Analysis Date2014-08-16 21:36:05
MD53e7a700aaccc00e7096d71ac7b0d0dd8
SHA1de9ffbffa9a61838c62a2fb6f8cf39084bdef5cd

Static Details:

File typePE32 executable for MS Windows (GUI) Intel 80386 32-bit
Section.text md5: f0009b8a5aa2cc645411f79b5c79bcc3 sha1: 6d0dd410c40cf5d021e6f5fb19539cf697a52e54 size: 927744
Section.rdata md5: b791476a454fb8cbff2797e31db2d828 sha1: 3b8eea7a2980a3d7ab35dd6c0bb143f936ddd149 size: 34816
Section.data md5: ced3d90b227a5921a136ba6ecc25dc7e sha1: c4675ca14a303d0cd14a52393c1044d638387388 size: 113664
Timestamp2013-02-19 03:00:20
PackerMicrosoft Visual C++ ?.?
PEhash28d035f670c476d8433871e1d33d1d0a3c12a2c1
IMPhash1e48a85b5eb3f2364e8210fcae231df3
AV360 SafeGen:Variant.Kazy.164619
AVAd-AwareGen:Variant.Kazy.164619
AVAlwil (avast)Downloader-TLD [Trj]
AVArcabit (arcavir)no_virus
AVAuthentiumno_virus
AVAvira (antivir)no_virus
AVCA (E-Trust Ino)no_virus
AVCAT (quickheal)no_virus
AVClamAVno_virus
AVDr. Webno_virus
AVEmsisoftGen:Variant.Kazy.164619
AVEset (nod32)Win32/Bayrob.M
AVFortinetW32/Agent.ALA!tr
AVFrisk (f-prot)no_virus
AVF-SecureGen:Variant.Kazy.164619
AVGrisoft (avg)Generic_r.CDO
AVIkarusVirus.Win32.Dlder
AVK7Backdoor ( 04c5067b1 )
AVKasperskyTrojan.Win32.Generic:Trojan.Win32.PEF.pf.silent.175154:Trojan.Win32.PEF.pf.silent.181830:Trojan.Win32.PEF.pf.silent.374886:Trojan.Win32.PEF.pf.silent.375904:Trojan.Win32.PEF.pf.silent.376942:Trojan.Win32.PEF.pf.silent.377697:Trojan.Win32.PEF.pf.silent.378515:Trojan.Win32.PEF.pf.silent.379237:Trojan.Win32.PEF.pf.silent.380145:Trojan.Win32.PEF.pf.silent.380997:Trojan.Win32.PEF.pf.silent.416452
AVMalwareBytesno_virus
AVMcafeeno_virus
AVMicrosoft Security EssentialsTrojanSpy:Win32/Nivdort.gen!A
AVMicroWorld (escan)Gen:Variant.Kazy.164619
AVNormanno_virus
AVRisingno_virus
AVSophosno_virus
AVSymantecTrojan.Bayrob!gen4
AVTrend MicroTSPY_NIVDORT.SM
AVVirusBlokAda (vba32)no_virus
AVYara APTno_virus
AVZillya!no_virus

Runtime Details:

Screenshot

Process
↳ C:\malware.exe

Creates FileC:\Documents and Settings\Administrator\Local Settings\Temp\soil6lbq1lhvbsdrmtkmou.exe
Creates FileC:\WINDOWS\system32\uxhbwjkks\tst
Creates ProcessC:\Documents and Settings\Administrator\Local Settings\Temp\soil6lbq1lhvbsdrmtkmou.exe

Process
↳ C:\Documents and Settings\Administrator\Local Settings\Temp\soil6lbq1lhvbsdrmtkmou.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run\AutoConnect Net.Tcp Player Call Biometric ➝
C:\WINDOWS\system32\tflernzfut.exe
Creates FileC:\WINDOWS\system32\drivers\etc\hosts
Creates FileC:\WINDOWS\system32\uxhbwjkks\lck
Creates FileC:\WINDOWS\system32\uxhbwjkks\tst
Creates FileC:\WINDOWS\system32\tflernzfut.exe
Creates FileC:\WINDOWS\system32\uxhbwjkks\etc
Creates FileC:\Documents and Settings\Administrator\Start Menu\Programs\Startup\tflernzfut.exe
Deletes FileC:\WINDOWS\system32\\drivers\etc\hosts
Creates ProcessC:\WINDOWS\system32\tflernzfut.exe
Creates ServiceSSDP Superfetch Extensible Print - C:\WINDOWS\system32\tflernzfut.exe

