1.1
低危

8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0

8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe

分析耗时

14s

最近分析

397天前

文件大小

182.6KB
静态报毒 动态报毒 CVE FAMILY METATYPE PLATFORM TYPE UNKNOWN WIN32 TROJAN WORM SYTRO
鹰眼引擎
DACN 0.14
FACILE 1.00
IMCLNet 0.76
MFGraph 0.00
静态判定
反病毒引擎
查杀引擎 查杀结果 查杀时间 查杀版本
Alibaba None 20190527 0.3.0.5
Avast Win32:Delf-UDU [Trj] 20191119 18.4.3895.0
Baidu Win32.Trojan.Agent.aaw 20190318 1.0.0.2
CrowdStrike win/malicious_confidence_100% (W) 20190702 1.0
Kingsoft None 20191119 2013.8.14.323
McAfee W32/Sytro.worm.gen!p2p 20191119 6.0.6.653
Tencent Worm.Win32.Sytro.a 20191119 1.0.0.1
行为判定
动态指标
在文件系统上创建可执行文件 (50 个事件)
file C:\Windows\Temp\LordOfTheRings-FullDownloader.exe
file C:\Windows\Temp\SIMS FullDownloader.exe
file C:\Windows\Temp\Battle.net key generator (WORKS!!).exe
file C:\Windows\Temp\Sony Play station boot disc - Downloader.exe
file C:\Windows\Temp\Hacking Tool Collection.exe
file C:\Windows\Temp\Windows XP key generator.exe
file C:\Windows\Temp\CKY3 - Bam Margera World Industries Alien Workshop Full Downloader.exe
file C:\Windows\Temp\Shakira FullDownloader.exe
file C:\Windows\Temp\Winrar + crack.exe
file C:\Windows\Temp\Windows XP serial generator.exe
file C:\Windows\Temp\ScaryMovie 2 Full Downloader.exe
file C:\Windows\Temp\PS1 Boot Disc Full Dwonloader.exe
file C:\Windows\Temp\Grand theft auto 3 CD1 crack.exe
file C:\Windows\Temp\Internet and Computer Speed Booster.exe
file C:\Windows\Temp\Macromedia Flash 5.0 Full Downloader.exe
file C:\Windows\Temp\Windows XP Full Downloader.exe
file C:\Windows\Temp\DivX.exe
file C:\Windows\Temp\GTA3 crack.exe
file C:\Windows\Temp\MoviezChannelsInstaler.exe
file C:\Windows\Temp\Warcraft 3 ONLINE key generator.exe
file C:\Windows\Temp\How To Hack Websites.exe
file C:\Windows\Temp\[DiVX] Harry Potter And The Sorcerors Stone Full Downloader.exe
file C:\Windows\Temp\AikaQuest3Hentai FullDownloader.exe
file C:\Windows\Temp\Zidane-ScreenInstaler.exe
file C:\Windows\Temp\Macromedia key generator (all products).exe
file C:\Windows\Temp\MSN Password Hacker and Stealer.exe
file C:\Windows\Temp\AIM Account Stealer Downloader.exe
file C:\Windows\Temp\Key generator for all windows XP versions.exe
file C:\Windows\Temp\Quake 4 BETA.exe
file C:\Windows\Temp\Warcraft 3 battle.net serial generator.exe
file C:\Windows\Temp\ZoneAlarm Firewall Full Downloader.exe
file C:\Windows\Temp\Borland Delphi 6 Key Generator.exe
file C:\Windows\Temp\Xbox.info.exe
file C:\Windows\Temp\Microsoft Windows XP crack pack.exe
file C:\Windows\Temp\Half-life WON key generator.exe
file C:\Windows\Temp\Winzip 8.0 + serial.exe
file C:\Windows\Temp\Hack into any computer!!.exe
file C:\Windows\Temp\Jenna Jameson - Built For Speed Downloader.exe
file C:\Windows\Temp\Microsoft key generator, works for ALL microsoft products!!.exe
file C:\Windows\Temp\Gladiator FullDownloader.exe
file C:\Windows\Temp\Cat Attacks Child Full Downloader.exe
file C:\Windows\Temp\Half-life ONLINE key generator.exe
file C:\Windows\Temp\KaZaA media desktop v2.0 UNOFFICIAL.exe
file C:\Windows\Temp\Star Wars Episode 2 - Attack Of The Clones Full Downloader.exe
file C:\Windows\Temp\DSL Modem Uncapper.exe
file C:\Windows\Temp\StarWars2 - CloneAttack - FullDownloader.exe
file C:\Windows\Temp\Britney spears nude.exe
file C:\Windows\Temp\Star wars episode 2 downloader.exe
file C:\Windows\Temp\[DiVX] Lord of The Rings Full Downloader.exe
file C:\Windows\Temp\Spiderman FullDownloader.exe
可执行文件使用UPX压缩 (2 个事件)
section UPX0 description 节名称指示UPX
section UPX1 description 节名称指示UPX
网络通信
文件已被 VirusTotal 上 61 个反病毒引擎识别为恶意 (50 out of 61 个事件)
APEX Malicious
AVG Win32:Delf-UDU [Trj]
Acronis suspicious
Ad-Aware Generic.Malware.SN!.F215F420
AhnLab-V3 Worm/Win32.Sytro.R233708
Antiy-AVL Worm[P2P]/Win32.Sytro.j
Arcabit Generic.Malware.SN!.F215F420
Avast Win32:Delf-UDU [Trj]
Avira W32/Elkern.B
Baidu Win32.Trojan.Agent.aaw
BitDefender Generic.Malware.SN!.F215F420
BitDefenderTheta Gen:Trojan.Heur.PT.lqY@baH5Dkd
CAT-QuickHeal Trojan.GenericPMF.S2218022
CMC P2P-Worm.Win32.Sytro!O
ClamAV Win.Worm.Soltern-1
Comodo Packed.Win32.MUPX.Gen@24tbus
CrowdStrike win/malicious_confidence_100% (W)
Cybereason malicious.a7660e
Cylance Unsafe
Cyren W32/Soltern.C.gen!Eldorado
DrWeb Win32.HLLW.Sytro
ESET-NOD32 a variant of Win32/Soltern.NAA
Emsisoft Generic.Malware.SN!.F215F420 (B)
Endgame malicious (high confidence)
F-Prot W32/Soltern.C.gen!Eldorado
F-Secure Malware.W32/Elkern.B
FireEye Generic.mg.be79412a7660e640
Fortinet W32/Sytro.AVCT!worm.p2p
GData Generic.Malware.SN!.F215F420
Ikarus Virus.Win32.Sytro
Invincea heuristic
Jiangmin Worm/P2P.Sytro.j
K7AntiVirus Trojan ( 0048ed981 )
K7GW Trojan ( 0048ed981 )
Kaspersky P2P-Worm.Win32.Sytro.j
MAX malware (ai score=82)
Malwarebytes Trojan.Soltern
MaxSecure Worm.Sytro.k
McAfee W32/Sytro.worm.gen!p2p
McAfee-GW-Edition BehavesLike.Win32.Sytro.ch
MicroWorld-eScan Generic.Malware.SN!.F215F420
Microsoft Worm:Win32/Soltern.L
NANO-Antivirus Trojan.Win32.Sytro.fybx
Panda Trj/Genetic.gen
Qihoo-360 Worm.Win32.Sytro.B
Rising Worm.Soltern!1.A328 (CLASSIC)
SentinelOne DFI - Malicious PE
Sophos W32/Systro-J
Symantec W32.HLLW.Electron
TACHYON Worm/W32.DP-Sytro.Zen.B
可视化分析
二进制图像
数据导入图像 288x288
数据导入图像 224x224
数据导入图像 192x192
数据导入图像 160x160
数据导入图像 128x128
数据导入图像 96x96
数据导入图像 64x64
数据导入图像 32x32
运行截图
暂无运行截图 该样本运行过程中未生成截图

👋 欢迎使用 ChatHawk

我是您的恶意软件分析助手,可以帮您分析和解读恶意软件报告。请随时向我提问!

