Analysis Date2015-02-11 11:33:26
MD5ca7507b54cae34fbba7d86c61ca92c68
SHA12092e9ce4f62dce9d0732c7e87de39548d7a2f07

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: 5c7f2d245e3a8f80a42c4aa8da6bed0a sha1: 926b730d5477e0c1b1844fff0400edffb9ddbe43 size: 967680
Section.rdata md5: 91412b61469e24c711c9ec16f01be23c sha1: e0ac682ff6ed7cfe3caf14b62cf2e7bbbd97d078 size: 31232
Section.data md5: 84a505e2852f57a36c2e427a145e5693 sha1: 4a4c17e6d53a6ade93a167421c115322e1fe037b size: 116736
Timestamp2013-02-27 14:48:37
PackerMicrosoft Visual C++ ?.?
PEhash92faca1a074dd9e74bccf7c3edb991c2a9f7ed8a
IMPhashc5c0653f5f22969d7861b117e8e8d068
AV360 Safeno_virus
AVAd-AwareGen:Variant.Kazy.164619
AVAlwil (avast)Downloader-TLD [Trj]
AVArcabit (arcavir)Gen:Variant.Kazy.164619
AVAuthentiumW32/Symmi.G.gen!Eldorado
AVAvira (antivir)BDS/Zegost.Gen
AVBullGuardGen:Variant.Kazy.164619
AVCA (E-Trust Ino)no_virus
AVCAT (quickheal)no_virus
AVClamAVno_virus
AVDr. Webno_virus
AVEmsisoftGen:Variant.Kazy.164619
AVEset (nod32)Win32/Bayrob.N.Gen
AVFortinetW32/Bayrob.N!tr
AVFrisk (f-prot)W32/Symmi.G.gen!Eldorado
AVF-SecureGen:Variant.Kazy.164619
AVGrisoft (avg)Generic_r.CDN
AVIkarusTrojan.Win32.Spy
AVK7Backdoor ( 04c540d41 )
AVKasperskyTrojan.Win32.Generic:Trojan.Win32.PEF.pf.silent.175154:Trojan.Win32.PEF.pf.silent.181830:Trojan.Win32.PEF.pf.silent.375904:Trojan.Win32.PEF.pf.silent.376942:Trojan.Win32.PEF.pf.silent.377697:Trojan.Win32.PEF.pf.silent.378515:Trojan.Win32.PEF.pf.silent.379237:Trojan.Win32.PEF.pf.silent.380145:Trojan.Win32.PEF.pf.silent.380997:Trojan.Win32.PEF.pf.silent.432810:Trojan.Win32.PEF.pf.silent.456542:Trojan.Win32.PEF.pf.silent.483728:Trojan.Win32.PEF.pf.silent.484661:Trojan.Win32.PEF.pf.silent.23712702:Trojan.Win32.VHO.silent.23486822
AVMalwareBytesTrojan.Agent
AVMcafeeno_virus
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort.P
AVMicroWorld (escan)Gen:Variant.Kazy.164619
AVRisingno_virus
AVSophosTroj/Bayrob-E
AVSymantecTrojan.Bayrob!gen4
AVTrend MicroTSPY_NIVDORT.SM
AVVirusBlokAda (vba32)no_virus

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\WINDOWS\system32\brcmkcrmauxv\tst
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\kq0ktx1m8crbspadu.exe
Creates ProcessC:\Documents and Settings\Administrator\Local Settings\Temp\kq0ktx1m8crbspadu.exe

Process
↳ C:\Documents and Settings\Administrator\Local Settings\Temp\kq0ktx1m8crbspadu.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Base Themes Networking Peer Problem Web ➝
C:\WINDOWS\system32\skefdjbkfj.exe
Creates FileC:\WINDOWS\system32\brcmkcrmauxv\tst
Creates FileC:\WINDOWS\system32\drivers\etc\hosts
Creates FileC:\WINDOWS\system32\brcmkcrmauxv\etc
Creates FileC:\Documents and Settings\Administrator\Start Menu\Programs\Startup\skefdjbkfj.exe
Creates FileC:\WINDOWS\system32\skefdjbkfj.exe
Creates FileC:\WINDOWS\system32\brcmkcrmauxv\lck
Deletes FileC:\WINDOWS\system32\\drivers\etc\hosts
Creates ProcessC:\WINDOWS\system32\skefdjbkfj.exe
Creates ServiceProtected Browser Studio Engine Quality Socket - C:\WINDOWS\system32\skefdjbkfj.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ Pid 800

