Analysis Date2014-08-16 16:18:34
MD52698b7f4c984f2a96153ab28a4f7fac0
SHA14e485c371be8c4210f67e11e0adfdde3f9738e87

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: e5df293d9042d1d5a9539404a6e0175e sha1: ee5869ef72baae85ae07ddac909a65ba28c9bffd size: 981504
Section.rdata md5: 7ce49e679875795803c324aab820f0c5 sha1: 1c9e9e87a04cee9cdbc6b51622421eae7f296234 size: 31232
Section.data md5: 2799cbec34c8d1a7186c44aa7949fb7d sha1: 28cb503f67061468e789fe0939d122f56b17828f size: 117248
Timestamp2013-03-15 00:26:37
PackerMicrosoft Visual C++ ?.?
PEhashd49a2dd3e985cbe2155cd57bc24b26eec3ad0af7
IMPhash9a3aa9c93175c1b98a0f14f31a59e9df
AV360 SafeGen:Variant.Kazy.164619
AVAd-AwareGen:Variant.Kazy.164619
AVAlwil (avast)Downloader-TLD [Trj]
AVArcabit (arcavir)no_virus
AVAuthentiumW32/Symmi.G.gen!Eldorado
AVAvira (antivir)BDS/Zegost.Gen
AVCA (E-Trust Ino)no_virus
AVCAT (quickheal)no_virus
AVClamAVno_virus
AVDr. WebBackDoor.Gbot.2518
AVEmsisoftGen:Variant.Kazy.164619
AVEset (nod32)Win32/Bayrob.N.Gen
AVFortinetW32/Bayrob.N!tr
AVFrisk (f-prot)W32/Symmi.G.gen!Eldorado (generic, not disinfectable)
AVF-SecureGen:Variant.Kazy.164619
AVGrisoft (avg)Generic_r.CDN
AVIkarusTrojan.Win32.Spy
AVK7Backdoor ( 04c540d41 )
AVKasperskyTrojan.Win32.Generic:Trojan.Win32.PEF.pf.silent.175154:Trojan.Win32.PEF.pf.silent.181830:Trojan.Win32.PEF.pf.silent.375904:Trojan.Win32.PEF.pf.silent.376942:Trojan.Win32.PEF.pf.silent.377697:Trojan.Win32.PEF.pf.silent.378515:Trojan.Win32.PEF.pf.silent.379237:Trojan.Win32.PEF.pf.silent.380145:Trojan.Win32.PEF.pf.silent.380997
AVMalwareBytesno_virus
AVMcafeeno_virus
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort.P
AVMicroWorld (escan)Gen:Variant.Kazy.164619
AVNormanwinpe/Troj_Generic.KRREQ
AVRisingno_virus
AVSophosTroj/Bayrob-E
AVSymantecTrojan.Bayrob!gen4
AVTrend MicroTSPY_NIVDORT.SM
AVVirusBlokAda (vba32)no_virus
AVYara APTno_virus
AVZillya!no_virus

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\WINDOWS\system32\krpdduc\tst
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\irdjeej1knxhxsknjnr.exe
Creates ProcessC:\Documents and Settings\Administrator\Local Settings\Temp\irdjeej1knxhxsknjnr.exe

Process
↳ C:\Documents and Settings\Administrator\Local Settings\Temp\irdjeej1knxhxsknjnr.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\Cache Play Background Fax PC ➝
C:\WINDOWS\system32\eingksqir.exe
Creates FileC:\WINDOWS\system32\krpdduc\lck
Creates FileC:\WINDOWS\system32\drivers\etc\hosts
Creates FileC:\Documents and Settings\Administrator\Start Menu\Programs\Startup\eingksqir.exe
Creates FileC:\WINDOWS\system32\krpdduc\tst
Creates FileC:\WINDOWS\system32\eingksqir.exe
Creates FileC:\WINDOWS\system32\krpdduc\etc
Deletes FileC:\WINDOWS\system32\\drivers\etc\hosts
Creates ProcessC:\WINDOWS\system32\eingksqir.exe
Creates ServiceInstrumentation File TPM Base iSCSI Driver - C:\WINDOWS\system32\eingksqir.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ Pid 800