🔍 主要威胁分析
⚡ 行为特征
🛡️ 防护建议
🔧 技术手段
🎯 检测方法
🤖

PE Compile Time

1992-06-20 06:22:17

PE Imphash

8eb90f63ff7fc0bd388dac1d27b3afce

Sections

Name Virtual Address Virtual Size Size of Raw Data Entropy
UPX0 0x00001000 0x00018000 0x00018000 6.514811694989578
UPX1 0x00019000 0x0000e000 0x0000d600 2.8034055212734907
.rsrc 0x00027000 0x00002000 0x00001400 6.408987456540439
.imports 0x00029000 0x00001000 0x00000a00 4.535575540897738

Resources

Name Offset Size Language Sub-language File type
RT_STRING 0x00024018 0x000002b4 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_STRING 0x00024018 0x000002b4 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_STRING 0x00024018 0x000002b4 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_STRING 0x00024018 0x000002b4 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_STRING 0x00024018 0x000002b4 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_STRING 0x00024018 0x000002b4 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_STRING 0x00024018 0x000002b4 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_RCDATA 0x000242dc 0x000000b4 LANG_NEUTRAL SUBLANG_NEUTRAL None
RT_RCDATA 0x000242dc 0x000000b4 LANG_NEUTRAL SUBLANG_NEUTRAL None

Imports

Library KERNEL32.DLL:
0x41e1bc TlsSetValue
0x41e1c0 TlsGetValue
0x41e1c4 LocalAlloc
0x41e1c8 GetModuleHandleA
Library KERNEL32.DLL:
0x41e2bc Sleep
Library KERNEL32.DLL:
0x41e0ec VirtualFree
0x41e0f0 VirtualAlloc
0x41e0f4 LocalFree
0x41e0f8 LocalAlloc
0x41e0fc GetCurrentThreadId
0x41e108 VirtualQuery
0x41e10c WideCharToMultiByte
0x41e110 MultiByteToWideChar
0x41e114 lstrlenA
0x41e118 lstrcpynA
0x41e11c LoadLibraryExA
0x41e120 GetThreadLocale
0x41e124 GetStartupInfoA
0x41e128 GetProcAddress
0x41e12c GetModuleHandleA
0x41e130 GetModuleFileNameA
0x41e134 GetLocaleInfoA
0x41e138 GetLastError
0x41e13c GetCommandLineA
0x41e140 FreeLibrary
0x41e144 FindFirstFileA
0x41e148 FindClose
0x41e14c ExitProcess
0x41e150 WriteFile
0x41e158 SetFilePointer
0x41e15c SetEndOfFile
0x41e160 RtlUnwind
0x41e164 ReadFile
0x41e168 RaiseException
0x41e16c GetStdHandle
0x41e170 GetFileSize
0x41e174 GetSystemTime
0x41e178 GetFileType
0x41e17c CreateFileA
0x41e180 CloseHandle
Library KERNEL32.DLL:
0x41e1ec WriteFile
0x41e1f0 WaitForSingleObject
0x41e1f4 VirtualQuery
0x41e1f8 SetFilePointer
0x41e1fc SetEvent
0x41e200 SetEndOfFile
0x41e204 ResetEvent
0x41e208 ReadFile
0x41e214 GlobalUnlock
0x41e218 GlobalReAlloc
0x41e21c GlobalHandle
0x41e220 GlobalLock
0x41e224 GlobalFree
0x41e228 GlobalAlloc
0x41e230 GetVersionExA
0x41e234 GetTickCount
0x41e238 GetThreadLocale
0x41e23c GetStringTypeExA
0x41e240 GetStdHandle
0x41e244 GetProcAddress
0x41e248 GetModuleHandleA
0x41e24c GetModuleFileNameA
0x41e250 GetLocaleInfoA
0x41e254 GetLastError
0x41e258 GetDiskFreeSpaceA
0x41e25c GetCurrentThreadId
0x41e260 GetCPInfo
0x41e264 GetACP
0x41e268 FormatMessageA
0x41e26c FindFirstFileA
0x41e270 FindClose
0x41e27c ExitProcess
0x41e280 EnumCalendarInfoA
0x41e28c CreateFileA
0x41e290 CreateEventA
0x41e294 CreateDirectoryA
0x41e298 CopyFileA
0x41e29c CompareStringA
0x41e2a0 CloseHandle
Library advapi32.dll:
0x41e19c RegQueryValueExA
0x41e1a0 RegOpenKeyExA
0x41e1a4 RegCloseKey
Library advapi32.dll:
0x41e1d0 RegSetValueExA
0x41e1d4 RegQueryValueExA
0x41e1d8 RegOpenKeyExA
0x41e1dc RegFlushKey
0x41e1e0 RegCreateKeyExA
0x41e1e4 RegCloseKey
Library oleaut32.dll:
0x41e2c4 SafeArrayPtrOfIndex
0x41e2c8 SafeArrayPutElement
0x41e2cc SafeArrayGetElement
0x41e2d0 SafeArrayGetUBound
0x41e2d4 SafeArrayGetLBound
0x41e2d8 SafeArrayRedim
0x41e2dc SafeArrayCreate
0x41e2e0 VariantChangeTypeEx
0x41e2e4 VariantCopyInd
0x41e2e8 VariantCopy
0x41e2ec VariantClear
0x41e2f0 VariantInit
Library oleaut32.dll:
0x41e1ac SysFreeString
0x41e1b0 SysReAllocStringLen
0x41e1b4 SysAllocStringLen
Library user32.dll:
0x41e2a8 MessageBoxA
0x41e2ac LoadStringA
0x41e2b0 GetSystemMetrics
0x41e2b4 CharNextA
Library user32.dll:
0x41e188 GetKeyboardType
0x41e18c LoadStringA
0x41e190 MessageBoxA
0x41e194 CharNextA