Process
↳ C:\WINDOWS\system32\svchost.exe

Process
↳ Pid 808

Process
↳ Pid 852

Process
↳ C:\WINDOWS\System32\svchost.exe

Creates Filepipe\PCHFaultRepExecPipe

Process
↳ Pid 1208

Process
↳ C:\WINDOWS\system32\spoolsv.exe

RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\BeepEnabled ➝
NULL
RegistryHKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\System\Print\TypesSupported ➝
7
RegistryHKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Print\Printers\SymbolicLinkValue ➝
NULL
RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\Print\Printers\DefaultSpoolDirectory ➝
C:\WINDOWS\System32\spool\PRINTERS\\x00

Process
↳ Pid 1160

Process
↳ C:\WINDOWS\system32\tflernzfut.exe

RegistryHKEY_LOCAL_MACHINE\Software\Microsoft\Security Center\FirewallDisableNotify ➝
1
Creates FileC:\WINDOWS\system32\ohxwwiiuc.exe
Creates Filepipe\net\NtControlPipe10
Creates FileC:\WINDOWS\system32\uxhbwjkks\lck
Creates FileC:\WINDOWS\system32\uxhbwjkks\tst
Creates FileC:\WINDOWS\TEMP\soil6lbq1riwbsdy.exe
Creates FileC:\WINDOWS\system32\uxhbwjkks\run
Creates File\Device\Afd\Endpoint
Creates FileC:\WINDOWS\system32\uxhbwjkks\cfg
Creates FileC:\WINDOWS\system32\uxhbwjkks\rng
Creates ProcessWATCHDOGPROC "c:\windows\system32\tflernzfut.exe"
Creates ProcessC:\WINDOWS\TEMP\soil6lbq1riwbsdy.exe -r 32370 tcp

Process
↳ C:\WINDOWS\system32\tflernzfut.exe

Creates FileC:\WINDOWS\system32\uxhbwjkks\tst

Process
↳ WATCHDOGPROC "c:\windows\system32\tflernzfut.exe"

Creates FileC:\WINDOWS\system32\uxhbwjkks\tst

Process
↳ C:\WINDOWS\TEMP\soil6lbq1riwbsdy.exe -r 32370 tcp

Creates File\Device\Afd\Endpoint
Winsock DNS239.255.255.250

Network Details:

DNSspumkaguga.com
Type: A
69.172.201.208
DNSelementarimagine.com
Type: A
141.8.225.80
DNSlifedaily.net
Type: A
142.4.15.95
DNSlifefull.net
Type: A
50.63.202.63
DNSmouthfull.net
Type: A
69.172.201.208
DNSdecemberdaily.net
Type: A
50.63.202.36
DNSgadgets-small-talk-community.com
Type: A
DNSdominoclub-grup.com
Type: A
DNSgoforiteverytime.com
Type: A
DNSjarybuter.com
Type: A
DNSwheellose.net
Type: A
DNSsaidlose.net
Type: A
DNSwheelfull.net
Type: A
DNSsaidfull.net
Type: A
DNSstickblood.net
Type: A
DNSballblood.net
Type: A
DNSstickdaily.net
Type: A
DNSballdaily.net
Type: A
DNSsticklose.net
Type: A
DNSballlose.net
Type: A
DNSstickfull.net
Type: A
DNSballfull.net
Type: A
DNSenemyblood.net
Type: A
DNSlifeblood.net
Type: A
DNSenemydaily.net
Type: A
DNSenemylose.net
Type: A
DNSlifelose.net
Type: A
DNSenemyfull.net
Type: A
DNSmouthblood.net
Type: A
DNStillblood.net
Type: A
DNSmouthdaily.net
Type: A
DNStilldaily.net
Type: A
DNSmouthlose.net
Type: A
DNStilllose.net
Type: A
DNStillfull.net
Type: A
DNSshallblood.net
Type: A
DNSdeepblood.net
Type: A
DNSshalldaily.net
Type: A
DNSdeepdaily.net
Type: A
DNSshalllose.net
Type: A
DNSdeeplose.net
Type: A
DNSshallfull.net
Type: A
DNSdeepfull.net
Type: A
DNSpushblood.net
Type: A
DNSfridayblood.net
Type: A
DNSpushdaily.net
Type: A
DNSfridaydaily.net
Type: A
DNSpushlose.net
Type: A
DNSfridaylose.net
Type: A
DNSpushfull.net
Type: A
DNSfridayfull.net
Type: A
DNSalongblood.net
Type: A
DNSdecemberblood.net
Type: A
DNSalongdaily.net
Type: A
DNSalonglose.net
Type: A
DNSdecemberlose.net
Type: A
DNSalongfull.net
Type: A
DNSdecemberfull.net
Type: A
DNSlonghold.net
Type: A
DNSsoilhold.net
Type: A
DNSlongsecond.net
Type: A
DNSsoilsecond.net
Type: A
DNSlongocean.net
Type: A
DNSsoilocean.net
Type: A
DNSlonghave.net
Type: A
DNSsoilhave.net
Type: A
DNSwheelhold.net
Type: A
DNSsaidhold.net
Type: A
DNSwheelsecond.net
Type: A
DNSsaidsecond.net
Type: A
DNSwheelocean.net
Type: A
DNSsaidocean.net
Type: A
DNSwheelhave.net
Type: A
DNSsaidhave.net
Type: A
DNSstickhold.net
Type: A
DNSballhold.net
Type: A
DNSsticksecond.net
Type: A
DNSballsecond.net
Type: A
DNSstickocean.net
Type: A
DNSballocean.net
Type: A
DNSstickhave.net
Type: A
DNSballhave.net
Type: A
DNSenemyhold.net
Type: A
DNSlifehold.net
Type: A
DNSenemysecond.net
Type: A
DNSlifesecond.net
Type: A
DNSenemyocean.net
Type: A
DNSlifeocean.net
Type: A
DNSenemyhave.net
Type: A
DNSlifehave.net
Type: A
DNSmouthhold.net
Type: A
HTTP GEThttp://spumkaguga.com/forum/search.php?method=validate&mode=sox&v=000&sox=2c363400
User-Agent:
HTTP GEThttp://elementarimagine.com/forum/search.php?method=validate&mode=sox&v=000&sox=2c363400
User-Agent:
HTTP GEThttp://lifedaily.net/forum/search.php?method=validate&mode=sox&v=000&sox=2c363400
User-Agent:
HTTP GEThttp://lifefull.net/forum/search.php?method=validate&mode=sox&v=000&sox=2c363400
User-Agent:
HTTP GEThttp://mouthfull.net/forum/search.php?method=validate&mode=sox&v=000&sox=2c363400
User-Agent:
HTTP GEThttp://decemberdaily.net/forum/search.php?method=validate&mode=sox&v=000&sox=2c363400
User-Agent:
HTTP GEThttp://spumkaguga.com/forum/search.php?method=validate&mode=sox&v=000&sox=2c363400
User-Agent:
HTTP GEThttp://elementarimagine.com/forum/search.php?method=validate&mode=sox&v=000&sox=2c363400
User-Agent:
HTTP GEThttp://lifedaily.net/forum/search.php?method=validate&mode=sox&v=000&sox=2c363400
User-Agent:
HTTP GEThttp://lifefull.net/forum/search.php?method=validate&mode=sox&v=000&sox=2c363400
User-Agent:
HTTP GEThttp://mouthfull.net/forum/search.php?method=validate&mode=sox&v=000&sox=2c363400
User-Agent:
HTTP GEThttp://decemberdaily.net/forum/search.php?method=validate&mode=sox&v=000&sox=2c363400
User-Agent:
Flows TCP192.168.1.1:1037 ➝ 69.172.201.208:80
Flows TCP192.168.1.1:1038 ➝ 141.8.225.80:80
Flows TCP192.168.1.1:1039 ➝ 142.4.15.95:80
Flows TCP192.168.1.1:1040 ➝ 50.63.202.63:80
Flows TCP192.168.1.1:1041 ➝ 69.172.201.208:80
Flows TCP192.168.1.1:1042 ➝ 50.63.202.36:80
Flows TCP192.168.1.1:1043 ➝ 69.172.201.208:80
Flows TCP192.168.1.1:1044 ➝ 141.8.225.80:80
Flows TCP192.168.1.1:1045 ➝ 142.4.15.95:80
Flows TCP192.168.1.1:1046 ➝ 50.63.202.63:80
Flows TCP192.168.1.1:1047 ➝ 69.172.201.208:80
Flows TCP192.168.1.1:1048 ➝ 50.63.202.36:80