Process
↳ Pid 848

Process
↳ C:\WINDOWS\System32\svchost.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\WBEM\CIMOM\List of event-active namespaces ➝
NULL
Creates FilePIPE\lsarpc
Creates FileC:\WINDOWS\system32\WBEM\Repository\$WinMgmt.CFG
Creates FileC:\WINDOWS\system32\WBEM\Logs\wbemess.log

Process
↳ Pid 1208

Process
↳ C:\WINDOWS\system32\spoolsv.exe

Process
↳ Pid 1868

Process
↳ Pid 1160

Process
↳ C:\WINDOWS\system32\skefdjbkfj.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Security Center\FirewallDisableNotify ➝
1
Creates FileC:\WINDOWS\TEMP\kq0ktx1t1krf.exe
Creates FileC:\WINDOWS\system32\brcmkcrmauxv\rng
Creates FileC:\WINDOWS\system32\brcmkcrmauxv\cfg
Creates FileC:\WINDOWS\system32\agqrawjye.exe
Creates FileC:\WINDOWS\system32\brcmkcrmauxv\run
Creates FileC:\WINDOWS\system32\brcmkcrmauxv\tst
Creates Filepipe\net\NtControlPipe10
Creates File\Device\Afd\Endpoint
Creates FileC:\WINDOWS\system32\brcmkcrmauxv\lck
Creates ProcessC:\WINDOWS\TEMP\kq0ktx1t1krf.exe -r 23106 tcp
Creates ProcessWATCHDOGPROC "c:\windows\system32\skefdjbkfj.exe"

Process
↳ C:\WINDOWS\system32\skefdjbkfj.exe

Creates FileC:\WINDOWS\system32\brcmkcrmauxv\tst

Process
↳ WATCHDOGPROC "c:\windows\system32\skefdjbkfj.exe"

Creates FileC:\WINDOWS\system32\brcmkcrmauxv\tst

Process
↳ C:\WINDOWS\TEMP\kq0ktx1t1krf.exe -r 23106 tcp

Creates File\Device\Afd\Endpoint
Winsock DNS239.255.255.250

Network Details:

