1.1
低危

bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5

bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe

分析耗时

13s

最近分析

395天前

文件大小

133.9KB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN WORM SOLTERN
鹰眼引擎
DACN 0.14
FACILE 1.00
IMCLNet 0.86
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba None 20190527 0.3.0.5
Avast Win32:WormX-gen [Wrm] 20200217 18.4.3895.0
Baidu None 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_100% (D) 20190702 1.0
Kingsoft None 20200218 2013.8.14.323
McAfee W32/Sytro.worm.gen!p2p 20200217 6.0.6.653
Tencent Malware.Win32.Gencirc.10b0d189 20200218 1.0.0.1
静态指标
可执行文件包含未知的 PE 段名称,可能指示打包器(可能是误报) (9 个事件)
section CODE\x00Feb
section DATA\x00Feb
section BSS\x00:Feb
section .idata\x00b
section .tls\x00Feb
section .rsrc\x00eb
section .qTczh\x00b
section .ufExUT
section .ijfeur
行为判定
动态指标
在文件系统上创建可执行文件 (50 个事件)
file C:\Windows\Temp\LordOfTheRings-FullDownloader.exe
file C:\Windows\Temp\SIMS FullDownloader.exe
file C:\Windows\Temp\Battle.net key generator (WORKS!!).exe
file C:\Windows\Temp\Sony Play station boot disc - Downloader.exe
file C:\Windows\Temp\Hacking Tool Collection.exe
file C:\Windows\Temp\Windows XP key generator.exe
file C:\Windows\Temp\CKY3 - Bam Margera World Industries Alien Workshop Full Downloader.exe
file C:\Windows\Temp\Shakira FullDownloader.exe
file C:\Windows\Temp\Winrar + crack.exe
file C:\Windows\Temp\Windows XP serial generator.exe
file C:\Windows\Temp\ScaryMovie 2 Full Downloader.exe
file C:\Windows\Temp\PS1 Boot Disc Full Dwonloader.exe
file C:\Windows\Temp\Grand theft auto 3 CD1 crack.exe
file C:\Windows\Temp\Internet and Computer Speed Booster.exe
file C:\Windows\Temp\Macromedia Flash 5.0 Full Downloader.exe
file C:\Windows\Temp\Windows XP Full Downloader.exe
file C:\Windows\Temp\DivX.exe
file C:\Windows\Temp\GTA3 crack.exe
file C:\Windows\Temp\MoviezChannelsInstaler.exe
file C:\Windows\Temp\Warcraft 3 ONLINE key generator.exe
file C:\Windows\Temp\How To Hack Websites.exe
file C:\Windows\Temp\[DiVX] Harry Potter And The Sorcerors Stone Full Downloader.exe
file C:\Windows\Temp\AikaQuest3Hentai FullDownloader.exe
file C:\Windows\Temp\Zidane-ScreenInstaler.exe
file C:\Windows\Temp\Macromedia key generator (all products).exe
file C:\Windows\Temp\MSN Password Hacker and Stealer.exe
file C:\Windows\Temp\AIM Account Stealer Downloader.exe
file C:\Windows\Temp\Key generator for all windows XP versions.exe
file C:\Windows\Temp\Quake 4 BETA.exe
file C:\Windows\Temp\Warcraft 3 battle.net serial generator.exe
file C:\Windows\Temp\ZoneAlarm Firewall Full Downloader.exe
file C:\Windows\Temp\Borland Delphi 6 Key Generator.exe
file C:\Windows\Temp\Xbox.info.exe
file C:\Windows\Temp\Microsoft Windows XP crack pack.exe
file C:\Windows\Temp\Half-life WON key generator.exe
file C:\Windows\Temp\Winzip 8.0 + serial.exe
file C:\Windows\Temp\Hack into any computer!!.exe
file C:\Windows\Temp\Jenna Jameson - Built For Speed Downloader.exe
file C:\Windows\Temp\Microsoft key generator, works for ALL microsoft products!!.exe
file C:\Windows\Temp\Gladiator FullDownloader.exe
file C:\Windows\Temp\Cat Attacks Child Full Downloader.exe
file C:\Windows\Temp\Half-life ONLINE key generator.exe
file C:\Windows\Temp\KaZaA media desktop v2.0 UNOFFICIAL.exe
file C:\Windows\Temp\Star Wars Episode 2 - Attack Of The Clones Full Downloader.exe
file C:\Windows\Temp\DSL Modem Uncapper.exe
file C:\Windows\Temp\StarWars2 - CloneAttack - FullDownloader.exe
file C:\Windows\Temp\Britney spears nude.exe
file C:\Windows\Temp\Star wars episode 2 downloader.exe
file C:\Windows\Temp\[DiVX] Lord of The Rings Full Downloader.exe
file C:\Windows\Temp\Spiderman FullDownloader.exe
该二进制文件可能包含加密或压缩数据,表明使用了打包工具 (2 个事件)
section {'name': 'CODE\\x00Feb', 'virtual_address': '0x00001000', 'virtual_size': '0x0001a014', 'size_of_data': '0x0001a200', 'entropy': 7.226803731724648} entropy 7.226803731724648 description 发现高熵的节
entropy 0.8393574297188755 description 此PE文件的整体熵值较高
网络通信
文件已被 VirusTotal 上 56 个反病毒引擎识别为恶意 (50 out of 56 个事件)
APEX Malicious
AVG Win32:WormX-gen [Wrm]
Acronis suspicious
Ad-Aware GenPack:Generic.Malware.SN!.235B2661
AhnLab-V3 Worm/Win32.Sytro.R27096
Antiy-AVL Worm/Win32.AGeneric
Arcabit GenPack:Generic.Malware.SN!.235B2661
Avast Win32:WormX-gen [Wrm]
Avira WORM/Soltern.oald
BitDefender GenPack:Generic.Malware.SN!.235B2661
BitDefenderTheta AI:Packer.0281AAF31E
Bkav W32.HfsAutoB.
CAT-QuickHeal Worm.Soltern.A.mue
ClamAV Win.Worm.Sytro-7112048-0
CrowdStrike win/malicious_confidence_100% (D)
Cybereason malicious.4d10e0
Cylance Unsafe
Cyren W32/Soltern.C.gen!Eldorado
DrWeb Win32.HLLW.Sytro
ESET-NOD32 a variant of Win32/Soltern.NAA
Emsisoft GenPack:Generic.Malware.SN!.235B2661 (B)
Endgame malicious (high confidence)
F-Prot W32/Soltern.C.gen!Eldorado
F-Secure Worm.WORM/Soltern.oald
FireEye Generic.mg.2cbfb3a4d10e0131
Fortinet W32/Parite.C
GData GenPack:Generic.Malware.SN!.235B2661
Ikarus P2P-Worm.Win32.Sytro
Invincea heuristic
Jiangmin Worm.Generic.zau
K7AntiVirus Trojan ( 005568151 )
K7GW Trojan ( 005568151 )
Kaspersky HEUR:Worm.Win32.Generic
Lionic Worm.Win32.Sytro.lzAP
MAX malware (ai score=82)
MaxSecure Trojan.Malware.300983.susgen
McAfee W32/Sytro.worm.gen!p2p
McAfee-GW-Edition BehavesLike.Win32.Sytro.cc
MicroWorld-eScan GenPack:Generic.Malware.SN!.235B2661
Microsoft Worm:Win32/Soltern.AC
NANO-Antivirus Trojan.Win32.Sytro.fvwiow
Panda Trj/Genetic.gen
Qihoo-360 HEUR/QVM19.1.5301.Malware.Gen
Rising Trojan.Kryptik!1.BB30 (CLASSIC)
Sangfor Malware
SentinelOne DFI - Malicious PE
Sophos W32/Systro-AB
Symantec ML.Attribute.HighConfidence
Tencent Malware.Win32.Gencirc.10b0d189
Trapmine malicious.high.ml.score
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

1992-06-20 06:22:17

PE Imphash

8eb90f63ff7fc0bd388dac1d27b3afce

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
CODE\x00Feb 0x00001000 0x0001a014 0x0001a200 7.226803731724648
DATA\x00Feb 0x0001c000 0x00000778 0x00000800 3.85836319129189
BSS\x00:Feb 0x0001d000 0x00000a25 0x00000000 0.0
.idata\x00b 0x0001e000 0x00000bfa 0x00000c00 4.866195168814016
.tls\x00Feb 0x0001f000 0x0000000c 0x00000000 0.0
.rdata 0x00020000 0x00000018 0x00000200 0.190488766434666
.reloc 0x00021000 0x00001c74 0x00001e00 0.0
.rsrc\x00eb 0x00023000 0x00001400 0x00001400 3.48566346147267
.qTczh\x00b 0x00025000 0x00000109 0x00000200 0.9991082581917692
.ufExUT 0x00026000 0x000001c4 0x00000200 0.5212220180699688
.ijfeur 0x00027000 0x00000400 0x00000400 4.525756926017651

Resources

Name Offset Size Language Sub-language File type
RT_STRING 0x00024018 0x000002b4 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_STRING 0x00024018 0x000002b4 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_STRING 0x00024018 0x000002b4 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_STRING 0x00024018 0x000002b4 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_STRING 0x00024018 0x000002b4 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_STRING 0x00024018 0x000002b4 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_STRING 0x00024018 0x000002b4 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_RCDATA 0x000242dc 0x000000b4 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_RCDATA 0x000242dc 0x000000b4 LANG_NEUTRAL SUBLANG_NEUTRAL None