Process
↳ Pid 848

Process
↳ C:\WINDOWS\System32\svchost.exe

Creates Filepipe\PCHFaultRepExecPipe

Process
↳ Pid 1204

Process
↳ C:\WINDOWS\system32\spoolsv.exe

RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝
7
RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝
NULL
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝
C:\WINDOWS\System32\spool\PRINTERS\\x00

Process
↳ Pid 1120

Process
↳ C:\WINDOWS\system32\eingksqir.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Security Center\FirewallDisableNotify ➝
1
Creates FileC:\WINDOWS\system32\krpdduc\lck
Creates FileC:\WINDOWS\TEMP\irdjeej1q5uhf.exe
Creates FileC:\WINDOWS\system32\krpdduc\cfg
Creates FileC:\WINDOWS\system32\krpdduc\rng
Creates Filepipe\net\NtControlPipe10
Creates FileC:\WINDOWS\system32\krpdduc\run
Creates FileC:\WINDOWS\system32\krpdduc\tst
Creates FileC:\WINDOWS\system32\pjstcuqaqi.exe
Creates File\Device\Afd\Endpoint
Creates ProcessWATCHDOGPROC "c:\windows\system32\eingksqir.exe"
Creates ProcessC:\WINDOWS\TEMP\irdjeej1q5uhf.exe -r 20110 tcp

Process
↳ C:\WINDOWS\system32\eingksqir.exe

Creates FileC:\WINDOWS\system32\krpdduc\tst

Process
↳ WATCHDOGPROC "c:\windows\system32\eingksqir.exe"

Creates FileC:\WINDOWS\system32\krpdduc\tst

Process
↳ C:\WINDOWS\TEMP\irdjeej1q5uhf.exe -r 20110 tcp

Creates File\Device\Afd\Endpoint
Winsock DNS239.255.255.250

Network Details:

DNSelementarimagine.com
Type: A
141.8.225.80
DNSmojoguia.com
Type: A
204.11.56.26
DNSveryfree.net
Type: A
208.73.211.70
DNSwaitfree.net
Type: A
68.178.232.100
DNStakefree.net
Type: A
69.172.201.208
DNStakeforty.net
Type: A
173.204.164.227
DNSlifedaily.net
Type: A
142.4.15.95
DNSlifefull.net
Type: A
50.63.202.63
DNSmouthfull.net
Type: A
69.172.201.208
DNSdominoclub-grup.com
Type: A
DNSjarybuter.com
Type: A
DNSmojositio.com
Type: A
DNSvillemojo.com
Type: A
DNSaminastol.com
Type: A
DNSfallfree.net
Type: A
DNStoreforty.net
Type: A
DNSfallforty.net
Type: A
DNStoreother.net
Type: A
DNSfallother.net
Type: A
DNStorewall.net
Type: A
DNSfallwall.net
Type: A
DNSweekfree.net
Type: A
DNSweekforty.net
Type: A
DNSveryforty.net
Type: A
DNSweekother.net
Type: A
DNSveryother.net
Type: A
DNSweekwall.net
Type: A
DNSverywall.net
Type: A
DNSpiecefree.net
Type: A
DNSmuchfree.net
Type: A
DNSpieceforty.net
Type: A
DNSmuchforty.net
Type: A
DNSpieceother.net
Type: A
DNSmuchother.net
Type: A
DNSpiecewall.net
Type: A
DNSmuchwall.net
Type: A
DNSwaitforty.net
Type: A
DNSwaitother.net
Type: A
DNStakeother.net
Type: A
DNSwaitwall.net
Type: A
DNStakewall.net
Type: A
DNSlongblood.net
Type: A
DNSsoilblood.net
Type: A
DNSlongdaily.net
Type: A
DNSsoildaily.net
Type: A
DNSlonglose.net
Type: A
DNSsoillose.net
Type: A
DNSlongfull.net
Type: A
DNSsoilfull.net
Type: A
DNSwheelblood.net
Type: A
DNSsaidblood.net
Type: A
DNSwheeldaily.net
Type: A
DNSsaiddaily.net
Type: A
DNSwheellose.net
Type: A
DNSsaidlose.net
Type: A
DNSwheelfull.net
Type: A
DNSsaidfull.net
Type: A
DNSstickblood.net
Type: A
DNSballblood.net
Type: A
DNSstickdaily.net
Type: A
DNSballdaily.net
Type: A
DNSsticklose.net
Type: A
DNSballlose.net
Type: A
DNSstickfull.net
Type: A
DNSballfull.net
Type: A
DNSenemyblood.net
Type: A
DNSlifeblood.net
Type: A
DNSenemydaily.net
Type: A
DNSenemylose.net
Type: A
DNSlifelose.net
Type: A
DNSenemyfull.net
Type: A
DNSmouthblood.net
Type: A
DNStillblood.net
Type: A
DNSmouthdaily.net
Type: A
DNStilldaily.net
Type: A
DNSmouthlose.net
Type: A
DNStilllose.net
Type: A
DNStillfull.net
Type: A
DNSshallblood.net
Type: A
DNSdeepblood.net
Type: A
DNSshalldaily.net
Type: A
DNSdeepdaily.net
Type: A
DNSshalllose.net
Type: A
DNSdeeplose.net
Type: A
DNSshallfull.net
Type: A
DNSdeepfull.net
Type: A
DNSpushblood.net
Type: A
DNSfridayblood.net
Type: A
DNSpushdaily.net
Type: A
DNSfridaydaily.net
Type: A
DNSpushlose.net
Type: A
DNSfridaylose.net
Type: A
HTTP GEThttp://elementarimagine.com/forum/search.php?method=validate&mode=sox&v=004&sox=2c847801
User-Agent:
HTTP GEThttp://mojoguia.com/forum/search.php?method=validate&mode=sox&v=004&sox=2c847801
User-Agent:
HTTP GEThttp://veryfree.net/forum/search.php?method=validate&mode=sox&v=004&sox=2c847801
User-Agent:
HTTP GEThttp://waitfree.net/forum/search.php?method=validate&mode=sox&v=004&sox=2c847801
User-Agent:
HTTP GEThttp://takefree.net/forum/search.php?method=validate&mode=sox&v=004&sox=2c847801
User-Agent:
HTTP GEThttp://takeforty.net/forum/search.php?method=validate&mode=sox&v=004&sox=2c847801
User-Agent:
HTTP GEThttp://lifedaily.net/forum/search.php?method=validate&mode=sox&v=004&sox=2c847801
User-Agent:
HTTP GEThttp://lifefull.net/forum/search.php?method=validate&mode=sox&v=004&sox=2c847801
User-Agent:
HTTP GEThttp://mouthfull.net/forum/search.php?method=validate&mode=sox&v=004&sox=2c847801
User-Agent:
HTTP GEThttp://elementarimagine.com/forum/search.php?method=validate&mode=sox&v=004&sox=2c847801
User-Agent:
HTTP GEThttp://mojoguia.com/forum/search.php?method=validate&mode=sox&v=004&sox=2c847801
User-Agent:
HTTP GEThttp://veryfree.net/forum/search.php?method=validate&mode=sox&v=004&sox=2c847801
User-Agent:
HTTP GEThttp://waitfree.net/forum/search.php?method=validate&mode=sox&v=004&sox=2c847801
User-Agent:
HTTP GEThttp://takefree.net/forum/search.php?method=validate&mode=sox&v=004&sox=2c847801
User-Agent:
HTTP GEThttp://takeforty.net/forum/search.php?method=validate&mode=sox&v=004&sox=2c847801
User-Agent:
HTTP GEThttp://lifedaily.net/forum/search.php?method=validate&mode=sox&v=004&sox=2c847801
User-Agent:
HTTP GEThttp://lifefull.net/forum/search.php?method=validate&mode=sox&v=004&sox=2c847801
User-Agent:
HTTP GEThttp://mouthfull.net/forum/search.php?method=validate&mode=sox&v=004&sox=2c847801
User-Agent:
Flows TCP192.168.1.1:1036 ➝ 141.8.225.80:80
Flows TCP192.168.1.1:1038 ➝ 204.11.56.26:80
Flows TCP192.168.1.1:1039 ➝ 208.73.211.70:80
Flows TCP192.168.1.1:1040 ➝ 68.178.232.100:80
Flows TCP192.168.1.1:1041 ➝ 69.172.201.208:80
Flows TCP192.168.1.1:1042 ➝ 173.204.164.227:80
Flows TCP192.168.1.1:1043 ➝ 142.4.15.95:80
Flows TCP192.168.1.1:1044 ➝ 50.63.202.63:80
Flows TCP192.168.1.1:1045 ➝ 69.172.201.208:80
Flows TCP192.168.1.1:1046 ➝ 141.8.225.80:80
Flows TCP192.168.1.1:1047 ➝ 204.11.56.26:80
Flows TCP192.168.1.1:1048 ➝ 208.73.211.70:80
Flows TCP192.168.1.1:1049 ➝ 68.178.232.100:80
Flows TCP192.168.1.1:1050 ➝ 69.172.201.208:80
Flows TCP192.168.1.1:1051 ➝ 173.204.164.227:80
Flows TCP192.168.1.1:1052 ➝ 142.4.15.95:80
Flows TCP192.168.1.1:1053 ➝ 50.63.202.63:80
Flows TCP192.168.1.1:1054 ➝ 69.172.201.208:80