Raw Pcap
0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303030 26736f78 3d326333 36333430   =000&sox=2c36340
0x00000040 (00064)   30204854 54502f31 2e300d0a 41636365   0 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a207370 756d6b61 67756761 2e636f6d   : spumkaguga.com
0x00000080 (00128)   0d0a0d0a                              ....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303030 26736f78 3d326333 36333430   =000&sox=2c36340
0x00000040 (00064)   30204854 54502f31 2e300d0a 41636365   0 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a20656c 656d656e 74617269 6d616769   : elementarimagi
0x00000080 (00128)   6e652e63 6f6d0d0a 0d0a                ne.com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303030 26736f78 3d326333 36333430   =000&sox=2c36340
0x00000040 (00064)   30204854 54502f31 2e300d0a 41636365   0 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206c69 66656461 696c792e 6e65740d   : lifedaily.net.
0x00000080 (00128)   0a0d0a63 6f6d0d0a 0d0a                ...com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303030 26736f78 3d326333 36333430   =000&sox=2c36340
0x00000040 (00064)   30204854 54502f31 2e300d0a 41636365   0 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206c69 66656675 6c6c2e6e 65740d0a   : lifefull.net..
0x00000080 (00128)   0d0a0a63 6f6d0d0a 0d0a                ...com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303030 26736f78 3d326333 36333430   =000&sox=2c36340
0x00000040 (00064)   30204854 54502f31 2e300d0a 41636365   0 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206d6f 75746866 756c6c2e 6e65740d   : mouthfull.net.
0x00000080 (00128)   0a0d0a63 6f6d0d0a 0d0a                ...com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303030 26736f78 3d326333 36333430   =000&sox=2c36340
0x00000040 (00064)   30204854 54502f31 2e300d0a 41636365   0 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206465 63656d62 65726461 696c792e   : decemberdaily.
0x00000080 (00128)   6e65740d 0a0d0a0a 0d0a                net.......

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303030 26736f78 3d326333 36333430   =000&sox=2c36340
0x00000040 (00064)   30204854 54502f31 2e300d0a 41636365   0 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a207370 756d6b61 67756761 2e636f6d   : spumkaguga.com
0x00000080 (00128)   0d0a0d0a 0a0d0a0a 0d0a                ..........

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303030 26736f78 3d326333 36333430   =000&sox=2c36340
0x00000040 (00064)   30204854 54502f31 2e300d0a 41636365   0 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a20656c 656d656e 74617269 6d616769   : elementarimagi
0x00000080 (00128)   6e652e63 6f6d0d0a 0d0a                ne.com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303030 26736f78 3d326333 36333430   =000&sox=2c36340
0x00000040 (00064)   30204854 54502f31 2e300d0a 41636365   0 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206c69 66656461 696c792e 6e65740d   : lifedaily.net.
0x00000080 (00128)   0a0d0a63 6f6d0d0a 0d0a                ...com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303030 26736f78 3d326333 36333430   =000&sox=2c36340
0x00000040 (00064)   30204854 54502f31 2e300d0a 41636365   0 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206c69 66656675 6c6c2e6e 65740d0a   : lifefull.net..
0x00000080 (00128)   0d0a0a63 6f6d0d0a 0d0a                ...com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303030 26736f78 3d326333 36333430   =000&sox=2c36340
0x00000040 (00064)   30204854 54502f31 2e300d0a 41636365   0 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206d6f 75746866 756c6c2e 6e65740d   : mouthfull.net.
0x00000080 (00128)   0a0d0a63 6f6d0d0a 0d0a                ...com....

0x00000000 (00000)   47455420 2f666f72 756d2f73 65617263   GET /forum/searc
0x00000010 (00016)   682e7068 703f6d65 74686f64 3d76616c   h.php?method=val
0x00000020 (00032)   69646174 65266d6f 64653d73 6f782676   idate&mode=sox&v
0x00000030 (00048)   3d303030 26736f78 3d326333 36333430   =000&sox=2c36340
0x00000040 (00064)   30204854 54502f31 2e300d0a 41636365   0 HTTP/1.0..Acce
0x00000050 (00080)   70743a20 2a2f2a0d 0a436f6e 6e656374   pt: */*..Connect
0x00000060 (00096)   696f6e3a 20636c6f 73650d0a 486f7374   ion: close..Host
0x00000070 (00112)   3a206465 63656d62 65726461 696c792e   : decemberdaily.
0x00000080 (00128)   6e65740d 0a0d0a0a 0d0a                net.......