Imports

Library KERNEL32.DLL:
0x41e1bc TlsSetValue
0x41e1c0 TlsGetValue
0x41e1c4 LocalAlloc
0x41e1c8 GetModuleHandleA
Library KERNEL32.DLL:
0x41e2bc Sleep
Library KERNEL32.DLL:
0x41e0ec VirtualFree
0x41e0f0 VirtualAlloc
0x41e0f4 LocalFree
0x41e0f8 LocalAlloc
0x41e0fc GetCurrentThreadId
0x41e108 VirtualQuery
0x41e10c WideCharToMultiByte
0x41e110 MultiByteToWideChar
0x41e114 lstrlenA
0x41e118 lstrcpynA
0x41e11c LoadLibraryExA
0x41e120 GetThreadLocale
0x41e124 GetStartupInfoA
0x41e128 GetProcAddress
0x41e12c GetModuleHandleA
0x41e130 GetModuleFileNameA
0x41e134 GetLocaleInfoA
0x41e138 GetLastError
0x41e13c GetCommandLineA
0x41e140 FreeLibrary
0x41e144 FindFirstFileA
0x41e148 FindClose
0x41e14c ExitProcess
0x41e150 WriteFile
0x41e158 SetFilePointer
0x41e15c SetEndOfFile
0x41e160 RtlUnwind
0x41e164 ReadFile
0x41e168 RaiseException
0x41e16c GetStdHandle
0x41e170 GetFileSize
0x41e174 GetSystemTime
0x41e178 GetFileType
0x41e17c CreateFileA
0x41e180 CloseHandle
Library KERNEL32.DLL:
0x41e1ec WriteFile
0x41e1f0 WaitForSingleObject
0x41e1f4 VirtualQuery
0x41e1f8 SetFilePointer
0x41e1fc SetEvent
0x41e200 SetEndOfFile
0x41e204 ResetEvent
0x41e208 ReadFile
0x41e214 GlobalUnlock
0x41e218 GlobalReAlloc
0x41e21c GlobalHandle
0x41e220 GlobalLock
0x41e224 GlobalFree
0x41e228 GlobalAlloc
0x41e230 GetVersionExA
0x41e234 GetTickCount
0x41e238 GetThreadLocale
0x41e23c GetStringTypeExA
0x41e240 GetStdHandle
0x41e244 GetProcAddress
0x41e248 GetModuleHandleA
0x41e24c GetModuleFileNameA
0x41e250 GetLocaleInfoA
0x41e254 GetLastError
0x41e258 GetDiskFreeSpaceA
0x41e25c GetCurrentThreadId
0x41e260 GetCPInfo
0x41e264 GetACP
0x41e268 FormatMessageA
0x41e26c FindFirstFileA
0x41e270 FindClose
0x41e27c ExitProcess
0x41e280 EnumCalendarInfoA
0x41e28c CreateFileA
0x41e290 CreateEventA
0x41e294 CreateDirectoryA
0x41e298 CopyFileA
0x41e29c CompareStringA
0x41e2a0 CloseHandle
Library advapi32.dll:
0x41e19c RegQueryValueExA
0x41e1a0 RegOpenKeyExA
0x41e1a4 RegCloseKey
Library advapi32.dll:
0x41e1d0 RegSetValueExA
0x41e1d4 RegQueryValueExA
0x41e1d8 RegOpenKeyExA
0x41e1dc RegFlushKey
0x41e1e0 RegCreateKeyExA
0x41e1e4 RegCloseKey
Library oleaut32.dll:
0x41e2c4 SafeArrayPtrOfIndex
0x41e2c8 SafeArrayPutElement
0x41e2cc SafeArrayGetElement
0x41e2d0 SafeArrayGetUBound
0x41e2d4 SafeArrayGetLBound
0x41e2d8 SafeArrayRedim
0x41e2dc SafeArrayCreate
0x41e2e0 VariantChangeTypeEx
0x41e2e4 VariantCopyInd
0x41e2e8 VariantCopy
0x41e2ec VariantClear
0x41e2f0 VariantInit
Library oleaut32.dll:
0x41e1ac SysFreeString
0x41e1b0 SysReAllocStringLen
0x41e1b4 SysAllocStringLen
Library user32.dll:
0x41e2a8 MessageBoxA
0x41e2ac LoadStringA
0x41e2b0 GetSystemMetrics
0x41e2b4 CharNextA
Library user32.dll:
0x41e188 GetKeyboardType
0x41e18c LoadStringA
0x41e190 MessageBoxA
0x41e194 CharNextA

