Analysis Date2014-10-14 16:17:11
MD5400bdac6529bd283cf83fa63b1b9fdca
SHA1c475c7d2128af2a5f193a6996fd393ebf66754ce

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: b04cc4a6d18e7d4369c9a4b6ff5510bb sha1: 3009109153ea17c7eb73aec267b07db043025905 size: 121344
Section.rdata md5: a6c729549db78a21d20755ef24417644 sha1: e522ae02a564cda4debb873d695b604c18559ad2 size: 16384
Section.data md5: 3c6490958fa6fd21e3ea3cbc22e34833 sha1: e28544a75a22ebe661002dfc95352174ec8b340c size: 17408
Timestamp2014-01-22 06:52:29
PackerMicrosoft Visual C++ ?.?
PEhash2f856ae3c4c77af7c77046bedd37d2a769459314
IMPhash011178a7126bf74ccd60d03c55e6eb36
AV360 SafeGen:Variant.Zusy.82682
AVAd-AwareGen:Variant.Zusy.82682
AVAlwil (avast)Downloader-UVI [Trj]
AVArcabit (arcavir)no_virus
AVAuthentiumW32/Agent.NK2.gen!Eldorado
AVAvira (antivir)TR/Crypt.ZPACK.Gen8
AVBullGuardGen:Variant.Zusy.82682
AVCA (E-Trust Ino)no_virus
AVCAT (quickheal)no_virus
AVClamAVno_virus
AVDr. Webno_virus
AVEmsisoftGen:Variant.Zusy.82682
AVEset (nod32)Win32/Agent.VNC
AVFortinetW32/Agent.VNC!tr
AVFrisk (f-prot)no_virus
AVF-SecureGen:Variant.Zusy.82682
AVGrisoft (avg)Generic_r.DMA
AVIkarusTrojan.FBLock
AVK7no_virus
AVKasperskyTrojan.Win32.Generic:Trojan.Win32.PEF.pf.silent.342863:Trojan.Win32.PEF.pf.silent.347637:Trojan.Win32.PEF.pf.silent.348577:Trojan.Win32.PEF.pf.silent.349247:Trojan.Win32.PEF.pf.silent.349979:Trojan.Win32.PEF.pf.silent.375505:Trojan.Win32.PEF.pf.silent.376163:Trojan.Win32.PEF.pf.silent.377057:Trojan.Win32.PEF.pf.silent.377789:Trojan.Win32.PEF.pf.silent.378627:Trojan.Win32.PEF.pf.silent.379268:Trojan.Win32.PEF.pf.silent.380179:Trojan.Win32.PEF.pf.silent.380996:Trojan.Win32.PEF.pf.silent.433356:Trojan.Win32.PEF.pf.silent.453058
AVMalwareBytesTrojan.Agent
AVMcafeeGeneric-FAOV!400BDAC6529B
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort
AVMicroWorld (escan)Gen:Variant.Zusy.82682
AVNormanwinpe/Troj_Generic.WEUFH
AVRisingno_virus
AVSophosTroj/Bckdr-RRM
AVSymantecno_virus
AVTrend Microno_virus
AVVirusBlokAda (vba32)no_virus
AVYara APTno_virus
AVZillya!no_virus

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Tracking COM Procedure Function Redirector ➝
C:\Documents and Settings\Administrator\Application Data\pepjayefehujmky\jvefcpfeqohr.exe
Creates FileC:\Documents and Settings\Administrator\Application Data\pepjayefehujmky\jvefcpfeqohr.exe
Creates ProcessC:\Documents and Settings\Administrator\Application Data\pepjayefehujmky\jvefcpfeqohr.exe

Process
↳ C:\Documents and Settings\Administrator\Application Data\pepjayefehujmky\jvefcpfeqohr.exe

Creates FileC:\Documents and Settings\Administrator\Application Data\pepjayefehujmky\jvefcpfeqohr.j0
Creates File\Device\Afd\Endpoint
Creates FileC:\Documents and Settings\Administrator\Application Data\pepjayefehujmky\mrrqumvyshut.exe
Creates ProcessWATCHDOGPROC "C:\Documents and Settings\Administrator\Application Data\pepjayefehujmky\jvefcpfeqohr.exe"

Process
↳ WATCHDOGPROC "C:\Documents and Settings\Administrator\Application Data\pepjayefehujmky\jvefcpfeqohr.exe"

