Analysis Date2015-05-06 22:34:06
MD528917fb1d33bd636f03a90a5c5c8ffeb
SHA1de7373abdc766f6e38381feb510f698f8dc47965

Static Details:

File typeMS-DOS executable
Section_FLAT md5: 2badbc812a8840b3e4c15ce7cfa8e1d2 sha1: 14d031e8a9f0c52f052bb7972555fb9522c70b31 size: 196608
Section.imports md5: cb7e2038537c1a5427cfa273ec439b3b sha1: d4367317e636b07231ee4cd00c907b736c7e742c size: 8192
Timestamp1970-01-01 00:00:00
PackerBorland Delphi 3.0 (???)
PEhash66aa81f8691749390c39341ae0e6f716238cd296
IMPhash4a810a912d23b19433f9540b6f26fef9
AVAd-AwareGen:Variant.Kazy.551846
AVAlwil (avast)PlugX-A [Trj]
AVArcabit (arcavir)Gen:Variant.Kazy.551846
AVAuthentiumW32/S-0866b0ae!Eldorado
AVAvira (antivir)TR/Hijacker.Gen
AVBitDefenderGen:Variant.Kazy.551846
AVBullGuardGen:Variant.Kazy.551846
AVCA (E-Trust Ino)no_virus
AVCAT (quickheal)no_virus
AVClamAVno_virus
AVDr. Webno_virus
AVEmsisoftGen:Variant.Kazy.551846
AVEset (nod32)Win32/Korplug.A
AVFortinetW32/Korplug.A!tr
AVFrisk (f-prot)no_virus
AVF-SecureGen:Variant.Kazy.551846
AVGrisoft (avg)no_virus
AVIkarusTrojan-Downloader.Win32.Thoper
AVK7Trojan ( 003db13d1 )
AVKasperskyno_virus
AVMalwareBytesno_virus
AVMcafeeno_virus
AVMicrosoft Security EssentialsBackdoor:Win32/Plugx.A
AVMicroWorld (escan)Gen:Variant.Kazy.551846
AVPadvishno_virus
AVRisingno_virus
AVSophosMal/Behav-010
AVSymantecno_virus
AVTrend Microno_virus
AVTwisterW32.Korplug.A.srli
AVVirusBlokAda (vba32)no_virus

Runtime Details:

Network Details:


Raw Pcap

Strings
\??\
 11.0
1234
%16.16X
%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X%2.2X
%4.4d-%2.2d-%2.2d %2.2d:%2.2d:%2.2d
%4.4d-%2.2d-%2.2d %2.2d:%2.2d:%2.2d: 
68C3FCBC14814631
%ALLUSERSPROFILE%
%ALLUSERSPROFILE%\F3
%ALLUSERSPROFILE%\SxS
boot.cfg
\bug.log
C:\Documents and Settings\k318-3\Local Settings\Application Data\Google\Chrome\Application\chrome.exe
Cgfcb,rb? gjl vjt yfcnhtybt - cbytt-cbyttjhecbabwbhjdfnm rkfdbfnehe
Chrome_WidgetWin_1
CLSID
CMD.EXE
CommandLine
CompanyName
CONIN$
CONOUT$
ConsentPromptBehaviorAdmin
Create
CRYPTBASE.DLL
DEMO...
\Device\Floppy
DISPLAY
EnableLUA
FileDescription
FileVersion
FormDll.dll
Form.exe
Gjxtve rkfdbfnehf yt hecbabwbhjdfyf& Rfr hfymitZ nfr b gjlevfkf/ E hjlcndtyybrjd& D rfrjv ujhjlt&
 - Google Chrome
HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0
hSeDebugPrivilege
ICE2012
Jfazenda@#$J
LNULL
l%s\sysprep\CRYPTBASE.DLL
Mail.Ru: 
~MHZ
Mozilla/4.0 (compatible; MSIE 
NvSmart.hlp
oogle Chrome
\Parameters
PI[%8.8X]
\\.\pipe\a%d
\\.\pipe\b%d
\\.\PIPE\RUN_AS_USER(%d)
ProcessId
ProductName
ProductVersion
pUAC.TMP
readme.db
ROOT\CIMV2
RUNAS
S-1-16-12288
"%s" %d %d
%s %d %d
%s\%d.plg
ServiceDll
SeShutdownPrivilege
SeTcbPrivilege
%s\msiexec.exe %d %d
%s\msiexec.exe UAC
sNT AUTHORITY
Software\CLASSES\FAST
Software\CLASSES\FAST\PROXY
SOFTWARE\Microsoft\Internet Explorer\Version Vector
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\User Agent\Post Platform
SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\User Agent\Post Platform
SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
Software\Microsoft\Windows\CurrentVersion\Run
%s\sysprep
%s\sysprep\sysprep.exe
static
\StringFileInfo\%4.4X%4.4X\%s
\SxS
System
SYSTEM
System\CurrentControlSet\Services
SYSTEM\CurrentControlSet\Services\
\SystemRoot\
%SystemRoot%\system32\svchost.exe
THIS IS A DEMO VERSION!!!