L!This program must be run under Win32
.idata
.rdata
P.reloc
P.rsrc
P.qTczh
@.ufExUT
@.ijfeur
EM]]]]]]]]]]o
gZ?>YMZ
]]]$8]
W3/>]\]]]]
L\]]]]]LU]]uLq
]]]]]]]]]_
3/$]]^]
f8%&]L-
f81&]L-
f8=&]L-
f8e&]L-
f8q&]L-
f8}&]L-
f8E&]L-
f8&]L-M
f8Q&]L-
f8&]L-A
f8]&]L-
\RpyfD)
,YLd[nLdKWd]NY
f5f/p8
]\LYLd
6dIfL]LyLf
ffLUL=^f
YL2f,L;
D)L5<foLU
fWLY#?&
QF+8]F
NyfLy(
B-(*X{8
dMDy)f
YNyL=-l
8Il8]l
!+f!f<C5]
8hQ_]L9
UfRI{]
QJyf/8
8n!]h;8
n&(f/w8
>dI`8]l-8fiF
3.fL;v
)U^]LE
yB$$n,f@;
d_NY.d_NY.
KL=(/*X{8
L'.=!*^]Gf/T\
]mdV.A
XL-=!ndMD-Y/'8
l]GdU/
nfOL'&]m>]m)*X{8
5E_4f/8
8fB6RCo]
fJj<="f
Jyf/c8
\MyD)Q
}NYNfMNYNd
]D-Y/t8
n7fJybH;
Y-fZ5.
(nWY]/
J]n?fL9
8na)f/8
_Y"fH;
f7&NULYU
f+?!f;/8
n}9fL;
< VQ]F
]]b]L.
]L3h5f.
fLUD'_N
A,\]q]
ndMD-YN8
]/}f/Y8
y989N]5
N/BB]fM1/_%
8= *X{8
])n% *X{8
Xy]/nf l;
8na!f3
fD-Y/q8
x]GN]we]
IfLyy
fL5U]0
P{989N]5
)fL&/C\
V]DU]]
J]f/_]
dN%d0N
g^C-)}
g^C-)
g^*pfL8]fLn1
.+gNOjf
L77f/C1C\
f/'q.D
.;}\/r8
L-;}_/~8
1Y-]Jy
]m]T^]
]T_],]
]i]5G]
iU]N;FYt:RB.];8Y
8RC']7d
6GQ[])
]NIl#_71
8n8dN;FYv:)
;LYlv:)
WLILN(;CLU/(8
;\;^;_
eD-UD/U,
DM>(]\
`w:+`t:*]L
7n8Z/8
8fJ]dO
;FYv:RS-i]
]LIMW>)
8eO%J]
dN:;FYv:)
LQLM<^
]]N5%T]/>8
Gy8F)]]L-
D(+d/g8
N.;LYF
]=R@O]
m&)U]MQ
]~]()T^]D
28n8yN*
&>+\_F
N,RpY\?*
<)?X]G
%<)mNM
gCi2</mmm
;FYu:RS-i]
QLUQ'"
}}}}}}}}}}}}}}}}}}}}}hbi8
J].]L-
i]IRJl]
n`IU6nk
(N/%)`IU6Tj
n`IU6nk>,
mN/%)`IU6Tj>,
3,lk4.]]]G
"]]m]]
A]]>]]Z
{]w i]3
63g]/dY*]
: 5$?{
K8B/NI\(Kl^K
?CM$(=
xRViMD$N
m3\z}M
ZY(^\L.
]NJ\5C
?%;/;d"
ffL.a]f/Z8
X/o^WhfU8
LB6)fF,
@fVD.YLMB
)f&din
;fZ/]h
dLB-)fUD-YLfELYY
ND-ALB6)fF,(l
ULB-(4..D-LL-8
o$2()(6f
!1NfSD+__;L\
%1IfcD+[M[4)`)
o$2(*(6f[
qLQB-)fUul
T]/YJ]L
fM8Wm`-
J]B$)f
^D,X,L-\
]RB\3*
]l]dLyf
2]8]]]NM]]LULY
]Le]]LW]
]RB\3*)
LYLXJTN(h(
8ELL8D+U
ILQ,\]
]8]]]NM]]LU
~]/WuO]d]f
LUD,X/S8
q]L}]]LO]
$]f]fWNe]]LU/<8
YD,Xd_8<L-
Ww4],8
]RBd]]
JfWd_N
UL9NL>
]LUB-)f
]B-)fm6
gO[L.]t<fh6LY
]L=%UMn
&8b&8G}
])fJN=n
WB-)&8
<TV]4H
fMB?)*]]f
fNB?)*^]f
i38.B?)f
ynn938;
_9]D-Ud
n;fNyL
RJyfL&
%T\]/8
W;_;Y;[
B?)fUB$RCk8
<B$RC8
8dN/f
dLdB-)f
H]h86LL=*
D+UD*U,
^fB4()
$]8&]8d
fB-).]
eLodL/8
mLw# ht6
68fNN5
dN;l8hh
d-;+Yd/Z8
f^B-)dL
D.YJ]B?RCQ8
8fB6#`
f/]fL*
]fZLyf/
B-RC!8
W;_;Y;[
8.B-).]
_fB4()f
fL77f/
5f61zL+
8hf7_L+
WLLfKLY5T\]/]
dJLf!f
R]D+UN5
)Ri]RCf]P]nd
WN5^_LsfO/8
M\JUf2;
S>RCm]>RCe]
98fI/8
8UY],\
8fI/M]
fK/l8
c]D.MD+M,l
`!dLU8Y/8
^j,dN
IN5d/'U
]LdAfY
]-o%]n
Y0yLy0y
W07nn
r6)d~]l8
D7]D"\$$
}>!mX?l
d?/.Rj=-.J]
n+dIfz]n8*
y]1VLyN
=-/m>mJG/G
m,?l8]n
GyRC>]
]Ms8fG/G
W?l8]nn!]
t^NYD)UNyd
UNyn!]
FDy(n!]
,R[-gM
Gs8RR-WZLyN
f/B_L-
;fFLUL8GB
]Y/W8
+ +^NB
fNNLQ6
]i]LNB
?f:f5_L1_
\]D.YN
#n 7)fB
SLB$)fO/8
Y'Y8l!]]
1[LYNMLMF)U]WfH-
fOB?($._^8gMC?)m
v^8dB6)X]Jh:
hP]LD-_/8
7mc0]`
]f(;nf
=\RHr]
8k_8^fG]h
"/1s1]
50]]fF)9
]u?5]G
]u?5]G
]Y?5]G
B-RBd]n
(X]L`$
8\8XJ^/8
]i]Jh9
\mfWJh9
i]m ))f=]
)/1921]];<
>8]]/]L-].
UU]/68
LY=(Lq
WU]L+z.8
fB?)fWB$)f
6f\N]f/x8
fMB?)*]]
b]B$(.
LULMLQL.;8in
/QffLUD-Y
n ?RCU]n1
B-RCj]f
[G&OmG
bG'Omn
/f(;],f.f
](y]ml8],L'
L7$-<mRBt]%%
L*Y],f*f
mGVf+u
::989N
W+]5f-
&5989N
5fB6)l&] ]]Jy
dMl4.8
?Wnps8
f8&]L-
8fB6)n`:
B-(U]/8
{fH]fYE.Z
]L.78J]f-
f8%]L-u
f8%]L-a
f8%]L-m
f8%%]L-
f81%]L-
f8=%]L-
f8a%]L-
f8m%]L-
f8y%]L-
f8E%]L-
f8Q%]L-
f8]%]L-
f8%]L-]
f8%]L-
x0989N
84y]]]]]]]]]],M]
->)3Wm,]]]]]]]]]]G
}aQ]wz
gQ(;0$J]
]]]]]]]]]
2/]]]]]]]]]]
gT%/1L-
]]]]]]]]]]a/M]/
8<%-2}]]]]]]]]]]
]]]]]]]]]
]]M/]S
2Wq.]]]]]]]]]][
gV<8/]]]]]]]]]]
)]]]]]]]]]]
2}]]]]]]]]]]E)M]
]]]]]]]]]]]])]S
/49(]]]]]]]]]]
gT+;*L-]]]]]]]]]]](M]
]]]]]]]]]U]]5-]S
+42)9]]]]]]]]]]
-+]]]]]]]]]]
]]]]]]]]]A]]
>.2)3J]
]]]]]]]]]!]]
418W9*]]]]]]]]]]
gS)681
]]]]]]]]]m]]
e%]]]]]]]]]]O
]]]]]]]]]]]
.)349J]
]]]]]]]]]
2}]]]]]]]]]]M$Q]
$]]]]]]]]]];
]]]]]]]]]]
81%-2}1]sY]
$).L-8
]]U]]]]]]]]]]&
<2)D-.Bl
]]]]]]]
&]]]]]]]]]]
I9u]cG
fL.RG8fL+n
fjB6)g_/
d-%.<4J(d4K(
5Rq.Rq:t
5fL+ 8
B-)g[Rq
W).f/H8
=-/m>m
fL.X8fDy
8fD)QJ]
fn+fJyf/28
YD)I.8
fL]Jy
Lf/\8
C6)fL(j]h
UuF]/p8
L57f/M8
+dJN;5C(dd4K
J]5fL+
D)L45fD
B]ff/Fa
[JyfYz
LfL;?8
ffL.).8fD)
P#)AaSm(4d
GW'.?cj'.?
)mad6W]Rq-\
LRqY8h
1B]-]f
=dNLYNYG
]f^LYL/8
d^NY=(
8TM],T
S05]]p.]`(X
pZ]N+mbt>)^_G
]mF[H:
OL}]?+UR]
JNRq"
=fB6)h
W? ]p07
? U_]D
9]f ;9p8]n
\<*9f#^]Jg
Rx?f"n:E$"]mmmc
-)eMF-)G?]m4GT
8G?YvLUD
X}]Rx$"]mm
RMC-)*G
5TR]&+e
%1f(3h
}uyf/Q`
]]/]1]
(l#]m)
D8;f ;6,
5\0 1v;0
?2(/`&WT]\g
]DGf)6
^'.5X9`lt[d
2(/`&vT
O)/(e(
dO%YG]g
-mmeYG
]]J`]8
LL+U87`
]JX~]0
LL*/Z8
"J]fn1V\],<)
C78WZ]
1785K}
?]fL;QX8
;fL+W8f
b]WT]JC8T_]/8
WT]JC8T_]/8
qSL*~
B-(X]Jh:
ub]f`4
8TY]/8
R5R]L+
lZ8fL.
LI8`o
f/Y]]]l{
l;8:8]Jy
J8fL7?`
LQLUL+
<8fC6)
K8fL7?
?W_]/8
(6nHL/,
W%-8]\]
L/D8L-
md}B6)`
C8.DE8
JUD,YLU/78
|wwwwwwwwwwwwWf/8
]]h]\B68
B-RC{]
~\B8fw
8_\f=+;
]J]JfY!8f
8U\]/X8
]?.F)18
h]8IMx8]
l]GXn9
RL.S@8f
fL5n8f/8
L+<A8fL(
RCl])h
Ly=f=6
JJ~]D8f
g]J/<8
]99&(-nn
]~]bn`
]C6)+X2:
O]U]Jx18
'8U]Jx79
"]]]]]]]]]]]
JTb]}]
L?68Oq
]JTb]}]
L?68Op
~U]f/(8
W@]L.3
]JTb]}]
JTb]}]
v]f/j8
PJ}N8`
W~]L.I
bJTb]}M
WY]/!8
]}]hH8\q}]
b]J}]O8.q8
Q]09$$]
(8fB6)d
a]J/(8
7"fB6(
