Analysis Date2014-04-18 20:29:34
MD593abd686a3efec283017e1d9ac7b27a3
SHA161d82ddd604a7780df315c37cdde0970db26bd16

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: 6c5b1c16c4c7894e45a6c7e878294fdc sha1: a03a9498f8ac21482ab65c916218ae034d73b41e size: 119296
Section.rdata md5: 802b24bcef5dcc7528c46901d750c565 sha1: 3c199a31f06f20fdcd4eef4c0f025001b8585a16 size: 16384
Section.data md5: d9b507c5544bcd02343afc8c2fa623df sha1: fce0777d1ac200e5afebf167406c88dcc164a70b size: 95744
Timestamp2014-01-22 06:47:08
PEhash0ef8e8eb7d22eee5db8ecf236aaed237a49cb24c
IMPhash79bf85e9214034442bb3a4275ebec0de
AVaviraTR/Crypt.XPACK.Gen
AVavgGeneric_r.DML
AVmcafeeW32/Sality.gen.z
AVmsseVirus:Win32/Sality.AT

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

RegistryHKEY_CURRENT_USER\Software\Aasppapmmxkvs\A1_0 ➝
2692894802
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\policies\system\EnableLUA ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Svc\AntiVirusOverride ➝
1
RegistryHKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Hidden ➝
2
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall ➝
NULL
RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Framework Support Service Block Server ➝
C:\Documents and Settings\Administrator\Application Data\qeoywrpovv\impeifvsb.exe
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\malware.exe ➝
C:\malware.exe:*:Enabled:ipsec
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusOverride ➝
1
RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\GlobalUserOffline ➝
NULL
RegistryHKEY_CURRENT_USER\Software\Aasppapmmxkvs\-993627007\1768776769 ➝
215
Creates FileC:\Documents and Settings\Administrator\Application Data\qeoywrpovv\impeifvsb.exe
Creates FilePIPE\lsarpc
Creates FileC:\WINDOWS\SYSTEM.INI
Creates ProcessC:\Documents and Settings\Administrator\Application Data\qeoywrpovv\impeifvsb.exe
Creates MutexuxJLpe1m
Creates Mutexservices.exeM_616_
Creates Mutexalg.exeM_1844_
Creates Mutexsvchost.exeM_848_
Creates Mutexsvchost.exeM_800_
Creates Mutexlsass.exeM_628_
Creates Mutexuserinit.exeM_240_
Creates Mutexspoolsv.exeM_1296_
Creates Mutexsvchost.exeM_1164_
Creates Mutexreader_sl.exeM_964_
Creates Mutexmalware.exeM_1360_
Creates Mutexsvchost.exeM_1016_
Creates Mutexsvchost.exeM_1116_
Creates Mutexcsrss.exeM_548_
Creates Mutexsmss.exeM_500_
Creates Mutexwinlogon.exeM_572_
Creates Mutexexplorer.exeM_328_
Creates Mutexsvchost.exeM_1204_
Creates Mutexmonitor.exeM_1176_