DNSelementarimagine.com
Type: A
141.8.225.80
DNSlongfire.net
Type: A
72.167.131.128
DNSwheelfire.net
Type: A
208.91.197.39
DNSballfire.net
Type: A
217.160.239.225
DNSlifefire.net
Type: A
69.64.147.242
DNSdeepcold.net
Type: A
174.128.228.99
DNSdeepbone.net
Type: A
69.43.160.163
DNSdeepfire.net
Type: A
76.72.174.115
DNSfridayfire.net
Type: A
199.34.228.71
DNSdominoclub-grup.com
Type: A
DNSjarybuter.com
Type: A
DNSgoforiteverytime.com
Type: A
DNSsoilcold.net
Type: A
DNSlongwrote.net
Type: A
DNSsoilwrote.net
Type: A
DNSlongbone.net
Type: A
DNSsoilbone.net
Type: A
DNSsoilfire.net
Type: A
DNSwheelcold.net
Type: A
DNSsaidcold.net
Type: A
DNSwheelwrote.net
Type: A
DNSsaidwrote.net
Type: A
DNSwheelbone.net
Type: A
DNSsaidbone.net
Type: A
DNSsaidfire.net
Type: A
DNSstickcold.net
Type: A
DNSballcold.net
Type: A
DNSstickwrote.net
Type: A
DNSballwrote.net
Type: A
DNSstickbone.net
Type: A
DNSballbone.net
Type: A
DNSstickfire.net
Type: A
DNSenemycold.net
Type: A
DNSlifecold.net
Type: A
DNSenemywrote.net
Type: A
DNSlifewrote.net
Type: A
DNSenemybone.net
Type: A
DNSlifebone.net
Type: A
DNSenemyfire.net
Type: A
DNSmouthcold.net
Type: A
DNStillcold.net
Type: A
DNSmouthwrote.net
Type: A
DNStillwrote.net
Type: A
DNSmouthbone.net
Type: A
DNStillbone.net
Type: A
DNSmouthfire.net
Type: A
DNStillfire.net
Type: A
DNSshallcold.net
Type: A
DNSshallwrote.net
Type: A
DNSdeepwrote.net
Type: A
DNSshallbone.net
Type: A
DNSshallfire.net
Type: A
DNSpushcold.net
Type: A
DNSfridaycold.net
Type: A
DNSpushwrote.net
Type: A
DNSfridaywrote.net
Type: A
DNSpushbone.net
Type: A
DNSfridaybone.net
Type: A
DNSpushfire.net
Type: A
DNSalongcold.net
Type: A
DNSdecembercold.net
Type: A
DNSalongwrote.net
Type: A
DNSdecemberwrote.net
Type: A
DNSalongbone.net
Type: A
DNSdecemberbone.net
Type: A
DNSalongfire.net
Type: A
DNSdecemberfire.net
Type: A
DNSfieldfruit.net
Type: A
DNSqueenfruit.net
Type: A
DNSfieldrise.net
Type: A
DNSqueenrise.net
Type: A
DNSfieldnoise.net
Type: A
DNSqueennoise.net
Type: A
DNSfieldpull.net
Type: A
DNSqueenpull.net
Type: A
DNSbothfruit.net
Type: A
DNSgainfruit.net
Type: A
DNSbothrise.net
Type: A
DNSgainrise.net
Type: A
DNSbothnoise.net
Type: A
DNSgainnoise.net
Type: A
DNSbothpull.net
Type: A
DNSgainpull.net
Type: A
DNSleastfruit.net
Type: A
DNSfacefruit.net
Type: A
DNSleastrise.net
Type: A
DNSfacerise.net
Type: A
DNSleastnoise.net
Type: A
DNSfacenoise.net
Type: A
HTTP GEThttp://elementarimagine.com/forum/search.php?method=validate&mode=sox&v=001&sox=2c8c6e00
User-Agent:
HTTP GEThttp://longfire.net/forum/search.php?method=validate&mode=sox&v=001&sox=2c8c6e00
User-Agent:
HTTP GEThttp://wheelfire.net/forum/search.php?method=validate&mode=sox&v=001&sox=2c8c6e00
User-Agent:
HTTP GEThttp://ballfire.net/forum/search.php?method=validate&mode=sox&v=001&sox=2c8c6e00
User-Agent:
HTTP GEThttp://lifefire.net/forum/search.php?method=validate&mode=sox&v=001&sox=2c8c6e00
User-Agent:
HTTP GEThttp://deepcold.net/forum/search.php?method=validate&mode=sox&v=001&sox=2c8c6e00
User-Agent:
HTTP GEThttp://deepbone.net/forum/search.php?method=validate&mode=sox&v=001&sox=2c8c6e00
User-Agent:
HTTP GEThttp://deepfire.net/forum/search.php?method=validate&mode=sox&v=001&sox=2c8c6e00
User-Agent:
HTTP GEThttp://fridayfire.net/forum/search.php?method=validate&mode=sox&v=001&sox=2c8c6e00
User-Agent:
HTTP GEThttp://elementarimagine.com/forum/search.php?method=validate&mode=sox&v=001&sox=2c8c6e00
User-Agent:
HTTP GEThttp://longfire.net/forum/search.php?method=validate&mode=sox&v=001&sox=2c8c6e00
User-Agent:
HTTP GEThttp://wheelfire.net/forum/search.php?method=validate&mode=sox&v=001&sox=2c8c6e00
User-Agent:
HTTP GEThttp://ballfire.net/forum/search.php?method=validate&mode=sox&v=001&sox=2c8c6e00
User-Agent:
HTTP GEThttp://lifefire.net/forum/search.php?method=validate&mode=sox&v=001&sox=2c8c6e00
User-Agent:
HTTP GEThttp://deepcold.net/forum/search.php?method=validate&mode=sox&v=001&sox=2c8c6e00
User-Agent:
HTTP GEThttp://deepbone.net/forum/search.php?method=validate&mode=sox&v=001&sox=2c8c6e00
User-Agent:
HTTP GEThttp://deepfire.net/forum/search.php?method=validate&mode=sox&v=001&sox=2c8c6e00
User-Agent:
HTTP GEThttp://fridayfire.net/forum/search.php?method=validate&mode=sox&v=001&sox=2c8c6e00
User-Agent:
Flows TCP192.168.1.1:1036 ➝ 141.8.225.80:80
Flows TCP192.168.1.1:1037 ➝ 72.167.131.128:80
Flows TCP192.168.1.1:1038 ➝ 208.91.197.39:80
Flows TCP192.168.1.1:1039 ➝ 217.160.239.225:80
Flows TCP192.168.1.1:1040 ➝ 69.64.147.242:80
Flows TCP192.168.1.1:1041 ➝ 174.128.228.99:80
Flows TCP192.168.1.1:1042 ➝ 69.43.160.163:80
Flows TCP192.168.1.1:1043 ➝ 76.72.174.115:80
Flows TCP192.168.1.1:1045 ➝ 199.34.228.71:80
Flows TCP192.168.1.1:1046 ➝ 141.8.225.80:80
Flows TCP192.168.1.1:1047 ➝ 72.167.131.128:80
Flows TCP192.168.1.1:1048 ➝ 208.91.197.39:80
Flows TCP192.168.1.1:1049 ➝ 217.160.239.225:80
Flows TCP192.168.1.1:1050 ➝ 69.64.147.242:80
Flows TCP192.168.1.1:1051 ➝ 174.128.228.99:80
Flows TCP192.168.1.1:1052 ➝ 69.43.160.163:80
Flows TCP192.168.1.1:1053 ➝ 76.72.174.115:80
Flows TCP192.168.1.1:1054 ➝ 199.34.228.71:80