Raw Pcap
0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303034 26736f78 3d326338 34373830   =004&sox=2c84780
0x00000040 (00064)   31204854 54502f31 2e300d0a 41636365   1 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a20656c 656d656e 74617269 6d616769   : elementarimagi
0x00000080 (00128)   6e652e63 6f6d0d0a 0d0a                ne.com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303034 26736f78 3d326338 34373830   =004&sox=2c84780
0x00000040 (00064)   31204854 54502f31 2e300d0a 41636365   1 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206d6f 6a6f6775 69612e63 6f6d0d0a   : mojoguia.com..
0x00000080 (00128)   0d0a2e63 6f6d0d0a 0d0a                ...com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303034 26736f78 3d326338 34373830   =004&sox=2c84780
0x00000040 (00064)   31204854 54502f31 2e300d0a 41636365   1 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a207665 72796672 65652e6e 65740d0a   : veryfree.net..
0x00000080 (00128)   0d0a2e63 6f6d0d0a 0d0a                ...com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303034 26736f78 3d326338 34373830   =004&sox=2c84780
0x00000040 (00064)   31204854 54502f31 2e300d0a 41636365   1 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a207761 69746672 65652e6e 65740d0a   : waitfree.net..
0x00000080 (00128)   0d0a2e63 6f6d0d0a 0d0a                ...com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303034 26736f78 3d326338 34373830   =004&sox=2c84780
0x00000040 (00064)   31204854 54502f31 2e300d0a 41636365   1 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a207461 6b656672 65652e6e 65740d0a   : takefree.net..
0x00000080 (00128)   0d0a2e63 6f6d0d0a 0d0a                ...com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303034 26736f78 3d326338 34373830   =004&sox=2c84780
0x00000040 (00064)   31204854 54502f31 2e300d0a 41636365   1 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a207461 6b65666f 7274792e 6e65740d   : takeforty.net.
0x00000080 (00128)   0a0d0a63 6f6d0d0a 0d0a                ...com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303034 26736f78 3d326338 34373830   =004&sox=2c84780
0x00000040 (00064)   31204854 54502f31 2e300d0a 41636365   1 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206c69 66656461 696c792e 6e65740d   : lifedaily.net.
0x00000080 (00128)   0a0d0a63 6f6d0d0a 0d0a                ...com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303034 26736f78 3d326338 34373830   =004&sox=2c84780
0x00000040 (00064)   31204854 54502f31 2e300d0a 41636365   1 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206c69 66656675 6c6c2e6e 65740d0a   : lifefull.net..
0x00000080 (00128)   0d0a0a63 6f6d0d0a 0d0a                ...com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303034 26736f78 3d326338 34373830   =004&sox=2c84780
0x00000040 (00064)   31204854 54502f31 2e300d0a 41636365   1 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206d6f 75746866 756c6c2e 6e65740d   : mouthfull.net.
0x00000080 (00128)   0a0d0a63 6f6d0d0a 0d0a                ...com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303034 26736f78 3d326338 34373830   =004&sox=2c84780
0x00000040 (00064)   31204854 54502f31 2e300d0a 41636365   1 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a20656c 656d656e 74617269 6d616769   : elementarimagi
0x00000080 (00128)   6e652e63 6f6d0d0a 0d0a                ne.com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303034 26736f78 3d326338 34373830   =004&sox=2c84780
0x00000040 (00064)   31204854 54502f31 2e300d0a 41636365   1 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206d6f 6a6f6775 69612e63 6f6d0d0a   : mojoguia.com..
0x00000080 (00128)   0d0a2e63 6f6d0d0a 0d0a                ...com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303034 26736f78 3d326338 34373830   =004&sox=2c84780
0x00000040 (00064)   31204854 54502f31 2e300d0a 41636365   1 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a207665 72796672 65652e6e 65740d0a   : veryfree.net..
0x00000080 (00128)   0d0a2e63 6f6d0d0a 0d0a                ...com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303034 26736f78 3d326338 34373830   =004&sox=2c84780
0x00000040 (00064)   31204854 54502f31 2e300d0a 41636365   1 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a207761 69746672 65652e6e 65740d0a   : waitfree.net..
0x00000080 (00128)   0d0a2e63 6f6d0d0a 0d0a                ...com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303034 26736f78 3d326338 34373830   =004&sox=2c84780
0x00000040 (00064)   31204854 54502f31 2e300d0a 41636365   1 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a207461 6b656672 65652e6e 65740d0a   : takefree.net..
0x00000080 (00128)   0d0a2e63 6f6d0d0a 0d0a                ...com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303034 26736f78 3d326338 34373830   =004&sox=2c84780
0x00000040 (00064)   31204854 54502f31 2e300d0a 41636365   1 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a207461 6b65666f 7274792e 6e65740d   : takeforty.net.
0x00000080 (00128)   0a0d0a63 6f6d0d0a 0d0a                ...com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303034 26736f78 3d326338 34373830   =004&sox=2c84780
0x00000040 (00064)   31204854 54502f31 2e300d0a 41636365   1 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206c69 66656461 696c792e 6e65740d   : lifedaily.net.
0x00000080 (00128)   0a0d0a63 6f6d0d0a 0d0a                ...com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303034 26736f78 3d326338 34373830   =004&sox=2c84780
0x00000040 (00064)   31204854 54502f31 2e300d0a 41636365   1 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206c69 66656675 6c6c2e6e 65740d0a   : lifefull.net..
0x00000080 (00128)   0d0a0a63 6f6d0d0a 0d0a                ...com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303034 26736f78 3d326338 34373830   =004&sox=2c84780
0x00000040 (00064)   31204854 54502f31 2e300d0a 41636365   1 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206d6f 75746866 756c6c2e 6e65740d   : mouthfull.net.
0x00000080 (00128)   0a0d0a63 6f6d0d0a 0d0a                ...com....