MLdN}]
63n9]])./
)fLY/(#8
C6#f/C8
f0hf(3h
]>8fNUN]-
NUNQ,f/fQ
^JYB6(
LdfNJ
7fL+fLYB6)n&(6hf4XLY,
}]jh8fL*C
8_\fQ'
bX]nfL-
L77f/]
m;f/O8
NLLyi]L/|8
md}LDQ
88]B-#f
LD-Q}]8
md}L8ALDA
\zC5)f
ffD)NJLL}/88
dUL/a8.
Wi]L.qa8i
Y-]\L5n
]]]-]]
]}MQy8
]]]]-]]
]]]L-Mr]eY
]]]]]]]]
4)-}9r]
.0/3$Mr]w
ffCl8;F
Z*[<\;
]C-)fLyL
GLULUNa
f_L%;F
LfL;p8
8:\n]n
RL*9fbHb
NUJULU/<8
bHf81].j];
']NUNQ.=]
NUNQ.,]
\]235hCV
NUNQ.o]
/JLU/58
NUNQ,n
NUNQ,RpU?
IjI]8~V
,8Q8UJ/-8
;f/Sn"(n"RR-d
hMUOU,
{]J/$8
|8.$i8
J85]JL.
S]fL+;L/k8
989N;L]Y
.z];F.<(fL+;L/8
fL+;L/88
N]C-)fL;
{8f/g8
;L;LL*
8f4RLL*
]l(9(f
l(<\;D
md}LJTU
MU,RyU,RpU,
D)L5Rp?R@\h
]LU^dYd
x]NyNy
\]NyNy
YLyLyn
D)L5Rp?R@\h
]LUNyLQNy
INy2qn
8fL/W8
J85]n 7)
fLULq8
]C-)f/8
]Ly/.8
6fL5;DU
fL5;DU
+/f/8
L/f/8
\JUL;~8
;f/t"8
fL5;DU
L/f/$8
]JUL;t8
W+]5f-
f/]fL.]i
9\n]ZF
u]l]H]
RCy]]]fL*;~]/a8
8*fL*;~]/8
j]fL*;~]/8
\]n&(l&
md}lf(`
JL;e8f
JL;(j8f
]J}]58`
?W_]/$8
RLfkl8
md}lRD*];F
i;RpLJ/
)]ZLJ/
]JL.]i
i;RpLJ/{8
+fE8q.4]
8fJ/@8
"J]ffl8;D
NL*?R@_]h
8m 0)fL.
]88LL/8
CLLNN,8
?R@z^h
L*]]n 3(f
NLLL/8
8203L//"8
._<(n 3(f
9]n 3(f
NLLL/8
a]LLL/b8
Y?_\L/C 8
LLL/38
.LLL/+8
989N;F
9\n]l)
9\h]J/_8
#fm8YC-RCi]
;L;RpLJ/n8
#fE8iD
O.%\Rp&
i;RpLJ/O8
/fE8iD
]JL+]i48
;TV]LL
ffLMLIQf.
GLMLIQf+
]J}]I8.K8
d]f/Y8
LL;]fYfE8m,o88
ffCl8;D
Rp.Rqm
'f/_(8
Rl.f/]fL.!]i
TP]LyL
.;LUn05d
DL.28f0?
?)?(n")
]C-)fLyL
Rl/fL+]in
fL5;L;B-(
\;D\y,;L;D
md}f^h;D
;L;N;FQOLU1\TLUfEdG1\
f1.\<"
C-(]N/
D)Mn?fL!
B-)]I/68
/]D)C?)`
f]]`RS-
C-(]N/8
Rpf)]I/
C-(]N/
8i;F)]R/:
Rpf)]I/(
;Ll8Rp6<(
B-)]I/n
L[B$)fLL/J]
#R\]L/^8
Q(-fF8y
L(]fHk
h-naF)^\,
C6)fZ/,8
MLofIAfRN
dI_1RL+I
8dY]fkf-f
=(W]]L/J]fT[]7
Zy]fL*w
8#fL/.8
3fL/;8
]L/m,8
S8fLL/68
7hi]L.?"]n
LRC\/RC*]
Oi]2]]i].
#]4[J/78
]0[J/78
]2sJ/78
p]0[J/78
fK/78
fK/78
?">]nx]
^i].\/RC:]
]RC3]$]`
598dZ.)]
1J/z;8
=J/v;8
fJ/E;8
}I7]s]]]8
]f=/W8
7]f=]V8.8
ff[/_
fLyfE8A,
BJf[/%\
MfLLLf/\
ONf=T8
O5]f=W8.
;LYd_w
5ff=+T8
md}l/L
Rp>-\f
Y-]\OG
8d[D]X)
Y-]\O-
i3]f=T8.e8
"Wf/8
md}D-]
Wr]N5]dwX
U=x]NQ
dK]Uuq]Nn]
d_]U"]Nn]
dc]Ue$]Nn]
fWU>]/8
oJL\n8f
;NML8A
fL5(f/8
]L+n8in
]L+n8i
B-)d?)g
_MWZ!8EJC
LYB-)f],%m
na](da]`!
8BGR9f
L^YGZl
_;L</f\G
N:fkt)
l]G_N'
8\7eUG
_;N</dU
=]m(dLUGV9LRx
M\MUAe
_O%O,c
]$8fL;
]L[N%v
l]G_N'
md}JL:98f
J]fLgTG
fFM,)m
3d(?f.l]GVLL8,
^8]J/\
?989Nf]Mq
(fKR=d
^NNLM]m(fL8,
]h]L!
8^7f^L<
.F]6avg]f[NyLYNy
(fUR'd
MLM]m(f
M8y6avf]/
(6q5h3
d_LQNYf
]602g\
(fJR<d
^NNLMF
u]60n?2av
Z]605P+
60n?2av
LfL;.8
l]G_N'
`Id/\8
=]m(dLUGV9LRx
8\?d/8
ELM8Q8URx$^
YNyf.l]GPLyLy
n?fLUL4$]
l]9SLRx$^
YLM]m(fLy
[]]]]]]]]]]
gQ)<//J]K
]]]]]]]]]]]
/)//L-]]]]]]]]]]
]]]]]]]]]
2uZ]]]]]]]]]]_
2}]]]]]]]]]]
]]]]]]]]]
]]]]]]]]]]IUQ]
]]]]]]]]]
/:.//J]
]]]]]]]]]
]]]]]]]]]]%TM]
]]]]]]]]]A
/9.W]]]]
V]]]V)
eyY]]]]
xV284)
]Z<8]J][
iq.+so1._
]]]]CQM]
oS]\]_
]1.]f'
V)3)U]]
]]=V]S
S]]]]]]]]]]G
]]]]]]]]]]
38/0L-
]]]]]]]]]]
1)<-R]]]]]]]]]]
]]]]]]]]]]
P8/)<f
]]]]]]]]]
w[4/WL]]]
L]]]]]]
AL]]]-L]]]]]]
Lyf]8uDy5]n
]]]]]]]Oq]]
ya]M][
03)WuNZ
]1._1LU]9]]]G]
\]]G]\
]]]]]]]]]]
]]]]]]]]]
LYL>]fLyL*
fB6)f/
=fLQLUn
`]f/Q8
<!fLY/Z
C-)fLY/[
9H]]D)QL*
C6#f/O{8
B6!n1f
B6!n1f
L]/N 8
md}L>+4
<!fL+-]%
f/^f(f
L45]]L%L=
OLYN8UB
fE8YL+
fL51XU
_LYJLYJ
n?fL7)
W+]6f-
q@989N
Lhf!fH?+
=#fB$$n,
f/I]J]
>fL51XU
_f?yLYNB-)\_L=
_JY/U8
f7DLYJL#v
_$/pM8
UD)/C8
bX]nfJ]fD)/C8
md}LLY/wG8
UL/8@8
md}LG}
MLLYL>m
;m%(fH+
fL+]fG
8f[/hE8
PJ}5|/
}J]fF)9
B-)fS8
dZL*H8h
zL.uO:8i
T$<Lm\]
ZL+"]\\L;
LU/GK8
,]L+]fh
;fM8}-
8f^/I8
W^]/x8
NLD]h]D
7f]/K8
B<8fB6RCH];DU]]'8d
md}LLz8f
LLLme|LLL/Q8
LLLI/'}8
fIfU8M.
C6#f/K8
fU8eL5
~u989N
md}LL71p
?fU8EL%
J]fD)d
fLLffL
]J}]8.8
_\f]UD8
;f/'`8
j]J/A8
md}L/+8
;fU8ENJL;
;fU8EL%
;fE8yLL;
md}JL.
#W]/F8
]]JLLL
8fL/@8
^?8LL&n
]]JLLL
8fB6)f
8fB6)f
]J}]8.8
fL71q*
fe8QLLL.
"J]fD)n
xJfW\]L/C8
fE8iB-)
/Yff7}L'
]L/(W8
md}L.<]fL.y]
fE8ULLL
;fe8QL>
;fE89-
M]J/IK8
fLfL.
&l989N
]J/PH8
f78]L'
Lo989N
fU8AL/
Ln&)f
fM8MJQL;M
8n&)fLQL
md}JL;V8f
o]J/oI8
\gNC?)m
md}L/Gc
;fe8QLL/=
$]J/N8
m;f/,8
fU8uC6#f/T8
ULINy,
fLyfLTe]
Ln%)fL=
]fLq8u.
n&)fLUi]
fU8uL.
fL51XI
78fLUm]
>fL51XI
fIfQfL
fLhf!fH?+
8fLML/sM8
Lhf!fH?+
Zy]SY]
Lm&(fL.
fLm&)fH+
L.h8hf#fH?+
fL.P8f
fLfLUi]
f7@LMJ
fLm&)fH+
8hf!fH?+
8fLUi]
NNNLLL
(7^Nf4
NEJ]C?)fM8
fD)7_\L
fU8I/U
YD)M.J]f8Q8UL
(l ]m/
ffD);NL
Nf^/>9
WLfS(/nf
+f^LINL
fDQ8VFU]GJ,!n (l
fLNNLL
]]L%L=
UD)/]8
8n8_-LY/
]J]fL%
L+]fC6)
8fLQl8
8n& d(3+
_\fq[48
fLYB-!
C6#f/9
fU8AL=
LyNMJ]
Lf&fL.
#fWUl8]l
8dWLYL#f
(f/Nq8
]Z]L8f,
Rpf/q8
8qUf#fL.7
8d&f,n
L7?f(d
.A]]]}]]]]]]E]
]]]]]]]]]]uE]
9H]]D)QL+
\gNC?)m
JI}]k8]\
W+]5f-
LLQLY/
LL*z]fB
(W]L/We8
*/]fD)
md}LUn
(n ?)f
C-)fL*Y:8f/9
<!fL*58fLY
fLMILYT\fe8ML>%
C6#f/v9
f5fL-L+
]i]L/yEa
GL8ML/
3TY]L/(^
LLLYLL/G^
\LLI8M-
]C-RS-
=fJyf~
B-RKx]
;fU8}LUL/^8
"J]fL.-]t
L7g]f/8
o]LI4/d
fLULQLYL
md}JL.]f
md}L.W
q:8fL.>]
C-)f[/w9
d[LUL?N]
LYLULL
]fLU?
FLUD-f
3fL185LUD
md}LULLuLULD'Ln
3fE8ALUL1A
BLUL/8
]fLULLULL
LUD-/8
md}JJLL
]LLqNLLAN-
TLLNALn
HLLqLLS8
LLiL/8
CLLiL/$8
[]LLNqLLNA
u]J}]w
;n%(_\fT6
md}L.;y
n?fL.x]R
K8ML.f]d
ML9]f/
n](f~]
Lf/V'?R@s]GJ
