Analysis Date2015-01-16 22:44:45
MD5039ad62f27d0484917eaa51deda0be7e
SHA1ccc3227cf47a2b5e7f11801b8df7eaec3f1e0106

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: 8761dc517367a345d2886e187ff97db7 sha1: 5caf873f624620f4157bd05f3981df85d1248812 size: 119296
Section.rdata md5: 30e74fb52081f772bcb6bf5dd9ecf465 sha1: 959095b865dab6644b579a141b0855cd19ced580 size: 16384
Section.data md5: 97448f2b48b5dae138184ee59136a596 sha1: cf6f5b4cbc4de67db02155831ef83440ff0eb2e7 size: 16896
Timestamp2014-01-22 06:31:09
PackerMicrosoft Visual C++ ?.?
PEhash697d767c5edf620140bf18287f022d0708b26ab9
IMPhash56575e976bb8eb13965a2752661239b7
AV360 Safeno_virus
AVAd-AwareGen:Variant.Zusy.82682
AVAlwil (avast)Downloader-UVI [Trj]
AVArcabit (arcavir)Gen:Variant.Zusy.82682
AVAuthentiumW32/Agent.NK2.gen!Eldorado
AVAvira (antivir)no_virus
AVBullGuardGen:Variant.Zusy.82682
AVCA (E-Trust Ino)no_virus
AVCAT (quickheal)no_virus
AVClamAVno_virus
AVDr. Webno_virus
AVEmsisoftGen:Variant.Zusy.82682
AVEset (nod32)Win32/Agent.VNC
AVFortinetW32/Agent.VNC!tr
AVFrisk (f-prot)no_virus
AVF-SecureGen:Variant.Zusy.82682
AVGrisoft (avg)Generic_r.DMA
AVIkarusTrojan.FBLock
AVK7no_virus
AVKasperskyTrojan.Win32.Generic:Trojan.Win32.PEF.pf.silent.342863:Trojan.Win32.PEF.pf.silent.347637:Trojan.Win32.PEF.pf.silent.348577:Trojan.Win32.PEF.pf.silent.349247:Trojan.Win32.PEF.pf.silent.349979:Trojan.Win32.PEF.pf.silent.376163:Trojan.Win32.PEF.pf.silent.375505:Trojan.Win32.PEF.pf.silent.377057:Trojan.Win32.PEF.pf.silent.377789:Trojan.Win32.PEF.pf.silent.378627:Trojan.Win32.PEF.pf.silent.379268:Trojan.Win32.PEF.pf.silent.380179:Trojan.Win32.PEF.pf.silent.380996:Trojan.Win32.PEF.pf.silent.412526:Trojan.Win32.PEF.pf.silent.433356:Trojan.Win32.PEF.pf.silent.453058:Trojan.Win32.PEF.pf.silent.467723:Trojan.Win32.PEF.pf.silent.483967:Trojan.Win32.PEF.pf.silent.484872:Trojan.Win32.PEF.pf.silent.23219642:Trojan.Win32.PEF.pf.silent.23272206
AVMalwareBytesTrojan.Agent
AVMcafeeGeneric-FAOV!039AD62F27D0
AVMicrosoft Security Essentialsno_virus
AVMicroWorld (escan)Gen:Variant.Zusy.82682
AVRisingno_virus
AVSophosTroj/Bckdr-RRM
AVSymantecno_virus
AVTrend Microno_virus
AVVirusBlokAda (vba32)no_virus

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

RegistryHKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\Time Defragmenter Experience Transfer Shadow ➝
C:\Documents and Settings\Administrator\Application Data\gbujopws\jjzfistibif.exe
Creates FileC:\Documents and Settings\Administrator\Application Data\gbujopws\jjzfistibif.exe
Creates ProcessC:\Documents and Settings\Administrator\Application Data\gbujopws\jjzfistibif.exe

Process
↳ C:\Documents and Settings\Administrator\Application Data\gbujopws\jjzfistibif.exe