L!This program must be run under Win32
.imports
Boolean
Integer
StringP
Variant@
TObject
TObject
System
IInterface
System
TInterfacedObject
TBoundArray
System%A
;u3YZ]_^[
SVWUL$
]_^[SVWUL$
uZ]_^[
YZ]_^[
_^[U3Uh
d2d"hA
d2d"=EA
u3ZYYd
#_^[SVWU
SVW<$L$
]_^[USVW
d1d!=EA
2E3ZYYd
E_^[YY]
UQSVW3A
3Uh*$@
d1d!=EA
E3ZYYd
E_^[Y]
YZ]_^[
d2d"=EA
}3ZYYd
E_^[Y]
_^SVWU
< v;"u
3C<"u1S
>3Q<"u8S&
< w]_^[
Ek<1fU
Ht Ht.g
6Huv=L
j3E?E3s
3EE_^[Y]
f=r/f=w)f%f=u
1^[^8u
f=v)f=w#j
RPCHPHt$
-CGL$
SVWPtl11
-tb+t_$t_xtZXtU0u
FxtHXtCt
~ExC[)A
FuY12_^[
PRQYZXt5x
@~d@PQ@
YXYX
@aQYR@
b@"E@|oe@p+
BkU'9p|B0<RB~QC/j\
Cv)/&D
dEJzEb
9;5S]=];Z T7aZ%]g']
R`%uYnb
uM3Uh]9@
EP3ZYYd
f%fUf?f
SOFTWARE\Borland\Delphi\RTL
FPUMaskValue
Iu9u_^[
]U3Uh;@
_^[YY]SV
A_^[SVW11
_^[RQS|
PRQQTj
YZXtpH
S1VWUd
SPRQT$(j
9t7H;Ou
Ku]_^[
YZXtm1d
SPRQT$(H
ZTUWVSPRTj
Zd$,1Yd
t=HtN`
r6t0R=
t/=t&,*&"
USVW,A
USVW4A
d2d";~
P'v_^[]
aS1WV<
Ou^_[SVWxA
SVWU,A
^v]_^[
XRH ZX
PQ5ZXSVW
ISVWRP1L
JfZ_^[X$
thtkFW)w
9uXJt
8uAJt
t8JIt2S
PHXHI|
St-Xt&J|
t0JN|*9}&~")9~
t@t1SVW
1Z)_^[
$Z]_^[
9trtQtTFW)w
9uAJt
ff9u!
Mu]_^[
USVW1\$
USVW\$
USVW1\$
USVW\$
E|. tD$
USVWME]
3mEE;Et
u5];}}
;EU\]^
MO|"GE
[USVWUEu
U3fVMU`
SVWUEEEhD`@
t@hT`@
E8\u8Ex
VEPPEP
E_^[]kernel32.dll
GetLongPathNameA
5t@EPh
3Uhma@
t"EPEPj
+PEPSvj
+PEPS@j
Software\Borland\Locales
Software\Borland\Delphi\Locales
USVWE,A
t93Uhc@
d0d ]ES
u_^[YY]
UQE3Uh8d@
d2d"E@
t3ZYYd
USVMU3
;ur;ur
USVMUE}
2Ftl?;u
t<@t7;u
1u$F;u
v@EE^[]
SV3Uhg@
d0d T3t^:
PEYZz~
U?3ZYYd
SV3Uh{h@
d0d 4t]U
EDPE{@P
PEYYZ~
ET^[Y]
SV3Uhh@
d0d EE3ZYYd
U3Uhzi@
t3ZYYd
U3Uh%k@
U3Uh]k@
QRP`PPi\PF
PFPPO*
U3Uhm@
U3Uh]p@
Exception$q@
EHeapExceptionq@
EOutOfMemory@
EInOutError4r@
EExternalr@
EExternalExceptionr@
EIntErrorDs@
EDivByZeros@
ERangeErrors@
EIntOverflow@
EMathErrort@
EInvalidOp
EZeroDivideXu@
EOverflowu@
EUnderflow
EInvalidPointerdv@
EInvalidCast@
EConvertError
EAccessViolation@
EPrivilegew@
EStackOverflow0x@
EControlCx@
EVariantErrorx@
EAssertionFailed@
EAbstractErrory@
EIntfCastErrory@
EOSError@
ESafecallExceptionlz@
SysUtilsz@
SysUtils
TThreadLocalCounter
$TMultiReadExclusiveWriteSynchronizer@
BFKu_^[
9t*^ar
^[SVW3
PPf_^[
PWVS#u
$Z_^[SVWQj
PWVS/u
$Z_^[USV
EVEPEPSEEU^[YY]
u%EPPEPEPEPou
3URURURURP
EUE3RPEU4M
E3RPEU
1FW)^_
1t!F<ar
)t[^_
D$ D$$
3s(_^[SV
9t<%t^]E<-u
ZYuG1<*t"<0r=<9w9i
]IY[0:r
uSPE]X[_^[[]
t't#PE
UWVSE/A
INFNAN
11(efM
M[YCVut
N^$*@@@*$@@@$ *@@* $@@($*)@-$*@@$-*@@$*-@@(*$)@-*$@@*-$@@*$-@@-* $@-$ *@* $-@$ *-@$ -*@*- $@($ *)(* $)]
+ES]>[}
00fJu2}
Z_^[UQSVWM]
U3QQQQQQSVW3Uh?@
d0d #E
JCDHyYU~Uj
JC8HVYU[C
JE*YUC
u3ZYYd
SV3Uh@
d0d EPO@
VPhP@
[3ZYYd
U3QQQQQSVW3Uh~@
SQ_^[]
E~E^_^[]
PD$PPjPMj
jP26j@D$
PD$LPj
d0d EPU
\3ZYYd
d0d EPUEU
_^[YY]
TErrorRec
TExceptRec
]]3UhL@
43ZYYd
t<HtHU
r3t7G=
SV3E3Uh@
UE3Uh@
d0d Ew%
+G]_^[
YZ]_^[
u^[SVW
_^[US3
aEP\X3ZYYd
UQSVW}
u_^[Y]
U>Y_^[]
IuS3Uh@
d0d i,=A
3E3E,A
E3u?EP@
m/d/yy
mmmm d, yyyy
:mm:ss
US3E3Uh@
:3ZYYd
kernel32.dll
GetDiskFreeSpaceExA
^[SVWU
oD3GDt
UQfEE2E$
Y]SVWUQ
$(Z]_^[SVWU
$FD3D$
FHuH\$
YZ]_^[
_^[SVWGD3
EE@$;E
EE@(EUE@ 3Uh@
d0d Ex
EUP$E(dH;E
[]UEUE@
d0d EH
UE@ 3ZYYd
USE3CU;B$t&
UE@ C3Uhj@
d0d E@
23ZYYd
UE@ se[YY]
UEUE@ 3Uh@
d0d EH
u5UE@ iU;B$t
E#3ZYYd
SVW3Uh@
d0d t9E
d0d -8A
q\Z3ZYYd
U3Uha@
TCustomVariantTyped@
TCustomVariantType
Variants
|Z^[UQSVW}
UHYu_^[]
xZWVstO
I+WV<"
SVW3Uht@
=f;3ZYYd
E9[_^[Y]
EM_^[YY]
E3UhZ@
EWu_^[]S3f:
USVWfMff
E3Uh>@
d0d fEPj
fMuifEPj
WVRtRKUfE
UQS3EB
USVWMU]f
fu.f;u
d0d UEeU
UXE3Uha@
d0d UEf
?U3ZYYd
D$ 3D$$l$ <$*k
<$,$([
3D$ l$
LE3Uh\@
EUs{^[]
d0d En
E {[Y]
pLE3Uh@
U?3ZYYd
Ez^[]USV
Eh3Uh@
U3ZYYd
E$Bz^[]
_^[SVf;
SV3Uh@
U3ZYYd
}@w^[Y]
SV3Uh@
d0d E!U/3ZYYd
Lv^[Y]
SV3Uh@
d0d EU~U3ZYYd
E{u^[Y]
E3Uh5@
U3ZYYd
E|u^[]
U3QQQQSV3Uhl@
d0d f;
u-E"EPE
UX_|UU+EEPEUXvU03ZYYd
eycs^[]
USVWMUE]f
EPUME0V
tLf;]t/
VEPMUE
UEfEf%
EPUME8W
tVf;ut9
MUEfEf%
sBf;t-
9dEPUME0V
tIf;]t/
Ep_^[]
USVWf;
E3Uhh@
*3ZYYd
[]USVW
Ot&0EE].Ee]"EM]
RealOp
EExEU)
JE}E>E}U2Me*Mm"E!E
USVWMUE3
Ht*?EU
UEU+EU+E
uuEUcEU3ZYYd
uuEU7EU
uuEUEUvE
EUFEU#E#UEU2EU
EU3E3UEU
EURPE_^[]
Int64Op
USMUEUEf
Ht3Ht[
r=KUEMEf
PUEM@UEM#0}
USVWMUE]f
E3Uh$@
E3Uht@
d0d UEf
M)E3ZYYd
E=[gUE
MUEfEf%
t~f;utM
MUEfEf%
UE$fEf%
txf;]tJ
MUEfEf%
E-EPMUE
EdE_^[]
S3UhC@
EE<nPE3nZ3>3ZYYd
ic[YY]
$Z]_^[
Z^[SVf
t.h[fC
SVWQ3f7f
MUjJD3ZYYd
Ed^^[YY]3Sf
]]K|"C
+F4$TD$
SVQTVP"t
$Z^[SVQTVxP
AE3Uh}@
d0d f]f
u3ZYYd
E4R[[]
4IySPE
E<3Uh@
@3ZYYd
C9~]_^[]
$YZ]_^[
GNuZ]_^[
_^[SVWU
;|]_^[
IuQMSVWUE3UhI@
EqEPEo
EhEmPU
dT_^[]
IuQMSVWME3Uh
d0d (EE
69E}O|&G3
E|nEPEl
UdEPEl
Uf;Eff
73ZYYd
bQ_^[]
Variants@
IKu3ZYYd