]]]_]e]
W%]/'9
rJyT_]L.
JL.]f~]
fLM!]O
a7DL.]RO)f/8
md}J/9
8n ;(`;
;f]/39
7"J]fLUL/W*
989N]f
f4WLGE8(6f
NLmePL:
SLL-L/
3fU8MC-(
L&L]/Q8
LULLULL/|8
md}LDU
LLmevLL/L8
LLL/R8
LL.s8fLL/8
aL/=^n
LLL/+8
]LL/q8
LLLELL
]n ?)f
;T\]L.t
;TY]L.>
8fL/>9
md}JL.7
8n ;(7
;TY]/38
8.f^/]W\]/Yf^/.\
C-))f^/P8
C-)}f^/F8
md}L/!8
'?R@\h]
].&]]f
`].T]]f
v].J]]f
]U\]/8
0U\]/8
8WU]L/`_
C-)+f/8
"J]fD)
QL'fL
fL7;D
L77h<\#f~\
7TY]L/8
;LYd^L>
98.b68
|bbmec
M.?R@\h]
8Pi^]L+`8
82#vT]f
NUNQ,L
L77f/W\
+i;DW
RL.]fLQ8U
Fn )f/1@
LfL.58d.
]LQ4/d&
_WL.]f
LLYLL.
=8.L:8
/UffLULMLY/j8
6989Nf
\]L/@Z
LULLmL:_8fLUL/L8
fNLL}NLLuN-
1989N;DAf
rLL}NLU`
fU8yn>
]LLN}LLNu
md}Jx9
LLU/m9
vfUL/8
3M)]OL1@
EL1ARLDm
6_LLeML/X
{],R58
j]LLmNLLiNLLeNLLENLLuN-
.2989N
_\fT,'8f
u'8.?8
dM-B%8
f.]]]8
d.d.f/bK
C-)_TL.j]
C-)_PL.]
8]3]nam!na"__L.]f~]
]L9]f/
0]JU~]
\JyT\]L.
Y)fL./
.]]fD)
NNLL$8
3n 3RIh]
md}LL$8f
^8.9 8
`(8fLULLEL%8in
md}JLULD/G/]9
feLULu
LLUL/O
I8fB6)`
MLULL/
md}LULD-q/:9
x]J/b9
`]GULUn
3g]9%)
]*'sRS-
88LUL/[8
n%;(n%?RS-
88LUL/
md}LULU
md}JLULLUL/08
~98.%8
TLYB-(2
]LU.(f}E'#8
)n")n&)f
]8UL+]
fLULULLULULL}/"8
md}LUL8qJLULD/G/9
;nW^]/m9
LULN}LULL/8
R]LULLN}LULD-qL/
hLULLuf
+W^]/9
8]s]f7
n%;RS.
LULyC6(`
{h8n ;)`
'JLULLULL}/8
?hLULB
fLULULLALP8m?
;_P/_U`3
f]L>CQ8`3
LLUL/y8
JLUD-/<8
PLUD-/D=8
88.C-8
md}JLULLUL/8
]i]LDU
Rq?R@|]h
8imL]/AN8
ZRC\?R@\h?D]tn
]JL>?8f
LL/Y]f/
C-)_TL/aY&]_UL/Y
GJL>;=8f
#fE8ML/8
/TY]L/_8
}U8fPG+
_\fIZ8
A]J}],8`
|bbmec
md}JL#
t@]J/f9
Lf/9
]L9]f/8
fLfL:)8rL*
/8dY_IL.]f~]
NyFy8]
]L9]f/g8
_QL.]f~]
md}JL+
;TY]L+U
Y8fL7?MN]OyB
)fL+]fC6)
Y8eIfL.+]n&)
]LYB-)f/\%
ZL.?^8
Lf/8
L7?fL.;y
f/zYM_\L.]
LfL.
LMB-)f
|8gQfL
LMLU5!fh7
[LENQM]iM]f
LfLU/
8]B-)d(3+
pLMLUh
_\fT]8
f/]f/J]
5fJUL;T8
fU8eL5
fU8aL.
J]n%)f
fE8A.A8f/Y}
fL.#G8in
]fLUD}
JmU]/zA8
D8UIV]/9
_\f=T`8N
]]]]]]]]]]
gO8.$>)3W
]]]]]]~
]T8.$n?fNy
LU]/L^8
]Gf/o]
bX]nfW
fL+]fG
fLYB-)m&)
^8J]5fLU
NYJML:^8
]W\]/D9
md}JL>_8f
LE]L/9
J]LE]7f
8298hy
9m 9)n#RR-E8M
]8.=G8
}]xu8`
98hyLy/}8
=fL+/_8
8fB6#fL&n
LEY8fL8
;7f/w9
B-)d(3+
md}JL>B8f
8fB6)^<8hx
8]9)n]8
<}}818
1219s88
8<<.}1
}8}*288]
2}}84.(}*288]]8
}/})/3
}//.)8(}*288]8
n}0<8}/}9)8
1219s88
<.59(}*288]8
$)4}29>}*288]]8
.88]]8
</219s88
6}9)1s8
1284s8
1219s88
<29}<}m(}*288]]8
}9}>-s88
8./%8
1219s88
2<}14}$8/28]
4o(}*288]]8
3</%]8
1*288]]8
3</%]8
9)}1219s8]
~]6()8<
1*288]8
313</%]8
<p/3.1s8]8
1*288]8
}1219s8
J]48.<}98]8
6}3</%]8
42}}/18/28]8
%3s8]8
<13}$8/2u
</)})88.4}3</%]8
8:8)s8
]<*.-2}93</%]8
'}m}/1%8
4<v/6%]8
}3</2<}3*
+.38]8
8:8)s8
6}3</%]8
3);<2}l/6%]8
<29}$8/2u1/(.8]8
<0496-o}
/2}$8/2}/}/
0/2}2>|8]8
>>-6%8
<})<}0)|8]]5f
V989N58]`
f8fKOiHx
f}]|K8fZ/
De8W\]Jh9
B]2*825.2133
<28]]f$
md}J/8
md}}]m7
md}}]m7
8Ul]/9
B-#`r8
]hZ]Z(9h]fB8
=hN8hfB8
-xO8)fZLy
8Ul]/D9
W].14]8
(3:3]8
V]%19]8
R]0}>.8
989N]Gf[/8
8W^]/9
Lj]Jh9
A]2*8<<2133]8
S].154]
-p8fJ/9
7W^]/|9
vp8fJ/
%Cu8U}
Runtime error at 00000000
0123456789ABCDEF
KERNEL32.DLL
KERNEL32.DLL
KERNEL32.DLL
KERNEL32.DLL
advapi32.dll
advapi32.dll
oleaut32.dll
oleaut32.dll
user32.dll
user32.dll
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetCurrentThreadId
InterlockedDecrement
InterlockedIncrement
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
lstrcpynA
LoadLibraryExA
GetThreadLocale
GetStartupInfoA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetLastError
GetCommandLineA
FreeLibrary
FindFirstFileA
FindClose
ExitProcess
WriteFile
UnhandledExceptionFilter
SetFilePointer
SetEndOfFile
RtlUnwind
ReadFile
RaiseException
GetStdHandle
GetFileSize
GetSystemTime
GetFileType
CreateFileA
CloseHandle
WriteFile
WaitForSingleObject
VirtualQuery
SetFilePointer
SetEvent
SetEndOfFile
ResetEvent
ReadFile
LeaveCriticalSection
InitializeCriticalSection
GlobalUnlock
GlobalReAlloc
GlobalHandle
GlobalLock
GlobalFree
GlobalAlloc
GetWindowsDirectoryA
GetVersionExA
GetTickCount
GetThreadLocale
GetStringTypeExA
GetStdHandle
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetLastError
GetDiskFreeSpaceA
GetCurrentThreadId
GetCPInfo
GetACP
FormatMessageA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
FileTimeToDosDateTime
ExitProcess
EnumCalendarInfoA
EnterCriticalSection
DeleteCriticalSection
CreateFileA
CreateEventA
CreateDirectoryA
CopyFileA
CompareStringA
CloseHandle
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegFlushKey
RegCreateKeyExA
RegCloseKey
SafeArrayPtrOfIndex
SafeArrayPutElement
SafeArrayGetElement
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayRedim
SafeArrayCreate
VariantChangeTypeEx
VariantCopyInd
VariantCopy
VariantClear
VariantInit
SysFreeString
SysReAllocStringLen
SysAllocStringLen
MessageBoxA
LoadStringA
GetSystemMetrics
CharNextA
GetKeyboardType
LoadStringA
MessageBoxA
CharNextA
7project1
IniFiles
"RTLConsts
System
SysInit
KWindows
UTypes
SysUtils
SysConst
^Classes
3Messages
CVariants
$VarUtils
QTypInfo
sActiveX
8Registry
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^