Process
↳ C:\Documents and Settings\Administrator\Application Data\qeoywrpovv\impeifvsb.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\policies\system\EnableLUA ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Svc\AntiVirusOverride ➝
1
RegistryHKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Hidden ➝
2
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Documents and Settings\Administrator\Application Data\qeoywrpovv\impeifvsb.exe ➝
C:\Documents and Settings\Administrator\Application Data\qeoywrpovv\impeifvsb.exe:*:Enabled:ipsec
RegistryHKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\AntiVirusOverride ➝
1
RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\GlobalUserOffline ➝
NULL
RegistryHKEY_CURRENT_USER\Software\Aasppapmmxkvs\-993627007\1768776769 ➝
215
Creates FileC:\TEMP\FILES\monitor.exe
Creates FileC:\Documents and Settings\Administrator\Application Data\qeoywrpovv\ngcstauj.exe
Creates FileC:\WINDOWS\system32\drivers\ppmnn.sys
Creates FileC:\TEMP\FILES\ngcstauj.exe
Creates FilePIPE\SfcApi
Creates FileC:\Program Files\Adobe\Acrobat 7.0\Reader\AcroRd32.exe
Creates FileC:\TEMP\FILES\impeifvsb.exe
Creates FileC:\TEMP\FILES\AcroRd32.exe
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\winlqld.exe
Creates FileC:\TEMP\monitor.exe
Creates FilePIPE\lsarpc
Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\winjknhp.exe
Creates File\Device\Afd\Endpoint
Creates Fileamsint32
Creates FileC:\Documents and Settings\Administrator\Application Data\qeoywrpovv\impeifvsb.yp
Deletes FileC:\Documents and Settings\Administrator\Local Settings\Temp\000137C4_Rar\ngcstauj.exe
Deletes FileC:\Documents and Settings\Administrator\Local Settings\Temp\winlqld.exe
Deletes FileC:\Documents and Settings\Administrator\Local Settings\Temp\winjknhp.exe
Deletes FileC:\WINDOWS\system32\drivers\ppmnn.sys
Creates ProcessWATCHDOGPROC "C:\Documents and Settings\Administrator\Application Data\qeoywrpovv\impeifvsb.exe"
Creates MutexuxJLpe1m
Creates Mutexservices.exeM_616_
Creates Mutexalg.exeM_1844_
Creates Mutexsvchost.exeM_848_
Creates Mutexsvchost.exeM_800_
Creates Mutexlsass.exeM_628_
Creates Mutexngcstauj.exeM_3116_
Creates Mutexuserinit.exeM_240_
Creates Mutexspoolsv.exeM_1296_
Creates Mutexsvchost.exeM_1164_
Creates Mutexreader_sl.exeM_964_
Creates Mutexsvchost.exeM_1016_
Creates Mutexsvchost.exeM_1116_
Creates Mutexcsrss.exeM_548_
Creates Mutexsmss.exeM_500_
Creates Mutexwinlogon.exeM_572_
Creates Mutexexplorer.exeM_328_
Creates Mutexsvchost.exeM_1204_
Creates Muteximpeifvsb.exeM_3312_
Creates Mutexmonitor.exeM_1176_
Creates Serviceamsint32 - C:\WINDOWS\system32\drivers\ppmnn.sys
Starts ServiceIPFILTERDRIVER
Starts Serviceamsint32

Process
↳ C:\WINDOWS\system32\userinit.exe

Creates MutexuxJLpe1m
Creates Mutexuserinit.exeM_240_

Process
↳ C:\WINDOWS\Explorer.EXE

RegistryHKEY_CURRENT_USER\SessionInformation\ProgramCount ➝
NULL
Creates MutexuxJLpe1m
Creates Mutexexplorer.exeM_328_

Process
↳ C:\Program Files\Adobe\Acrobat 7.0\Reader\reader_sl.exe

Creates MutexuxJLpe1m
Creates Mutexreader_sl.exeM_964_

Process
↳ WATCHDOGPROC "C:\Documents and Settings\Administrator\Application Data\qeoywrpovv\impeifvsb.exe"

Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\000137C4_Rar\ngcstauj.exe
Creates Mutexngcstauj.exeM_3116_
Creates MutexuxJLpe1m

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Creates FileWMIDataDevice

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\System32\svchost.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\WBEM\CIMOM\List of event-active namespaces ➝
NULL
Creates FilePIPE\lsarpc
Creates FileC:\WINDOWS\system32\WBEM\Repository\$WinMgmt.CFG
Creates File\Device\Afd\Endpoint
Creates FileC:\WINDOWS\system32\WBEM\Logs\wbemess.log

Process
↳ C:\WINDOWS\system32\svchost.exe

Creates FileWMIDataDevice

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\system32\spoolsv.exe

RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝
7
RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝
NULL
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝
C:\WINDOWS\System32\spool\PRINTERS\\x00
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Print\Providers\LogonTime ➝
NULL
Creates FileWMIDataDevice
Creates FilePIPE\lsarpc

Process
↳ C:\WINDOWS\System32\alg.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Creates FileWMIDataDevice

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\System32\svchost.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\WBEM\CIMOM\List of event-active namespaces ➝
NULL
Creates FilePIPE\lsarpc
Creates FileC:\WINDOWS\system32\WBEM\Repository\$WinMgmt.CFG
Creates File\Device\Afd\Endpoint
Creates FileC:\WINDOWS\system32\WBEM\Logs\wbemess.log