Z_^[USVWU
_^[YY]
UQSVWEP
UQLUEA
&OUEDH}
E3ZYYd
jNE^[Y]USVW3
MUE3UhJ@
-3Uh-@
g|PF3A
GNu3ZYYd
LM3ZYYd
EcSME_^[]
a3ZYYd
d0d -pA
+Q3ZYYd
ENH_^[Y]
SVWt;1
uKu_^[SVW1
SVW3UhP@
UL3ZYYd
D_^[Y]
SVW3Uh@
d0d EQM
EP'D_^[Y]
,[[>[USV3
ERO3ZYYd
EHB^[]
EU3ZYYd
EGA_^[]SV
.<$~.5
FUSVW^
$EU;fE
<$EU_^[YY]
L3ZYYd
EStreamError@
EFCreateError
EFOpenError@
EFilerError
EReadError
EWriteErrorH
EClassNotFound
EListError
EStringListError@
EComponentError
TThreadListt
TPersistent
TPersistentt
Classes
TCollectiont
TCollection
Classes
IStringsAdapter
Classes
TStrings
TStrings
Classes
TStringItem
TStringList
TStringListL
Classes
TStream
THandleStreamL
TFileStream
TCustomMemoryStream<
TMemoryStream
TFiler
TReader
TWriter
TComponentName
YEkOAQ@
TComponent
TComponent
Classes
TRegGroup
TRegGroupsUQSVWt
$F$u%CNuE
3Z]_^[
QHKu_^[
E#GMuF
K|%C3E
USVWU3EA
K|)C3G
{*#FKu3ZYYd
Nt)E_^[YY]
d0d ]E
}J)3ZYYd
E.([]UQS
IE3ZYYd
(E[Y]US
R3ZYYd
/U([]UQSVW3EA
E(%Ku3ZYYd
'E_^[Y]
UQSVW3EA
En(%Ku3ZYYd
e'E_^[Y]
SVW3=A
E\&^[Y]
$ZXuE
E3ZYYd
%3ZYYd
%E_^[]
!^[SVW
y$YZ^[
d0d UaKU
*3$^[Y]SV
d0d E@
d0d Ex
M3Uh!A
uu` 3ZYYd
M3Uh}"A
(3ZYYd
E0%R_^[]
t<\APh$#A
d0d E@
UQSVWE
R 3Uhn$A
d0d Eq
GKu3ZYYd
Ey_^[Y]
UQSEE@
R 3Uh$A
5%3ZYYd
USVWUEEUR
E3Uh!'A
#COu3ZYYd
0V$_^[
MUE3Uh(A
3Uhv(A
EZ8W<CNu3ZYYd
Q@3ZYYd
USUEEPhL1A
Strings
MMUE3Uh*A
;u;N|0F3
SVW3Uh0+A
d0d U=U
d0d E3Uh+A
S$3ZYYd
S3Uhy,A
EV3ZYYd
MMMUE3Uh-A
uN|2FE
EuN|XFE
]ENu3ZYYd
MU3Uh(.A
ENuE3ZYYd
MMU3Uh.A
H|X@EE
EMuE3ZYYd
FKu]_^[UQSVWMM
S$_^[Y]
E3Uh/A
Ql3ZYYd
E3UhZ0A
d0d EP3Uh=0A
Q,3ZYYd
d0d ;tdE3Uh0A
Sd3ZYYd
_^[YY]
Sd]_^[
MUE3Uh1A
d0d E#
E3Uh1A
t3ZYYd
E3UhG2A
Qx3ZYYd
SV3Uh2A
SV3Uh+3A
Q,3ZYYd
E3Uh3A
d0d E3Uh3A
u3ZYYd
MUE3Uhr4A
d0d E>
K|C3M
FKuE|>
3F F$3F(F,
$Z]_^[
SVWUL$
Sd^[USVW
_^[USVMUE]uE
]CN;};u~
UE|];]|^[]
USVfME]EE
EUEU^[YY]
E3Uht=A
^[Y]SVWt
AEUEUYY]
3]_^[USVWt
TPropFixup@
TPropIntfFixupUSVt
SVWU3w
SV3UhCA
d0d E t.C
'3ZYYd
d0d 3Etg[
u}3ZYYd
ME_^[YY]
USVWUE=A
3Uh?EA
SKu3ZYYd
_^[YY]
UQSVWE=A
?3UhEA
Ku3ZYYd
_^[Y]S
QYZ[SVW
EEPp/6
.E3UhxGA
$Z[SVW
C<S8|$
j3UhHA
6Ku3ZYYd
!/_^[]USVW3
UE3UhIA
d0d E@0
@E3E@0
UE@0pu5t*E@0O
q3ZYYd
13ZYYd
C0^GNuC0R3C0_^[
SVWUL$
${G t1
K|)CD$
Kuv;-(
S3UhKA
d0d U<
[Y]UQSVU
R 3Uh|LA
d0d uLEB
R$S^[Y]UE
USVW3UhMA
S,3ZYYd
(w_^[]
USVW3UhNA
_^[]USVW3Uh3OA
RB,3ZYYd
MMUE3Uh!QA
d0d MUE
E@,EE@
E3UhPA
d0d EE}
d0d EfH
E@,MUfE
t"E@4Us}
E@4U3ZYYd
EZ3ZYYd
EUP,EU
UB03UhQA
E33ZYYd
[Y]USVW
E@,EE@(EfeUB,3UhfRA
d0d fFEx(u
E*EZtE
EUP,EUP(i_^[]S
t t6DT$
)3!SVW
U3UhqVA
@3ZYYd
MUE3UhlXA
d0d 3Uh!XA
d2d"UE
ErEEE@x
.uEpP+
IURpzu
EPpE3E
UYEECkE
EPpE3ZYYd
UoYq3ZYYd
23ZYYd
EAc_^[]
2_^[YY]
@@0p_^[]
@@03ZYYd
IuMSMUE3Uh\A
d0d Ex
EM<$UE
tIMUE^9U
EaRPUE
UdY3ZYYd
E3Uh]A
d0d 3Uhe]A
d0d Ea
=_^[YY]
$ Z^[USV3
M3Uh^A
M3ZYYd
EB^[YY]
SV3Uhs_A
EBE:\^[]Q
S3Uh_A
d0d U}
u3ZYYd
7[]UQS
UE3UhbA
uYwEmU
]Y_UYV
Y3ZYYd
S3UhibA
d0d UX=3ZYYd
EDf[Y]USV3
d0d t*MU
tG3ZYYd
]3UhcA
d0d E3Es
v3a3ZYYd
SVWfxB
_^[SVQ
CdS`<$
UU3UhtfA
-E3UhOfA
d0d UE
ERPEEP
E3Uh*fA
d0d UESU
E_ERPEEP
EK3ZYYd
E.E&3ZYYd
EE9[[]&
0U3QQQQQQQSVE3UhxhA
d0d (E
UkUEUTE<
=UEYU'EF
E1EE5W^[]
cE3UhDjA
d0d UE
MR3ZYYd
E1[YY]
d0d EU
E ^[Y]
USVWEE@ EE3
P 3UhNkA
t8BK|*C3E
EUP _^[YY]UQSVWEE
K|(C3E
GKu3_^[Y]
EE@ EE@(E3UhzlA
d0d fK
lYUB EfxB
tJEp t
t/E@ EC
PEPE(Pu
UFDV@EUP U
EUP EUP(U^[]
UE3UhdpA
EX0t1E@4;C
EP4E@0$U;B t
EEE@0t UR4;P
E@4E@8UE
E@0EE@4EE@8EE@
EE@(E3Uh
d0d E3
d0d EX td
UB0EPhhA
EP(E@ fE@
Ef3ZYYd
EUP0EUP4EUP8EUP
;Et'pA
UE3ZYYd
<$| <$
USVWUEE
rE3UhsA
uN|,F3E
GNu3ZYYd
3Uh|tA
d0d EU
SVW3Uh
E_^[Y]
SV3Uh|uA
@3ZYYd
E1S^[Y]Uj
RR,3Uh
@3ZYYd
]U3E3UhQwA
@EUqYu{E
U"Y>UE
PEoYME
E\~YY]UE
}UYu E
PQYfEPuuE
P4Yt0ME
@@ JUE
E&[Y]Uj
d0d ME
SVW3UhzA
{YuhzA
/3ZYYd
<_^[Y]
.Owner
U3QQQQQ3Uh}A
u'UhYu
@@ EEU
RR,3Uh
@UG3ZYYd
Y3ZYYd
S3UhX~A
RY3ZYYd
EEw[YY]
YEkOAQU3QQQQQ3Uh{
d0d ME
EW/uDE
EUYu.E
PUEvY}
@U3ZYYd
EEBEET
YEkOAQUSV3
P;Yt ME
US3E3Uh
d0d ME
@7UEYuTE
@3ZYYd
U3QQQQS3UhKA
PYt/ME
`3ZYYd
U3QQQQ3UhA
d0d ME
@}UCYu
UMUEEx
Y4UpY+UY"UZY
d0d Uf
mt%EOPE
E3UhPA
ME3ZYYd
MEN3ZYYd
SV3Uh"A
$eZ_^[Uj
SV3UheA
d0d UEM
93ZYYd
EHj^[Y]
d0d UE
GNu_^[
K}Z]_^[
UQSVW3EF t
S _^[]
K|"C3G
EKu3Z]_^[
Ttot-3u"4$D$
GMuZ]_^[
FKu3ZYYd
U3Uh|A
ERegistryException<A
TRegistryS
d0d 3EE!EY
b3ZYYd
_^[]USV3
d0d EHE
E2EPEPj
rMU3ZYYd
SVWUQ3
P>t$}E
USVW3EE
E'IE^[YY]
d0d E@
E3ZYYd
U3UhXA
dextor32
Star Wars Episode 2 - Attack Of The Clones Full Downloader.exe
Jenna Jameson - Built For Speed Downloader.exe
[DiVX] Lord of The Rings Full Downloader.exe
[DiVX] Harry Potter And The Sorcerors Stone Full Downloader.exe
CKY3 - Bam Margera World Industries Alien Workshop Full Downloader.exe
