Analysis Date2014-04-18 13:36:37
MD51583e8e63eb27089e76564e5f856aa12
SHA11a368fcb94b122520dcc5bfbbba640d1b3ade37e

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: afae93b7d0dd6fd142b64d7b593176db sha1: 1cbcdf075f4c68683449bee497929631aab866a6 size: 119296
Section.rdata md5: 802b24bcef5dcc7528c46901d750c565 sha1: 3c199a31f06f20fdcd4eef4c0f025001b8585a16 size: 16384
Section.data md5: 561c9a40dfbb01ab6b880898e5ea454b sha1: 428cafa946122b2269a96e2f9692ce036790a403 size: 99840
Timestamp2014-01-22 06:47:08
PEhash92bb72c03327ad220119793b6a201b308f5ca793
IMPhash79bf85e9214034442bb3a4275ebec0de
AVaviraW32/Sality.AT
AVavgGeneric_r.DML
AVmcafeeW32/Sality.gen.z
AVmsseVirus:Win32/Sality.AT

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

RegistryHKEY_CURRENT_USER\Software\Aasppapmmxkvs\A1_0 ➝
2692894802
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\policies\system\EnableLUA ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Svc\AntiVirusOverride ➝
1
RegistryHKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Hidden ➝
2
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall ➝
NULL
RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Framework Support Service Block Server ➝
C:\Documents and Settings\Administrator\Application Data\qeoywrpovv\impeifvsb.exe
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\malware.exe ➝
C:\malware.exe:*:Enabled:ipsec
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusOverride ➝
1
RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\GlobalUserOffline ➝
NULL
RegistryHKEY_CURRENT_USER\Software\Aasppapmmxkvs\-993627007\1768776769 ➝
215
Creates FilePIPE\lsarpc
Creates FileC:\Documents and Settings\Administrator\Application Data\qeoywrpovv\impeifvsb.exe
Creates FileC:\WINDOWS\SYSTEM.INI
Creates ProcessC:\Documents and Settings\Administrator\Application Data\qeoywrpovv\impeifvsb.exe
Creates MutexuxJLpe1m
Creates Mutexservices.exeM_616_
Creates Mutexexplorer.exeM_360_
Creates Mutexsvchost.exeM_1192_
Creates Mutexsvchost.exeM_1092_
Creates Mutexsvchost.exeM_800_
Creates Mutexlsass.exeM_628_
Creates Mutexmonitor.exeM_1232_
Creates Mutexspoolsv.exeM_1312_
Creates Mutexmalware.exeM_1456_
Creates Mutexalg.exeM_1876_
Creates Mutexreader_sl.exeM_972_
Creates Mutexsvchost.exeM_1208_
Creates Mutexcsrss.exeM_548_
Creates Mutexsvchost.exeM_852_
Creates Mutexsmss.exeM_500_
Creates Mutexwinlogon.exeM_572_
Creates Mutexuserinit.exeM_268_
Creates Mutexsvchost.exeM_1020_

Process
↳ C:\Documents and Settings\Administrator\Application Data\qeoywrpovv\impeifvsb.exe

Creates FileC:\Documents and Settings\Administrator\Application Data\qeoywrpovv\ngcstauj.exe
Creates File\Device\Afd\Endpoint
Creates FileC:\Documents and Settings\Administrator\Application Data\qeoywrpovv\impeifvsb.yp
Creates ProcessWATCHDOGPROC "C:\Documents and Settings\Administrator\Application Data\qeoywrpovv\impeifvsb.exe"
Creates MutexuxJLpe1m
Creates Muteximpeifvsb.exeM_1424_

Process
↳ Pid 268

Process
↳ C:\WINDOWS\Explorer.EXE

Creates MutexuxJLpe1m

Process
↳ C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe

Creates MutexuxJLpe1m

Process
↳ WATCHDOGPROC "C:\Documents and Settings\Administrator\Application Data\qeoywrpovv\impeifvsb.exe"