tSystem Idle Process
tuesday05
\VarFileInfo\Translation
Win32_Process
%WINDIR%\SYSTEM32\SERVICES.EXE
Windows F3 Services
; Windows NT %d.%d
WINSTA0
wser Class
0!0&0-020T0]0f0l0q0v0}0
0$0-03080=0D0I0g0z0
0"0'030I0U0b0
0%0.0D0V0\0e0
0:0[0k0{0
0%030^0
0(080A0J0P0U0Z0a0f0w0
0+0A0J0O0c0
!0?0b0
0.0d0}0
0[0e0q0
0	181G1X1l1
0@1R1[1a1f1k1r1w1
030:0N0X0d0
031C1I1`1
; ;$;(;,;0;4;8;<;@;D;H;L;P;T;
050@0W0
0A1[1d1j1o1t1{1
"0B0i0x0
+0E0S0\0c0z0
?(?0?H?f?x?
0I0[0`0h0
:+:0:I:O:[:l:
>0>K>[>c>i>t>x>|>
?0?M?]?m?
	0t0&1E1
0T0c0q0
0t9It#ItCIu
<0=@=Z=d=
1(10151<1A1H1M1T1Y1a1q1|1
1!1(1/151A1
1(1.13181?1D1U1k1
1'1\1l1u1{1
1*12171<1P1n1
1)141G1W1g1
1.161<1H1M1T1k1w1
1-181L1W1k1v1
1-1C1[1j1
1*1D1T1p1
1;1H1j1
1=1X1s1
127.0.0.1
1:2A2Y2`2x2
1<2B2I2O2\2b2l2r2|2
1?2L2p2
141=1F1L1Q1V1]1b1
151F1Z1o1
151R1h1n1
?$?+?1?6?=?C?H?e?w?}?
>)>1>B>
;1<D<M<S<X<]<d<i<
; ;1;G;h;
:1:H:`:n:}:
;1;?;H;O;h;q;z;
;1<H<W<b<u<
2%2+202I2l2
2'2;2]2
2$2*2F2N2T2p2x2~2
2"2'2Q2x2
2*252S2]2k2z2
2&272F2
2&272F2b2g2s2
2+2D2f2
2.2H2]2i2
2&2M2^2
2,2S2j2
2$2T2v2
2[2v2}2
2%2Z2p2
232A2O2]2k2y2
2#3-3=3L3
2.3=3`3u3
2"3,3B3Q3`3
2*3<3Q3X3
2$343D3W3
2?3I3h3
2,3V3q3
243I3Y3h3w3
252]2{2
;2;7;D;J;];j;p;
?!?&?+?2?7?X?
:):2:8:=:B:I:N:f:o:x:~:
>2?9?>?J?S?Y?^?c?j?o?
>2?D?O?i?{?
