Class Hierarchy Descriptor' CloseHandle __clrcall CompareStringA CompareStringW Complete Object Locator' CONOUT$ `copy constructor closure' CopyFileA CorExitProcess CP8dTc( CreateDirectoryA CreateEventA CreateFileA CreateIconFromResourceEx CreateProcessA CreateStreamOnHGlobal CreateThread CreateToolhelp32Snapshot CreateWindowExA - CRT not initialized Cz{6m< CzZ~:: D$,]_^[ D$$_^][ D$\_^[ "d1~<2R D$4h [B D$8PQV D$8PQVW dddd, MMMM dd, yyyy D$dPVf December DecodePointer `default constructor closure' DefWindowProcA delete delete[] Delete DeleteCriticalSection D$h+D$` D$,htGB DispatchMessageA Dk+z(7 D$l+D$d+ DOMAIN error DPtoLP D$(PVf D$\QRPS Dsn"Xfi `dynamic atexit destructor for ' `dynamic initializer for ' `eh vector constructor iterator' `eh vector copy constructor iterator' `eh vector destructor iterator' `eh vector vbase constructor iterator' `eh vector vbase copy constructor iterator' , ?EI1 }E`K'F( EncodePointer EndPaint EnterCriticalSection Ep7AFe E:u1zZ6 ExitProcess %''f7}> __fastcall fATx"}_CN February Fh=`gB F$IH@7 FileTimeToLocalFileTime FileTimeToSystemTime FindClose FindFirstFileA FL#; a - floating point support not loaded FlsAlloc FlsFree FlsGetValue FlsSetValue FlushFileBuffers ForceRemove }F&Q{`' FreeEnvironmentStringsA FreeEnvironmentStringsW Friday ^F<-uB (fub\5 GAIsProcessorFeaturePresent _=,G>b GDI32.dll ;g[!EL GetACP GetActiveWindow GetCommandLineA GetConsoleCP GetConsoleMode GetConsoleOutputCP GetCPInfo GetCurrentDirectoryA GetCurrentProcess GetCurrentProcessId GetCurrentThreadId GetDesktopWindow GetDeviceCaps GetDriveTypeA GetEnvironmentStrings GetEnvironmentStringsW GetEnvironmentVariableA GetFileSize GetFileType GetFullPathNameA GetLastActivePopup GetLastError GetLocaleInfoA GetMapMode GetMessageA GetModuleFileNameA GetModuleHandleA GetModuleHandleW GetOEMCP GetProcAddress GetProcessHeap GetProcessWindowStation GetStartupInfoA GetStdHandle GetStockObject GetStringTypeA GetStringTypeW GetSystemTimeAsFileTime GetTempPathA GetTickCount GetTimeZoneInformation GetTitleBarInfo GetUserObjectInformationA GetWindowDC GetWindowRect ghE_q' GJ>mkH Gl;ED9 GlobalAlloc GlobalFree GlobalLock GlobalUnlock g+Y3q} `h```` "HAA:CfE5 HdosB; HeapAlloc HeapCreate HeapFree HeapReAlloc HeapSize `h`hhh HH:mm:ss HHtXHHt H`t$Za I*2d07 I7Z8xF >If90t ;IGU PYa InitializeCriticalSectionAndSpinCount InterlockedDecrement InterlockedIncrement InvalidateRect invalid string position IsDebuggerPresent IsValidCodePage ]"iud\y ivFI1F I\Xnxg iz%ERy JanFebMarAprMayJunJulAugSepOctNovDec January \JbGa5n -jg?VTCPM$ j$hHEB j@j ^V j]N:I<U J\{pZ_ JR;I555 $ J(s. j"^SSSSS K2xKndP +K92Ad KERNEL32 KERNEL32.dll KI[*aW kimnT" ]#L 7~F L$8QRVWW lAdv<o L<Bu/>A LCMapStringA LCMapStringW le9dq V LeaveCriticalSection lH)A1@R !Li:Vc +l*&jj$ L$l_^][3 ~llxhEM LoadCursorA LoadKeyboardLayoutA LoadLibraryA `local static guard' `local static thread guard' `local vftable' `local vftable constructor closure' LPtoDP L$ QUV L$TQVPW LurB9S L$@VPQ |m<9eWr M=9vvL `managed vector constructor iterator' `managed vector copy constructor iterator' `managed vector destructor