Cat Attacks Child Full Downloader.exe
PS1 Boot Disc Full Dwonloader.exe
Sony Play station boot disc - Downloader.exe
How To Hack Websites.exe
AIM Account Stealer Downloader.exe
MSN Password Hacker and Stealer.exe
Hacking Tool Collection.exe
Windows XP Full Downloader.exe
Macromedia Flash 5.0 Full Downloader.exe
DSL Modem Uncapper.exe
Internet and Computer Speed Booster.exe
ZoneAlarm Firewall Full Downloader.exe
Borland Delphi 6 Key Generator.exe
ScaryMovie 2 Full Downloader.exe
StarWars2 - CloneAttack - FullDownloader.exe
Spiderman FullDownloader.exe
Shakira FullDownloader.exe
Gladiator FullDownloader.exe
AikaQuest3Hentai FullDownloader.exe
MoviezChannelsInstaler.exe
Zidane-ScreenInstaler.exe
LordOfTheRings-FullDownloader.exe
SIMS FullDownloader.exe
Britney spears nude.exe
Quake 4 BETA.exe
Windows XP key generator.exe
Windows XP serial generator.exe
Xbox.info.exe
DivX.exe
GTA3 crack.exe
Battle.net key generator (WORKS!!).exe
Warcraft 3 battle.net serial generator.exe
Half-life WON key generator.exe
Star wars episode 2 downloader.exe
Winzip 8.0 + serial.exe
Winrar + crack.exe
Key generator for all windows XP versions.exe
Warcraft 3 ONLINE key generator.exe
Half-life ONLINE key generator.exe
Grand theft auto 3 CD1 crack.exe
Macromedia key generator (all products).exe
KaZaA media desktop v2.0 UNOFFICIAL.exe
Microsoft key generator, works for ALL microsoft products!!.exe
Microsoft Windows XP crack pack.exe
Hack into any computer!!.exe
I3ZYYd
\Software\Morpheus\LocalContent
\Software\Kazaa\LocalContent
U3QQQQSV
d0d EJEA
KuX3ZYYd
u6E0u5A
\Software\Microsoft\Windows\CurrentVersion\Run
ULSVW3PLT
f]fEXA
f,Q~,a~}
\Software\Morpheus\LocalContent
InstallDir
\GnuConfig.ini
MaxUploads=
MaxUploads=3
[Search Screen]
Temp, Recursive
USVW3 A
t3ZYYd
\Software\Kazaa\LocalContent
012345:
DisableSharing
\Software\HP710C
U3QQQQQS3Uh
E0EPEu5A
)3ZYYd
U3Uh@A
z3ZYYd
d0d 3ZYYd
Runtime error at 00000000
0123456789ABCDEF
7project1
IniFiles
"RTLConsts
System
SysInit
KWindows
UTypes
SysUtils
SysConst
^Classes
3Messages
CVariants
$VarUtils
QTypInfo
sActiveX
8Registry
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetCurrentThreadId
InterlockedDecrement
InterlockedIncrement
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
lstrcpynA
LoadLibraryExA
GetThreadLocale
GetStartupInfoA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetLastError
GetCommandLineA
FreeLibrary
FindFirstFileA
FindClose
ExitProcess
WriteFile
UnhandledExceptionFilter
SetFilePointer
SetEndOfFile
RtlUnwind
ReadFile
RaiseException
GetStdHandle
GetFileSize
GetSystemTime
GetFileType
CreateFileA
CloseHandle
WriteFile
WaitForSingleObject
VirtualQuery
SetFilePointer
SetEvent
SetEndOfFile
ResetEvent
ReadFile
LeaveCriticalSection
InitializeCriticalSection
GlobalUnlock
GlobalReAlloc
GlobalHandle
GlobalLock
GlobalFree
GlobalAlloc
GetWindowsDirectoryA
GetVersionExA
GetTickCount
GetThreadLocale
GetStringTypeExA
GetStdHandle
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetLastError
GetDiskFreeSpaceA
GetCurrentThreadId
GetCPInfo
GetACP
FormatMessageA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
FileTimeToDosDateTime
ExitProcess
EnumCalendarInfoA
EnterCriticalSection
DeleteCriticalSection
CreateFileA
CreateEventA
CreateDirectoryA
CopyFileA
CompareStringA
CloseHandle
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegFlushKey
RegCreateKeyExA
RegCloseKey
SafeArrayPtrOfIndex
SafeArrayPutElement
SafeArrayGetElement
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayRedim
SafeArrayCreate
VariantChangeTypeEx
VariantCopyInd
VariantCopy
VariantClear
VariantInit
SysFreeString
SysReAllocStringLen
SysAllocStringLen
MessageBoxA
LoadStringA
GetSystemMetrics
CharNextA
GetKeyboardType
LoadStringA
MessageBoxA
CharNextA
.idata
.rdata
P.reloc
P.rsrc
u-cI3ck0o
Yy49Ql
+3BEn'!{H'iPm
O=tbMG
{)JCi
7sA-aV
ag/!K1#?
krlAp`
+k-?7Yf|Mhd
Md[pwP1WC
sl/=YC
%[/''+
rNucw-
?VJw"Su"
&A;Rcv%W]
!Jhg=g
dF(%L 7
oo9yQHJga!#Md+i?
/km4t+urCc
?d;wz/
Rgmh}kK
I%`%\Y' GHKP6}d
7([CF1
`$5QH\f
TSet$_
GZ#All
oDule5EA@S
eCi?SEoMeav
iz0Virt2C
Lv1Id`v
In,dQueryWidKAToXK~[Bytn
={@sq,!Pr
Addrar
momm@n.5
r-6pOA
eF(fU]
7Rtl:w
h&XTim
1Gba6a
L(KJvZ
Bl4G>t
FkD(DM
FFlush
d;N/Pj_
csNpoQ=3?
wknb8rdC]E
`DATAx
Hw]BSS
6'A.5+na
KERNEL32.DLL
advapi32.dll
oleaut32.dll
user32.dll
LoadLibraryA
GetProcAddress
ExitProcess
RegCloseKey
VariantCopy
CharNextA
grf]`}BfV
GfNuDpWR
MM``~9MkYM[V~9M
"]|`_g(`_
g}M]=~^c
Vbrz(<
)`hx`<
