Analysis Date2015-09-16 01:14:58
MD574863af72a2c788644cb3439af21292c
SHA142561eedd6e310c08410f0fbcd2851badc17de7b

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: e1dfbbbe316c0a2a5baa1a9bf1681c60 sha1: 9c0559e5649f352630cf8368c029293a7301ebc7 size: 811008
Section.rdata md5: fb4e16a7cce972bd5d5f790ac652e853 sha1: b7510b8ef3e3759f7db88ff35723bfbd22d3878d size: 299008
Section.data md5: f35ebfcf95288fba8ba0d012618b64b0 sha1: cd28846e0545b2afc3fcfe0bc8c38a46de8e7534 size: 8192
Section.reloc md5: cc36a05e07ab3c7131d36933b03ff359 sha1: c5a0beb23c77e45fea7d0c62720f7792ed052a94 size: 60928
Timestamp2015-02-06 20:58:55
PackerMicrosoft Visual C++ ?.?
PEhash36bef66d37b712b6d4e866c88f05b378e266465e
IMPhashf8deb944d58d4c1de6a6a4376a06e14d
AVCA (E-Trust Ino)no_virus
AVRising0x590627fc
AVMcafeeTrojan-FGIJ!74863AF72A2C
AVAvira (antivir)TR/Agent.1180160.21
AVTwisterno_virus
AVAd-AwareGen:Variant.Kazy.553443
AVAlwil (avast)Downloader-TLD [Trj]
AVEset (nod32)Win32/Kryptik.DDQD
AVGrisoft (avg)Win32/Cryptor
AVSymantecDownloader.Upatre!g15
AVFortinetW32/Kryptik.DDQD!tr
AVBitDefenderGen:Variant.Kazy.553443
AVK7Trojan ( 004c77f41 )
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort.BN
AVMicroWorld (escan)Gen:Variant.Kazy.553443
AVMalwareBytesno_virus
AVAuthentiumW32/SoxGrave.A.gen!Eldorado
AVFrisk (f-prot)no_virus
AVIkarusTrojan.Win32.Crypt
AVEmsisoftGen:Variant.Kazy.553443
AVZillya!Trojan.Kryptik.Win32.767429
AVKasperskyTrojan.Win32.Generic
AVTrend Microno_virus
AVCAT (quickheal)no_virus
AVVirusBlokAda (vba32)no_virus
AVPadvishno_virus
AVBullGuardGen:Variant.Kazy.553443
AVArcabit (arcavir)Gen:Variant.Kazy.553443
AVClamAVno_virus
AVDr. WebTrojan.DownLoader16.17654
AVF-SecureGen:Variant.Kazy.553443

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\tcmbmw1ld3lvok9jmqo.exe
Creates FileC:\WINDOWS\system32\vzzhzppuhrigk\tst
Creates ProcessC:\Documents and Settings\Administrator\Local Settings\Temp\tcmbmw1ld3lvok9jmqo.exe

Process
↳ C:\Documents and Settings\Administrator\Local Settings\Temp\tcmbmw1ld3lvok9jmqo.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Presentation Resource IPsec Plug Collector ➝
C:\WINDOWS\system32\aquzbmn.exe
Creates FileC:\WINDOWS\system32\drivers\etc\hosts
Creates FileC:\WINDOWS\system32\vzzhzppuhrigk\etc
Creates FileC:\WINDOWS\system32\aquzbmn.exe
Creates FileC:\WINDOWS\system32\vzzhzppuhrigk\lck
Creates FileC:\WINDOWS\system32\vzzhzppuhrigk\tst
Deletes FileC:\WINDOWS\system32\\drivers\etc\hosts
Creates ProcessC:\WINDOWS\system32\aquzbmn.exe
Creates ServiceProvider Acquisition Bluetooth - C:\WINDOWS\system32\aquzbmn.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ Pid 816

Process
↳ Pid 860

Process
↳ C:\WINDOWS\System32\svchost.exe

Creates Filepipe\PCHFaultRepExecPipe

Process
↳ Pid 1216

Process
↳ C:\WINDOWS\system32\spoolsv.exe

RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝
7
RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝
NULL
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝
C:\WINDOWS\System32\spool\PRINTERS\\x00
Creates FileWMIDataDevice