Creates FileC:\Documents and Settings\Administrator\Application Data\gbujopws\copfgeup.exe
Creates File\Device\Afd\Endpoint
Creates FileC:\Documents and Settings\Administrator\Application Data\gbujopws\jjzfistibif.quc0
Creates ProcessWATCHDOGPROC "C:\Documents and Settings\Administrator\Application Data\gbujopws\jjzfistibif.exe"

Process
↳ WATCHDOGPROC "C:\Documents and Settings\Administrator\Application Data\gbujopws\jjzfistibif.exe"

Network Details:

DNSsmokeinside.net
Type: A
50.63.202.34
DNSpartybright.net
Type: A
184.168.221.24
DNSfreshpeople.net
Type: A
91.206.201.140
DNSsummerready.net
Type: A
72.167.191.69
DNSsummerpeople.net
Type: A
65.254.248.141
DNSwaterready.net
Type: A
64.74.223.38
DNSwaterpeople.net
Type: A
66.151.181.49
DNSpartyready.net
Type: A
8.5.1.51
DNSpartypeople.net
Type: A
217.138.13.211
DNSwomaninstead.net
Type: A
DNSsmokeinstead.net
Type: A
DNSwomanexplain.net
Type: A
DNSsmokeexplain.net
Type: A
DNSwomanbright.net
Type: A
DNSsmokebright.net
Type: A
DNSwomaninside.net
Type: A
DNSpartyinstead.net
Type: A
DNSfightinstead.net
Type: A
DNSpartyexplain.net
Type: A
DNSfightexplain.net
Type: A
DNSfightbright.net
Type: A
DNSpartyinside.net
Type: A
DNSfightinside.net
Type: A
DNSfreshready.net
Type: A
DNSexperienceready.net
Type: A
DNSfreshbrown.net
Type: A
DNSexperiencebrown.net
Type: A
DNSexperiencepeople.net
Type: A
DNSfreshdaughter.net
Type: A
DNSexperiencedaughter.net
Type: A
DNSgentlemanready.net
Type: A
DNSalreadyready.net
Type: A
DNSgentlemanbrown.net
Type: A
DNSalreadybrown.net
Type: A
DNSgentlemanpeople.net
Type: A
DNSalreadypeople.net
Type: A
DNSgentlemandaughter.net
Type: A
DNSalreadydaughter.net
Type: A
DNSfollowready.net
Type: A
DNSmemberready.net
Type: A
DNSfollowbrown.net
Type: A
DNSmemberbrown.net
Type: A
DNSfollowpeople.net
Type: A
DNSmemberpeople.net
Type: A
DNSfollowdaughter.net
Type: A
DNSmemberdaughter.net
Type: A
DNSbeginready.net
Type: A
DNSknownready.net
Type: A
DNSbeginbrown.net
Type: A
DNSknownbrown.net
Type: A
DNSbeginpeople.net
Type: A
DNSknownpeople.net
Type: A
DNSbegindaughter.net
Type: A
DNSknowndaughter.net
Type: A
DNScrowdready.net
Type: A
DNSsummerbrown.net
Type: A
DNScrowdbrown.net
Type: A
DNScrowdpeople.net
Type: A
DNSsummerdaughter.net
Type: A
DNScrowddaughter.net
Type: A
DNSthoughtready.net
Type: A
DNSthoughtbrown.net
Type: A
DNSwaterbrown.net
Type: A
DNSthoughtpeople.net
Type: A
DNSthoughtdaughter.net
Type: A
DNSwaterdaughter.net
Type: A
DNSwomanready.net
Type: A
DNSsmokeready.net
Type: A
DNSwomanbrown.net
Type: A
DNSsmokebrown.net
Type: A
DNSwomanpeople.net
Type: A
DNSsmokepeople.net
Type: A
DNSwomandaughter.net
Type: A
DNSsmokedaughter.net
Type: A
DNSfightready.net
Type: A
DNSpartybrown.net
Type: A
DNSfightbrown.net
Type: A
DNSfightpeople.net
Type: A
DNSpartydaughter.net
Type: A
DNSfightdaughter.net
Type: A
DNSfreshnation.net
Type: A
DNSexperiencenation.net
Type: A
DNSfreshsoldier.net
Type: A
DNSexperiencesoldier.net
Type: A
DNSfreshplease.net
Type: A
HTTP GEThttp://smokeinside.net/forum/search.php?email=balanelm@yahoo.com&method=post
User-Agent:
HTTP GEThttp://partybright.net/forum/search.php?email=balanelm@yahoo.com&method=post
User-Agent:
HTTP GEThttp://freshpeople.net/forum/search.php?email=balanelm@yahoo.com&method=post
User-Agent:
HTTP GEThttp://summerready.net/forum/search.php?email=balanelm@yahoo.com&method=post
User-Agent:
HTTP GEThttp://summerpeople.net/forum/search.php?email=balanelm@yahoo.com&method=post
User-Agent:
HTTP GEThttp://waterready.net/forum/search.php?email=balanelm@yahoo.com&method=post
User-Agent:
HTTP GEThttp://waterpeople.net/forum/search.php?email=balanelm@yahoo.com&method=post
User-Agent:
HTTP GEThttp://partyready.net/forum/search.php?email=balanelm@yahoo.com&method=post
User-Agent:
HTTP GEThttp://partypeople.net/forum/search.php?email=balanelm@yahoo.com&method=post
User-Agent:
Flows TCP192.168.1.1:1031 ➝ 50.63.202.34:80
Flows TCP192.168.1.1:1032 ➝ 184.168.221.24:80
Flows TCP192.168.1.1:1033 ➝ 91.206.201.140:80
Flows TCP192.168.1.1:1034 ➝ 72.167.191.69:80
Flows TCP192.168.1.1:1035 ➝ 65.254.248.141:80
Flows TCP192.168.1.1:1036 ➝ 64.74.223.38:80
Flows TCP192.168.1.1:1037 ➝ 66.151.181.49:80
Flows TCP192.168.1.1:1038 ➝ 8.5.1.51:80
Flows TCP192.168.1.1:1039 ➝ 217.138.13.211:80