>2><>d>s>
2ez{JG
=%=2=G=P=V=[=`=g=l=
>->2>r>z>
3!3*30353:3A3F3Y3
333>3I3
3!3&3?3N3S3v3
3'3/3B3`3q3
3)3@3G3W3k3y3
3(3;3K3Z3b3
3(383K3Z3h3
3-3F3a3
3)3K3m3
3*4/474F4R4[4j4y4
3#4-4H4V4o4
3%484B4
374F4v4
<$<-<3<8<=<E<_<
393B3Q3q3{3
3B4b4r4
>">'>3>I>U>b>}>
:-:3:;:M:f:s:y:
=3=M=U=[=q=
>3>O>p>
;#;3;V;_;h;
40R0Z0o0|0
414N4]4
4,424A4G4V4\4k4p4
4%4.4<4t4{4
4/4@4X4
4&4B4G4S4i4u4
4%4D4K4\4j4w4
4%5:5z5
4,595H5
4=5N5u5|5
485H5l5y5
>%>.>4>9>>>F>U>j>s>y>~>
4A4N4p4
;4;=;F;L;Q;V;];b;
=4===F=L=Q=V=]=b=t=}=
=,=4=?=F=R=
4H4L4P4T4X4
>(>4>k>z>
;4;U;s;;<E<k<
515A5P5_5r5
516:6@6E6J6Q6V6
5-52575G5`5e5j5
5!525H5j5y5
5 5$5(5A5z5
5"5<5b5g5p5y5
5 5&5S5\5a5}5
5	565G5T5_5n5
5&575F5b5g5s5
5-5J5X5o5
5,5O5a5k5u5
565I5W5b5i5t5
5$6+626;6D6K6P6X6g6p6y6
5/6I6`6o6
5.6Q6a6x6
585`5d5h5l5p5
585@5F5Q5`5
>+>5>A>J>Q>V>]>b>n>~>$?N?b?
=#=5=;=C=[={=
5I5X5v5
<5<@<L<[<a<t<z<
=5=S=[=
<-<5<><W<x<
636@6e6{6
636d6t6
6 656R6W6
6;6[6|6
6 6%6=6I6N6S6p6}6
6 6;6l6
6	6.6u6
6`6d6h6l6v6
6'6G6Q6
6>6J6V6h6w6
6&6Y6`6
676]6k6
6"7(7-747:7?7K7Q7Z7|7
6(7/7h7x7
6^7m7{7
=$=-=6=<=A=F=M=R=z=
:$;6;?;F;W;f;
?$?6???F?W?f?
>&>/>6>G>V>r>w>
<(=6=H=O=v=
<6<@<L<U<\<a<i<
:%:*:/:6:;:V:d:
707M7T7Z7q7y7
70H0Q0Z0`0e0j0q0v0
728C8I8
747B7R7b7r7
748F8T8
757A7|7
7+707@7J7h7
7!727?7b7y7
7+747:7?7D7K7P7k7
7(777]7g7
7"7)7.7J7W7b7k7q7v7{7
7"7,7E7g7y7
7,7:7H7W7f7l7{7
7!7;7Y7e7|7
7&787l7
7#797E7R7m7
7%7F7`7d7h7l7p7
7+7G7^7q7}7
7@7R7\7b7j7r7
7%8,8I8c8
7-8L8`8y8
:);7;E;
?)?7?g?
;7;I;Z;r;
7L8R8d8
<7<T<3=Q=^=m=
8$8-84898@8E8
8&8/858:8?8F8K8e8
8"8(8-858=8T8d8m8v8|8
8!8.8<8C8O8^8
8"8-8A8S8^8
8@8\8g8
8#8:8O8p8
8'909:9L9V9g9
8)939U9e9
8&949F9r9
8$969?9F9W9f9
8GULPt
8GULPu#
=8===H=T=]=c=h=m=t=y=
8$:O:W:o:
8S8i8~8
8U8[8f8{8
9!:;:}:
909<9w9
9$:0:<:R:a:t:|:
939=9]9
9	:*:4:q:
9)91979I9
9)92989=9B9I9N9
9!929K9a9h9
9#959D9R9
9&9/969G9V9r9w9
9!9&9,93989C9J9
9,999B9H9M9R9Y9^9
9"9)9.9e9y9
999B9K9Q9V9[9b9g9y9
9 9:9D9L9d9
9%9-9F9
9+9:9R9a9n9
999T9o9
9-9B9G9S9\9b9g9l9s9x9
9)9D9f9
9:9D9Q9[9h9r9
9+:L:S:
=$>9>[>m>|>
9S9i9w9
;9;X;f;~;
;!;A;d;
AdjustTokenPrivileges
advapi32
advapi32.dll
ADVAPI32.dll
/Af|X"fq
?*?A?i?