Strings
  ---
ss
+
"
 
\
.
...............0...
.
...
..
. .
!"!#$%&%$#!'!
.
:
:
+%3D%3A%26A&
 
 ' 
 
 
"H
"
dll2
h2
1
1
exe
"1"
2dll1exe
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
 
!
"
#
$
%
&
'
(
)
*
+
,
-
.
/
0
1
 0
a
[
Z
[
Z
[
-
h1
21212
.
S
%+#.*fa
0e
%+#I64o
.,
 -00-+ CC
 
-E-
-0
-0010+-0
0
-0
.
.
-e-
. 
\
.
00-+ 00:\
:..
  ...........?- 
0
0
0
0
-
uJ
.
.a

ekernel32.dll
                                 H
         (((((                  H
         h((((                  H
jjjh
jjjj
jjjjh
jjjjj
KERNEL32.DLL
mscoree.dll
(null)
                          
																		
 !"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`abcdefghijklmnopqrstuvwxyz{|}~
 !"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~
0A@@Ju
0HRhUw\
0j(&Jn
0:pmN0
0pQARd
0SSSSS
0U%!} 
0WWWWW
{1@2A	
?1-C/}
}1~gVlH
{\1L4Om*[]|
1/_N}N
_1PaPN;a!
1(*q9S
1#QNAN
1#SNAN
1vsVKu]
&1z~g;q
2j_t+E
2!u3+U
%^:<@3E
3_H!]/
3 .JLA
3pfB|]nJ
43~'q(
!4`	pX X!
[,4R'/
4z8K3U
5g2[7;
5ItD;#E
5j"]I#E
5K#^f3E
5L3vt3E
5r6z)=
6~2l;U
$?6g ^
6Zh;HG
_7) ks
7"m-u.
7'm_	Y
-7vy)3
"8;5,*
8,F1h4qdp
8GCGjkO
8;k}+M
8K/]+U
8VVVVV
9gJI+U
9tgM2"XB
A0	'Pd
:abAEE
abcdefghijklmnopqrstuvwxyz
ABCDEFGHIJKLMNOPQRSTUVWXYZ
ADVAPI32.dll
AG"$[\n
\+aispj}!
america
american
american english
american-english
An application has made an attempt to load the C runtime library incorrectly.
aqF	Ax
<at9<rt,<wt
- Attempt to initialize the CRT more than once.
- Attempt to use MSIL code from this assembly during native code initialization
.?AUctype_base@std@@
August
australian
.?AVbad_alloc@std@@
.?AVbad_cast@std@@
.?AVbad_exception@std@@
.?AV?$basic_ios@DU?$char_traits@D@std@@@std@@
.?AV?$basic_ostream@DU?$char_traits@D@std@@@std@@
.?AV?$basic_ostringstream@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@
.?AV?$basic_streambuf@DU?$char_traits@D@std@@@std@@
.?AV?$basic_stringbuf@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@
.?AVBitmap@Gdiplus@@
.?AVCAtlException@ATL@@
.?AVCImage@ATL@@
.?AV?$ctype@D@std@@
.?AVexception@std@@
.?AVfacet@locale@std@@
.?AVfailure@ios_base@std@@
.?AVGdiplusBase@Gdiplus@@
AVil+M
.?AVImage@Gdiplus@@
.?AVios_base@std@@
.?AV?$_Iosb@H@std@@
.?AVlength_error@std@@
.?AV_Locimp@locale@std@@
.?AVlogic_error@std@@
.?AV?$numpunct@D@std@@
.?AV?$num_put@DV?$ostreambuf_iterator@DU?$char_traits@D@std@@@std@@@std@@
.?AVout_of_range@std@@
.?AVruntime_error@std@@
.?AVtype_info@@
BA9$!u[
bad allocation
bad cast
bad exception
 Base Class Array'
 Base Class Descriptor at (
__based(
bC`,7'
BeginPaint
belgian
BI3}bH3
BitBlt
BLPHd[qc"
%BMi)3E
bmv_=4oYJu	
>b;rAL
britain
canadian
__cdecl
!~CGkU\
chinese
chinese-hongkong
chinese-simplified
chinese-singapore
chinese-traditional
+C\+J+
CkhmyI
CL8rF^
 Class Hierarchy Descriptor'
CloseHandle
__clrcall
cmd.exe
CnXN~"
CompareStringA
CompareStringW
 Complete Object Locator'
COMSPEC
CONOUT$
ContinueDebugEvent
`copy constructor closure'
CopyFileA
Copyright (c) 1992-2004 by P.J. Plauger, licensed by Dinkumware, Ltd. ALL RIGHTS RESERVED.