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\policies\system\EnableLUA ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Svc\AntiVirusOverride ➝
1
RegistryHKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Hidden ➝
2
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Documents and Settings\Administrator\Application Data\qeoywrpovv\ngcstauj.exe ➝
C:\Documents and Settings\Administrator\Application Data\qeoywrpovv\ngcstauj.exe:*:Enabled:ipsec
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusOverride ➝
1
RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\GlobalUserOffline ➝
NULL
RegistryHKEY_CURRENT_USER\Software\Aasppapmmxkvs\-993627007\1768776769 ➝
215
Creates FileC:\TEMP\FILES\monitor.exe
Creates FileC:\TEMP\FILES\ngcstauj.exe
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\00015975_Rar\ngcstauj.exe
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\nxsfqa.exe
Creates FilePIPE\SfcApi
Creates FileC:\Program Files\Adobe\Acrobat 7.0\Reader\AcroRd32.exe
Creates FileC:\TEMP\FILES\ncfkr.exe
Creates FileC:\TEMP\FILES\impeifvsb.exe
Creates FileC:\TEMP\FILES\AcroRd32.exe
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\ncfkr.exe
Creates FileC:\TEMP\monitor.exe
Creates FilePIPE\lsarpc
Creates File\Device\Afd\Endpoint
Creates FileC:\WINDOWS\system32\drivers\lukgn.sys
Creates Fileamsint32
Deletes FileC:\Documents and Settings\Administrator\Local Settings\Temp\00015975_Rar\ngcstauj.exe
Deletes FileC:\Documents and Settings\Administrator\Local Settings\Temp\nxsfqa.exe
Deletes FileC:\Documents and Settings\Administrator\Local Settings\Temp\ncfkr.exe
Deletes FileC:\WINDOWS\system32\drivers\lukgn.sys
Creates MutexuxJLpe1m
Creates Mutexservices.exeM_616_
Creates Mutexexplorer.exeM_360_
Creates Mutexsvchost.exeM_1192_
Creates Mutexsvchost.exeM_1092_
Creates Mutexsvchost.exeM_800_
Creates Mutexlsass.exeM_628_
Creates Mutexmonitor.exeM_1232_
Creates Mutexspoolsv.exeM_1312_
Creates Mutexalg.exeM_1876_
Creates Mutexreader_sl.exeM_972_
Creates Mutexsvchost.exeM_1208_
Creates Mutexcsrss.exeM_548_
Creates Mutexsvchost.exeM_852_
Creates Mutexsmss.exeM_500_
Creates Mutexwinlogon.exeM_572_
Creates Mutexuserinit.exeM_268_
Creates Mutexngcstauj.exeM_3548_
Creates Mutexsvchost.exeM_1020_
Creates Muteximpeifvsb.exeM_1424_
Creates Serviceamsint32 - C:\WINDOWS\system32\drivers\lukgn.sys
Starts ServiceIPFILTERDRIVER
Starts Serviceamsint32

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Creates FileWMIDataDevice

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\System32\svchost.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\WBEM\CIMOM\List of event-active namespaces ➝
NULL
Creates FilePIPE\lsarpc
Creates FileC:\WINDOWS\system32\WBEM\Repository\$WinMgmt.CFG
Creates File\Device\Afd\Endpoint

Process
↳ C:\WINDOWS\system32\svchost.exe

Creates FileWMIDataDevice

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\system32\spoolsv.exe

Creates FilePIPE\lsarpc

Process
↳ C:\WINDOWS\System32\alg.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Creates FileWMIDataDevice

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\System32\svchost.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\WBEM\CIMOM\List of event-active namespaces ➝
NULL
Creates FilePIPE\lsarpc
Creates FileC:\WINDOWS\system32\WBEM\Repository\$WinMgmt.CFG
Creates File\Device\Afd\Endpoint

Process
↳ C:\WINDOWS\system32\svchost.exe

Creates FileWMIDataDevice

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\system32\spoolsv.exe

Creates FilePIPE\lsarpc

Process
↳ C:\WINDOWS\System32\alg.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Creates FileWMIDataDevice

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\System32\svchost.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\WBEM\CIMOM\List of event-active namespaces ➝
NULL
Creates FilePIPE\lsarpc
Creates FileC:\WINDOWS\system32\WBEM\Repository\$WinMgmt.CFG
Creates File\Device\Afd\Endpoint