Strings
 
-
"1"
2dll1exe
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
 
!
"
#
$
%
&
'
(
)
*
+
,
.
  ---
ss
 
 ' 
:
:
[
Z
[
Z
[
bmp
"H
"
dll2
h2
1
1
exe
a
h1
21212
"
 
.
\
.
...............0...
.
...
..
. .
!"!#$%&%$#!'!
+
+%3D%3A%26A&
 
S
 0
%+#.*fa
0e
%+#I64o
.,
 -00-+ CC
 
.
-e-
. 
.-E-
-0
-0010+-0
0
-0
\
00-+ 
  .
:\
:..00...........?- 
0
0
0
0
-
..
.B_..
..
..
u
                                 H
         (((((                  H
         h((((                  H
jjjh
jjjj
jjjjh
KERNEL32.DLL
mscoree.dll
(null)
                          
_     
.~+^}{
)$,&	 
																		
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
0A@@Ju
;0]FLD
0*Ivgr
0SSSSS
0WWWWW
0w#x0,cODi
1d"DB[
+:1`+E
1+p{|[I
1#QNAN
-1R++E
1#SNAN
(1wm)m
2(0x[P	
2.,gI0
2nG?9W
2Pg:JkB
2 r#d{
\2rD{B~Q
2Vus3,
\3)A:e
/{([3M
3p]Pt=
3x0-81]
[[4	3U
4gB4=	
=!	4Mt
4ZvFqV
;51'+E
5(8P#M
5`Ch+U
=5\!l}
:5O0*R
5PZop#E
5<R%>n
5xfXM='
5XiJO;
%5zJ0=
5zRSg#E
\6||:e
	%6eEB
6IE9/:
$6^?J	
-6skG+
]7D`+g`
7~Lo*X
7s|L(/
7\vE	2
<8l$+M
 8mw+M
8VVVVV
91^xoN#H
9;4),<E-
9Fz_#E
9N7od:
9w"4$/C
a1x-3M
A%7h$m
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
ABU'|Z
Af_4T3
america
american
american english
american-english
An application has made an attempt to load the C runtime library incorrectly.
AQD*C(
<at9<rt,<wt
- Attempt to initialize the CRT more than once.
- Attempt to use MSIL code from this assembly during native code initialization
.?AUctype_base@std@@
August
australian
.?AVbad_alloc@std@@
.?AVbad_cast@std@@
.?AVbad_exception@std@@
.?AV?$basic_ios@DU?$char_traits@D@std@@@std@@
.?AV?$basic_ostream@DU?$char_traits@D@std@@@std@@
.?AV?$basic_ostringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@
.?AV?$basic_streambuf@DU?$char_traits@D@std@@@std@@
.?AV?$basic_stringbuf@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@
.?AV?$ctype@D@std@@
.?AVexception@std@@
.?AVfacet@locale@std@@
.?AVfailure@ios_base@std@@
$A={vH
.?AVios_base@std@@
.?AV?$_Iosb@H@std@@
.?AVlength_error@std@@
.?AV_Locimp@locale@std@@
.?AVlogic_error@std@@
.?AV?$numpunct@D@std@@
.?AV?$num_put@DV?$ostreambuf_iterator@DU?$char_traits@D@std@@@std@@@std@@
.?AVout_of_range@std@@
.?AVruntime_error@std@@
.?AVtype_info@@
AX7%a`
b3e]1N
B3UwCr
bad allocation
bad cast
bad exception
 Base Class Array'
 Base Class Descriptor at (
__based(
B-biyN~e
Bcm6[r
+bDy;>o
belgian
BI]_].
britain
bT3D+E
:bY/+E
-C8O)1
]CA!AOTs
canadian
CBLIzp_
__cdecl
Cdp-H!	|
chinese
chinese-hongkong
chinese-simplified
chinese-singapore
chinese-traditional
 Class Hierarchy Descriptor'
CloseHandle
__clrcall
_?c-#M
cmd.exe
C.N_R#
%!cOe=&
CompareStringA
CompareStringW
 Complete Object Locator'
COMSPEC
CONOUT$
`copy constructor closure'
Copyright (c) 1992-2004 by P.J. Plauger, licensed by Dinkumware, Ltd. ALL RIGHTS RESERVED.
CorExitProcess
C PjPV
C$PjQV
C.PjRV
C/PjSV
C*PjTV
C+PjUV
C,PjVV
C-PjWV
CreateEventA
CreateFileA
CreatePipe
CreateProcessA
CreateThread
- CRT not initialized
c_S,[<
!c&=*v
_cxc+U
c(Y#cs
$D :@;
@.data
dddd, MMMM dd, yyyy
December
DecodePointer
`default constructor closure'
 delete
 delete[]
Delete
DeleteCriticalSection
deque<T> too long
DGuXpu
dN@/FW
DoDxMNk
DOMAIN error
dutch-belgian
#`dw~o
@D[xJWz
=dX^;u'
`dynamic atexit destructor for '
`dynamic initializer for '
? "	#E
e-Di3M
`eh vector constructor iterator'
`eh vector copy constructor iterator'
`eh vector destructor iterator'