CorExitProcess
C PjPV
C$PjQV
C.PjRV
C/PjSV
C*PjTV
C+PjUV
C,PjVV
C-PjWV
"c@{rCo
CreateCompatibleBitmap
CreateCompatibleDC
CreateDirectoryA
CreateEventA
CreateFileA
CreateIconFromResourceEx
CreateMutexA
CreatePipe
CreateProcessA
CreateStreamOnHGlobal
CreateThread
CreateToolhelp32Snapshot
CreateWindowExA
- CRT not initialized
'~c`s1
cxNI8a^)+
}&;+D"
d23dD#"M
@.data
dddd, MMMM dd, yyyy
December
DecodePointer
`default constructor closure'
DefWindowProcA
 delete
 delete[]
Delete
DeleteCriticalSection
DeleteDC
DeleteFileA
DeleteObject
deque<T> too long
DispatchMessageA
D )[#M
DOMAIN error
DpPk4"
DPtoLP
DRichYU
dutch-belgian
`dynamic atexit destructor for '
`dynamic initializer for '
'E~7O/@
`eh vector constructor iterator'
`eh vector copy constructor iterator'
`eh vector destructor iterator'
`eh vector vbase constructor iterator'
`eh vector vbase copy constructor iterator'
=E?L^u
<=&e+M
emP6t6(
%eN3eg
EncodePointer
EndPaint
england
english-american
english-aus
english-belize
english-can
english-caribbean
english-ire
english-jamaica
english-nz
english-south africa
english-trinidad y tobago
english-uk
english-us
english-usa
EnterCriticalSection
EnumSystemLocalesA
eS{@+U
Eu*hk;
]%&EX{
ExitProcess
ey?JfjNBr
f6n eg2hC
__fastcall
f$ C3M
February
?FFkLE
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
FindNextFileA
FindResourceA
FindResourceExA
- floating point support not loaded
FlsAlloc
FlsFree
FlsGetValue
FlsSetValue
FlushFileBuffers
ForceRemove
FoZB+M
FreeEnvironmentStringsA
FreeEnvironmentStringsW
FreeLibrary
french-belgian
french-canadian
french-luxembourg
french-swiss
Friday
^F<-uB
fX1,le
=G3u+u8
GAIsProcessorFeaturePresent
GDI32.dll
GdipAlloc
GdipCloneImage
GdipCreateBitmapFromHBITMAP
GdipCreateBitmapFromScan0
GdipDisposeImage
GdipFree
GdipGetImageEncoders
GdipGetImageEncodersSize
gdiplus.dll
GdiplusShutdown
GdiplusStartup
GdipSaveImageToFile
german-austrian
german-lichtenstein
german-luxembourg
german-swiss
GetACP
GetActiveWindow
GetCommandLineA
GetConsoleCP
GetConsoleMode
GetConsoleOutputCP
GetCPInfo
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDesktopWindow
GetDeviceCaps
GetDriveTypeA
GetEnvironmentStrings
GetEnvironmentStringsW
GetEnvironmentVariableA
GetExitCodeProcess
GetFileAttributesA
GetFileType
GetFullPathNameA
GetLastActivePopup
GetLastError
GetLocaleInfoA
GetLocaleInfoW
GetLocalTime
GetMapMode
GetMessageA
GetModuleFileNameA
GetModuleHandleA
GetModuleHandleW
GetObjectA
GetOEMCP
GetProcAddress
GetProcessHeap
GetProcessWindowStation
GetStartupInfoA
GetStdHandle
GetStockObject
GetStringTypeA
GetStringTypeW
GetSystemInfo
GetSystemMetrics
GetSystemTime
GetSystemTimeAsFileTime
GetTempFileNameA
GetTempPathA
GetThreadContext
GetTickCount
GetTimeZoneInformation
GetTitleBarInfo
GetUserDefaultLCID
GetUserObjectInformationA
GetVersionExA
GetWindowDC
GetWindowRect
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
~G>mH|qu
	gnE#M
great britain
`h````