Process
↳ Pid 1264

Process
↳ C:\WINDOWS\system32\aquzbmn.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Security Center\FirewallDisableNotify ➝
1
Creates FileC:\WINDOWS\system32\fgfpilmqrkc.exe
Creates Filepipe\net\NtControlPipe10
Creates FileC:\WINDOWS\TEMP\tcmbmw1rxnlvo.exe
Creates FileC:\WINDOWS\system32\vzzhzppuhrigk\cfg
Creates FileC:\WINDOWS\system32\vzzhzppuhrigk\rng
Creates File\Device\Afd\Endpoint
Creates FileC:\WINDOWS\system32\vzzhzppuhrigk\lck
Creates FileC:\WINDOWS\system32\vzzhzppuhrigk\tst
Creates FileC:\WINDOWS\system32\vzzhzppuhrigk\run
Creates ProcessWATCHDOGPROC "c:\windows\system32\aquzbmn.exe"
Creates ProcessC:\WINDOWS\TEMP\tcmbmw1rxnlvo.exe -r 51305 tcp

Process
↳ C:\WINDOWS\system32\aquzbmn.exe

Creates FileC:\WINDOWS\system32\vzzhzppuhrigk\tst

Process
↳ WATCHDOGPROC "c:\windows\system32\aquzbmn.exe"

Creates FileC:\WINDOWS\system32\vzzhzppuhrigk\tst

Process
↳ C:\WINDOWS\TEMP\tcmbmw1rxnlvo.exe -r 51305 tcp

Creates File\Device\Afd\Endpoint
Winsock DNS239.255.255.250

Network Details:

DNSqueentell.net
Type: A
208.91.197.241
DNSwednesdayhalf.net
Type: A
208.91.197.241
DNSmouthrest.net
Type: A
208.91.197.241
DNSdrivethirteen.net
Type: A
208.91.197.241
DNSfaceboat.net
Type: A
208.91.197.241
DNSmuchhappy.net
Type: A
208.91.197.241
DNScallmile.net
Type: A
208.91.197.241
DNSlifeclock.net
Type: A
162.212.2.137
DNSlifeclock.net
Type: A
198.46.51.193
DNSlifemake.net
Type: A
192.64.119.44
DNSenemyrush.net
Type: A
95.211.230.75
DNSdeeprush.net
Type: A
184.168.221.26
DNSpushhard.net
Type: A
66.96.147.159
DNSpushclock.net
Type: A
217.70.184.38
DNSpushmake.net
Type: A
37.59.4.217
DNSlongshine.net
Type: A
218.107.207.37
DNSableread.net
Type: A
DNSsoilunder.net
Type: A
DNSfearstate.net
Type: A
DNSlongclock.net
Type: A
DNSsoilclock.net
Type: A
DNSlongmake.net
Type: A
DNSsoilmake.net
Type: A
DNSlongrush.net
Type: A
DNSsoilrush.net
Type: A
DNSwheelhard.net
Type: A
DNSsaidhard.net
Type: A
DNSwheelclock.net
Type: A
DNSsaidclock.net
Type: A
DNSwheelmake.net
Type: A
DNSsaidmake.net
Type: A
DNSwheelrush.net
Type: A
DNSsaidrush.net
Type: A
DNSstickhard.net
Type: A
DNSballhard.net
Type: A
DNSstickclock.net
Type: A
DNSballclock.net
Type: A
DNSstickmake.net
Type: A
DNSballmake.net
Type: A
DNSstickrush.net
Type: A
DNSballrush.net
Type: A
DNSenemyhard.net
Type: A
DNSlifehard.net
Type: A
DNSenemyclock.net
Type: A
DNSenemymake.net
Type: A
DNSliferush.net
Type: A
DNSmouthhard.net
Type: A
DNStillhard.net
Type: A
DNSmouthclock.net
Type: A
DNStillclock.net
Type: A
DNSmouthmake.net
Type: A
DNStillmake.net
Type: A
DNSmouthrush.net
Type: A
DNStillrush.net
Type: A
DNSshallhard.net
Type: A
DNSdeephard.net
Type: A
DNSshallclock.net
Type: A
DNSdeepclock.net
Type: A
DNSshallmake.net
Type: A
DNSdeepmake.net
Type: A
DNSshallrush.net
Type: A
DNSfridayhard.net
Type: A
DNSfridayclock.net
Type: A
DNSfridaymake.net
Type: A
DNSpushrush.net
Type: A
DNSfridayrush.net
Type: A
DNSalonghard.net
Type: A
DNSdecemberhard.net
Type: A
DNSalongclock.net
Type: A
DNSdecemberclock.net
Type: A
DNSalongmake.net
Type: A
DNSdecembermake.net
Type: A
DNSalongrush.net
Type: A
DNSdecemberrush.net
Type: A
DNSlongfifth.net
Type: A
DNSsoilfifth.net
Type: A
DNSsoilshine.net
Type: A
DNSlongdone.net
Type: A
DNSsoildone.net
Type: A
DNSlongknew.net
Type: A
DNSsoilknew.net
Type: A
DNSwheelfifth.net
Type: A
DNSsaidfifth.net
Type: A
DNSwheelshine.net
Type: A
DNSsaidshine.net
Type: A
DNSwheeldone.net
Type: A
DNSsaiddone.net
Type: A
DNSwheelknew.net
Type: A
DNSsaidknew.net
Type: A
DNSstickfifth.net
Type: A
DNSballfifth.net
Type: A
DNSstickshine.net
Type: A
DNSballshine.net
Type: A
DNSstickdone.net
Type: A
DNSballdone.net
Type: A
DNSstickknew.net
Type: A
HTTP GEThttp://queentell.net/index.php?method=validate&mode=sox&v=040&sox=4b4e6800&lenhdr
User-Agent:
HTTP GEThttp://wednesdayhalf.net/index.php?method=validate&mode=sox&v=040&sox=4b4e6800&lenhdr
User-Agent:
HTTP GEThttp://mouthrest.net/index.php?method=validate&mode=sox&v=040&sox=4b4e6800&lenhdr
User-Agent:
HTTP GEThttp://drivethirteen.net/index.php?method=validate&mode=sox&v=040&sox=4b4e6800&lenhdr
User-Agent:
HTTP GEThttp://faceboat.net/index.php?method=validate&mode=sox&v=040&sox=4b4e6800&lenhdr
User-Agent:
HTTP GEThttp://muchhappy.net/index.php?method=validate&mode=sox&v=040&sox=4b4e6800&lenhdr
User-Agent:
HTTP GEThttp://callmile.net/index.php?method=validate&mode=sox&v=040&sox=4b4e6800&lenhdr
User-Agent:
HTTP GEThttp://lifeclock.net/index.php?method=validate&mode=sox&v=040&sox=4b4e6800&lenhdr
User-Agent:
HTTP GEThttp://lifemake.net/index.php?method=validate&mode=sox&v=040&sox=4b4e6800&lenhdr
User-Agent:
HTTP GEThttp://enemyrush.net/index.php?method=validate&mode=sox&v=040&sox=4b4e6800&lenhdr
User-Agent:
HTTP GEThttp://deeprush.net/index.php?method=validate&mode=sox&v=040&sox=4b4e6800&lenhdr
User-Agent:
HTTP GEThttp://pushhard.net/index.php?method=validate&mode=sox&v=040&sox=4b4e6800&lenhdr
User-Agent:
HTTP GEThttp://pushclock.net/index.php?method=validate&mode=sox&v=040&sox=4b4e6800&lenhdr
User-Agent:
HTTP GEThttp://pushmake.net/index.php?method=validate&mode=sox&v=040&sox=4b4e6800&lenhdr
User-Agent:
HTTP GEThttp://longshine.net/index.php?method=validate&mode=sox&v=040&sox=4b4e6800&lenhdr
User-Agent:
Flows TCP192.168.1.1:1037 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1038 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1039 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1040 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1041 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1042 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1043 ➝ 208.91.197.241:80
Flows TCP192.168.1.1:1044 ➝ 162.212.2.137:80
Flows TCP192.168.1.1:1045 ➝ 192.64.119.44:80
Flows TCP192.168.1.1:1046 ➝ 95.211.230.75:80
Flows TCP192.168.1.1:1047 ➝ 184.168.221.26:80
Flows TCP192.168.1.1:1048 ➝ 66.96.147.159:80
Flows TCP192.168.1.1:1049 ➝ 217.70.184.38:80
Flows TCP192.168.1.1:1050 ➝ 37.59.4.217:80
Flows TCP192.168.1.1:1051 ➝ 218.107.207.37:80