Process
↳ C:\WINDOWS\system32\svchost.exe

Creates FileWMIDataDevice

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\system32\spoolsv.exe

Creates FilePIPE\lsarpc

Process
↳ C:\WINDOWS\System32\alg.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Network Details:

DNSnightmaster.net
Type: A
83.143.81.38
DNSrecordcontinue.net
Type: A
98.139.135.198
DNSmelbourneit.hotkeysparking.com
Type: A
8.5.1.16
DNSrecordmaster.net
Type: A
209.54.54.125
DNSstreetmaster.net
Type: A
74.220.215.228
DNStrademaster.net
Type: A
72.46.65.6
DNSquietmaster.net
Type: A
216.21.239.197
DNSseasonmaster.net
Type: A
72.21.91.60
DNSbreadcaught.net
Type: A
DNSquietstrong.net
Type: A
DNSseasonstrong.net
Type: A
DNSquiettrouble.net
Type: A
DNSseasontrouble.net
Type: A
DNSquietpresident.net
Type: A
DNSseasonpresident.net
Type: A
DNSquietcaught.net
Type: A
DNSseasoncaught.net
Type: A
DNSagainstcontinue.net
Type: A
DNSdoubtcontinue.net
Type: A
DNSagainstmaster.net
Type: A
DNSdoubtmaster.net
Type: A
DNSagainstwonder.net
Type: A
DNSdoubtwonder.net
Type: A
DNSagainstdiscover.net
Type: A
DNSdoubtdiscover.net
Type: A
DNSnightcontinue.net
Type: A
DNSdecidecontinue.net
Type: A
DNSdecidemaster.net
Type: A
DNSnightwonder.net
Type: A
DNSdecidewonder.net
Type: A
DNSnightdiscover.net
Type: A
DNSdecidediscover.net
Type: A
DNSlargecontinue.net
Type: A
DNScaptaincontinue.net
Type: A
DNSlargemaster.net
Type: A
DNScaptainmaster.net
Type: A
DNSlargewonder.net
Type: A
DNScaptainwonder.net
Type: A
DNSlargediscover.net
Type: A
DNScaptaindiscover.net
Type: A
DNSelectriccontinue.net
Type: A
DNSelectricmaster.net
Type: A
DNSrecordwonder.net
Type: A
DNSelectricwonder.net
Type: A
DNSrecorddiscover.net
Type: A
DNSelectricdiscover.net
Type: A
DNSstreetcontinue.net
Type: A
DNStradecontinue.net
Type: A
DNSstreetwonder.net
Type: A
DNStradewonder.net
Type: A
DNSstreetdiscover.net
Type: A
DNStradediscover.net
Type: A
DNSbettercontinue.net
Type: A
DNSgathercontinue.net
Type: A
DNSbettermaster.net
Type: A
DNSgathermaster.net
Type: A
DNSbetterwonder.net
Type: A
DNSgatherwonder.net
Type: A
DNSbetterdiscover.net
Type: A
DNSgatherdiscover.net
Type: A
DNSfliercontinue.net
Type: A
DNSbreadcontinue.net
Type: A
DNSfliermaster.net
Type: A
DNSbreadmaster.net
Type: A
DNSflierwonder.net
Type: A
DNSbreadwonder.net
Type: A
DNSflierdiscover.net
Type: A
DNSbreaddiscover.net
Type: A
DNSquietcontinue.net
Type: A
DNSseasoncontinue.net
Type: A
DNSquietwonder.net
Type: A
DNSseasonwonder.net
Type: A
DNSquietdiscover.net
Type: A
DNSseasondiscover.net
Type: A
DNSagainstindustry.net
Type: A
DNSdoubtindustry.net
Type: A
DNSagainstbecame.net
Type: A
DNSdoubtbecame.net
Type: A
DNSagainstcontain.net
Type: A
DNSdoubtcontain.net
Type: A
DNSagainstbasket.net
Type: A
DNSdoubtbasket.net
Type: A
DNSnightindustry.net
Type: A
DNSdecideindustry.net
Type: A
DNSnightbecame.net
Type: A
DNSdecidebecame.net
Type: A
HTTP GEThttp://nightmaster.net/forum/search.php?email=lia_stancu66@yahoo.com&method=post
User-Agent:
HTTP GEThttp://recordcontinue.net/forum/search.php?email=lia_stancu66@yahoo.com&method=post
User-Agent:
HTTP GEThttp://electriccontinue.net/forum/search.php?email=lia_stancu66@yahoo.com&method=post
User-Agent:
HTTP GEThttp://recordmaster.net/forum/search.php?email=lia_stancu66@yahoo.com&method=post
User-Agent:
HTTP GEThttp://streetmaster.net/forum/search.php?email=lia_stancu66@yahoo.com&method=post
User-Agent:
HTTP GEThttp://trademaster.net/forum/search.php?email=lia_stancu66@yahoo.com&method=post
User-Agent:
HTTP GEThttp://quietmaster.net/forum/search.php?email=lia_stancu66@yahoo.com&method=post
User-Agent:
HTTP GEThttp://seasonmaster.net/forum/search.php?email=lia_stancu66@yahoo.com&method=post
User-Agent:
Flows TCP192.168.1.1:1038 ➝ 83.143.81.38:80
Flows TCP192.168.1.1:1039 ➝ 98.139.135.198:80
Flows TCP192.168.1.1:1040 ➝ 8.5.1.16:80
Flows TCP192.168.1.1:1041 ➝ 209.54.54.125:80
Flows TCP192.168.1.1:1042 ➝ 74.220.215.228:80
Flows TCP192.168.1.1:1043 ➝ 72.46.65.6:80
Flows TCP192.168.1.1:1044 ➝ 216.21.239.197:80
Flows TCP192.168.1.1:1045 ➝ 72.21.91.60:80