Raw Pcap
0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303031 26736f78 3d326338 63366530   =001&sox=2c8c6e0
0x00000040 (00064)   30204854 54502f31 2e300d0a 41636365   0 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a20656c 656d656e 74617269 6d616769   : elementarimagi
0x00000080 (00128)   6e652e63 6f6d0d0a 0d0a                ne.com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303031 26736f78 3d326338 63366530   =001&sox=2c8c6e0
0x00000040 (00064)   30204854 54502f31 2e300d0a 41636365   0 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206c6f 6e676669 72652e6e 65740d0a   : longfire.net..
0x00000080 (00128)   0d0a2e63 6f6d0d0a 0d0a                ...com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303031 26736f78 3d326338 63366530   =001&sox=2c8c6e0
0x00000040 (00064)   30204854 54502f31 2e300d0a 41636365   0 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a207768 65656c66 6972652e 6e65740d   : wheelfire.net.
0x00000080 (00128)   0a0d0a63 6f6d0d0a 0d0a                ...com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303031 26736f78 3d326338 63366530   =001&sox=2c8c6e0
0x00000040 (00064)   30204854 54502f31 2e300d0a 41636365   0 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206261 6c6c6669 72652e6e 65740d0a   : ballfire.net..
0x00000080 (00128)   0d0a0a63 6f6d0d0a 0d0a                ...com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303031 26736f78 3d326338 63366530   =001&sox=2c8c6e0
0x00000040 (00064)   30204854 54502f31 2e300d0a 41636365   0 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206c69 66656669 72652e6e 65740d0a   : lifefire.net..
0x00000080 (00128)   0d0a0a63 6f6d0d0a 0d0a                ...com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303031 26736f78 3d326338 63366530   =001&sox=2c8c6e0
0x00000040 (00064)   30204854 54502f31 2e300d0a 41636365   0 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206465 6570636f 6c642e6e 65740d0a   : deepcold.net..
0x00000080 (00128)   0d0a0a63 6f6d0d0a 0d0a                ...com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303031 26736f78 3d326338 63366530   =001&sox=2c8c6e0
0x00000040 (00064)   30204854 54502f31 2e300d0a 41636365   0 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206465 6570626f 6e652e6e 65740d0a   : deepbone.net..
0x00000080 (00128)   0d0a0a63 6f6d0d0a 0d0a                ...com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303031 26736f78 3d326338 63366530   =001&sox=2c8c6e0
0x00000040 (00064)   30204854 54502f31 2e300d0a 41636365   0 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206465 65706669 72652e6e 65740d0a   : deepfire.net..
0x00000080 (00128)   0d0a0a63 6f6d0d0a 0d0a                ...com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303031 26736f78 3d326338 63366530   =001&sox=2c8c6e0
0x00000040 (00064)   30204854 54502f31 2e300d0a 41636365   0 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206672 69646179 66697265 2e6e6574   : fridayfire.net
0x00000080 (00128)   0d0a0d0a 6f6d0d0a 0d0a                ....om....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303031 26736f78 3d326338 63366530   =001&sox=2c8c6e0
0x00000040 (00064)   30204854 54502f31 2e300d0a 41636365   0 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a20656c 656d656e 74617269 6d616769   : elementarimagi
0x00000080 (00128)   6e652e63 6f6d0d0a 0d0a                ne.com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303031 26736f78 3d326338 63366530   =001&sox=2c8c6e0
0x00000040 (00064)   30204854 54502f31 2e300d0a 41636365   0 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206c6f 6e676669 72652e6e 65740d0a   : longfire.net..
0x00000080 (00128)   0d0a2e63 6f6d0d0a 0d0a                ...com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303031 26736f78 3d326338 63366530   =001&sox=2c8c6e0
0x00000040 (00064)   30204854 54502f31 2e300d0a 41636365   0 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a207768 65656c66 6972652e 6e65740d   : wheelfire.net.
0x00000080 (00128)   0a0d0a63 6f6d0d0a 0d0a                ...com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303031 26736f78 3d326338 63366530   =001&sox=2c8c6e0
0x00000040 (00064)   30204854 54502f31 2e300d0a 41636365   0 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206261 6c6c6669 72652e6e 65740d0a   : ballfire.net..
0x00000080 (00128)   0d0a0a63 6f6d0d0a 0d0a                ...com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303031 26736f78 3d326338 63366530   =001&sox=2c8c6e0
0x00000040 (00064)   30204854 54502f31 2e300d0a 41636365   0 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206c69 66656669 72652e6e 65740d0a   : lifefire.net..
0x00000080 (00128)   0d0a0a63 6f6d0d0a 0d0a                ...com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303031 26736f78 3d326338 63366530   =001&sox=2c8c6e0
0x00000040 (00064)   30204854 54502f31 2e300d0a 41636365   0 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206465 6570636f 6c642e6e 65740d0a   : deepcold.net..
0x00000080 (00128)   0d0a0a63 6f6d0d0a 0d0a                ...com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303031 26736f78 3d326338 63366530   =001&sox=2c8c6e0
0x00000040 (00064)   30204854 54502f31 2e300d0a 41636365   0 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206465 6570626f 6e652e6e 65740d0a   : deepbone.net..
0x00000080 (00128)   0d0a0a63 6f6d0d0a 0d0a                ...com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303031 26736f78 3d326338 63366530   =001&sox=2c8c6e0
0x00000040 (00064)   30204854 54502f31 2e300d0a 41636365   0 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206465 65706669 72652e6e 65740d0a   : deepfire.net..
0x00000080 (00128)   0d0a0a63 6f6d0d0a 0d0a                ...com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303031 26736f78 3d326338 63366530   =001&sox=2c8c6e0
0x00000040 (00064)   30204854 54502f31 2e300d0a 41636365   0 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206672 69646179 66697265 2e6e6574   : fridayfire.net
0x00000080 (00128)   0d0a0d0a 6f6d0d0a 0d0a                ....om....