Raw Pcap
0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 643d7661 6c696461 7465266d   ethod=validate&m
0x00000020 (00032)   6f64653d 736f7826 763d3034 3026736f   ode=sox&v=040&so
0x00000030 (00048)   783d3462 34653638 3030266c 656e6864   x=4b4e6800&lenhd
0x00000040 (00064)   72204854 54502f31 2e300d0a 41636365   r HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a207175 65656e74 656c6c2e 6e65740d   : queentell.net.
0x00000080 (00128)   0a0d0a                                ...

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 643d7661 6c696461 7465266d   ethod=validate&m
0x00000020 (00032)   6f64653d 736f7826 763d3034 3026736f   ode=sox&v=040&so
0x00000030 (00048)   783d3462 34653638 3030266c 656e6864   x=4b4e6800&lenhd
0x00000040 (00064)   72204854 54502f31 2e300d0a 41636365   r HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a207765 646e6573 64617968 616c662e   : wednesdayhalf.
0x00000080 (00128)   6e65740d 0a0d0a                       net....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 643d7661 6c696461 7465266d   ethod=validate&m
0x00000020 (00032)   6f64653d 736f7826 763d3034 3026736f   ode=sox&v=040&so
0x00000030 (00048)   783d3462 34653638 3030266c 656e6864   x=4b4e6800&lenhd
0x00000040 (00064)   72204854 54502f31 2e300d0a 41636365   r HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206d6f 75746872 6573742e 6e65740d   : mouthrest.net.
0x00000080 (00128)   0a0d0a0d 0a0d0a                       .......

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 643d7661 6c696461 7465266d   ethod=validate&m
0x00000020 (00032)   6f64653d 736f7826 763d3034 3026736f   ode=sox&v=040&so
0x00000030 (00048)   783d3462 34653638 3030266c 656e6864   x=4b4e6800&lenhd
0x00000040 (00064)   72204854 54502f31 2e300d0a 41636365   r HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206472 69766574 68697274 65656e2e   : drivethirteen.
0x00000080 (00128)   6e65740d 0a0d0a                       net....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 643d7661 6c696461 7465266d   ethod=validate&m
0x00000020 (00032)   6f64653d 736f7826 763d3034 3026736f   ode=sox&v=040&so
0x00000030 (00048)   783d3462 34653638 3030266c 656e6864   x=4b4e6800&lenhd
0x00000040 (00064)   72204854 54502f31 2e300d0a 41636365   r HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206661 6365626f 61742e6e 65740d0a   : faceboat.net..
0x00000080 (00128)   0d0a740d 0a0d0a                       ..t....

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 643d7661 6c696461 7465266d   ethod=validate&m
0x00000020 (00032)   6f64653d 736f7826 763d3034 3026736f   ode=sox&v=040&so
0x00000030 (00048)   783d3462 34653638 3030266c 656e6864   x=4b4e6800&lenhd
0x00000040 (00064)   72204854 54502f31 2e300d0a 41636365   r HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206d75 63686861 7070792e 6e65740d   : muchhappy.net.
0x00000080 (00128)   0a0d0a0d 0a0d0a                       .......

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 643d7661 6c696461 7465266d   ethod=validate&m
0x00000020 (00032)   6f64653d 736f7826 763d3034 3026736f   ode=sox&v=040&so
0x00000030 (00048)   783d3462 34653638 3030266c 656e6864   x=4b4e6800&lenhd
0x00000040 (00064)   72204854 54502f31 2e300d0a 41636365   r HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206361 6c6c6d69 6c652e6e 65740d0a   : callmile.net..
0x00000080 (00128)   0d0a0a0d 0a0d0a                       .......