`=Wffm
_`7C`h
)Wp'V]
7''` S~'}
VWQL ht
dA\RG%EN4
^$_=2"?
~-.d
,N[D<6:=9
qZy6Cs
hxfW
'@8]f]V
nbV0S:_
br=Mj[
>^'8'8f^VT&~~V
D'''``
VH`j(N9k
'ZVtV!VX
w_[(rV
VV\VKX(Cy
({@`G'`$
PUF'''='
V'''f(V
'h(''''C
CjEjMfEj~~~'h8h
\@'(8h
wV7'''8X
Vv'''rx
^7=fX=6x
~'Z'Uh(
@<D`@@
~'~~'P]~'h
W`w(\Zg`,
\`_ZZ`k7kj
iD@PP@P
x^_V"+
Z`x`}Xkd(d`Y`|$
Ij$FX`
#kdYfCSkd`d
xhe@b`he
`\Z@0`$j
@0?he(VU
{{7{Ew
p5dP=dP=P=IpxPP
pHxPHp
\P)`PPP
PVtPPMPP
`VPyP=c
Trl`|@\
XX@\ZMJ
Vbr}]MFj
'\mMkE]
E@x@}XX?y
Dn\Z`x|`
r`]`|W|
kd][f@]`8
F(`''V
~~`Y''
'Y''VV]
'''F''
h'.''`TD'.''MT
q:\102\exe\278ae0ffb32d54a185df793611053701-log\backup\129985746716175000
f793611053701.dup
KERNEL32.DLL
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleA
KERNEL32.DLL
KERNEL32.DLL
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetCurrentThreadId
InterlockedDecrement
InterlockedIncrement
VirtualQuery
WideCharToMultiByte
MultiByteToWideChar
lstrlenA
lstrcpynA
LoadLibraryExA
GetThreadLocale
GetStartupInfoA
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetLastError
GetCommandLineA
FreeLibrary
FindFirstFileA
FindClose
ExitProcess
WriteFile
UnhandledExceptionFilter
SetFilePointer
SetEndOfFile
RtlUnwind
ReadFile
RaiseException
GetStdHandle
GetFileSize
GetSystemTime
GetFileType
CreateFileA
CloseHandle
KERNEL32.DLL
WriteFile
WaitForSingleObject
VirtualQuery
SetFilePointer
SetEvent
SetEndOfFile
ResetEvent
ReadFile
LeaveCriticalSection
InitializeCriticalSection
GlobalUnlock
GlobalReAlloc
GlobalHandle
GlobalLock
GlobalFree
GlobalAlloc
GetWindowsDirectoryA
GetVersionExA
GetTickCount
GetThreadLocale
GetStringTypeExA
GetStdHandle
GetProcAddress
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GetLastError
GetDiskFreeSpaceA
GetCurrentThreadId
GetCPInfo
GetACP
FormatMessageA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
FileTimeToDosDateTime
ExitProcess
EnumCalendarInfoA
EnterCriticalSection
DeleteCriticalSection
CreateFileA
CreateEventA
CreateDirectoryA
CopyFileA
CompareStringA
CloseHandle
advapi32.dll
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
advapi32.dll
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegFlushKey
RegCreateKeyExA
RegCloseKey
oleaut32.dll
SafeArrayPtrOfIndex
SafeArrayPutElement
SafeArrayGetElement
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayRedim
SafeArrayCreate
VariantChangeTypeEx
VariantCopyInd
VariantCopy
VariantClear
VariantInit
oleaut32.dll
SysFreeString
SysReAllocStringLen
SysAllocStringLen
user32.dll
MessageBoxA
LoadStringA
GetSystemMetrics
CharNextA
user32.dll
GetKeyboardType
LoadStringA
MessageBoxA
CharNextA
[(rnNE`pV
fAl*/&=y9
a$~rSb
!(q:p~
@UDMTg#w|QU#),x
@HwGJ4
N-a4:
Kj,3o#ElyPL
C)S|kAj
Q:d6Jmv
|"wzs{4XxvsG|*(
{INoK^
l$"ebhtI'
bWWV":NJ}Z%Lz.'7
6l0p^Kn\@`K
k$(3.l
b[S6 dh\
?U)-/z
bZu,<D{
:oIf.*b
JfeQdf*d
o"/{|~
zaNbytn
/d|X`,
,Hoc1!Y&{
,sn}fdt
;u=dCW9
7{`N!W^
@h/%r4m/
vN-u[0
VzXU\ECo>uSI
R'2vC^k>l
*ZS1Lvu5
Lm_-/2\
5N.>P@E"*[h
,hQw '
p@[BhBh]+
N?l3CU
20n8inTB\K
##m`Ko
/j-s7wg
,lrDZh
|bC]r&=uSo
QR7L%k
V4<B%caYkX
jUf#Y%
>c"7@gX%
B7/8Wn
&o>pY[Q
tL/j6\MY
)8&(&Y|w@V
h<}4q[j
z~FFUNzf6A
k=oHQ7c!EH
25BUbV
10vMr$,t
qP!`)|`1yAg
2_%P]G
:$_0_F(3
?#` )7L
3d5;<|~
adiU2A>4h
00*W|QFed
2#|Cs[/..N2&!}KR6
3^-r6f7
+i,/B\D
|D3*]2uc
bvV!thG
&zG^/GT
/_Ays"GeT
73>>*EbU
_;1e$W%*Ztm
#t=i(EH
~n<g5Wsz)
.Fm'HJC
DVzE|J}G]:NE&
tM&c*2
.\/aCy
=vSq\-
CUMjCy$(
X=G;8kX|@
<$!5{CX
[1S,il.
]kB5gl
m;SQ"pG
kV|Y/ps
WUM9hA^=M
$X97>t
3_7Hro9/P,l@o
IQw7GA^
7"e"&!
p~q59zeA|#
EJi5z'
E:28cg4goHrv2Z
-y6!SR\(O,N[
see)%v
^pbrx[a)S8
254GtUU
%"`W+w-W
1;K|=@vxS
66lSC}
%LuNvcz>L
X[|Kry
REO<|V
-,>c`
|c/.t&LZT
FM"bp*VYNS
0VR5#^|OoH5
Gq9FW&
YUxN|&
D<H6[jSF^[
Si-gK@[j
Ml\ii9)
Q5Z6gfT1N.W
"*v@=mDC
o!fW*l-|+q{
]A>t\(.
,@B78=
<"@j+r
pq~(cDv#
Q?"4$wl_s
`pR%t}g
]ODUj`.oP/5R
he*}\|,`ip,d86
U7<eo]P*m
i$vqBM
JvW1'#bCTDTGL&="*Q
A6V+DpL
vj[&)&
AVnYl7-]
yr|@W-4!
1*x>OBh
!Dq~/x
g*cu184N
{%b&$N
r&mNz*-Wl
BYXJ`/NpDo
$f`Z|qcR
D:(@A<4
V3OpV[
!. <X?DI
;J$oyIR
x[)l(.Q
hG5.Ib5kV""~QC%,ep
T9C,<}7{I]=6
1(]9nb
!F^iW|
A5/n#>Q
<1k@,=E
INx!iw
I0Q"1/e
S0E"R|W
<b_vMTSl=FCOA;
|B Bveu4
r2BCZ.
)qP&uA*|
R`_n+AlaFb
_*G}`)
&(Ij5AM[
<"g'x]du{#E[brm=]N5-
- [6&Y;
/5gGw/
?N(BL%
R;3+%5PeR
21w]ak&Q
)#Y2tI
{=<ph0|2
pn%M5ar
2Y]k\w
#n)&O9ZyUh)%
6+CZ1r.;g
Fy[Tt(b-"
P{bLv90
:4*o%f)H
(U{8223
[RNd.[1l
|-Y6P{
tznV?n
a$n'd=0-
Ls1u%H
](z3PjKN
:Qz{yF
DA]&?A$JFz
4l0dDjN!o(k
d5*C\Y /
`Nf4N&bD
86cqm'v5a7
AktB<Ad'Dk%z
I?0A!|
o1!:O1]
GakMhix5
o'y{qp`u,
$X]n9i
mw^LS!
Kxm`k!zb$
vxlpwI8Ce
90*jPU
@i&/\wv
Gv&QGwQ
PZ:ZL.
spEqC!#
9zf[w31 i