Process
↳ C:\WINDOWS\system32\svchost.exe

Creates FileWMIDataDevice

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\system32\spoolsv.exe

RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝
7
RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝
NULL
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝
C:\WINDOWS\System32\spool\PRINTERS\\x00
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Print\Providers\LogonTime ➝
NULL
Creates FileWMIDataDevice
Creates FilePIPE\lsarpc

Process
↳ C:\WINDOWS\System32\alg.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Creates FileWMIDataDevice

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\System32\svchost.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\WBEM\CIMOM\List of event-active namespaces ➝
NULL
Creates FilePIPE\lsarpc
Creates FileC:\WINDOWS\system32\WBEM\Repository\$WinMgmt.CFG
Creates File\Device\Afd\Endpoint
Creates FileC:\WINDOWS\system32\WBEM\Logs\wbemess.log

Process
↳ C:\WINDOWS\system32\svchost.exe

Creates FileWMIDataDevice

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ C:\WINDOWS\system32\spoolsv.exe

RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝
7
RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝
NULL
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝
C:\WINDOWS\System32\spool\PRINTERS\\x00
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Print\Providers\LogonTime ➝
NULL
Creates FileWMIDataDevice
Creates FilePIPE\lsarpc

Process
↳ C:\WINDOWS\System32\alg.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Network Details:

DNSquietmaster.net
Type: A
216.21.239.197
DNSseasonmaster.net
Type: A
72.21.91.60
DNSrecordindustry.net
Type: A
66.96.163.138
DNSelectricindustry.net
Type: A
8.5.1.46
DNSstreetindustry.net
Type: A
184.168.221.32
DNStradeindustry.net
Type: A
66.151.181.33
DNSstreetbasket.net
Type: A
208.73.210.85
DNSbreadbasket.net
Type: A
72.52.4.90
DNSstreetdiscover.net
Type: A
DNStradediscover.net
Type: A
DNSbettercontinue.net
Type: A
DNSgathercontinue.net
Type: A
DNSbettermaster.net
Type: A
DNSgathermaster.net
Type: A
DNSbetterwonder.net
Type: A
DNSgatherwonder.net
Type: A
DNSbetterdiscover.net
Type: A
DNSgatherdiscover.net
Type: A
DNSfliercontinue.net
Type: A
DNSbreadcontinue.net
Type: A
DNSfliermaster.net
Type: A
DNSbreadmaster.net
Type: A
DNSflierwonder.net
Type: A
DNSbreadwonder.net
Type: A
DNSflierdiscover.net
Type: A
DNSbreaddiscover.net
Type: A
DNSquietcontinue.net
Type: A
DNSseasoncontinue.net
Type: A
DNSquietwonder.net
Type: A
DNSseasonwonder.net
Type: A
DNSquietdiscover.net
Type: A
DNSseasondiscover.net
Type: A
DNSagainstindustry.net
Type: A
DNSdoubtindustry.net
Type: A
DNSagainstbecame.net
Type: A
DNSdoubtbecame.net
Type: A
DNSagainstcontain.net
Type: A
DNSdoubtcontain.net
Type: A
DNSagainstbasket.net
Type: A
DNSdoubtbasket.net
Type: A
DNSnightindustry.net
Type: A
DNSdecideindustry.net
Type: A
DNSnightbecame.net
Type: A
DNSdecidebecame.net
Type: A
DNSnightcontain.net
Type: A
DNSdecidecontain.net
Type: A
DNSnightbasket.net
Type: A
DNSdecidebasket.net
Type: A
DNSlargeindustry.net
Type: A
DNScaptainindustry.net
Type: A
DNSlargebecame.net
Type: A
DNScaptainbecame.net
Type: A
DNSlargecontain.net
Type: A
DNScaptaincontain.net
Type: A
DNSlargebasket.net
Type: A
DNScaptainbasket.net
Type: A
DNSrecordbecame.net
Type: A
DNSelectricbecame.net
Type: A
DNSrecordcontain.net
Type: A
DNSelectriccontain.net
Type: A
DNSrecordbasket.net
Type: A
DNSelectricbasket.net
Type: A
DNSstreetbecame.net
Type: A
DNStradebecame.net
Type: A
DNSstreetcontain.net
Type: A
DNStradecontain.net
Type: A
DNStradebasket.net
Type: A
DNSbetterindustry.net
Type: A
DNSgatherindustry.net
Type: A
DNSbetterbecame.net
Type: A
DNSgatherbecame.net
Type: A
DNSbettercontain.net
Type: A
DNSgathercontain.net
Type: A
DNSbetterbasket.net
Type: A
DNSgatherbasket.net
Type: A
DNSflierindustry.net
Type: A
DNSbreadindustry.net
Type: A
DNSflierbecame.net
Type: A
DNSbreadbecame.net
Type: A
DNSfliercontain.net
Type: A
DNSbreadcontain.net
Type: A
DNSflierbasket.net
Type: A
DNSquietindustry.net
Type: A
DNSseasonindustry.net
Type: A
DNSquietbecame.net
Type: A
HTTP GEThttp://quietmaster.net/forum/search.php?email=lia_stancu66@yahoo.com&method=post
User-Agent:
HTTP GEThttp://seasonmaster.net/forum/search.php?email=lia_stancu66@yahoo.com&method=post
User-Agent:
HTTP GEThttp://recordindustry.net/forum/search.php?email=lia_stancu66@yahoo.com&method=post
User-Agent:
HTTP GEThttp://electricindustry.net/forum/search.php?email=lia_stancu66@yahoo.com&method=post
User-Agent:
HTTP GEThttp://streetindustry.net/forum/search.php?email=lia_stancu66@yahoo.com&method=post
User-Agent:
HTTP GEThttp://tradeindustry.net/forum/search.php?email=lia_stancu66@yahoo.com&method=post
User-Agent:
HTTP GEThttp://streetbasket.net/forum/search.php?email=lia_stancu66@yahoo.com&method=post
User-Agent:
HTTP GEThttp://breadbasket.net/forum/search.php?email=lia_stancu66@yahoo.com&method=post
User-Agent:
Flows TCP192.168.1.1:1037 ➝ 216.21.239.197:80
Flows TCP192.168.1.1:1038 ➝ 72.21.91.60:80
Flows TCP192.168.1.1:1039 ➝ 66.96.163.138:80
Flows TCP192.168.1.1:1040 ➝ 8.5.1.46:80
Flows TCP192.168.1.1:1041 ➝ 184.168.221.32:80
Flows TCP192.168.1.1:1042 ➝ 66.151.181.33:80
Flows TCP192.168.1.1:1043 ➝ 208.73.210.85:80
Flows TCP192.168.1.1:1045 ➝ 72.52.4.90:80