]13]\]
EM]]]]]]]]]]o
gZ?>YMZ
]]]$8]
W3/>]\]]]]
L\]]]]]LU]]uLq
]]]]]]]]]_
3/$]]^]
f8%&]L-
f81&qB
UUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUUU]
4PTvey
.#[V#1=?S:
%+LYh5u>
;!_{\B].PlQ\v^`
nQ=wk|
($R4FL[FW1X)^';d
f2#|-)\m
P`2/Le
+/Uub.
xlIM*ap_OA/]|
"ZN"Hp
^Y|<L+G/
DP7WmA
Y%u|;!?W{
lFT<j~@\1
:@e<=0
1bP>\w7
j[70a|
L8:d4$
)o\_}\Nu
hmyGXMw
sPz<QA
avHx`Hg.
z^`AXhIS'~
_J.>YmfeV
T1wk,DsVjLh
i$wxyS4":l[
ViB?qpKu
f9<tBn9KP,Y4y
yNpJxMG#
q ggF-3
7.aj<e
Am)dE|%pL8@
~"@vcO
R\K[xHl
z+V]4f
[$EQVp
0Rs_vD-j
L7|t~c
eDwrKlL
UsaFncU
>SEDOz`Z
T_0j@y
(c`}w|
K#%)S@&alsi
Ng`$Z|N~}?()5p\+
$_+|\EfP`QCE)F
! x?$g]
/3"1`+K
;:7Ri'
u+L|HlB8602m}
X~f}<}N|
gDzR]lLYvO PF?
{J;E7M
}-YhLQZl
UUOO)
q)_|Hc
4Nl]V~
!}Mq|t
.j,S/eE
k7Xs5$]3r
0_MB.'p
<)\^9AZx
|GGWz;x7s%
Q_H3uhNnfE"3;+
/xf5qaD="*x3MC1
=vwpg/
lb/dLE1e
HgW?w%*iG
:BG*R4
'nnkW8y
Rj?B1IViH(Hz
([t"~z:hk8mU
hI;s^n6%=B
9)lo/TI
(hSrZ&
dq{@De
.Q<Bz9
o.)wiJ*\
!d6<Tb=n
7qn $zZp&
Xhk>TETS
ZfU%AS~
ZzC X}W$bIcIh>?.
#p2*;a!TmY|S'1a%h.c]"M
vZ7Lx'
Xc[tu2
kgyX|6S(
GL0e1I
Yb}s,@yD
!`yDb"
a>&e4zZ
'qt}<i5
d=tUle
n@|Tk>mNV'L
]/Cy$~t
]NWl>6#u
i7D,.o
8}19R4Z
3RH`R"/2y"y
FEK# AO
}..UYE
O3[8IlA;f
c-|]V&8;)
q<n7c7Q
_@N8(DlC|
4]W_(F
Z,Ur,B
NU$Y]F'f3YjB[c>xbX<X
zfwl%/
sp*3n%9v
@4tK<"\n
&ob3"gYG"XX
c=k-v
WTyX9d
-yUjz?
fv{Bsh6lJ664hOh(M
]L6gnz
O5`+aR
@|eI:<2ElxggC3
L$_DlBt.P<
#'@NXFX%
Aw[%MK
'`M*pYdM
aS8Fw".
{%K[0]Mi
n*f5N(jM<9T\
acYW*R
Cv]X2=@%
[6X1`5e
s6_X@y6s
KWv6"<
%6tr|qIGR8N
mh'/t}
}~oQXW
*+kMTf)=
LWQC:p
RB,v1 b
m_S}Ft
8FHN,7
\;^0AwUB
AS6B+m+f
-`nO^z
dk0%!u!
`:3"r]m{
w&LPEW
;MyW3T
;6ze$tu
2M$Y`jF0
r+4?{I`#h{WOP
EJ<7!VW?FP&-Q
upx.B>3#Y\
Q2w"FE<I
DVCLAL
PACKAGEINFO
List index out of bounds (%d)+Out of memory while expanding memory stream
Error reading %s%s%s: %s
Stream read error
Property is read-only
Failed to create key %s
Failed to get data for '%s'
Failed to set data for '%s'
%s.Seek not implemented$Operation not allowed on sorted list
Property %s does not exist
Stream write error
Friday
Saturday
Ancestor for '%s' not found
Cannot assign a %s to a %s
Class %s not found%List does not allow duplicates ($0%x)#A component named %s already exists%String list does not allow duplicates
Cannot create file %s
Cannot open file %s$''%s'' is not a valid component name
Invalid property path
Invalid property value
Invalid data type for '%s' List capacity out of bounds (%d)
List count out of bounds (%d)
September
October
November
December
Sunday
Monday
Tuesday
Wednesday
Thursday
January
February
August
Error creating variant array
Variant is not an array!Variant array index out of bounds
External exception %x
Assertion failed
Interface not supported
Exception in safecall method
%s (%s, line %d)
Abstract Error?Access violation at address %p in module '%s'. %s of address %p
System Error. Code: %d.
%sA call to an OS function failed
Floating point underflow
Invalid pointer operation
Invalid class typecast0Access violation at address %p. %s of address %p
Stack overflow
Control-C hit
Privileged instruction%Exception %s in module %s at %p.
Application Error1Format '%s' invalid or incompatible with argument
No argument for format '%s'Invalid variant type conversion
Invalid variant operation"Variant method calls not supported
!'%s' is not a valid integer value
Out of memory
I/O error %d
File not found
Invalid filename
Too many open files
File access denied
Read beyond end of file
Disk full
Invalid numeric input
Division by zero
Range check error
Integer overflow Invalid floating point operationFloating point division by zero
Floating point overflow