AllocateAndGetTcpExTableFromStack
AllocateAndGetUdpExTableFromStack
AllocateAndInitializeSid
AllocConsole
=A=R=_=
;A<S<w<
AttachConsole
BitBlt
bootProc
:B;W;`;f;k;p;w;|;
;%;*;C;
CallNextHookEx
ChangeServiceConfig2W
ChangeServiceConfigW
CloseDesktop
CloseHandle
CloseServiceHandle
closesocket
CloseWindowStation
:*:::C:L:R:W:\:c:h:z:
;(;C;O;b;o;~;
CoCreateInstance
CoInitializeEx
CoInitializeSecurity
CommandLineToArgvW
connect
ConnectNamedPipe
CONNECT %s:%d HTTP/1.1
Content-length: 0
Content-Type: text/html
ControlService
ConvertStringSidToSidW
CoSetProxyBlanket
CoUninitialize
CreateCompatibleBitmap
CreateCompatibleDC
CreateDCW
CreateDesktopW
CreateDIBSection
CreateDirectoryW
CreateEnvironmentBlock
CreateEventW
CreateFileMappingW
CreateFileW
CreateIoCompletionPort
CreateMutexW
CreateNamedPipeW
CreateProcessAsUserW
CreateProcessW
CreateRemoteThread
CreateServiceW
CreateThread
CreateWindowExW
?C?Y?m?
D$4PhH
DefWindowProcW
DeleteCriticalSection
DeleteDC
DeleteFileW
DeleteObject
DeleteService
DestroyEnvironmentBlock
DestroyIcon
DisconnectNamedPipe
DispatchMessageW
;'<;<D<J<O<T<[<`<x<
< =.=d=k=u=
 dllmain.cpp
dnsapi
dnsapi.dll
DnsFree
DnsQuery_A
DoImpUserProc
D$(Ph`T
>+>D>S>a>o>
DSVWP3
D$tPSh
DuplicateTokenEx
;D;V;_;f;w;
d:\work\plug5.0(hrb)\shellcode\shellcode\XPlug.h
d:\work\plug5.0(hrb)\shellcode\shellcode\XSetting.h
D$<WPW
=&=D=Z=`=e=|=
=%>E>{>
;-;@;E;^;
E0c0k0
;$<.<E<L<V<g<|<
EName:%s,EAddr:0x%p,ECode:0x%p,EAX:%p,EBX:%p,ECX:%p,EDX:%p,ESI:%p,EDI:%p,EBP:%p,ESP:%p,EIP:%p
EnterCriticalSection
EnumProcesses
EnumProcessModules
EnumServicesStatusExW
EqualSid
ExitProcess
ExitThread
ExitWindowsEx
ExpandEnvironmentStringsW
ExtractIconExW
f9~4t"
;F<d<l<
file: %s, line: %d, error: [%d]%s
FindClose
FindFirstFileW
FindNextFileW
FlushFileBuffers
;&<F<n<~<
FormatMessageA
FreeConsole
FreeSid
gdi32.dll
GDI32.dll
GdiFlush
GenerateConsoleCtrlEvent
GetAdaptersInfo
GetAsyncKeyState
GetClassNameW
GetCommandLineW
GetComputerNameW
GetConsoleCP
GetConsoleCursorInfo
GetConsoleDisplayMode
GetConsoleMode
GetConsoleOutputCP
GetConsoleScreenBufferInfo
GetConsoleWindow
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDeviceCaps
GetDIBits
GetDiskFreeSpaceExW
GetDriveTypeW
GetExitCodeThread
GetExtendedTcpTable
GetExtendedUdpTable
GetFileAttributesW
GetFileSize
GetFileTime
GetFileVersionInfoSizeW
GetFileVersionInfoW
GetForegroundWindow
gethostbyname
GetIconInfo
GetKeyState
GetLastError
GetLengthSid
GetLocalTime
GetMessageW
GetModuleFileNameExW
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetModuleInformation
GetNativeSystemInfo
GetOverlappedResult
GetProcAddress
GetProcessHeap
GetProcessWindowStation
GetQueuedCompletionStatus
GetRawInputData
getsockname
GetStdHandle
GetSystemDefaultLCID
GetSystemDirectoryW
GetSystemInfo
GetSystemMetrics
GetSystemTime
GetTcpTable
GetThreadDesktop
GetTickCount
GetTokenInformation
GetUdpTable
GetUserNameW
GetVersionExW
GetVolumeInformationW
GetWindowsDirectoryW
GetWindowTextW
GetWindowThreadProcessId
>,>>>G>^>l>
GlobalMemoryStatus
GlobalMemoryStatusEx
?&?G?S?u?