Network Details:

DNSmorningbright.net
Type: A
216.185.144.185
DNSthinkready.net
Type: A
208.109.181.72
DNSthinkpeople.net
Type: A
50.63.202.54
DNScollegeready.net
Type: A
192.254.214.203
DNSchiefpeople.net
Type: A
50.63.202.52
DNScollegepeople.net
Type: A
50.87.149.136
DNSthinkinside.net
Type: A
DNSpresentinside.net
Type: A
DNSchiefinstead.net
Type: A
DNScollegeinstead.net
Type: A
DNSchiefexplain.net
Type: A
DNScollegeexplain.net
Type: A
DNSchiefbright.net
Type: A
DNScollegebright.net
Type: A
DNSchiefinside.net
Type: A
DNScollegeinside.net
Type: A
DNSofteninstead.net
Type: A
DNSaloneinstead.net
Type: A
DNSoftenexplain.net
Type: A
DNSaloneexplain.net
Type: A
DNSoftenbright.net
Type: A
DNSalonebright.net
Type: A
DNSofteninside.net
Type: A
DNSaloneinside.net
Type: A
DNSmiddleinstead.net
Type: A
DNStwelveinstead.net
Type: A
DNSmiddleexplain.net
Type: A
DNStwelveexplain.net
Type: A
DNSmiddlebright.net
Type: A
DNStwelvebright.net
Type: A
DNSmiddleinside.net
Type: A
DNStwelveinside.net
Type: A
DNSratherinstead.net
Type: A
DNSmorninginstead.net
Type: A
DNSratherexplain.net
Type: A
DNSmorningexplain.net
Type: A
DNSratherbright.net
Type: A
DNSratherinside.net
Type: A
DNSmorninginside.net
Type: A
DNSstrangeinstead.net
Type: A
DNShistoryinstead.net
Type: A
DNSstrangeexplain.net
Type: A
DNShistoryexplain.net
Type: A
DNSstrangebright.net
Type: A
DNShistorybright.net
Type: A
DNSstrangeinside.net
Type: A
DNShistoryinside.net
Type: A
DNSamountinstead.net
Type: A
DNSweatherinstead.net
Type: A
DNSamountexplain.net
Type: A
DNSweatherexplain.net
Type: A
DNSamountbright.net
Type: A
DNSweatherbright.net
Type: A
DNSamountinside.net
Type: A
DNSweatherinside.net
Type: A
DNSthickinstead.net
Type: A
DNSclassinstead.net
Type: A
DNSthickexplain.net
Type: A
DNSclassexplain.net
Type: A
DNSthickbright.net
Type: A
DNSclassbright.net
Type: A
DNSthickinside.net
Type: A
DNSclassinside.net
Type: A
DNSpresentready.net
Type: A
DNSthinkbrown.net
Type: A
DNSpresentbrown.net
Type: A
DNSpresentpeople.net
Type: A
DNSthinkdaughter.net
Type: A
DNSpresentdaughter.net
Type: A
DNSchiefready.net
Type: A
DNSchiefbrown.net
Type: A
DNScollegebrown.net
Type: A
DNSchiefdaughter.net
Type: A
DNScollegedaughter.net
Type: A
DNSoftenready.net
Type: A
DNSaloneready.net
Type: A
DNSoftenbrown.net
Type: A
DNSalonebrown.net
Type: A
DNSoftenpeople.net
Type: A
DNSalonepeople.net
Type: A
DNSoftendaughter.net
Type: A
DNSalonedaughter.net
Type: A
DNSmiddleready.net
Type: A
DNStwelveready.net
Type: A
DNSmiddlebrown.net
Type: A
HTTP GEThttp://morningbright.net/forum/search.php?email=orzeae@yahoo.fr&method=post
User-Agent:
HTTP GEThttp://thinkready.net/forum/search.php?email=orzeae@yahoo.fr&method=post
User-Agent:
HTTP GEThttp://thinkpeople.net/forum/search.php?email=orzeae@yahoo.fr&method=post
User-Agent:
HTTP GEThttp://collegeready.net/forum/search.php?email=orzeae@yahoo.fr&method=post
User-Agent:
HTTP GEThttp://chiefpeople.net/forum/search.php?email=orzeae@yahoo.fr&method=post
User-Agent:
HTTP GEThttp://collegepeople.net/forum/search.php?email=orzeae@yahoo.fr&method=post
User-Agent:
Flows TCP192.168.1.1:1031 ➝ 216.185.144.185:80
Flows TCP192.168.1.1:1032 ➝ 208.109.181.72:80
Flows TCP192.168.1.1:1033 ➝ 50.63.202.54:80
Flows TCP192.168.1.1:1034 ➝ 192.254.214.203:80
Flows TCP192.168.1.1:1035 ➝ 50.63.202.52:80
Flows TCP192.168.1.1:1036 ➝ 50.87.149.136:80