Process Tree


bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe, PID: 3044, Parent PID: 1864

default registry file network process services synchronisation iexplore office pdf

Hosts

No hosts contacted.

DNS

No domains contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Name bd430c2bc9811c82_battle.net key generator (works!!).exe
Filepath C:\Windows\Temp\Battle.net key generator (WORKS!!).exe
Size 134.0KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 451c0c3c9baa075304b3b62173dcd66c
SHA1 fb091efdc7cc90118a7ef20b4e06c3c30dc331c1
SHA256 bd430c2bc9811c822a7c26a531e12e581e2b9a4410c346dd6b4524484417736b
CRC32 DB6E5B09
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 6b7b07f46e1e8d23_scarymovie 2 full downloader.exe
Filepath C:\Windows\Temp\ScaryMovie 2 Full Downloader.exe
Size 134.3KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 3bf549c934abad53bbed6932b3c47215
SHA1 19a5943d0bc5533d1dc0c26ca4afc1220b293e88
SHA256 6b7b07f46e1e8d2391d77e359d999920fdaed922db845dad252b36e42cb1f1d1
CRC32 9D6534BB
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 7f209811a05ba8a5_xbox.info.exe
Filepath C:\Windows\Temp\Xbox.info.exe
Size 134.2KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 f55b172a47a81d888990784f6259d5a1
SHA1 9663e7200e548490c02e48c450e4a1f8c86fa258
SHA256 7f209811a05ba8a531b9c51efe1c6a82f6ab9e7474c8409706ef1df627f84edb
CRC32 9E24F3AA
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 63f80fef714f00c8_hack into any computer!!.exe
Filepath C:\Windows\Temp\Hack into any computer!!.exe
Size 134.3KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 1593d13706d7ccf79da83921322a366e
SHA1 9302e28900e2a30ab3d8c6d1da8a6a6fcf2dc44b
SHA256 63f80fef714f00c84d4565cde14544470e6b5c9e7d14e891739dc66516483f4c
CRC32 B82964D2
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 2e41e65e6169e5d1_how to hack websites.exe
Filepath C:\Windows\Temp\How To Hack Websites.exe
Size 134.3KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 4256584ac1f53a2c7fead849ed9e56bc
SHA1 7b861f06fa815a98b6d83e39ac7c4549fc60779b
SHA256 2e41e65e6169e5d179922046f8b250b535abe9597823078cadaa50646f894958
CRC32 1A633A37
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name fcc373707b0070f8_jenna jameson - built for speed downloader.exe
Filepath C:\Windows\Temp\Jenna Jameson - Built For Speed Downloader.exe
Size 134.0KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 393fbeb794d7bde07fda1fd83f5043d8
SHA1 ac1be69ebb1901d0c195c9977a73d9d9ad4b48c4
SHA256 fcc373707b0070f87e76b56e8c207a1ceda36361af4c42990ca4564384b11a1c
CRC32 115E4FC4
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 0cdc9c9a8085755b_key generator for all windows xp versions.exe
Filepath C:\Windows\Temp\Key generator for all windows XP versions.exe
Size 134.2KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 2956bec7fac049eb2c31ece8870c9df3
SHA1 8830dd23eddc76f21ea32017fa3f5a6473fc1e8f
SHA256 0cdc9c9a8085755b40a449e34826fd32636a43b16ea9212e078601a1e8bd49cb
CRC32 0B99B2B3
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name bf9b24f851342a2a_borland delphi 6 key generator.exe
Filepath C:\Windows\Temp\Borland Delphi 6 Key Generator.exe
Size 133.9KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 b3d6bbedc9a242636a58c138a51814a7
SHA1 3fe107d70ba774b2a59fed30953e419c4945068a
SHA256 bf9b24f851342a2a213d25819e41b1ac5860b03865ba08cd9125a87d2acc59b0
CRC32 35A6A28E
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 11256caa1ded9c9e_ps1 boot disc full dwonloader.exe
Filepath C:\Windows\Temp\PS1 Boot Disc Full Dwonloader.exe
Size 134.0KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 84f478b5fbf1ad9d1cd757cb677b233f
SHA1 fcc2b8f4988e49be76932eb1b528f73ccf3d7ae9
SHA256 11256caa1ded9c9eb2eda048c7db83cd5440886ee01231de2c2c7e6ad70ffb19
CRC32 E271870C
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 172d3bf540f1ccdc_star wars episode 2 - attack of the clones full downloader.exe
Filepath C:\Windows\Temp\Star Wars Episode 2 - Attack Of The Clones Full Downloader.exe
Size 134.2KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 4d13217958a8d94cb9a283975161fef9
SHA1 316629e2fc6f415ea79d35648f81053c1367c510
SHA256 172d3bf540f1ccdcce5dba2555711ab49d17b3b073b81be7fe3c6623481b8350
CRC32 F65AA733
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name e47a95e7c067d453_macromedia flash 5.0 full downloader.exe
Filepath C:\Windows\Temp\Macromedia Flash 5.0 Full Downloader.exe
Size 134.3KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 9be250d58c8246fae718543f788bdfd7
SHA1 3950dae9e02aeacf2241c3834e5e31849050cd5a
SHA256 e47a95e7c067d45356e3ca82f8184b3d3cef04c87d68aea6d6987e38a4b15813
CRC32 9409D258
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 5b5674b92b2bf57c_gladiator fulldownloader.exe
Filepath C:\Windows\Temp\Gladiator FullDownloader.exe
Size 133.9KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 63d445005685dc7ad84e18f1e41f1b5f
SHA1 e4bfecfff185013ac194e86d08b17a5e1be3e4b4
SHA256 5b5674b92b2bf57c3e30c0073a3fd27fa049e78ca6e2e0bfdc9fecf0e1edac39
CRC32 2F429C51
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 9100d750b48387ea_divx.exe
Filepath C:\Windows\Temp\DivX.exe
Size 134.1KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 f5c23885c334e8cb93edafbdb029d8f7
SHA1 2f65f8b48c6dc68883aa23660cb704fa899817a4
SHA256 9100d750b48387ea91f10bc5ffc6f59e87a82591c9eee293f78568d8c5414c43
CRC32 B18B90B5
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 720464c0eb68d544_half-life online key generator.exe
Filepath C:\Windows\Temp\Half-life ONLINE key generator.exe
Size 134.2KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 8658ad50d07b9d35529ea316af6bdcf3
SHA1 dd37a4d703f7526ba371d7e809f9122030818087
SHA256 720464c0eb68d5446b1fae697ae1aa51411ba98f1c8372c01f4cc3a84a8dc0b3
CRC32 F7B3089D
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 82baf54de042e13a_winzip 8.0 + serial.exe
Filepath C:\Windows\Temp\Winzip 8.0 + serial.exe
Size 134.2KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 9d3c317972b949d1f471c584263a5f6d
SHA1 256fa62729a543f47c5face3f6fadb4a06b6bfbc
SHA256 82baf54de042e13a846ad08ada836a3a9c19b031ab1fe6018c7b4be3c0eb9302
CRC32 A48FC4E0
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 6f3572e23789aea8_moviezchannelsinstaler.exe
Filepath C:\Windows\Temp\MoviezChannelsInstaler.exe
Size 134.0KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 1da02b6220788ec6dced1064d3df6325
SHA1 08ae18d115ef432295c2cc2ca55022349febc0fe
SHA256 6f3572e23789aea8a63dbed308fd91516f1547f26e44d6dda17dbdd2a42cbbdf
CRC32 C5835201
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 80f4cb6f73785f58_half-life won key generator.exe
Filepath C:\Windows\Temp\Half-life WON key generator.exe
Size 134.2KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 d2424e9628586277e9034fc21b704137
SHA1 01875aa437fcf26d21931d81d54f2369c437c6f4
SHA256 80f4cb6f73785f58a90af82314f477a630086e2f25e63756550dca62c41ba93a
CRC32 52D2E52C
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name b325039e69c965d1_warcraft 3 online key generator.exe
Filepath C:\Windows\Temp\Warcraft 3 ONLINE key generator.exe
Size 134.2KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 891f8e5f92539945498d65eb05534755
SHA1 b5b3214baf51800ecba9c4472cf03d70e7df327e
SHA256 b325039e69c965d198fb7c39d18938b00b656800afe5034455fee869f7a5fe0d
CRC32 7AD34E00
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 291c091d4c5ff247_zidane-screeninstaler.exe
Filepath C:\Windows\Temp\Zidane-ScreenInstaler.exe
Size 134.2KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 c8ce4452b8fc0e32a4a1ed088bc8d9e0
SHA1 873662668ca0f481fca5a5d2c754acd96609dcd1
SHA256 291c091d4c5ff247ddf6124d7821c8600f16bb81bb4f34579f30ce449d901ad3
CRC32 89933587
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 3ff061b793413006_star wars episode 2 downloader.exe
Filepath C:\Windows\Temp\Star wars episode 2 downloader.exe
Size 134.2KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 d6392a6218c669b2d9bcbb277405ef10
SHA1 12a2087f295e6b1aa8462a365fabe6b7eebb0eac
SHA256 3ff061b79341300698927cea8f7221e223935a06049a86f9b7cc80194dc082d8
CRC32 4F7417E6
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name b65f85953fffffc9_winrar + crack.exe
Filepath C:\Windows\Temp\Winrar + crack.exe
Size 134.1KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 206f064a3fc7636b311bb978b5ddbbe6
SHA1 7a48298f762dd7361c1b20feb284b8032b22588c
SHA256 b65f85953fffffc963f8d23e36351b4ad70881577b81ee4172bb1dcec01539a2
CRC32 BDAAC3C0
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name e1694a1ebf789e99_grand theft auto 3 cd1 crack.exe
Filepath C:\Windows\Temp\Grand theft auto 3 CD1 crack.exe
Size 133.9KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 c56d9a49e44f4b94b526722f2476fd86
SHA1 e7b8737e68fb3600af011ed621c3e93c29dd3030
SHA256 e1694a1ebf789e997b25ab225b850129fed3350add73ef99d11a3b3a201a4a67
CRC32 3A973AC7
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 5ab5e741ab969e6c_cky3 - bam margera world industries alien workshop full downloader.exe
Filepath C:\Windows\Temp\CKY3 - Bam Margera World Industries Alien Workshop Full Downloader.exe
Size 133.9KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 dad9e6ef5cced9c4b9b16948b2a016c9
SHA1 3a697c32d191997769e701b490a8316ba41093ec
SHA256 5ab5e741ab969e6cd8b40af41ee156abea6eed3393964781ed2ede39fddda488
CRC32 DD277260
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 03f0e793b6d0d774_microsoft windows xp crack pack.exe
Filepath C:\Windows\Temp\Microsoft Windows XP crack pack.exe
Size 133.9KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 177b77e491fa750cba315c22c2b1f11c
SHA1 d51c883697135962e91b8f9343cde32151d2e1c4
SHA256 03f0e793b6d0d7741ec0912ef06c19fd5e2c405f9019217f2edaafd956780599
CRC32 943C9F5D
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 27dbf3c517117ddb_starwars2 - cloneattack - fulldownloader.exe
Filepath C:\Windows\Temp\StarWars2 - CloneAttack - FullDownloader.exe
Size 134.2KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 aeea858bfcf49f3e55cd770c8e955388
SHA1 e2681a96c0c45e75fa8ce13f1cd8e320f7e3f3ea
SHA256 27dbf3c517117ddbcc321c9c3bf83446617ac3d7a61a6b4ec4f273cdf6fda445
CRC32 DE35B068