=G>T>]>c>h>m>t>y>
;GULPt
;#;;;h;
hack130.7766.org
HeapFree
Ht)Ht&Ht
HTTP://
HTTP/1.0 200 
HTTP/1.1 200 
HttpAddRequestHeadersA
HttpEndRequestA
HttpOpenRequestA
HttpQueryInfoA
HttpSendRequestExA
<H=V=b=t=
:H:W:j:y:
=H=W=v=
I|H'{7
> ?I?l?{?
.imports
inet_addr
inet_ntoa
InitializeCriticalSection
InitiateSystemShutdownA
<'<I<N<p<
InternetCloseHandle
InternetConnectA
InternetOpenA
InternetOpenUrlA
InternetReadFile
InternetSetOptionA
InternetWriteFile
iphlpapi
iphlpapi.dll
IsWow64Process
=!=I=V={=
<-<I<w<
>%>I>X>_>n>
JoProc
JoProcAccept
JoProcBroadcast
JoProcBroadcastRecv
JoProcListen
JtnJtTJtAJt
>,>J>W>`>i>o>t>y>
jWX_^[
jWX_^[]
kernel32
kernel32.dll
KERNEL32.dll
keybd_event
KeyLog
KillTimer
KLProc
='=K=m=y=
> >l>{>
LdrLoadShellcode
LeaveCriticalSection
LoadCursorW
LoadLibraryA
LocalAlloc
LocalFree
LocalLock
LocalReAlloc
LocalUnlock
LockWorkStation
LookupAccountSidW
LookupPrivilegeValueW
lovedj.6600.org
L$(Qh@W
lstrcatW
lstrcmpA
lstrcmpiW
lstrcmpW
lstrcpyA
lstrcpynA
lstrcpynW
lstrcpyW
lstrlenA
lstrlenW
L$tQSh
;?;L;U;^;d;i;n;u;z;
>_?l?y?
>/>M>|>
MapViewOfFile
memcmp
memcpy
memset
MessageBoxW
mouse_event
;-;M;S;
msvcrt.dll
:+:>:M:`:t:
MultiByteToWideChar
?"?*?N?[?
Nethood
Netstat
ntdll.dll
;!;N;W;a;q;w;
=.>N>W>]>b>g>n>s>
?`?o?~?
<%<*<O<
:$;O;];
:+:O:b:q:
odbc32.dll
ODBC32.dll
ole32.dll
oleaut32.dll
OLEAUT32.dll
OlProc
OlProcManager
OlProcNotify
OpenFileMappingW
OpenInputDesktop
OpenProcess
OpenProcessToken
OpenSCManagerW
OpenServiceW
OpenWindowStationW
Option
OutputDebugStringA
PlugProc
PortMap
PostMessageA
PostQueuedCompletionStatus
PostQuitMessage
@PPRWSPP
Process
ProcessIdToSessionId
Protocol:[%4s], Host: [%s:%d], Proxy: [%d:%s:%d:%s:%s]
Proxy-Authorization: Basic %s
Proxy-Connection: Keep-Alive
psapi.dll
PVVVVVVh 
>|>Q?l?~?
<	<&<Q<_<q<
QRPh@V
QSSSSSSVS
QueryDosDeviceW
QueryPerformanceCounter
QueryPerformanceFrequency
QueryServiceConfig2W
QueryServiceConfigW
QueryServiceStatusEx
QueueUserAPC
QWWh$W
QWWPWW
>'>Q>y>
ReadConsoleOutputW
ReadFile
ReadProcessMemory
RegCloseKey
RegCreateKeyExW
RegDeleteValueW
RegEdit
RegEnumKeyExW
RegEnumValueA
RegEnumValueW
RegisterRawInputDevices
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
RemoveDirectoryW
ResetEvent
ResumeThread
RevertToSelf
RtlCompressBuffer
RtlDecompressBuffer
RtlGetCompressionWorkSpaceSize
RtlMessageBoxProc
RtlNtStatusToDosError
?R?u?}?