Raw Pcap
0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 62616c61   h.php?email=bala
0x00000020 (00032)   6e656c6d 40796168 6f6f2e63 6f6d266d   nelm@yahoo.com&m
0x00000030 (00048)   6574686f 643d706f 73742048 5454502f   ethod=post HTTP/
0x00000040 (00064)   312e300d 0a416363 6570743a 202a2f2a   1.0..Accept: */*
0x00000050 (00080)   0d0a436f 6e6e6563 74696f6e 3a20636c   ..Connection: cl
0x00000060 (00096)   6f73650d 0a486f73 743a2073 6d6f6b65   ose..Host: smoke
0x00000070 (00112)   696e7369 64652e6e 65740d0a 0d0a       inside.net....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 62616c61   h.php?email=bala
0x00000020 (00032)   6e656c6d 40796168 6f6f2e63 6f6d266d   nelm@yahoo.com&m
0x00000030 (00048)   6574686f 643d706f 73742048 5454502f   ethod=post HTTP/
0x00000040 (00064)   312e300d 0a416363 6570743a 202a2f2a   1.0..Accept: */*
0x00000050 (00080)   0d0a436f 6e6e6563 74696f6e 3a20636c   ..Connection: cl
0x00000060 (00096)   6f73650d 0a486f73 743a2070 61727479   ose..Host: party
0x00000070 (00112)   62726967 68742e6e 65740d0a 0d0a       bright.net....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 62616c61   h.php?email=bala
0x00000020 (00032)   6e656c6d 40796168 6f6f2e63 6f6d266d   nelm@yahoo.com&m
0x00000030 (00048)   6574686f 643d706f 73742048 5454502f   ethod=post HTTP/
0x00000040 (00064)   312e300d 0a416363 6570743a 202a2f2a   1.0..Accept: */*
0x00000050 (00080)   0d0a436f 6e6e6563 74696f6e 3a20636c   ..Connection: cl
0x00000060 (00096)   6f73650d 0a486f73 743a2066 72657368   ose..Host: fresh
0x00000070 (00112)   70656f70 6c652e6e 65740d0a 0d0a       people.net....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 62616c61   h.php?email=bala
0x00000020 (00032)   6e656c6d 40796168 6f6f2e63 6f6d266d   nelm@yahoo.com&m
0x00000030 (00048)   6574686f 643d706f 73742048 5454502f   ethod=post HTTP/
0x00000040 (00064)   312e300d 0a416363 6570743a 202a2f2a   1.0..Accept: */*
0x00000050 (00080)   0d0a436f 6e6e6563 74696f6e 3a20636c   ..Connection: cl
0x00000060 (00096)   6f73650d 0a486f73 743a2073 756d6d65   ose..Host: summe
0x00000070 (00112)   72726561 64792e6e 65740d0a 0d0a       rready.net....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 62616c61   h.php?email=bala
0x00000020 (00032)   6e656c6d 40796168 6f6f2e63 6f6d266d   nelm@yahoo.com&m
0x00000030 (00048)   6574686f 643d706f 73742048 5454502f   ethod=post HTTP/
0x00000040 (00064)   312e300d 0a416363 6570743a 202a2f2a   1.0..Accept: */*
0x00000050 (00080)   0d0a436f 6e6e6563 74696f6e 3a20636c   ..Connection: cl
0x00000060 (00096)   6f73650d 0a486f73 743a2073 756d6d65   ose..Host: summe
0x00000070 (00112)   7270656f 706c652e 6e65740d 0a0d0a     rpeople.net....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 62616c61   h.php?email=bala
0x00000020 (00032)   6e656c6d 40796168 6f6f2e63 6f6d266d   nelm@yahoo.com&m
0x00000030 (00048)   6574686f 643d706f 73742048 5454502f   ethod=post HTTP/
0x00000040 (00064)   312e300d 0a416363 6570743a 202a2f2a   1.0..Accept: */*
0x00000050 (00080)   0d0a436f 6e6e6563 74696f6e 3a20636c   ..Connection: cl
0x00000060 (00096)   6f73650d 0a486f73 743a2077 61746572   ose..Host: water
0x00000070 (00112)   72656164 792e6e65 740d0a0d 0a0d0a     ready.net......