Raw Pcap
0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 6c69615f   h.php?email=lia_
0x00000020 (00032)   7374616e 63753636 40796168 6f6f2e63   stancu66@yahoo.c
0x00000030 (00048)   6f6d266d 6574686f 643d706f 73742048   om&method=post H
0x00000040 (00064)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000050 (00080)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000060 (00096)   3a20636c 6f73650d 0a486f73 743a206e   : close..Host: n
0x00000070 (00112)   69676874 6d617374 65722e6e 65740d0a   ightmaster.net..
0x00000080 (00128)   0d0a                                  ..

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 6c69615f   h.php?email=lia_
0x00000020 (00032)   7374616e 63753636 40796168 6f6f2e63   stancu66@yahoo.c
0x00000030 (00048)   6f6d266d 6574686f 643d706f 73742048   om&method=post H
0x00000040 (00064)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000050 (00080)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000060 (00096)   3a20636c 6f73650d 0a486f73 743a2072   : close..Host: r
0x00000070 (00112)   65636f72 64636f6e 74696e75 652e6e65   ecordcontinue.ne
0x00000080 (00128)   740d0a0d 0a                           t....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 6c69615f   h.php?email=lia_
0x00000020 (00032)   7374616e 63753636 40796168 6f6f2e63   stancu66@yahoo.c
0x00000030 (00048)   6f6d266d 6574686f 643d706f 73742048   om&method=post H
0x00000040 (00064)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000050 (00080)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000060 (00096)   3a20636c 6f73650d 0a486f73 743a2065   : close..Host: e
0x00000070 (00112)   6c656374 72696363 6f6e7469 6e75652e   lectriccontinue.
0x00000080 (00128)   6e65740d 0a0d0a                       net....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 6c69615f   h.php?email=lia_
0x00000020 (00032)   7374616e 63753636 40796168 6f6f2e63   stancu66@yahoo.c
0x00000030 (00048)   6f6d266d 6574686f 643d706f 73742048   om&method=post H
0x00000040 (00064)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000050 (00080)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000060 (00096)   3a20636c 6f73650d 0a486f73 743a2072   : close..Host: r
0x00000070 (00112)   65636f72 646d6173 7465722e 6e65740d   ecordmaster.net.
0x00000080 (00128)   0a0d0a0d 0a0d0a                       .......

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 6c69615f   h.php?email=lia_
0x00000020 (00032)   7374616e 63753636 40796168 6f6f2e63   stancu66@yahoo.c
0x00000030 (00048)   6f6d266d 6574686f 643d706f 73742048   om&method=post H
0x00000040 (00064)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000050 (00080)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000060 (00096)   3a20636c 6f73650d 0a486f73 743a2073   : close..Host: s
0x00000070 (00112)   74726565 746d6173 7465722e 6e65740d   treetmaster.net.
0x00000080 (00128)   0a0d0a0d 0a0d0a                       .......