Strings
 
 ' 
+h1
21212
.
-
:
:
+%3D%3A%26A&
S
bmp
 0
a
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
 
!
"
#
$
%
&
'
(
)
*
+
,
-
.
/
0
 
"H
"
dll2
h2
1
1
exe
"
 
 
.
[
Z
[
Z
[  ---
ss
"1"
2dll1exe
\
...............0...
.
...
..
...
 ! "#$%$#" & 
%+#.*fa
0e
%+#I64o
.,
 -CC
 
00-+ 
.
-e-
. 
.
-E-
-0
-0010+-0
0
-0
\
00-+ 
  
.
:\
:..00...........?- 
0
0
0
0
-
Y
..
.
..L
.
6
O{...w
tc.u
                                 H
         (((((                  H
         h((((                  H
jjjh
jjjj
jjjjh
KERNEL32.DLL
mscoree.dll
(null)
                          
																		
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
	}\03MS
0A@@Ju
{/0C+E
0d]r6nh
0o0dy+
#0=Q@]ut
0SSSSS
0?@VsG_
0VtN3U
0WWWWW
:14$#_;
1kQO#M
1>lv1w
1#QNAN
1#SNAN
&'1#t&H+
-2	,t3E
3"?8L)
-3o*Yz
444@Fpi
4Gg?UenB
%4s3`]
4<s`5	7
54?vb=$
	5{9m,
5@&}c3E
5d"=Z;
5 ~,e3
5HE4,@ N
5iC=p#
5kvGv3E
5#mX~#E
5OGD[;
.5v`#E
6A"fm%
=6BWA_uo
6g 7iwFF
6j6vz)&w
{)(6o&
6Oa}`|
77wfV8]
79Sz+0
[7KYEu
7{@n#U
'7NUih
7tk7-h
7`^v}h
7+" Wd
8'1E+M
$$8DwU
8GC)/|p}
8o_#?'
^8Um\A
8VVVVV
!`934OY
9/8XMZ#
9cfm6.
9lX&68W
A4U	5?Ri;
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
Ai6c_q=
aib${QA
ai=N1UR
(aK,g0AUU
america
american
american english
american-english
An application has made an attempt to load the C runtime library incorrectly.
$_as?A
<at9<rt,<wt
- Attempt to initialize the CRT more than once.
- Attempt to use MSIL code from this assembly during native code initialization
.?AUctype_base@std@@
August
australian
.?AVbad_alloc@std@@
.?AVbad_cast@std@@
.?AVbad_exception@std@@
.?AV?$basic_ios@DU?$char_traits@D@std@@@std@@
.?AV?$basic_ostream@DU?$char_traits@D@std@@@std@@
.?AV?$basic_ostringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@
.?AV?$basic_streambuf@DU?$char_traits@D@std@@@std@@
.?AV?$basic_stringbuf@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@
.?AV?$ctype@D@std@@
.?AVexception@std@@
.?AVfacet@locale@std@@
.?AVfailure@ios_base@std@@
.?AVios_base@std@@
.?AV?$_Iosb@H@std@@
.?AVlength_error@std@@
.?AV_Locimp@locale@std@@
.?AVlogic_error@std@@
.?AV?$numpunct@D@std@@
.?AV?$num_put@DV?$ostreambuf_iterator@DU?$char_traits@D@std@@@std@@@std@@
.?AVout_of_range@std@@
.?AVruntime_error@std@@
=AV:s|
.?AVtype_info@@
A #*'Z
b04I+M
B9dt#U
`b|9n&w\k
bad allocation
bad cast
bad exception
 Base Class Array'
 Base Class Descriptor at (
__based(
b\Cj,.
belgian
bJy$}nL
B){kt_
=BK|xG
Bky33U
bkz"dTO
<BO%X?
britain
BS{w&"o%
BumrAR
Bytx+M
C7m-#E
Ca6SD1
canadian
-CAv%=.
__cdecl
&c=	;E
chinese
chinese-hongkong
chinese-simplified
chinese-singapore
chinese-traditional
 Class Hierarchy Descriptor'
CloseHandle
__clrcall
cmd.exe
CompareStringA
CompareStringW
 Complete Object Locator'
COMSPEC
CONOUT$
`copy constructor closure'
Copyright (c) 1992-2004 by P.J. Plauger, licensed by Dinkumware, Ltd. ALL RIGHTS RESERVED.
CorExitProcess
C PjPV
C$PjQV
C.PjRV
C/PjSV
C*PjTV
C+PjUV
C,PjVV
C-PjWV
CreateEventA
CreateFileA
CreatePipe
CreateProcessA
CreateThread
- CRT not initialized
cV/^+M
cxG%qw
=	\C(X(PqS
= d;'-
d.6x2K3<
d*8;Wh
@.data
Db]q#E
Dco1H2
dddd, MMMM dd, yyyy
,D){+E
December
DecodePointer
`default constructor closure'
 delete
 delete[]
Delete
DeleteCriticalSection
deque<T> too long
)d~f^u-}
DgD4z}
D|>J:e
D=JKP.t
~d	k&;*
DOMAIN error
Dprd+M