`eh vector vbase constructor iterator'
`eh vector vbase copy constructor iterator'
EI@FkF
%EJ?N3E
 Ej_SY"
E=l%yy
EncodePointer
england
english-american
english-aus
english-belize
english-can
english-caribbean
english-ire
english-jamaica
english-nz
english-south africa
english-trinidad y tobago
english-uk
english-us
english-usa
EnterCriticalSection
EnumSystemLocalesA
eSKI+M
EWDw|'
%ewRS9E
ExitProcess
f1-]W8L
F4qX8'
__fastcall
/FC.Re_#
February
	]&]Fg3
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
\Fjz?+(-^
FK]5gO
Fk`~JA
<Fk{vB
- floating point support not loaded
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
f]L'|U
FlushFileBuffers
|Fm[k`
-)|FML
F\=@&O
ForceRemove
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeLibrary
french-belgian
french-canadian
french-luxembourg
french-swiss
Friday
_fS1Oxo
Ft99[:
 F&TJG
^F<-uB
G45#N<
{G7n8`Z
GAIsProcessorFeaturePresent
g}%da	5
g]*E?PPn
german-austrian
german-lichtenstein
german-luxembourg
german-swiss
GetACP
GetActiveWindow
GetCommandLineA
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
GetCPInfo
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDriveTypeA
GetEnvironmentStrings
GetEnvironmentStringsW
GetExitCodeProcess
GetFileAttributesA
GetFileType
GetFullPathNameA
GetLastActivePopup
GetLastError
GetLocaleInfoA
GetLocaleInfoW
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetProcessWindowStation
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetStringTypeW
GetSystemTimeAsFileTime
GetTickCount
GetTimeZoneInformation
GetUserDefaultLCID
GetUserObjectInformationA
GFk7+M
GJi-;#&[
gMO+#>
g??%o'<
=Go0K	5
=GokO|#
G^?ps1
great britain
/	g\Ua
`h````
=]}H/~
hB	V#N`
	#;"hd?{
HeapAlloc
HeapCreate
HeapFree
HeapReAlloc
HeapSize
`h`hhh
HH:mm:ss
HHtXHHt
HHtYHHt
holland
.HoLtJ
hong-kong
hq	f8nD
ht43q2V^
<!ht6E
<hZ	{sO
H_z?+U
>i#63_H
iC<{3E
>If90t
iFLjO$;
iK'ee@
IK+N,_^
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
invalid map/set<T> iterator
invalid string position
i|o+4>
ios_base::badbit set
ios_base::failbit set
Iqkp.m
irish-english
IsDebuggerPresent
IsValidCodePage
IsValidLocale
italian-swiss
`J!\'}
j0"'py
J1t|C&\
j2h<5Q
j2h<AQ
j2h`@Q
JanFebMarAprMayJunJulAugSepOctNovDec
January
jDaC)3
J-h.*.1
j	h`3Q
j	h4mP
j_hdTk
j,h(~O
j_hp!Q
j,hpzO
j%h|qP
j	h vP
j@j ^V
jLfv7B
jPh "Q
j`r]DF
j"^SSSSS
j'S:'x"w
j`YV50
j/:zJhwZ%4#
K5}?+E
k.8V7;cGbz
K9BrgL
:=ka2<
KERNEL32
KERNEL32.dll
Kf>z}X
km1?#/xq
k?-M}E
=kw%j~
{kZW>\
L>9L3&
LC_ALL
LC_COLLATE
LC_CTYPE
LCMapStringA
LCMapStringW
LC_MONETARY
LC_NUMERIC
LC_TIME
lDIb?f
LeaveCriticalSection
L,FcN|
ljcK64
LKe[W7
lm<%SQ
LoadLibraryA
LocalAlloc
`local static guard'
`local static thread guard'
`local vftable'
`local vftable constructor closure'
l=P"#=
<,lpqxq=*h
lr6_I5
#L_"RA
^luM9M
]l^xJ7{
lZJ.SC
M*3%'Y\%;7
m4-T1=s
m>A=9E
`managed vector constructor iterator'
`managed vector copy constructor iterator'
`managed vector destructor iterator'
map/set<T> too long
+M	d#U
MessageBoxA
Microsoft Visual C++ Runtime Library
M/LIj_
Ml#O#U
mlvl+U
MM/dd/yy
Monday
&&M@r<
MrX+wc,
,M@t2a
m!t~N@
MultiByteToWideChar
MyX)+M
n84Ep*
n<	C3U
 new[]
new-zealand
Ng@TdK
N&Km;n
=&Nocu'
NOMP:LN
NoRemove
norwegian
norwegian-bokmal
norwegian-nynorsk
Norwegian-Nynorsk
- not enough space for arguments
- not enough space for environment
- not enough space for locale information
- not enough space for lowio initialization