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 6c69615f   h.php?email=lia_
0x00000020 (00032)   7374616e 63753636 40796168 6f6f2e63   stancu66@yahoo.c
0x00000030 (00048)   6f6d266d 6574686f 643d706f 73742048   om&method=post H
0x00000040 (00064)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000050 (00080)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000060 (00096)   3a20636c 6f73650d 0a486f73 743a2074   : close..Host: t
0x00000070 (00112)   72616465 6d617374 65722e6e 65740d0a   rademaster.net..
0x00000080 (00128)   0d0a0a0d 0a0d0a                       .......

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 6c69615f   h.php?email=lia_
0x00000020 (00032)   7374616e 63753636 40796168 6f6f2e63   stancu66@yahoo.c
0x00000030 (00048)   6f6d266d 6574686f 643d706f 73742048   om&method=post H
0x00000040 (00064)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000050 (00080)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000060 (00096)   3a20636c 6f73650d 0a486f73 743a2071   : close..Host: q
0x00000070 (00112)   75696574 6d617374 65722e6e 65740d0a   uietmaster.net..
0x00000080 (00128)   0d0a0a0d 0a0d0a                       .......

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 6c69615f   h.php?email=lia_
0x00000020 (00032)   7374616e 63753636 40796168 6f6f2e63   stancu66@yahoo.c
0x00000030 (00048)   6f6d266d 6574686f 643d706f 73742048   om&method=post H
0x00000040 (00064)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000050 (00080)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000060 (00096)   3a20636c 6f73650d 0a486f73 743a2073   : close..Host: s
0x00000070 (00112)   6561736f 6e6d6173 7465722e 6e65740d   easonmaster.net.
0x00000080 (00128)   0a0d0a0d 0a0d0a                       .......


Strings
.
-E-
-0
-0010+-0
0
-0
CC00-+ 
.
.
-e-
. 
\
 
00
.
:\
:..
...........?- 
0
0
0
0
-
.u(.O
.
.
1

ANAYA
                                 H
         (((((                  H
         h((((                  H
jjjjh
jjjjj
KERNEL32.DLL
mscoree.dll
(null)
                          