Raw Pcap
0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 6c69615f   h.php?email=lia_
0x00000020 (00032)   7374616e 63753636 40796168 6f6f2e63   stancu66@yahoo.c
0x00000030 (00048)   6f6d266d 6574686f 643d706f 73742048   om&method=post H
0x00000040 (00064)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000050 (00080)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000060 (00096)   3a20636c 6f73650d 0a486f73 743a2071   : close..Host: q
0x00000070 (00112)   75696574 6d617374 65722e6e 65740d0a   uietmaster.net..
0x00000080 (00128)   0d0a                                  ..

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 6c69615f   h.php?email=lia_
0x00000020 (00032)   7374616e 63753636 40796168 6f6f2e63   stancu66@yahoo.c
0x00000030 (00048)   6f6d266d 6574686f 643d706f 73742048   om&method=post H
0x00000040 (00064)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000050 (00080)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000060 (00096)   3a20636c 6f73650d 0a486f73 743a2073   : close..Host: s
0x00000070 (00112)   6561736f 6e6d6173 7465722e 6e65740d   easonmaster.net.
0x00000080 (00128)   0a0d0a                                ...

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 6c69615f   h.php?email=lia_
0x00000020 (00032)   7374616e 63753636 40796168 6f6f2e63   stancu66@yahoo.c
0x00000030 (00048)   6f6d266d 6574686f 643d706f 73742048   om&method=post H
0x00000040 (00064)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000050 (00080)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000060 (00096)   3a20636c 6f73650d 0a486f73 743a2072   : close..Host: r
0x00000070 (00112)   65636f72 64696e64 75737472 792e6e65   ecordindustry.ne
0x00000080 (00128)   740d0a0d 0a                           t....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 6c69615f   h.php?email=lia_
0x00000020 (00032)   7374616e 63753636 40796168 6f6f2e63   stancu66@yahoo.c
0x00000030 (00048)   6f6d266d 6574686f 643d706f 73742048   om&method=post H
0x00000040 (00064)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000050 (00080)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000060 (00096)   3a20636c 6f73650d 0a486f73 743a2065   : close..Host: e
0x00000070 (00112)   6c656374 72696369 6e647573 7472792e   lectricindustry.
0x00000080 (00128)   6e65740d 0a0d0a                       net....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 6c69615f   h.php?email=lia_
0x00000020 (00032)   7374616e 63753636 40796168 6f6f2e63   stancu66@yahoo.c
0x00000030 (00048)   6f6d266d 6574686f 643d706f 73742048   om&method=post H
0x00000040 (00064)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000050 (00080)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000060 (00096)   3a20636c 6f73650d 0a486f73 743a2073   : close..Host: s
0x00000070 (00112)   74726565 74696e64 75737472 792e6e65   treetindustry.ne
0x00000080 (00128)   740d0a0d 0a0d0a                       t......