Raw Pcap
0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 6f727a65   h.php?email=orze
0x00000020 (00032)   61654079 61686f6f 2e667226 6d657468   ae@yahoo.fr&meth
0x00000030 (00048)   6f643d70 6f737420 48545450 2f312e30   od=post HTTP/1.0
0x00000040 (00064)   0d0a4163 63657074 3a202a2f 2a0d0a43   ..Accept: */*..C
0x00000050 (00080)   6f6e6e65 6374696f 6e3a2063 6c6f7365   onnection: close
0x00000060 (00096)   0d0a486f 73743a20 6d6f726e 696e6762   ..Host: morningb
0x00000070 (00112)   72696768 742e6e65 740d0a0d 0a         right.net....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 6f727a65   h.php?email=orze
0x00000020 (00032)   61654079 61686f6f 2e667226 6d657468   ae@yahoo.fr&meth
0x00000030 (00048)   6f643d70 6f737420 48545450 2f312e30   od=post HTTP/1.0
0x00000040 (00064)   0d0a4163 63657074 3a202a2f 2a0d0a43   ..Accept: */*..C
0x00000050 (00080)   6f6e6e65 6374696f 6e3a2063 6c6f7365   onnection: close
0x00000060 (00096)   0d0a486f 73743a20 7468696e 6b726561   ..Host: thinkrea
0x00000070 (00112)   64792e6e 65740d0a 0d0a0a0d 0a         dy.net.......

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 6f727a65   h.php?email=orze
0x00000020 (00032)   61654079 61686f6f 2e667226 6d657468   ae@yahoo.fr&meth
0x00000030 (00048)   6f643d70 6f737420 48545450 2f312e30   od=post HTTP/1.0
0x00000040 (00064)   0d0a4163 63657074 3a202a2f 2a0d0a43   ..Accept: */*..C
0x00000050 (00080)   6f6e6e65 6374696f 6e3a2063 6c6f7365   onnection: close
0x00000060 (00096)   0d0a486f 73743a20 7468696e 6b70656f   ..Host: thinkpeo
0x00000070 (00112)   706c652e 6e65740d 0a0d0a0d 0a         ple.net......

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 6f727a65   h.php?email=orze
0x00000020 (00032)   61654079 61686f6f 2e667226 6d657468   ae@yahoo.fr&meth
0x00000030 (00048)   6f643d70 6f737420 48545450 2f312e30   od=post HTTP/1.0
0x00000040 (00064)   0d0a4163 63657074 3a202a2f 2a0d0a43   ..Accept: */*..C
0x00000050 (00080)   6f6e6e65 6374696f 6e3a2063 6c6f7365   onnection: close
0x00000060 (00096)   0d0a486f 73743a20 636f6c6c 65676572   ..Host: colleger
0x00000070 (00112)   65616479 2e6e6574 0d0a0d0a 0a         eady.net.....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 6f727a65   h.php?email=orze
0x00000020 (00032)   61654079 61686f6f 2e667226 6d657468   ae@yahoo.fr&meth
0x00000030 (00048)   6f643d70 6f737420 48545450 2f312e30   od=post HTTP/1.0
0x00000040 (00064)   0d0a4163 63657074 3a202a2f 2a0d0a43   ..Accept: */*..C
0x00000050 (00080)   6f6e6e65 6374696f 6e3a2063 6c6f7365   onnection: close
0x00000060 (00096)   0d0a486f 73743a20 63686965 6670656f   ..Host: chiefpeo
0x00000070 (00112)   706c652e 6e65740d 0a0d0a0a 0a         ple.net......