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 62616c61   h.php?email=bala
0x00000020 (00032)   6e656c6d 40796168 6f6f2e63 6f6d266d   nelm@yahoo.com&m
0x00000030 (00048)   6574686f 643d706f 73742048 5454502f   ethod=post HTTP/
0x00000040 (00064)   312e300d 0a416363 6570743a 202a2f2a   1.0..Accept: */*
0x00000050 (00080)   0d0a436f 6e6e6563 74696f6e 3a20636c   ..Connection: cl
0x00000060 (00096)   6f73650d 0a486f73 743a2077 61746572   ose..Host: water
0x00000070 (00112)   70656f70 6c652e6e 65740d0a 0d0a0a     people.net.....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 62616c61   h.php?email=bala
0x00000020 (00032)   6e656c6d 40796168 6f6f2e63 6f6d266d   nelm@yahoo.com&m
0x00000030 (00048)   6574686f 643d706f 73742048 5454502f   ethod=post HTTP/
0x00000040 (00064)   312e300d 0a416363 6570743a 202a2f2a   1.0..Accept: */*
0x00000050 (00080)   0d0a436f 6e6e6563 74696f6e 3a20636c   ..Connection: cl
0x00000060 (00096)   6f73650d 0a486f73 743a2070 61727479   ose..Host: party
0x00000070 (00112)   72656164 792e6e65 740d0a0d 0a0a0a     ready.net......

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f656d 61696c3d 62616c61   h.php?email=bala
0x00000020 (00032)   6e656c6d 40796168 6f6f2e63 6f6d266d   nelm@yahoo.com&m
0x00000030 (00048)   6574686f 643d706f 73742048 5454502f   ethod=post HTTP/
0x00000040 (00064)   312e300d 0a416363 6570743a 202a2f2a   1.0..Accept: */*
0x00000050 (00080)   0d0a436f 6e6e6563 74696f6e 3a20636c   ..Connection: cl
0x00000060 (00096)   6f73650d 0a486f73 743a2070 61727479   ose..Host: party
0x00000070 (00112)   70656f70 6c652e6e 65740d0a 0d0a0a     people.net.....