dQA+k>'
dutch-belgian
DvhHr;
`dynamic atexit destructor for '
`dynamic initializer for '
#||!+E
?e1uJ{k
_e]2z@
`eh vector constructor iterator'
`eh vector copy constructor iterator'
`eh vector destructor iterator'
`eh vector vbase constructor iterator'
`eh vector vbase copy constructor iterator'
-EK*O3E
EKtl!g
EncodePointer
england
english-american
english-aus
english-belize
english-can
english-caribbean
english-ire
english-jamaica
english-nz
english-south africa
english-trinidad y tobago
english-uk
english-us
english-usa
EnterCriticalSection
EnumSystemLocalesA
EtJh":~Y
ExitProcess
>`F+|-
f~&1JO
__fastcall
"F'd]#s
f-	'+E
February
(F!H3U
(F+hF Q
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
f?jL0K
FkG^#M
- floating point support not loaded
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
FlushFileBuffers
FM    
ForceRemove
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeLibrary
french-belgian
french-canadian
french-luxembourg
french-swiss
Friday
+fsI+M
^F<-uB
Fw9p*8
g8'rGP
GAIsProcessorFeaturePresent
g^	^CN
german-austrian
german-lichtenstein
german-luxembourg
german-swiss
GetACP
GetActiveWindow
GetCommandLineA
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
GetCPInfo
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDriveTypeA
GetEnvironmentStrings
GetEnvironmentStringsW
GetExitCodeProcess
GetFileAttributesA
GetFileType
GetFullPathNameA
GetLastActivePopup
GetLastError
GetLocaleInfoA
GetLocaleInfoW
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetProcessWindowStation
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemTimeAsFileTime
GetTickCount
GetTimeZoneInformation
GetUserDefaultLCID
GetUserObjectInformationA
GJ',+%
great britain
%gxRJu
g|%~yf%c
`h````
HeapAlloc
HeapCreate
HeapFree
HeapReAlloc
HeapSize
`h`hhh
HH:mm:ss
HHtXHHt
HHtYHHt
holland
hong-kong
HP+ZF,
i5jy/S
>If90t
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
invalid map/set<T> iterator
invalid string position
ios_base::badbit set
ios_base::failbit set
irish-english
~I {sd
IsDebuggerPresent
IsValidCodePage
IsValidLocale
IT&8+E
italian-swiss
I&^tL'Y
j1h4aP
j8h,OP
JanFebMarAprMayJunJulAugSepOctNovDec
January
jbhhbO
jEh8dP
j%fyAk
j/h4rO
j	h84P
j$hdaO
j	hd P
j	hdrO
j!hLgP
j h@LO
j	h$mO
j h\~P
j"h<!P
j]h`/P
j	hP=P
j	hpSP
j	ht1P
j	hx.P
j	h<ZP
j@j ^V
J<lbS	
JP5=%(
j"^SSSSS
jTh(MO
jwh(xP
\J:WnL
>_:~Jx
	j	y}>
J:"Zpt
KCG0yG
KERNEL32
KERNEL32.dll
=Kf>Tu
k$l'H[
K,{QbfMi
=K\`W}
kzg|Z(
~l 2.ab
L`.b<V
LC_ALL
LC_COLLATE
LC_CTYPE
LCMapStringA
LCMapStringW
/lc~miv[bxeIS
LC_MONETARY
LC_NUMERIC
LC_TIME
LeaveCriticalSection
LoadLibraryA
LocalAlloc
`local static guard'
`local static thread guard'
`local vftable'
`local vftable constructor closure'
{lO*o3
%?lP83
lpO*5x
(l&U9M
].Lx%#
m5ab~$
#M<6#U
`managed vector constructor iterator'
`managed vector copy constructor iterator'
`managed vector destructor iterator'
map/set<T> too long
MessageBoxA
?M<E+U
Microsoft Visual C++ Runtime Library
m,K#STw
mm$a3M
MM/dd/yy
Monday
M@rL;M
MultiByteToWideChar
Mv-=4.C
?mXBq6
!=MY8'
m" Z4G
N1tF?7nU
NDIMzV
 new[]
new-zealand
$n*+.}I
NoRemove
norwegian
norwegian-bokmal
norwegian-nynorsk
Norwegian-Nynorsk
- not enough space for arguments
- not enough space for environment
- not enough space for locale information