5H{xt5m ]
2Qc5Ix
]lJj^
3Qk[~&A
d9'1-^
bk,V>cmc/[v92
MD|kWd
Z_[AFc20=GLdV
W+fvM
"'{E.C
7b, nK4DaD+R!F9
TADb3YW
+,=C18dI*o
8z5(M|
/;'Fc$^~t7=jincsXi
iHjR>1
/ZI!0}
X%{VD%h
#od*'y?\MD=o
&:@MK5
{oA:Tp*8Z
S5H*moc
H;Zj_:E
ldHDx?mmXM
wHjjob=2W
XH~0J$
%9y>|
p+D]jC
[ORi!o
n$*8W(4k@'
^ *YZj
7%HwJ"
u,6mF5
6y_<p\
4//< =v
*?hcu!
0S90h+
.[8O}]x
uaFupy7RzL9M}j
N^H)G!*(`Yu
~e3h30
J|H3_i
D|} r.&
qnmb>s
)l veCv
q$XKQa
.c]pArZP
3^]6Z\
sS}\uA
a6.*|_U#V
ml|W7b}
|Y>WD'r
?&E<2V
c#Dvvq64
qE?4'R
W@r|ro
)}6>3x%Gl
$c5kI"x
#A|:;!e<
._|d|BYzGeO
0k rvbDn=J1K]n
E_/Qujb
;\. ]^
"r3)K[5ZqG^Xc
exxJ5|
rjKe"TRD7)eO/byJO*4;h
Z^Zh z!
ettYo5
<84H(N
Xpo>e`S*kO
8y"nxUq"
L)eNTln
L9pRi;
7+o@}_
.x_Y^m
HIhR.^x
r\Rg6A
&h$l0p)
ZwG2X|Y?W
G^q4,|#:nD
|iP,ug5{;o!C
y8\(1Y
;dD<>~
AT?V,88"
7E4la<79{6S)%-[j7
Qr+i8*g
w$j`@,Y(
Zds23A-^3 ?Mw
;l$t/Bj
Ia"Uq-jm
%Vj>iB6A)X
K#qgv38
#,Dq9`?N}
NG-v'J]{
FS7[kh
bqvtg:HR
{wh>sD
V=@+bdGLc38B
U,d!pu
KD-lQ(_%s
F$fN@[J
ODzJf]*Jj`
@CBW2HR$
'35n\GFP
{i43;+
#PAtH? =
Toi|l5/{5
!uC8{9.1
3Nrcbw@
IVNA~-
k9]m=z.3vTs+
R8X` "Rf
XeYV)P^!QV
#f)z%]E
`}eRDVC[L=\W
c[F9"lT'i
S(&1`V
'Wuq~
\/V\gtG+4_qB.[@
U`nI@PWp!pE
l}lTrIx
iGq?s',
i)I{6AGqGi
HJ`bD48>>N{X=wel
)@7=.+o9]
&K@;JI
~!V2O'x\b:>dO
(a_cdV+l|
D%H2*<>_FXM
\lH,uYlhD
3L~\}Th|A
/qr?5mS-CZ1b@mYo
v:Q044;
rAHiRA8
Og{5-)*}A
ZtIt]q#E|s=Di
8t5^CP
o%NtO.%^Op0V89l
.$Zd}3*?:
wu#8fV
>7nEaz$
&L py"8
P&($}:6
MOUufz)
[z[r6'
>.PU?S
G|B`FKld~I\-
g]kg{6PFx
aPlH*ln1U5_
IxbXtNCw
^4L>OXB
{*b)GE
l.i= i
i#cKKmo
x&xj]P
GGYzEd|oJU-0M
kpt=1:vT1Q
<e+&Hg
Y_tV<\>uY
GH2}O,Ub= gG`T
=V0)5jH+r
Fh!9_2
kQHF_@L
R-sfrdY@6')ibvj($8
L?MB48s
7R$d}y
^6.K6n7q^
EI9;N{QN
5dt ri<
!T:>P|
G?5Wq:
EIZ/K_
q)#A8W-te-9'+
tv'#lt3qi&
K<l/@j3^e5
k]t|&aT
G.zRB@nlgeU
ZUIz=%|4qiY(("G[Q
Qez&sB'v
uVxIZU}
tL|q{`?7fa|4S2
8ya4F2.%
{W:J7>\-g?7_Mv%
'YM>[m0
5~Wu<8l
?".PqZ}r
'i.QHld\
Q/iv_hw;
q}3#w-c
._cQ
oy:EZa%
Oj_>JY
{b2N@hKt,{,
o./3OTeyKEBf
[e|(GO
|Q}UQP
AIhW?}|V2
p]FkQk
LJ-lIV
:+W)2w
%TA?YLs
\=r'K<d
3'm==Z
Z7.JmU
)fvOs4m"9VD2u>D<Q=*
ma~]cl=qz.
ZJ3ckMOu
Z4L2gd
.g-Nu KBP
Hq[A`w
v"LWa7Nyr
a1slSD
?zz^>d
Gdk0wx|O@-X
!vPy7ny~D|
BZc)N%*qDM3k_
!D4,9Q>p
r=zf2Oz
j *1#I
Tt&`s(r(y;[{
_)^+YoSkx::UHI1H*0u,
%/4khYF\r
{|~AUkLgd>[0
0N[4R~s\^
"tAhgg}e
!0M;'RPEPFLz`;8
pxR4q
^M'{u&*L|Ihh.
AK_2<b-Y?
ZN"ygZ%x
C*V'BE
T3&=#^
!XQ5&<
;bQ@x^&sm2.Kn
[N9i6?
j$Kh{y(4v(,
qpe;o'[F
vP@#MP>2
tthijK
aK{nN-
b&tAOwsF
6NmB7-7
wfVR7}_]u`
#C*,jl_
&p]qj8 _*B
!tkiIn
c$OW=GwY
IW;"_vb!Qt$g?RUT^\?P,3
AAAAAAAA
@@@@@@
@@@@@@@@@@@
@@@@@@@@@@@@@
@@@@@@@
@@@@@@@@@@@
@@@@@@@
@@@@@@
A4A?AJAdAlA
AAAAAAAAA
DVCLAL
PACKAGEINFO
List index out of bounds (%d)+Out of memory while expanding memory stream
Error reading %s%s%s: %s
Stream read error
Property is read-only
Failed to create key %s
Failed to get data for '%s'
Failed to set data for '%s'
%s.Seek not implemented$Operation not allowed on sorted list
Property %s does not exist
Stream write error
Friday
Saturday
Ancestor for '%s' not found
Cannot assign a %s to a %s
Class %s not found%List does not allow duplicates ($0%x)#A component named %s already exists%String list does not allow duplicates
Cannot create file %s
Cannot open file %s$''%s'' is not a valid component name
Invalid property path
Invalid property value
Invalid data type for '%s' List capacity out of bounds (%d)
List count out of bounds (%d)
September
October
November
December
Sunday
Monday
Tuesday
Wednesday
Thursday
January
February
August
Error creating variant array
Variant is not an array!Variant array index out of bounds
External exception %x
Assertion failed
Interface not supported
Exception in safecall method
%s (%s, line %d)
Abstract Error?Access violation at address %p in module '%s'. %s of address %p
System Error. Code: %d.
%sA call to an OS function failed
Floating point underflow
Invalid pointer operation
Invalid class typecast0Access violation at address %p. %s of address %p
Stack overflow
Control-C hit
Privileged instruction%Exception %s in module %s at %p.
Application Error1Format '%s' invalid or incompatible with argument
No argument for format '%s'Invalid variant type conversion
Invalid variant operation"Variant method calls not supported
!'%s' is not a valid integer value
Out of memory
I/O error %d
File not found
Invalid filename
Too many open files
File access denied
Read beyond end of file
Disk full
Invalid numeric input
Division by zero
Range check error
Integer overflow Invalid floating point operationFloating point division by zero
Floating point overflow
DVCLAL
PACKAGEINFO