Strings
.
-E-
-0
-0010+-0
0
-0
CC
.00-+ 
.
-e-
. 
\
 
00
.
:\
:..
...........?- 
0
0
0
0
-
$
]u
Bjjj
                                 H
         (((((                  H
         h((((                  H
jjjjh
KERNEL32.DLL
mscoree.dll
(null)
                          
\$ [_^]
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
\$0;5(CB
0A@@Ju
0SSSSS
0U*/+3
_0wTUan*i
0WWWWW
1#QNAN
1#SNAN
|$28\$1u
6))XwO
7^m8.Px
7u['[:
8VVVVV
$:9HtH
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
ADVAPI32.dll
An application has made an attempt to load the C runtime library incorrectly.
<at9<rt,<wt
- Attempt to initialize the CRT more than once.
- Attempt to use MSIL code from this assembly during native code initialization
August
.?AVbad_alloc@std@@
.?AVbad_exception@std@@
.?AVexception@std@@
.?AVlength_error@std@@
.?AVlogic_error@std@@
.?AVout_of_range@std@@
.?AVtype_info@@
bad allocation
bad exception
 Base Class Array'
 Base Class Descriptor at (
__based(
BeginPaint
__cdecl
 Class Hierarchy Descriptor'
CloseHandle
__clrcall
CompareStringA
CompareStringW
 Complete Object Locator'
CONOUT$
ConvertToAutoInheritPrivateObjectSecurity
`copy constructor closure'
CopyFileA
CorExitProcess
CreateDirectoryA
CreateEventA
CreateFileA
CreateIconFromResourceEx
CreateProcessA
CreateStreamOnHGlobal
CreateThread
CreateToolhelp32Snapshot
CreateWindowExA
- CRT not initialized
D$8SVW
@.data
dddd, MMMM dd, yyyy
D$dSUVW
December
DecodePointer
`default constructor closure'
DefWindowProcA
 delete
 delete[]
Delete
DeleteCriticalSection
D$HPQR
DispatchMessageA
D$L+D$D
DOMAIN error
D$P+D$H+
D$@PQV
D$@PQVWW
DPtoLP
D$@PWVS
D$$VSj
`dynamic atexit destructor for '
`dynamic initializer for '
E](&d.
`eh vector constructor iterator'
`eh vector copy constructor iterator'
`eh vector destructor iterator'
`eh vector vbase constructor iterator'
`eh vector vbase copy constructor iterator'
>|E|kj
EncodePointer
EndPaint
EnterCriticalSection
evw~2;
ExitProcess
__fastcall
February
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
- floating point support not loaded
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
FlushFileBuffers
ForceRemove
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeUserPhysicalPages
Friday
^F<-uB
GAIsProcessorFeaturePresent
GDI32.dll
GetACP
GetActiveWindow
GetCommandLineA
GetCommTimeouts
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
GetCPInfo
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDesktopWindow
GetDeviceCaps
GetDriveTypeA
GetEnhMetaFileA
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetFileSize
GetFileType
GetFullPathNameA
GetLastActivePopup
GetLastError
GetLocaleInfoA
GetMapMode
GetMessageA
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
GetOEMCP
GetProcAddress
GetProcessHeap
GetProcessWindowStation
GetStartupInfoA
GetStdHandle
GetStockObject
GetStringTypeA
GetStringTypeW
GetSystemTimeAsFileTime
GetTempPathA
GetTickCount
GetTimeZoneInformation
GetTitleBarInfo
GetUserObjectInformationA
GetWindowDC
GetWindowRect
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
gzJ_+.c
`h````
HeapAlloc
HeapCreate
HeapFree
HeapReAlloc
HeapSize
`h`hhh
HH:mm:ss
HHtXHHt
>If90t
InitializeCriticalSectionAndSpinCount
InterlockedDecrement
InterlockedIncrement
InvalidateRect
invalid string position