;H}<-#
H0%@#M
h0r|+U
h1.02W
H1\k$6
h!8v4<,;
':H9|	
hdcbVQ8DG
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
`h`hhh
HH:mm:ss
HHtXHHt
HHtYHHt
hk|((~~
holland
hong-kong
horwv_
HV.8sO
(ICi"8
]IDF@_
>If90t
ij5o+U
Il#xqU
InitializeCriticalSection
InitializeCriticalSectionAndSpinCount
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
InvalidateRect
invalid map/set<T> iterator
invalid string position
(*i`nw
ios_base::badbit set
ios_base::eofbit set
ios_base::failbit set
irish-english
IsDebuggerPresent
IsValidCodePage
IsValidLocale
italian-swiss
<]IyT7
I@zd,\p
j7h@EP
JanFebMarAprMayJunJulAugSepOctNovDec
January
jbhpOP
J^	*,e
jFl /.
j	h0+P
j	h4:P
j?h4rO
j,h$7P
j	h\7P
j/h89P
j?h8GP
j/h8{O
j!hDKP
j	hh}O
j#hh<P
j	hhPP
j	hL P
j	h@MP
j!h$NP
j	h$+P
j	h\<P
j+hp+P
j_h qO
j	h<rP
j	hx P
j@j ^V
jjWyPz&^&x
jkh8LP
-jKvtp2
jPhHZP
JPmK+E
j"^SSSSS
J]S>vv
jTh ,P
juh(FP
)Jy)\Gl
K~0PKx
K5j[/Odq
k{b43M
@kbdEr
kDK>+U
_k(Doz
KERNEL32
KERNEL32.dll
K\r%+E
KSB6+q
ktNG $'XI
l8\v6fJ;
`l;>B(
LC_ALL
LC_COLLATE
LC_CTYPE
LCMapStringA
LCMapStringW
LC_MONETARY
LC_NUMERIC
LC_TIME
-LDVe5
LeaveCriticalSection
(Lh:TM
LoadCursorA
LoadLibraryA
LoadResource
LocalAlloc
`local static guard'
`local static thread guard'
`local vftable'
`local vftable constructor closure'
LockResource
LPtoDP
l;<s\k
lstrlenA
L#u0TEW
>L[Uzi
lwUw>0I
m4#(Yvu
M6$_t)8
M7^Z+E
>m9K0HAS
.	+m9U
M*9u\a&
`managed vector constructor iterator'
`managed vector copy constructor iterator'
`managed vector destructor iterator'
map/set<T> too long
MessageBoxA
Microsoft Visual C++ Runtime Library
,MJC+U
MM/dd/yy
Module32First
Monday
MoveFileA
MoveWindow
MulDiv
MultiByteToWideChar
/#N]}'
||naMt
ND\>eRMhH
NDfBU,
 new[]
new-zealand
;'nM#E
NoRemove
norwegian
norwegian-bokmal
norwegian-nynorsk
Norwegian-Nynorsk
- not enough space for arguments
- not enough space for environment
- not enough space for locale information
- not enough space for lowio initialization
- not enough space for _onexit/atexit table
- not enough space for stdio initialization
- not enough space for thread data
November
N!.PHM
nsgC'p
(null)
N'w.P]T
ny194S[
Obq{@a
October
oI 5AoC
oJ~|Je
ojKhl$
ole32.dll
OLEAUT32.dll
`omni callsig'
OpenProcess
operator
'os^;M
OVK{#E
)|p/a$
__pascal
PathFindExtensionA
PathFindExtensionW
&pE*n`h
_P}</(;F
p`ioh6iJ
\PK.9"
)p	}`L
P!l8{@a
`placement delete closure'
`placement delete[] closure'
]pLC2^s
Please contact the application's support team for more information.
portuguese-brazilian
PostMessageA
PostQuitMessage
PPPPPPPP
pr china
pr-china
Process32First
Process32Next
Program: 
<program name unknown>
__ptr64
puerto-rico
- pure virtual function call
q(CPi4
<~#qK<
Q*Lm4Hf>q
=Q$n_D
QQSVWd
q%qv'>Q
QTy|VA6S
QueryPerformanceCounter
Q*z~5rn
Qzlh"<
-r#],3E
>@R<|6_
RaiseException
RcWYG-3Y
`.rdata
ReadFile
RegCloseKey
RegisterClassExA
RegOpenKeyA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
ReleaseDC
ReleaseMutex
RemoveDirectoryA
RE^S9U
ResetEvent
__restrict
RHg.u.
;r")hT