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 111bf76a700faac1_lordoftherings-fulldownloader.exe
Filepath C:\Windows\Temp\LordOfTheRings-FullDownloader.exe
Size 134.4KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 1e028416048bbf85b31a4678e5292565
SHA1 45d5f1a3cfd2a2a48ab097489f6f04296d6fbb13
SHA256 111bf76a700faac1c0bba58080ab765891ea505d7111044933b56b23678aa7df
CRC32 010A7B03
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name a2101e4f694e87bb_microsoft key generator, works for all microsoft products!!.exe
Filepath C:\Windows\Temp\Microsoft key generator, works for ALL microsoft products!!.exe
Size 133.9KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 ed1b86a80b78cc30df740ed13231725e
SHA1 8e077434620c64a601ff24b0f6b8c36fc26c7be0
SHA256 a2101e4f694e87bb64596cb5825ed1a2a6bed40667af6cd8c061cf8320597b65
CRC32 BE9046FF
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name b73a8024b3ab1a86_[divx] lord of the rings full downloader.exe
Filepath C:\Windows\Temp\[DiVX] Lord of The Rings Full Downloader.exe
Size 134.0KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 8829b9701eb62b84b308a68c819795fa
SHA1 8fe551fd92ad7a4653fd88dd46d551e2cc2a1df6
SHA256 b73a8024b3ab1a862c17cc5d7fd7a6d65bc717466af0604a1e9b07bf7b2f3f34
CRC32 B7DF7909
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name b8f61442cf5cb2f3_britney spears nude.exe
Filepath C:\Windows\Temp\Britney spears nude.exe
Size 134.1KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 43c8627e5352ecdf595fcb0989f9b1bd
SHA1 8d97c4f241ccf865565def47f2caec98601d9fcf
SHA256 b8f61442cf5cb2f38197291a246db33468144eb04ff70bef3e3f23e1addbb35a
CRC32 E3813838
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name dce3ee7b8113a8a3_sims fulldownloader.exe
Filepath C:\Windows\Temp\SIMS FullDownloader.exe
Size 134.2KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 d5e768a546c99bc4c8a2257d6391fb3c
SHA1 6a64ecd56911a7ada17567719b43e0d77c07d9ba
SHA256 dce3ee7b8113a8a3f08bede5956a751016355b668c5cae762e212926d9c97bad
CRC32 105C831F
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name a90eef0601e64edf_windows xp serial generator.exe
Filepath C:\Windows\Temp\Windows XP serial generator.exe
Size 134.4KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 de67e05a4e314abdca32deeed7a57a70
SHA1 572ce7b49a8a2e826d17ea88a63cabe6a5d84ce1
SHA256 a90eef0601e64edf8f3249da4583d5e61e88c20859a11273354079149d17e5eb
CRC32 D4818DB1
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 07252019939b1ba0_internet and computer speed booster.exe
Filepath C:\Windows\Temp\Internet and Computer Speed Booster.exe
Size 134.0KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 33095cbaae297f51a2a9bcfd2143d321
SHA1 88b4b0be44a7bf186eae02626f4179fc2e06dbbd
SHA256 07252019939b1ba09cd8336be85d106a25cbd8326cb9928bfb52f32ae78e0567
CRC32 A779125E
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name cc0ee6bf79438f39_windows xp key generator.exe
Filepath C:\Windows\Temp\Windows XP key generator.exe
Size 134.1KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 f7b3355bcbf290ac1aae8599f4e3cc61
SHA1 9358a6b899d6eb7db35dad45bf87f3ea02b0eb64
SHA256 cc0ee6bf79438f3926e5a93898e4686b2446c34b1853abb48f2690c41bbf10e8
CRC32 EEB38B8A
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name e4c047a376938aa5_cat attacks child full downloader.exe
Filepath C:\Windows\Temp\Cat Attacks Child Full Downloader.exe
Size 134.2KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 052c0f39ec59569cbb157bc95729af48
SHA1 9f1e1e184cc49a5b796d154811d10297f11ff49d
SHA256 e4c047a376938aa5ed2c91f24d853bd8d690aa512ed42c8d0986a2ebbd17a786
CRC32 260F75B6
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 43b4def93c6677a8_hacking tool collection.exe
Filepath C:\Windows\Temp\Hacking Tool Collection.exe
Size 134.0KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 226b569716c10da9a8f2341f6c6337df
SHA1 8a3e5628edb41da3841142b7ae0d377edecad3b1
SHA256 43b4def93c6677a8a9b7f4b925eef376548f93a2acd12d71d53ec488ec8f61b7
CRC32 E6617C7D
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name ba31d77b5e45ae55_macromedia key generator (all products).exe
Filepath C:\Windows\Temp\Macromedia key generator (all products).exe
Size 134.0KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 9962c77be1873e05dbe3432324145708
SHA1 a79fd8115fd65d7211fc9957470f31ca855c89f4
SHA256 ba31d77b5e45ae55d800aab3083e94fe36ad4b18538693e59b6f3bcd362f3c01
CRC32 36F7F95A
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 4b00776bd3e8b8ae_[divx] harry potter and the sorcerors stone full downloader.exe
Filepath C:\Windows\Temp\[DiVX] Harry Potter And The Sorcerors Stone Full Downloader.exe
Size 134.3KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 efb6663ca80ce424f470312da31d7ca0
SHA1 c76789e159ed79acd1fdd1a214f2651ff6a3cc08
SHA256 4b00776bd3e8b8aea5f9ef28bbdc57a6485210bf4c8218f7e24b7e56ec67e6e3
CRC32 D4C75346
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 8d87caada968a0ff_aim account stealer downloader.exe
Filepath C:\Windows\Temp\AIM Account Stealer Downloader.exe
Size 134.1KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 28a621ad611806e2146a50f216f094c6
SHA1 b56a760b7947d6aff2f07840c6cd5c8ee5b03b03
SHA256 8d87caada968a0ffdc706176c53278144e54cf1522ca1dee6af1890ce3a04121
CRC32 373E8339
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 4bd4abdb8c8a51da_shakira fulldownloader.exe
Filepath C:\Windows\Temp\Shakira FullDownloader.exe
Size 134.0KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 ed50f80f2b0461028a87ba7f77c4ec19
SHA1 b98d308898cda3ee286f0e72de86dfb687959f09
SHA256 4bd4abdb8c8a51da477640a1593527ad583fc89b081fa24657dc133150131cc8
CRC32 22BAD1FF
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name ddac658bf8d1fa8d_zonealarm firewall full downloader.exe
Filepath C:\Windows\Temp\ZoneAlarm Firewall Full Downloader.exe
Size 134.4KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 2098d139befaaddf5d789c773476d264
SHA1 545fd65affc439c056ea410390ed97c91f006386
SHA256 ddac658bf8d1fa8d226fcc0495a50fccd2506d1bc24e01280c0a0d53676d9488
CRC32 767C2F9B
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 9abd945f02636d3d_quake 4 beta.exe
Filepath C:\Windows\Temp\Quake 4 BETA.exe
Size 134.3KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 006e6735655ddb2768d357ff4bb3a998
SHA1 dbef1a8aa712fb0b73a0c69dc79beb7fa59ffecf
SHA256 9abd945f02636d3d1f78bab54059e0a12fae146354ff40d410136b8f24a8ec1a
CRC32 B62B83DE
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name bcfe0c1ee43c4c49_kazaa media desktop v2.0 unofficial.exe
Filepath C:\Windows\Temp\KaZaA media desktop v2.0 UNOFFICIAL.exe
Size 134.1KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 7939d9eaf8f13a700e3420189998e8d3
SHA1 aab8295a36227161924fcafe3dbd81f9dd1e8455
SHA256 bcfe0c1ee43c4c4989dc468eb03da45fa02597b18400283ffe8b2eb71644459c
CRC32 7235FE00
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name aebcc4a90dc7e28a_spiderman fulldownloader.exe
Filepath C:\Windows\Temp\Spiderman FullDownloader.exe
Size 134.1KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 9a7650afbe1d19712b846cfad85bf7c2
SHA1 f95882ed450b61d9fa1a9d4789048e614d0c410e
SHA256 aebcc4a90dc7e28a6d88ecebe5a32f988a70e377e517e0fa3fcdb8a16a1cd0c0
CRC32 FDB32091
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name f888bc26627ea518_msn password hacker and stealer.exe
Filepath C:\Windows\Temp\MSN Password Hacker and Stealer.exe
Size 134.2KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 303b0d7c2abcef3a3fbe12d4d5fda0d1
SHA1 24a87c4d6f335f8ccbb4e1cacee72ed838fa6661
SHA256 f888bc26627ea51848f835e46ad434faea95a53ca64c30388ef9c996e9918e9c
CRC32 FDEB6624
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name bc65469d526e5c82_dsl modem uncapper.exe
Filepath C:\Windows\Temp\DSL Modem Uncapper.exe
Size 133.9KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 2cbfb3a4d10e0131aac405a51f40b484
SHA1 7bd2190c8a12843fd87127e537898a0f6443c8f4
SHA256 bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5
CRC32 55702987
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 04f6846fada91557_sony play station boot disc - downloader.exe
Filepath C:\Windows\Temp\Sony Play station boot disc - Downloader.exe
Size 134.0KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 cf2555cf1bf651c8f7699c29b8142896
SHA1 b027741747f867c125c6a242c51964f1ae7a26c3
SHA256 04f6846fada915576e333c66cb9db55d2818c185fceaea2a1c5066187dce74a8
CRC32 0D4A0C2C
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name db109d37df2081a8_aikaquest3hentai fulldownloader.exe
Filepath C:\Windows\Temp\AikaQuest3Hentai FullDownloader.exe
Size 134.1KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 6f52548c7c00361f46756dc003650da0
SHA1 38215e492e79a2c7a73517d5e733a5b9a2dbd733
SHA256 db109d37df2081a8ec3ef2cfb85248c695ce671a36a05d8d78e90f04de05f1e6
CRC32 2620D2A3
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 41465785431e9f96_warcraft 3 battle.net serial generator.exe
Filepath C:\Windows\Temp\Warcraft 3 battle.net serial generator.exe
Size 134.1KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 eada6b51274d985be09f391735d81f69
SHA1 7b65da93f8e6298bb49e9caaebecb6cc2d60a9f5
SHA256 41465785431e9f96d1a4b7145196870cd31c66aa95745fc3c0b760c37888c240
CRC32 C63279E2
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name cf2040257019a32d_windows xp full downloader.exe
Filepath C:\Windows\Temp\Windows XP Full Downloader.exe
Size 134.0KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 9136a55ebdd11838fcef241d09f22d9c
SHA1 a95a628a6fb4f507fa6dcbbbb72c5670eae4a419
SHA256 cf2040257019a32d544ed907f65c8aff7616a242830e70141b2a68619749b124
CRC32 18950409
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name a688b69dab039061_gta3 crack.exe
Filepath C:\Windows\Temp\GTA3 crack.exe
Size 134.1KB
Processes 3044 (bc65469d526e5c8243a83c13ac3c942d1a928168ec34e53fc0403ddfc6f951c5.exe)
Type PE32 executable (GUI) Intel 80386, for MS Windows
MD5 0bafd077607eed34ef73e2e009752354
SHA1 5a6c46bf7386b0b2c06379e1af05eb25ca037aaa
SHA256 a688b69dab039061df320f002282aedd6f224a295e653783dcb304a4724eadbc
CRC32 C05EF853
ssdeep None
Yara None matched
VirusTotal Search for analysis
Sorry! No dropped buffers.