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 6f727a65   h.php?email=orze
0x00000020 (00032)   61654079 61686f6f 2e667226 6d657468   ae@yahoo.fr&meth
0x00000030 (00048)   6f643d70 6f737420 48545450 2f312e30   od=post HTTP/1.0
0x00000040 (00064)   0d0a4163 63657074 3a202a2f 2a0d0a43   ..Accept: */*..C
0x00000050 (00080)   6f6e6e65 6374696f 6e3a2063 6c6f7365   onnection: close
0x00000060 (00096)   0d0a486f 73743a20 636f6c6c 65676570   ..Host: collegep
0x00000070 (00112)   656f706c 652e6e65 740d0a0d 0a         eople.net....


Strings
.
-E-
-0
-0010+-0
0
-0CC
.00-+ 
.
-e-
. 
\
 
00
.
:\
:..
...........?- 
0
0
0
0
-
.
.
{
.u
E(null)
                                 H
         (((((                  H
         h((((                  H
jjjjh
KERNEL32.DLL
mscoree.dll
                          
\$ _^[
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
0A@@Ju
0SSSSS
0WWWWW
1#QNAN
1#SNAN
3dKG,?
6UayNr
\$8j~Rf
8VVVVV
\$@93r
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
AddAuditAccessAce
ADVAPI32.dll
An application has made an attempt to load the C runtime library incorrectly.
AngleArc
aot[uwhr
<at9<rt,<wt
- Attempt to initialize the CRT more than once.
- Attempt to use MSIL code from this assembly during native code initialization
August
.?AVbad_alloc@std@@
.?AVbad_exception@std@@
.?AVexception@std@@
.?AVlength_error@std@@
.?AVlogic_error@std@@
.?AVout_of_range@std@@
.?AVtype_info@@
bad allocation
bad exception
 Base Class Array'
 Base Class Descriptor at (
__based(
BeginPaint
Bx'v!iZ0
CancelDeviceWakeupRequest
__cdecl
 Class Hierarchy Descriptor'
CloseHandle
__clrcall
CompareStringA
CompareStringW
 Complete Object Locator'
CONOUT$
`copy constructor closure'
CopyFileA
CorExitProcess
CreateDirectoryA
CreateEventA
CreateFileA
CreateIconFromResourceEx
CreateProcessA
CreateStreamOnHGlobal
CreateThread
CreateToolhelp32Snapshot
CreateWindowExA
- CRT not initialized
D$ _^[
D$0SVW
d$4jZW
D$8P^@
@.data
dddd, MMMM dd, yyyy
D$\+D$T
D$`+D$X+
December
DecodePointer
`default constructor closure'
DefWindowProcA
 delete
 delete[]
Delete
DeleteCriticalSection
D$h_^[3
DispatchMessageA
dJ	$	'
D$LQWRPS
DOMAIN error
D$P;D$
D$(Pj 
DPtoLP
D$XPQV
D$XPQVWW
D$XPWVS
`dynamic atexit destructor for '
`dynamic initializer for '
`eh vector constructor iterator'
`eh vector copy constructor iterator'
`eh vector destructor iterator'
`eh vector vbase constructor iterator'
`eh vector vbase copy constructor iterator'
]}`+"EK{
EncodePointer
EndPaint
EnterCriticalSection
eWN8;R
ExitProcess
__fastcall
February
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
FJI\7s~W3kz
- floating point support not loaded
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
FlushFileBuffers
ForceRemove
FreeEnvironmentStringsA
FreeEnvironmentStringsW
Friday
^F<-uB
GAIsProcessorFeaturePresent
GDI32.dll
GdiTransparentBlt
GetACP
GetActiveWindow
GetCommandLineA
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
GetCPInfo
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDesktopWindow
GetDeviceCaps
GetDriveTypeA
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetFileSize
GetFileType
GetFullPathNameA
GetGlyphIndicesA
GetLastActivePopup
GetLastError
GetLocaleInfoA
GetMapMode
GetMessageA
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetProcessWindowStation
GetStartupInfoA
GetStdHandle
GetStockObject
GetStringTypeA
GetStringTypeW
GetSystemTimeAsFileTime
GetTempPathA
GetTickCount
GetTimeZoneInformation
GetTitleBarInfo
GetUserObjectInformationA