IsDebuggerPresent
IsValidCodePage
JanFebMarAprMayJunJulAugSepOctNovDec
January
j h\3B
j$ht2B
j@j ^V
j"^SSSSS
jXHV5,
KERNEL32
KERNEL32.dll
k}:t9 eH
L$0QRWf
L$4Qj$
L	?7EP
LCMapStringA
LCMapStringW
LeaveCriticalSection
L<~FZd
L$(h$EB
LoadCursorA
LoadLibraryA
`local static guard'
`local static thread guard'
`local vftable'
`local vftable constructor closure'
LockFile
LookupPrivilegeDisplayNameA
LPtoDP
L$@QRVPP
L$ QUV
`managed vector constructor iterator'
`managed vector copy constructor iterator'
`managed vector destructor iterator'
MessageBoxA
Microsoft Visual C++ Runtime Library
MM/dd/yy
Monday
MoveWindow
MulDiv
MultiByteToWideChar
N6gE&j#m-Q
 new[]
n{\fcx2hkj
NoRemove
- not enough space for arguments
- not enough space for environment
- not enough space for locale information
- not enough space for lowio initialization
- not enough space for _onexit/atexit table
- not enough space for stdio initialization
- not enough space for thread data
November
(null)
N/UP#uU.
Nw,Ca 
October
ole32.dll
OLEAUT32.dll
`omni callsig'
OpenProcess
OpenProcessToken
operator
__pascal
`placement delete closure'
`placement delete[] closure'
Please contact the application's support team for more information.
PostQuitMessage
PPPPPPPP
Process32First
Process32Next
Program: 
<program name unknown>
__ptr64
- pure virtual function call
qG.90s
qgh+a>/2
QQSVWd
QueryPerformanceCounter
QueueUserAPC
RaiseException
`.rdata
ReadFile
RegCloseKey
RegisterClassExA
RegOpenKeyA
RegSetValueExA
__restrict
R+ >QHd2
RtlUnwind
Rtte?iH$
runtime error 
Runtime Error!
Saturday
`scalar deleting destructor'
September
SetEndOfFile
SetEnvironmentVariableA
SetEvent
SetFileAttributesA
SetFilePointer
SetFocus
SetHandleCount
SetLastError
SetMapMode
SetStdHandle
SetUnhandledExceptionFilter
SetWindowTextA
ShowWindow
SING error
SRSSSh
s[S;7|G;w
^SSSSS
__stdcall
`string'
string too long
Sunday
SunMonTueWedThuFriSat
SystemParametersInfoA
T}$b^cql
t$d;t$(
TerminateProcess
tGHt.Ht&
+t HHt
This application has requested the Runtime to terminate it in an unusual way.
__thiscall
This indicates a bug in your application.
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
!This program cannot be run in DOS mode.
t$ hP1B
Thursday
< tK<	tG
TLOSS error
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
<\tM</tI
Tn-<^(
to=(mB
T$<PWQRS
tR99u2
TranslateMessage
T$ RPPj
T$@RPV
T$@RPVW
T$@RWV
t"SS9]
<+t(<-t$:
T$TRVPW
t$<"u	3
Tuesday
;t$,v-
t+WWVPV
T$XQPR
 Type Descriptor'
`typeof'
>:u8FV
uBh!CA
`udt returning'
uDVWj4h
~Uh8VB
- unable to initialize heap
- unable to open console device
__unaligned
- unexpected heap error
- unexpected multithread lock error
UnhandledExceptionFilter
UNICODE
Unknown exception
uN=RoZ
UpdateWindow
UQPXY]Y[
ur0ocdl
URPQQh
USER32.dll
USER32.DLL
u[SSSP
UTF-16LE
v$;5LmB
`vbase destructor'
`vbtable'
`vcall'
`vector constructor iterator'
`vector copy constructor iterator'
`vector deleting destructor'
`vector destructor iterator'
`vector vbase constructor iterator'
`vector vbase copy constructor iterator'
`vftable'
VirtualAlloc
`virtual displacement map'
VirtualFree
v	N+D$
vsP1bPG
_VVVVV
VVVVVQRSSj
#w0qT{
WaitForSingleObject
Wednesday
WideCharToMultiByte
WriteConsoleA
WriteConsoleW
WriteFile
WS2_32.dll
^WWWWW
\$Xj h
XL~f,&
xM9DKM
xppwpp
xpxxxx
<xtX<XtT
>=Yt1j