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
0A@@Ju
+0KnQlP
0SSSSS
0WWWWW
1H8$sW4
[1n&6D]_i7
1{N>k=
1#QNAN
1#SNAN
26?`*mM
& 2dvm=
2m"*\FDB
3[AC6v{O
+3.(fs
3oq|LY<
[~)3!se
"\5Eml
#6%]]7O
^6^h"50
6r`\sW
6x}17W
6ZO<dx
]*7A /
8D$Bt@
8G#+J+*
8P/40O
8'vav"
8VVVVV
][9!10hbG
.9hE{T
a2'0.q
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
ACs\'r
ADVAPI32.dll
An application has made an attempt to load the C runtime library incorrectly.
A*Ny"e
<at9<rt,<wt
- Attempt to initialize the CRT more than once.
- Attempt to use MSIL code from this assembly during native code initialization
August
.?AVbad_alloc@std@@
.?AVbad_exception@std@@
.?AVexception@std@@
.?AVlength_error@std@@
.?AVlogic_error@std@@
.?AVout_of_range@std@@
.?AVtype_info@@
;b3d)3
B3xNC&Ta
|$B8\$A
bad allocation
bad exception
 Base Class Array'
 Base Class Descriptor at (
__based(
/B,d%4
BeginPaint
Bg<QV_
+BpE(0
b~pp@x
-c(5*D
-C?6V#
__cdecl
CIEi>A
C{{j3L
 Class Hierarchy Descriptor'
CloseHandle
__clrcall
CompareStringA
CompareStringW
 Complete Object Locator'
CONOUT$
`copy constructor closure'
CopyFileA
CorExitProcess
CP8dTc(
CreateDirectoryA
CreateEventA
CreateFileA
CreateIconFromResourceEx
CreateProcessA
CreateStreamOnHGlobal
CreateThread
CreateToolhelp32Snapshot
CreateWindowExA
- CRT not initialized
Cz{6m<
CzZ~::
D$,]_^[
D$$_^][
D$\_^[
"d1~<2R
D$4h [B
D$8PQV
D$8PQVW
dddd, MMMM dd, yyyy
D$dPVf
December
DecodePointer
`default constructor closure'
DefWindowProcA
 delete
 delete[]
Delete
DeleteCriticalSection
D$h+D$`
D$,htGB
DispatchMessageA
Dk+z(7
D$l+D$d+
DOMAIN error
DPtoLP
D$(PVf
D$\QRPS
Dsn"Xfi
`dynamic atexit destructor for '
`dynamic initializer for '
`eh vector constructor iterator'
`eh vector copy constructor iterator'
`eh vector destructor iterator'
`eh vector vbase constructor iterator'
`eh vector vbase copy constructor iterator'
, ?EI1
}E`K'F(
EncodePointer
EndPaint
EnterCriticalSection
Ep7AFe
E:u1zZ6
ExitProcess
%''f7}>
__fastcall
fATx"}_CN	
February
Fh=`gB
F$IH@7
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
FL#;	a
- floating point support not loaded
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
FlushFileBuffers
ForceRemove
}F&Q{`'
FreeEnvironmentStringsA
FreeEnvironmentStringsW
Friday
^F<-uB
(fub\5
GAIsProcessorFeaturePresent
_=,G>b
GDI32.dll
;g[!EL
GetACP
GetActiveWindow
GetCommandLineA
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
GetCPInfo
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDesktopWindow
GetDeviceCaps
GetDriveTypeA
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetFileSize
GetFileType
GetFullPathNameA
GetLastActivePopup
GetLastError
GetLocaleInfoA
GetMapMode
GetMessageA
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetProcessWindowStation
GetStartupInfoA
GetStdHandle
GetStockObject
GetStringTypeA
GetStringTypeW
GetSystemTimeAsFileTime
GetTempPathA
GetTickCount
GetTimeZoneInformation
GetTitleBarInfo
GetUserObjectInformationA
GetWindowDC
GetWindowRect
ghE_q'
GJ>mkH
Gl;ED9
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
g+Y3q}
`h````
"HAA:CfE5
HdosB;
HeapAlloc
HeapCreate
HeapFree
HeapReAlloc
HeapSize
`h`hhh
HH:mm:ss
HHtXHHt
H`t$Za
I*2d07
I7Z8xF
>If90t
;IGU PYa
InitializeCriticalSectionAndSpinCount
InterlockedDecrement
InterlockedIncrement
InvalidateRect
invalid string position
IsDebuggerPresent
IsValidCodePage
]"iud\y
ivFI1F
I\Xnxg 
iz%ERy
JanFebMarAprMayJunJulAugSepOctNovDec
January
\JbGa5n
-jg?VTCPM$
j$hHEB
j@j ^V
j]N:I<U
J\{pZ_
JR;I555
$	J(s.
j"^SSSSS
K2xKndP
+K92Ad
KERNEL32
KERNEL32.dll
KI[*aW
kimnT"
]#L	7~F
L$8QRVWW