- not enough space for _onexit/atexit table
- not enough space for stdio initialization
- not enough space for thread data
November
ns5a+E
nSs&NOoVK0
NuD7OH
(null)
o{1@`;
_OBHmZk
o-ck+U
October
olDg}[rGfr
OLEAUT32.dll
`omni callsig'
oO[NC I
operator
O|>P+M
p3~rCDs}
__pascal
P)cFw)_G
_pcj3E
p_K1iJ
`placement delete closure'
`placement delete[] closure'
Please contact the application's support team for more information.
portuguese-brazilian
PPPPPPPP
pr china
pr-china
Program: 
<program name unknown>
__ptr64
(pT;!xt
puerto-rico
- pure virtual function call
`p}wt,
PXd([~
pxhA?!
P}Xs\Ak
#q7!L!
`<qb+M
Q'i[Yl
Qj+wwS
Q-K`DU
Q*o/Xq
QQSVWd
$>Q=<S
QueryPerformanceCounter
Q__uS0}u
Qv}Fwr
Q;`ZW<
#{-R%|
/r3.#U
r`6,ow
RaiseException
`.rdata
r<\ #E
ReadFile
__restrict
Richh!
RN,|5]B
rQ2b9iA
RR^?w5
RtlUnwind
R:_u0M
runtime error 
Runtime Error!
*ru}RA
|Ry9+M
s2YU1w
S"8,X9{
Saturday
sc42FN|
`scalar deleting destructor'
September
SetEndOfFile
SetEnvironmentVariableA
SetEvent
SetFilePointer
SetHandleCount
SetHandleInformation
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
shR3vqS
si:{3U
SING error
slovak
south africa
south-africa
south korea
south-korea
S OZ:B
spanish-argentina
spanish-bolivia
spanish-chile
spanish-colombia
spanish-costa rica
spanish-dominican republic
spanish-ecuador
spanish-el salvador
spanish-guatemala
spanish-honduras
spanish-mexican
spanish-modern
spanish-nicaragua
spanish-panama
spanish-paraguay
spanish-peru
spanish-puerto rico
spanish-uruguay
spanish-venezuela
`Sq93U
s[S;7|G;w
^SSSSS
SS%X~"
+ST9M*O
__stdcall
`string'
string too long
Sunday
SunMonTueWedThuFriSat
swedish-finland
[Syeu]
SystemRoot
>}	T/1
TerminateProcess
t=FA9]
tGHt.Ht&
(</t$h
+t HHt
This application has requested the Runtime to terminate it in an unusual way.
__thiscall
This indicates a bug in your application.
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
!This program cannot be run in DOS mode.
Thursday
tIj"[:
tjp	F.
"Tk?>cNiWt
< tK<	tG
TL B%Q2
TLOSS error
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
[tMaVS
<\tM</tI
[tm>xW
tPR]\#Z
tR99u2
trinidad & tobago
t"SS9]
<+t(<-t$:
t$<"u	3
Tuesday
;t$,v-
t VV9u
-Tw\<G%Q
t+WWVPV
TXyN7EH
 Type Descriptor'
`typeof'
_]U:5S
>:u8FV
`udt returning'
ufe;J7
Uh8P}:
- unable to initialize heap
- unable to open console device
__unaligned
- unexpected heap error
- unexpected multithread lock error
UnhandledExceptionFilter
UNICODE
united-kingdom
united-states
Unknown exception
UQPXY]Y[
uqSSSSS
URPQQh@
USER32.DLL
u[SSSP
UTF-16LE
U+|T~VCb
u,VVWV
uw8xgc6V
-U?X83
`vbase destructor'
`vbtable'
`vcall'
`vector constructor iterator'
`vector copy constructor iterator'
`vector deleting destructor'
`vector destructor iterator'
`vector vbase constructor iterator'
`vector vbase copy constructor iterator'
`vftable'
VirtualAlloc
`virtual displacement map'
VirtualFree
VLu(yd	
??]vn0
v	N+D$
v#@|O-
vqwJ.s;%
_VVVVV
VVVVVQRSSj
vw3Kxh;
WaitForSingleObject
W[C\+E
Wd6Bu!
Wednesday
WfU}#S
WideCharToMultiByte
w+j7D@
WmlD#U
Wr_)e%
WriteConsoleA
WriteConsoleW
WriteFile
WS2_32.dll
!Wv&Rk
WwQl#U
^WWWWW
Wx=:B9
\xA1AR
XApq4a
xc+v+J
xD}{|Q
xiS]tm<
:):xkv
%{)X#M
xN5c]`
XOyCp;G
xppwpp
XPxSOA
xpxxxx
=x:QxZ
%xqY|3E
<xtX<XtT
XybVr@t
_{	 ?y[
Y1*N+U
y}AqNwBrxx>
[)ycf$
[.YDC62q
YgkIX3
Ygo-.<
,YhK?Th+
~YHS`<
Y@ios_base::eofbit set
Y,QY>ral
yS\pMuN
>=Yt1j
Y<\u#j\V
Z\K7^K
"^Z!+M
zP9q#U
z,s;;E
Z`V})`
#zW +U
@ZXHHc