iterator' MessageBoxA Microsoft Visual C++ Runtime Library Mk+)|M M!lgV-{ MM/dd/yy Monday MoveWindow MulDiv MultiByteToWideChar )+M*WJ mXEjN,6 NenAu~ new[] nJ<V:@ :n-'KE NoRemove - not enough space for arguments - not enough space for environment - not enough space for locale information - not enough space for lowio initialization - not enough space for _onexit/atexit table - not enough space for stdio initialization - not enough space for thread data November (null) O`6r8$ O9S}"^1 October oDDe/z oGUhBr ole32.dll OLEAUT32.dll `omni callsig' OpenProcess operator OzBx6pQ&* __pascal `placement delete closure' `placement delete[] closure' Please contact the application's support team for more information. p+lTSN P,ofl%PTJ" PostQuitMessage PPPPPPPP %p+-{] Q Process32First Process32Next Program: <program name unknown> `pS2J" __ptr64 - pure virtual function call q"1O^"1 q^{4/@ q8h5h4E Q{e+(2 QhA3w qhz?%H2 QQSVWd QueryPerformanceCounter QxnY{WW7 RaiseException rCHzq`G .rdata ReadFile RectInRegion RegCloseKey RegisterClassExA RegOpenKeyA RegSetValueExA __restrict ^+r>K*R $=rq%QE R,QXG]37 _r+rw5oG3 RtlUnwind &r`T=X runtime error Runtime Error! Rxs(% }S[{7A -Sa`[j Saturday `scalar deleting destructor' September SetEndOfFile SetEnvironmentVariableA SetEvent SetFileAttributesA SetFilePointer SetFocus SetHandleCount SetLastError SetMapMode SetSecurityDescriptorOwner SetStdHandle SetSysColors SetUnhandledExceptionFilter SetupComm SetWindowTextA ShowWindow SING error Sn$??( SN>V}N s[S;7|G;w ^SSSSS __stdcall `string' string too long Sunday SunMonTueWedThuFriSat T$0RPj t$0WSQ3 T$8RUVPP *tB[dO T$DRPQ te$lbhT TerminateProcess tGHt.Ht& t(HE\Z[Qb^ +t HHt This application has requested the Runtime to terminate it in an unusual way. __thiscall This indicates a bug in your application. This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain. !This program cannot be run in DOS mode. Thursday < tK< tG TLOSS error TlsAlloc TlsFree TlsGetValue TlsSetValue %tMdgJ~el <\tM</tI #TNa<^^H to=xoB tR99u2 TranslateMessage T$(RWf T$@SRf t"SS9] <+t(<-t$: t$`;t$ t$<"u 3 Tuesday ;t$,v- T$ VSj Tw_k(>nF t$,WPR t+WWVPV tyO^Dg Type Descriptor' `typeof' T%.'\z~ >:u8FV `udt returning' UFr%qW ujVWj4h u>jWhR uL`wUq - unable to initialize heap - unable to open console device __unaligned - unexpected heap error - unexpected multithread lock error UnhandledExceptionFilter UNICODE Unknown exception UpdateWindow UQPXY]Y[ URPQQh< USER32.dll USER32.DLL u[SSSP UTF-16LE -.UT:y; u`^V*0 #>}UVD v)@!8c `vbase destructor' `vbtable' `vcall' `vector constructor iterator' `vector copy constructor iterator' `vector deleting destructor' `vector destructor iterator' `vector vbase constructor iterator' `vector vbase copy constructor iterator' VfeoZ]: `vftable' VirtualAlloc `virtual displacement map' VirtualFree v N+D$ >VRP"3G _VVVVV VVVVVQRSSj vy^u-x" w ]9b# w9xAXk WaitForSingleObject Wednesday WideCharToMultiByte wm.|%?P WriteConsoleA WriteConsoleW WriteFile WS2_32.dll ^WWWWW XJ~&x xn,jAo xppwpp xpxxxx Xt M. <xtX<XtT )[Xw(-| =xw(8:{ Y;=hmB Yh{',o yodWRx <!yrW@ YR"zBs >=Yt1j <'zazEC >^*Zem=