RWWh@W
RWWWWWWh
Screen
ScreenT1
ScreenT2
%s: %d
SelectObject
Service
SetCapture
SetConsoleCtrlHandler
SetConsoleScreenBufferSize
SetCursorPos
SetEndOfFile
SetErrorMode
SetEvent
SetFileAttributesW
SetFilePointer
SetFileTime
SetLastError
SetProcessWindowStation
setsockopt
SetTcpEntry
SetThreadDesktop
SetTimer
SetTokenInformation
SetUnhandledExceptionFilter
SetWindowLongW
SetWindowsHookExW
SfcIsFileProtected
SHCopyKeyW
SHCreateItemFromParsingName
SHDeleteKeyW
SHDeleteValueW
shell32.dll
SHELL32.dll
ShellExecuteExW
ShellT1
ShellT2
SHEnumKeyExW
SHEnumValueW
SHFileOperationW
SHGetValueW
shlwapi
ShowWindow
shuaigege.3322.org
SiProc
= =%=S=]=i=r=y=~=
socket
SQLAllocEnv
SQLAllocHandle
SQLColAttributeW
SQLDataSourcesW
SQLDisconnect
SQLDriverConnectW
SQLDriversW
SQLExecDirectW
SQLFetch
SQLFreeHandle
SQLGetData
SQLGetDiagRecW
SQLMoreResults
SQLNumResultCols
SQLSetEnvAttr
SSSSRSj
SSSVSQ
StartServiceW
SVSSSPQ
|SVWhD
 SVWP3
SxWorkProc
\$T9\$<u
:T;b;q;
T$DRWWW
Telnet
TelnetT1
TelnetT2
TerminateProcess
TerminateThread
t,f9\8
t>f9Q*u8
t*Ht=Ht:Ht7Sh/
tLHtI-
tMHt=Ht/Ht"j
TranslateMessage
t$ WPVj
tXHtU-
:u_f9G
UnhookWindowsHookEx
/update?id=%8.8x
user32
user32.dll
USER32.dll
userenv
userenv.dll
VariantClear
:";V;};D<V<g<
VerQueryValueW
version
VirtualAlloc
VirtualAllocEx
VirtualFree
VirtualFreeEx
VirtualProtect
VirtualProtectEx
VirtualQueryEx
Vt9It"It
Vt;Ht$Ht
VVPQVR
WaitForMultipleObjects
WaitForSingleObject
>w>)?F?P?z?
WideCharToMultiByte
WindowFromPoint
wininet
wininet.dll
WNetCloseEnum
WNetEnumResourceW
WNetOpenEnumW
:):W:r:
WriteConsoleInputW
WriteFile
WriteProcessMemory
ws2_32
ws2_32.dll
WS2_32.dll
WSACleanup
WSAGetLastError
WSAGetOverlappedResult
WSAIoctl
WSARecv
WSARecvFrom
WSASend
WSASendTo
WSASocketA
WSAStartup
wsprintfA
wsprintfW
wtsapi32
WTSEnumerateProcessesW
WTSFreeMemory
<w\u(3
WWWhlN
wxjzz.3322.org
XBase64.cpp
XBoot.cpp
XBuffer.cpp
XDList.cpp
XException.cpp
XHide.cpp
XInstall.cpp
XInstallUAC.cpp
XJoin.cpp
XOnline.cpp
XPacket.cpp
XPlgLoader.cpp
XPlug.cpp
XPlugDisk.cpp
XPlugKeyLogger.cpp
XPlugNethood.cpp
XPlugNetstat.cpp
XPlugOption.cpp
XPlugPortMap.cpp
XPlugProcess.cpp
XPlugRegedit.cpp
XPlugScreen.cpp
XPlugService.cpp
XPlugShell.cpp
XPlugSQL.cpp
XPlugTelnet.cpp
XRTL.cpp
X-Session
XSessionImpersonate.cpp
XSetting.cpp
X-Size
XSo.cpp
XSoPipe.cpp
XSoTcp.cpp
XSoTcpHttp.cpp
XSoUdp.cpp
X-Status
XThreadManager.cpp