R&+j{^Fm
~R?=M!v q*
<RtkeG
RtlUnwind
Rt>W 7O
runtime error 
Runtime Error!
/Rvlzl
r"w9%a
*Rx`?$
S37?tHixYu
s4}j#U
Saturday
`scalar deleting destructor'
SelectObject
September
SetEndOfFile
SetEnvironmentVariableA
SetEvent
SetFileAttributesA
SetFilePointer
SetFocus
SetHandleCount
SetHandleInformation
SetLastError
SetMapMode
SetStdHandle
SetThreadContext
SetThreadStackGuarantee
SetUnhandledExceptionFilter
SetWindowTextA
S,F4/{?`3x
SHELL32.dll
Shell_NotifyIconA
SHLWAPI.dll
ShowWindow
SING error
SizeofResource
skzL+M
slovak
SNs<Shy
south africa
south-africa
south korea
south-korea
spanish-argentina
spanish-bolivia
spanish-chile
spanish-colombia
spanish-costa rica
spanish-dominican republic
spanish-ecuador
spanish-el salvador
spanish-guatemala
spanish-honduras
spanish-mexican
spanish-modern
spanish-nicaragua
spanish-panama
spanish-paraguay
spanish-peru
spanish-puerto rico
spanish-uruguay
spanish-venezuela
s[S;7|G;w
^SSSSS
__stdcall
`string'
string too long
Sunday
SunMonTueWedThuFriSat
SvSoV(&
swedish-finland
SystemRoot
TerminateProcess
TerminateThread
t=FA9]
|T_/g{_Dg
tGHt.Ht&
(</t$h
t'hdHN
+t HHt
This application has requested the Runtime to terminate it in an unusual way.
__thiscall
This indicates a bug in your application.
This indicates a bug in your application. It is most likely the result of calling an MSIL-compiled (/clr) function from a native constructor or from DllMain.
!This program cannot be run in DOS mode.
Thursday
tIj"[:
]T?ja3!S
tjwS3E
< tK<	tG
]T'Ln*J>e
TLOSS error
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
/tM:JCO
tmr2|'
<\tM</tI
T[Oi;E
to=txP
tQ-I9l
tR99u2
TranslateMessage
t[rEq;`t
trinidad & tobago
t"SS9]
<+t(<-t$:
t$<"u	3
Tuesday
;t$,v-
t VV9u
t+WWVPV
 Type Descriptor'
`typeof'
]tYyyr
>:u8FV
`udt returning'
u;h4kN
u,h,kN
	ukW}e
- unable to initialize heap
- unable to open console device
__unaligned
- unexpected heap error
- unexpected multithread lock error
UnhandledExceptionFilter
UNICODE
united-kingdom
united-states
Unknown exception
u	[O#d
UpdateWindow
UQPXY]Y[
uqSSSSS
URPQQhH
USER32.dll
USER32.DLL
u[SSSP
UTF-16LE
u,VVWV
|(-Uy}m
v5^H;cI
v{a=>/
`vbase destructor'
v`\b+M
`vbtable'
`vcall'
Ve4?k`
`vector constructor iterator'
`vector copy constructor iterator'
`vector deleting destructor'
`vector destructor iterator'
`vector vbase constructor iterator'
`vector vbase copy constructor iterator'
VELolv
`vftable'
]vhf~IR
VirtualAlloc
`virtual displacement map'
VirtualFree
VirtualProtect
VirtualQuery
v\J{h	
Vj@h8`N
vm~g15
v@mr; %
v	N+D$
v`PDzL^
v }RC/}m
_VVVVV
VVVVVQRSSj
)~~vxkZ
w<:53@
w5q'[\0
w5@}wHt
WaitForDebugEvent
WaitForSingleObject
|){w+E
Wednesday
WideCharToMultiByte
~-w&j5
!WjJ~7
w`k)M_
wr1d_5
WriteConsoleA
WriteConsoleW
WriteFile
WS2_32.dll
\wwpvY
^WWWWW
WzJYH(Y
x0|gJ4g:t
(X?4$vd
%Xk3L#
	@Xm+U
xppwpp
xpxxxx
<xtX<XtT
/{{"|Y
y3*H#E
~#y7V-G
y8/=t=
&`yh[d
Y%l	#U
YNh"!C
YOs|IcmQ
>=Yt1j
Y<\u#j\V
yU<Ue$
=z	"!.4(/
Z%8!$V:q
_ZCo3U
zE:[X^
z!H53U
<Zm?#E
ZTAF-,J
zuWz3M
zxKRTC