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 643d7661 6c696461 7465266d   ethod=validate&m
0x00000020 (00032)   6f64653d 736f7826 763d3034 3026736f   ode=sox&v=040&so
0x00000030 (00048)   783d3462 34653638 3030266c 656e6864   x=4b4e6800&lenhd
0x00000040 (00064)   72204854 54502f31 2e300d0a 41636365   r HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206c69 6665636c 6f636b2e 6e65740d   : lifeclock.net.
0x00000080 (00128)   0a0d0a0d 0a0d0a                       .......

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 643d7661 6c696461 7465266d   ethod=validate&m
0x00000020 (00032)   6f64653d 736f7826 763d3034 3026736f   ode=sox&v=040&so
0x00000030 (00048)   783d3462 34653638 3030266c 656e6864   x=4b4e6800&lenhd
0x00000040 (00064)   72204854 54502f31 2e300d0a 41636365   r HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206c69 66656d61 6b652e6e 65740d0a   : lifemake.net..
0x00000080 (00128)   0d0a0a0d 0a0d0a                       .......

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 643d7661 6c696461 7465266d   ethod=validate&m
0x00000020 (00032)   6f64653d 736f7826 763d3034 3026736f   ode=sox&v=040&so
0x00000030 (00048)   783d3462 34653638 3030266c 656e6864   x=4b4e6800&lenhd
0x00000040 (00064)   72204854 54502f31 2e300d0a 41636365   r HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a20656e 656d7972 7573682e 6e65740d   : enemyrush.net.
0x00000080 (00128)   0a0d0a0d 0a0d0a                       .......

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 643d7661 6c696461 7465266d   ethod=validate&m
0x00000020 (00032)   6f64653d 736f7826 763d3034 3026736f   ode=sox&v=040&so
0x00000030 (00048)   783d3462 34653638 3030266c 656e6864   x=4b4e6800&lenhd
0x00000040 (00064)   72204854 54502f31 2e300d0a 41636365   r HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206465 65707275 73682e6e 65740d0a   : deeprush.net..
0x00000080 (00128)   0d0a0a0d 0a0d0a                       .......

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 643d7661 6c696461 7465266d   ethod=validate&m
0x00000020 (00032)   6f64653d 736f7826 763d3034 3026736f   ode=sox&v=040&so
0x00000030 (00048)   783d3462 34653638 3030266c 656e6864   x=4b4e6800&lenhd
0x00000040 (00064)   72204854 54502f31 2e300d0a 41636365   r HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a207075 73686861 72642e6e 65740d0a   : pushhard.net..
0x00000080 (00128)   0d0a0a0d 0a0d0a                       .......

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 643d7661 6c696461 7465266d   ethod=validate&m
0x00000020 (00032)   6f64653d 736f7826 763d3034 3026736f   ode=sox&v=040&so
0x00000030 (00048)   783d3462 34653638 3030266c 656e6864   x=4b4e6800&lenhd
0x00000040 (00064)   72204854 54502f31 2e300d0a 41636365   r HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a207075 7368636c 6f636b2e 6e65740d   : pushclock.net.
0x00000080 (00128)   0a0d0a0d 0a0d0a                       .......

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 643d7661 6c696461 7465266d   ethod=validate&m
0x00000020 (00032)   6f64653d 736f7826 763d3034 3026736f   ode=sox&v=040&so
0x00000030 (00048)   783d3462 34653638 3030266c 656e6864   x=4b4e6800&lenhd
0x00000040 (00064)   72204854 54502f31 2e300d0a 41636365   r HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a207075 73686d61 6b652e6e 65740d0a   : pushmake.net..
0x00000080 (00128)   0d0a0a0d 0a0d0a                       .......

0x00000000 (00000)   47455420 2f696e64 65782e70 68703f6d   GET /index.php?m
0x00000010 (00016)   6574686f 643d7661 6c696461 7465266d   ethod=validate&m
0x00000020 (00032)   6f64653d 736f7826 763d3034 3026736f   ode=sox&v=040&so
0x00000030 (00048)   783d3462 34653638 3030266c 656e6864   x=4b4e6800&lenhd
0x00000040 (00064)   72204854 54502f31 2e300d0a 41636365   r HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206c6f 6e677368 696e652e 6e65740d   : longshine.net.
0x00000080 (00128)   0a0d0a0d 0a0d0a                       .......


Strings