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 6c69615f   h.php?email=lia_
0x00000020 (00032)   7374616e 63753636 40796168 6f6f2e63   stancu66@yahoo.c
0x00000030 (00048)   6f6d266d 6574686f 643d706f 73742048   om&method=post H
0x00000040 (00064)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000050 (00080)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000060 (00096)   3a20636c 6f73650d 0a486f73 743a2074   : close..Host: t
0x00000070 (00112)   72616465 696e6475 73747279 2e6e6574   radeindustry.net
0x00000080 (00128)   0d0a0d0a 0a0d0a                       .......

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 6c69615f   h.php?email=lia_
0x00000020 (00032)   7374616e 63753636 40796168 6f6f2e63   stancu66@yahoo.c
0x00000030 (00048)   6f6d266d 6574686f 643d706f 73742048   om&method=post H
0x00000040 (00064)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000050 (00080)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000060 (00096)   3a20636c 6f73650d 0a486f73 743a2073   : close..Host: s
0x00000070 (00112)   74726565 74626173 6b65742e 6e65740d   treetbasket.net.
0x00000080 (00128)   0a0d0a0a 0a0d0a                       .......

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 6c69615f   h.php?email=lia_
0x00000020 (00032)   7374616e 63753636 40796168 6f6f2e63   stancu66@yahoo.c
0x00000030 (00048)   6f6d266d 6574686f 643d706f 73742048   om&method=post H
0x00000040 (00064)   5454502f 312e300d 0a416363 6570743a   TTP/1.0..Accept:
0x00000050 (00080)   202a2f2a 0d0a436f 6e6e6563 74696f6e    */*..Connection
0x00000060 (00096)   3a20636c 6f73650d 0a486f73 743a2062   : close..Host: b
0x00000070 (00112)   72656164 6261736b 65742e6e 65740d0a   readbasket.net..
0x00000080 (00128)   0d0a0a0a 0a0d0a                       .......


Strings
.
-E-
-0
-0010+-0
0
-0
CC00-+ 
.
.
-e-
. 
\
 
00
.
:\
:..
...........?- 
0
0
0
0
-
.u.
V..
:
a.

ANAYA
                                 H
         (((((                  H
         h((((                  H
jjjjh
jjjjj
KERNEL32.DLL
mscoree.dll
(null)
                          