GetWindowDC
GetWindowRect
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
gq|bmmiPgx
gU4	#])
`h````
HeapAlloc
HeapCreate
HeapFree
HeapLock
HeapReAlloc
HeapSize
`h`hhh
HH:mm:ss
HHtXHHt
-h?}lj
Ia~tz	
>If90t
InitializeCriticalSectionAndSpinCount
InterlockedDecrement
InterlockedIncrement
InvalidateRect
invalid string position
IsDebuggerPresent
IsValidCodePage
J<4A%m
\$ j4Pf
JanFebMarAprMayJunJulAugSepOctNovDec
January
j hdZB
j,hp B
%$j/ic
j@j ^V
j"^SSSSS
#"*jxN
KERNEL32
KERNEL32.dll
LCMapStringA
LCMapStringW
LeaveCriticalSection
LoadCursorA
LoadCursorFromFileA
LoadLibraryA
`local static guard'
`local static thread guard'
`local vftable'
`local vftable constructor closure'
Lpfn&8
LPtoDP
L$(Qj 
L$@QRP
L$ QUV
L$@RPQ
L$XQRV
L$XQRVPP
`managed vector constructor iterator'
`managed vector copy constructor iterator'
`managed vector destructor iterator'
MessageBoxA
Microsoft Visual C++ Runtime Library
MM/dd/yy
Monday
MoveWindow
MulDiv
MultiByteToWideChar
 new[]
NoRemove
- not enough space for arguments
- not enough space for environment
- not enough space for locale information
- not enough space for lowio initialization
- not enough space for _onexit/atexit table
- not enough space for stdio initialization
- not enough space for thread data
November
(null)
_O8zpb
October
ole32.dll
OLEAUT32.dll
`omni callsig'
OpenProcess
operator
__pascal
`placement delete closure'
`placement delete[] closure'
Please contact the application's support team for more information.
PostQuitMessage
PPPPPPPP
Process32First
Process32Next
Program: 
<program name unknown>
__ptr64
PulseEvent
- pure virtual function call
QQSVWd
QueryPerformanceCounter
Q_w5GkELT
q{ZR:,l
RaiseException
`.rdata
ReadFile
RegCloseKey
RegisterClassExA
RegOpenKeyA
RegSetValueExA
__restrict
RtlUnwind
runtime error 
Runtime Error!
Rw:,)8
Saturday
`scalar deleting destructor'
September
SetEndOfFile
SetEnvironmentVariableA
SetEvent
SetFileAttributesA
SetFilePointer
SetFocus
SetHandleCount
SetLastError
SetMapMode
SetStdHandle
SetUnhandledExceptionFilter
SetWindowTextA
ShowWindow
SING error
s[S;7|G;w
^SSSSS
__stdcall
`string'
string too long
Sunday
SunMonTueWedThuFriSat
t$8WPR
TerminateProcess
/&tGA*
tGHt.Ht&
+t HHt
This application has requested the Runtime to terminate it in an unusual way.
__thiscall
This indicates a bug in your application.
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
!This program cannot be run in DOS mode.
T$HRVPW
Thursday
	TK@6y
< tK<	tG
TLOSS error
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
<\tM</tI
T$PSVf
tR99u2
TranslateMessage
T$,RVVj
t"SS9]
<+t(<-t$:
t$<"u	3
Tuesday
;t$,v-
t$(WSPVj
t+WWVPV
T$XQPR
T$XRPVQ
T$XRSVPP
T$XRWV
 Type Descriptor'
`typeof'
>:u8FV
uBhALA
`udt returning'
uL9=x}B
- unable to initialize heap
- unable to open console device
__unaligned
- unexpected heap error
- unexpected multithread lock error
UnhandledExceptionFilter
UNICODE
Unknown exception
UpdateWindow
UQPXY]Y[
URPQQh
USER32.dll
USER32.DLL
UserHandleGrantAccess
u[SSSP
UTF-16LE
`vbase destructor'
`vbtable'
`vcall'
`vector constructor iterator'
`vector copy constructor iterator'
`vector deleting destructor'
`vector destructor iterator'
`vector vbase constructor iterator'
`vector vbase copy constructor iterator'
`vftable'
VirtualAlloc
`virtual displacement map'
VirtualFree
v	N+D$
_VVVVV
VVVVVQRSSj
WaitForSingleObject
W~'Bw4
Wednesday
WideCharToMultiByte
WriteConsoleA
WriteConsoleW
WriteFile
WS2_32.dll
^WWWWW
xppwpp
xpxxxx
<xtX<XtT
>=Yt1j
;zbMOhb
zU[b$g-1