- not enough space for lowio initialization
- not enough space for _onexit/atexit table
- not enough space for stdio initialization
- not enough space for thread data
November
NP-I=|n
(null)
@O2Wx8$
o`-:Bnk
October
OLEAUT32.dll
`omni callsig'
oof{@m
o,O%HyW
o!=p\7k
operator
OPx2#E
OVjr+E
[*}owhc*)
=$oyo"
^(>p5<
\,P93M
__pascal
Pb30B[
PDG@H6
`placement delete closure'
`placement delete[] closure'
Please contact the application's support team for more information.
portuguese-brazilian
PPPPPPPP
Pp)~t`
pr china
pr-china
Program: 
<program name unknown>
__ptr64
puerto-rico
- pure virtual function call
Q-{eRRh
&Qj1aQ
q.MM	-
.*;QoL
/qO-m(
QQSVWd
QRPhLOO
QRPh,OO
QSvC3M
QubcRS
QueryPerformanceCounter
qw5W&y
=q)wc~*
qz/{Jb
R1J'-.
RaiseException
R'\#B0
`.rdata
ReadFile
ree<8S
__restrict
/RFDF~
Richh!
RJgg`M
RtlUnwind
/r ?tQ
runtime error 
Runtime Error!
R\,Xwr
[S1%_qc
s54=]$
=S91nR
Saturday
`scalar deleting destructor'
September
SetEndOfFile
SetEnvironmentVariableA
SetEvent
SetFilePointer
SetHandleCount
SetHandleInformation
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
[s(g*<
sIDiX$
SING error
"sJE%E2
sJzC3M
slovak
S<lrx)
south africa
south-africa
south korea
south-korea
SP0}+E
spanish-argentina
spanish-bolivia
spanish-chile
spanish-colombia
spanish-costa rica
spanish-dominican republic
spanish-ecuador
spanish-el salvador
spanish-guatemala
spanish-honduras
spanish-mexican
spanish-modern
spanish-nicaragua
spanish-panama
spanish-paraguay
spanish-peru
spanish-puerto rico
spanish-uruguay
spanish-venezuela
s[S;7|G;w
^SSSSS
__stdcall
`string'
string too long
Sunday
SunMonTueWedThuFriSat
SUo@msn7
sv7|WU
swedish-finland
SystemRoot
tehZvM
TerminateProcess
t=FA9]
t,,f:B,3
tGHt.Ht&
(</t$h
+t HHt
This application has requested the Runtime to terminate it in an unusual way.
__thiscall
This indicates a bug in your application.
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
!This program cannot be run in DOS mode.
Thursday
tIj"[:
T`#?j2
T+K5#E
< tK<	tG
TLOSS error
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
<\tM</tI
TmV"KR
TN{,^s
tR99u2
trinidad & tobago
t"SS9]
<+t(<-t$:
t$<"u	3
Tuesday
;t$,v-
t VV9u
t+WWVPV
 Type Descriptor'
`typeof'
>:u8FV
UCYJ`/4V
UDR/a+]
`udt returning'
uev@#U
u'hX~Q
uLYLSB
- unable to initialize heap
- unable to open console device
__unaligned
- unexpected heap error
- unexpected multithread lock error
UnhandledExceptionFilter
UNICODE
united-kingdom
united-states
Unknown exception
UQPXY]Y[
uqSSSSS
URPQQh
USER32.DLL
u[SSSP
UTF-16LE
u,VVWV
U!W>nTd
=V1<e/
=v<5+~
:V_9F#
`vbase destructor'
`vbtable'
`vcall'
=vDL{~
V#EA)2A
`vector constructor iterator'
`vector copy constructor iterator'
`vector deleting destructor'
`vector destructor iterator'
`vector vbase constructor iterator'
`vector vbase copy constructor iterator'
VfOJ;M
`vftable'
VirtualAlloc
`virtual displacement map'
VirtualFree
VLu/`C
v	N+D$
vrZ#V}
_VVVVV
VVVVVQRSSj
]W7q#U
WaitForSingleObject
Wednesday
w F)10^s
WideCharToMultiByte
WriteConsoleA
WriteConsoleW
WriteFile
WS2_32.dll
^WWWWW
>== ;Wz
$ Xd8t<
xL]zmx
xppwpp
xpxxxx
(XQND1
<xtX<XtT
@Y3Q5u
y^EE~J
@YEXK4
YG\w  =
-ygyO#
Y@ios_base::eofbit set
%YK\{=
yl4*~@
yLBD9#
Y(O\'SfQ
>=Yt1j
y_TcH}
Y<\u#j\V
Yw|wYT[
$y=xB7e;
z-1e.#|
Z2(XLsu
Z2,Xsp
zd.k{`
~z*Jgi^
zkDvJu9
z L53U
ZS49jzX