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
0A@@Ju
+0KnQlP
0Qn6Z^
0SSSSS
0WWWWW
1"8M4?
1{N>k=
1#QNAN
1#SNAN
3oq|LY<
3=qX,$
4?FIU,
5JVG?R
5$S0pK2
6bZuo1
{=6|H@
6i}`j`
6<i{ki
6xK{v.)[
8D$Bt@
8VVVVV
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
ADVAPI32.dll
Aiq0m>
a>$jn1w
An application has made an attempt to load the C runtime library incorrectly.
As1 ~$
<at9<rt,<wt
- Attempt to initialize the CRT more than once.
- Attempt to use MSIL code from this assembly during native code initialization
August
.?AVbad_alloc@std@@
.?AVbad_exception@std@@
.?AVexception@std@@
.?AVlength_error@std@@
.?AVlogic_error@std@@
.?AVout_of_range@std@@
.?AVtype_info@@
B3xNC&Ta
|$B8\$A
bad allocation
bad exception
 Base Class Array'
 Base Class Descriptor at (
__based(
BeginPaint
	`bezQ
Bj%Ucu
^BQb$,Y
b\v<i'*G
-c(5*D
C7#FlJ&
__cdecl
Cf#)RN
 Class Hierarchy Descriptor'
CloseHandle
__clrcall
C"[$ma"g
CompareStringA
CompareStringW
 Complete Object Locator'
CONOUT$
`copy constructor closure'
CopyFileA
CorExitProcess
?@cQKy]
CreateDirectoryA
CreateEventA
CreateFileA
CreateIconFromResourceEx
CreateProcessA
CreateStreamOnHGlobal
CreateThread
CreateToolhelp32Snapshot
CreateWindowExA
- CRT not initialized
D$,]_^[
D$$_^][
D$\_^[
D$4h [B
D$8PQV
D$8PQVW
Dc5oLs?
dddd, MMMM dd, yyyy
D$dPVf
DD/{qP
December
DecodePointer
`default constructor closure'
DefWindowProcA
 delete
 delete[]
Delete
DeleteCriticalSection
D$h+D$`
D$,htGB
DispatchMessageA
D$l+D$d+
dN,c?[
DOMAIN error
DPtoLP
D$(PVf
D$\QRPS
DxYW:d
`dynamic atexit destructor for '
`dynamic initializer for '
e0%'i22
`eh vector constructor iterator'
`eh vector copy constructor iterator'
`eh vector destructor iterator'
`eh vector vbase constructor iterator'
`eh vector vbase copy constructor iterator'
EncodePointer
EndPaint
EnterCriticalSection
ExitProcess
_ezYV)
__fastcall
fATx"}_CN	
February
ffxuNa
Fh=`gB
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
- floating point support not loaded
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
FlushFileBuffers
f\NF\<
ForceRemove
FreeEnvironmentStringsA
FreeEnvironmentStringsW
Friday
^F<-uB
\^g3WSuo
GAIsProcessorFeaturePresent
GCRK?H[
GDI32.dll
;g[!EL
GetACP
GetActiveWindow
GetCommandLineA
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
GetCPInfo
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDesktopWindow
GetDeviceCaps
GetDriveTypeA
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetFileSize
GetFileType
GetFullPathNameA
GetLastActivePopup
GetLastError
GetLocaleInfoA
GetMapMode
GetMessageA
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetProcessWindowStation
GetStartupInfoA
GetStdHandle
GetStockObject
GetStringTypeA
GetStringTypeW
GetSystemTimeAsFileTime
GetTempPathA
GetTickCount
GetTimeZoneInformation
GetTitleBarInfo
GetUserObjectInformationA
GetWindowDC
GetWindowRect
gG:5RBc
gHf0f	
GJ>mkH
Gl-"HX
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
gP ni$
GQXkgJ
G+w.K]
Gwv*O\
`h````
)H-%,	1l	
HeapAlloc
HeapCreate
HeapFree
HeapReAlloc
HeapSize
;h~H].5v/
`h`hhh
HH:mm:ss
HHtXHHt
+= h.T_r
"hV*Zn
I3dr@e{8q
I7Z8xF
Ia}M>&
>If90t
IJlS]i%$W$
ijp8W'
InitializeCriticalSectionAndSpinCount
InterlockedDecrement
InterlockedIncrement
InvalidateRect
invalid string position
IQ]qAm
IsDebuggerPresent
IsValidCodePage
~(+?!J
(J4J7+l
JanFebMarAprMayJunJulAugSepOctNovDec
January
+,$&Jg1
-jg?VTCPM$
j$hHEB
-((/%JiB[
j@j ^V
J\{pZ_
j"^SSSSS
jWeb/q
K2xKndP
K_epHN
KERNEL32
KERNEL32.dll
_kNc2n]*[R
#\KQ>xb