lAdv<o
L<Bu/>A
LCMapStringA
LCMapStringW
le9dq	V
LeaveCriticalSection
lH)A1@R
!Li:Vc
+l*&jj$
L$l_^][3
~llxhEM
LoadCursorA
LoadKeyboardLayoutA
LoadLibraryA
`local static guard'
`local static thread guard'
`local vftable'
`local vftable constructor closure'
LPtoDP
L$ QUV
L$TQVPW
LurB9S
L$@VPQ
|m<9eWr
M=9vvL
`managed vector constructor iterator'
`managed vector copy constructor iterator'
`managed vector destructor iterator'
MessageBoxA
Microsoft Visual C++ Runtime Library
Mk+)|M
M!lgV-{
MM/dd/yy
Monday
MoveWindow
MulDiv
MultiByteToWideChar
)+M*WJ
mXEjN,6
NenAu~
 new[]
nJ<V:@
:n-'KE
NoRemove
- not enough space for arguments
- not enough space for environment
- not enough space for locale information
- not enough space for lowio initialization
- not enough space for _onexit/atexit table
- not enough space for stdio initialization
- not enough space for thread data
November
(null)
O`6r8$
O9S}"^1
October
oDDe/z
oGUhBr
ole32.dll
OLEAUT32.dll
`omni callsig'
OpenProcess
operator
OzBx6pQ&*
__pascal
`placement delete closure'
`placement delete[] closure'
Please contact the application's support team for more information.
p+lTSN
P,ofl%PTJ"
PostQuitMessage
PPPPPPPP
	%p+-{]	Q
Process32First
Process32Next
Program: 
<program name unknown>
`pS2J"
__ptr64
- pure virtual function call
q"1O^"1
q^{4/@
q8h5h4E
Q{e+(2
	QhA3w
qhz?%H2
QQSVWd
QueryPerformanceCounter
QxnY{WW7
RaiseException
rCHzq`G
.rdata
ReadFile
RectInRegion
RegCloseKey
RegisterClassExA
RegOpenKeyA
RegSetValueExA
__restrict
^+r>K*R
$=rq%QE
R,QXG]37
_r+rw5oG3
RtlUnwind
&r`T=X
runtime error 
Runtime Error!
 Rxs(%
}S[{7A
-Sa`[j
Saturday
`scalar deleting destructor'
September
SetEndOfFile
SetEnvironmentVariableA
SetEvent
SetFileAttributesA
SetFilePointer
SetFocus
SetHandleCount
SetLastError
SetMapMode
SetSecurityDescriptorOwner
SetStdHandle
SetSysColors
SetUnhandledExceptionFilter
SetupComm
SetWindowTextA
ShowWindow
SING error
Sn$??(
SN>V}N
s[S;7|G;w
^SSSSS
__stdcall
`string'
string too long
Sunday
SunMonTueWedThuFriSat
T$0RPj
t$0WSQ3
T$8RUVPP
*tB[dO
T$DRPQ
te$lbhT
TerminateProcess
tGHt.Ht&
t(HE\Z[Qb^
+t HHt
This application has requested the Runtime to terminate it in an unusual way.
__thiscall
This indicates a bug in your application.
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
!This program cannot be run in DOS mode.
Thursday
< tK<	tG
TLOSS error
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
%tMdgJ~el
<\tM</tI
#TNa<^^H
to=xoB
tR99u2
TranslateMessage
T$(RWf
T$@SRf
t"SS9]
<+t(<-t$:
t$`;t$
t$<"u	3
Tuesday
;t$,v-
T$ VSj
Tw_k(>nF
t$,WPR
t+WWVPV
tyO^Dg
 Type Descriptor'
`typeof'
T%.'\z~
>:u8FV
`udt returning'
UFr%qW
ujVWj4h
u>jWhR
uL`wUq
- unable to initialize heap
- unable to open console device
__unaligned
- unexpected heap error
- unexpected multithread lock error
UnhandledExceptionFilter
UNICODE
Unknown exception
UpdateWindow
UQPXY]Y[
URPQQh<
USER32.dll
USER32.DLL
u[SSSP
UTF-16LE
-.UT:y;
u`^V*0
#>}UVD
v)@!8c
`vbase destructor'
`vbtable'
`vcall'
`vector constructor iterator'
`vector copy constructor iterator'
`vector deleting destructor'
`vector destructor iterator'
`vector vbase constructor iterator'
`vector vbase copy constructor iterator'
VfeoZ]:
`vftable'
VirtualAlloc
`virtual displacement map'
VirtualFree
v	N+D$
>VRP"3G 
_VVVVV
VVVVVQRSSj
vy^u-x"
w ]9b#
w9xAXk
WaitForSingleObject
Wednesday
WideCharToMultiByte
wm.|%?P
WriteConsoleA
WriteConsoleW
WriteFile
WS2_32.dll
^WWWWW
XJ~&x 
xn,jAo
xppwpp
xpxxxx
	Xt	M.
<xtX<XtT
)[Xw(-|
=xw(8:{
Y;=hmB
Yh{',o
yodWRx
<!yrW@
YR"zBs
>=Yt1j
<'zazEC
>^*Zem=