KYxSIhU
]#L	7~F
L$8QRVWW
LCMapStringA
LCMapStringW
LeaveCriticalSection
lH)A1@R
!Li:Vc
L$l_^][3
LoadCursorA
LoadKeyboardLayoutA
LoadLibraryA
`local static guard'
`local static thread guard'
`local vftable'
`local vftable constructor closure'
LPtoDP
L$ QUV
L$TQVPW
L$@VPQ
Lvw\= 
M=9vvL
`managed vector constructor iterator'
`managed vector copy constructor iterator'
`managed vector destructor iterator'
:MB)UGx[
MessageBoxA
Microsoft Visual C++ Runtime Library
Mk+)|M
ML]m6C
MM/dd/yy
	*mo5\
Monday
MoveWindow
mSuL@@{
MulDiv
MultiByteToWideChar
 new[]
NjW}6P
:n-'KE
Nm'lC)
NoRemove
- not enough space for arguments
- not enough space for environment
- not enough space for locale information
- not enough space for lowio initialization
- not enough space for _onexit/atexit table
- not enough space for stdio initialization
- not enough space for thread data
November
N	p3z2
`~,nrt"
(null)
O`:&_,
October
ole32.dll
OLEAUT32.dll
`omni callsig'
OpenProcess
operator
ou%0tc|
P7sr>),
__pascal
P={au{
PB0uJf
)PK|ic
`placement delete closure'
`placement delete[] closure'
Please contact the application's support team for more information.
P=Nez7
PostQuitMessage
PPPPPPPP
Process32First
Process32Next
Program: 
<program name unknown>
__ptr64
{Pul\B
- pure virtual function call
q"1O^"1
q}>CzK
q*ep:N
QMSqD&eWi
/=QoYR
QQSVWd
QueryPerformanceCounter
@Q<U H
Q,V,PTN
QX2DaoQ
r9YR]u
RaiseException
.rdata
.RduBCr
ReadFile
RectInRegion
RegCloseKey
RegisterClassExA
RegOpenKeyA
RegSetValueExA
.Re(o9w
__restrict
R/jpziL
^+r>K*R
.Ro" u
R,QXG]37
r'}_SV
RtlUnwind
runtime error 
Runtime Error!
Saturday
`scalar deleting destructor'
September
SetEndOfFile
SetEnvironmentVariableA
SetEvent
SetFileAttributesA
SetFilePointer
SetFocus
SetHandleCount
SetLastError
SetMapMode
SetSecurityDescriptorOwner
SetStdHandle
SetSysColors
SetUnhandledExceptionFilter
SetupComm
SetWindowTextA
ShowWindow
SING error
Si#vIF
`SmS/h
s[S;7|G;w
ssd!}0
^SSSSS
s)t`#4
__stdcall
`string'
string too long
Sunday
SunMonTueWedThuFriSat
T$0RPj
t$0WSQ3
T$8RUVPP
*tB[dO
T$DRPQ
te$lbhT
TerminateProcess
tGHt.Ht&
TH/g4<
+t HHt
This application has requested the Runtime to terminate it in an unusual way.
__thiscall
This indicates a bug in your application.
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
!This program cannot be run in DOS mode.
Thursday
< tK<	tG
TLOSS error
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
<\tM</tI
to=xoB
tR99u2
TranslateMessage
T$(RWf
T$@SRf
t"SS9]
<+t(<-t$:
t$`;t$
t$<"u	3
Tuesday
;t$,v-
T$ VSj
Tw=?;oVB
t$,WPR
t+WWVPV
tyO^Dg
 Type Descriptor'
`typeof'
>:u8FV
`udt returning'
ujVWj4h
u>jWhR
U*=LD/+
- unable to initialize heap
- unable to open console device
__unaligned
- unexpected heap error
- unexpected multithread lock error
UnhandledExceptionFilter
UNICODE
Unknown exception
UpdateWindow
UQPXY]Y[
URPQQh<
USER32.dll
USER32.DLL
u[SSSP
UTF-16LE
v6i|J|
`vbase destructor'
`vbtable'
`vcall'
`vector constructor iterator'
`vector copy constructor iterator'
`vector deleting destructor'
`vector destructor iterator'
`vector vbase constructor iterator'
`vector vbase copy constructor iterator'
`vftable'
V]>hjZ
VirtualAlloc
`virtual displacement map'
VirtualFree
VlCtg(3
v}nAeJ
v	N+D$
-vr\ W`
_VVVVV
VVVVVQRSSj
WaitForSingleObject
Wednesday
WideCharToMultiByte
WriteConsoleA
WriteConsoleW
WriteFile
WS2_32.dll
_w:S?6o;
^WWWWW
\x23au
xbu'?\
X~E9'$]
xP 3@$
xppwpp
xpxxxx
xtb9(].
<xtX<XtT
=xw(8:{
X;zPQlQ
{yhct[
Y;=hmB
-/y"KH
{Yq*d^I
>=Yt1j
zS0h	D