Process Tree


8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe, PID: 2244, Parent PID: 1788

default registry file network process services synchronisation iexplore office pdf

Hosts

No hosts contacted.

DNS

No domains contacted.

TCP

No TCP connections recorded.

UDP

Source Source Port Destination Destination Port
192.168.56.101 53179 224.0.0.252 5355
192.168.56.101 49642 224.0.0.252 5355
192.168.56.101 137 192.168.56.255 137

HTTP & HTTPS Requests

No HTTP requests performed.

ICMP traffic

No ICMP traffic performed.

IRC traffic

No IRC requests performed.

Suricata Alerts

No Suricata Alerts

Suricata TLS

No Suricata TLS

Snort Alerts

No Snort Alerts

Name 092e2cef32331b98_warcraft 3 battle.net serial generator.exe
Filepath C:\Windows\Temp\Warcraft 3 battle.net serial generator.exe
Size 182.9KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 66f99a3bd34240573d763eb7ed0ff00f
SHA1 86facfa1335a8f74ac251f57d4279dd620e3259e
SHA256 092e2cef32331b98a35990b4697daffe755d754125ba2a46c2ffa812930f3c07
CRC32 274D8749
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name da74a780578e4758_sims fulldownloader.exe
Filepath C:\Windows\Temp\SIMS FullDownloader.exe
Size 182.6KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 090e10d89cd72bf3b1144444a9652493
SHA1 e379aa343b78fb4d0fc82656c402969e3a97bffc
SHA256 da74a780578e4758a2af370fabde4c1ad0303a925efd8e7f0f362306fa4b2fa7
CRC32 1F90235E
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name db20c447a9a20a2d_starwars2 - cloneattack - fulldownloader.exe
Filepath C:\Windows\Temp\StarWars2 - CloneAttack - FullDownloader.exe
Size 182.9KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 70f40c2c107a73c99c928eb4292f7334
SHA1 09764055ca0a8e312826eb6fc7bff32ce95c6f68
SHA256 db20c447a9a20a2d545da5a2ae59a51b44196ae9180a49330126bb00f950953c
CRC32 856E121F
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 5fe5f65e1bc24c31_zonealarm firewall full downloader.exe
Filepath C:\Windows\Temp\ZoneAlarm Firewall Full Downloader.exe
Size 182.7KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 dfcff10229d7fff7a0f6aa5fba3cf89c
SHA1 2746b6df1cfd2eb33405c2639f6c558a020d5cb0
SHA256 5fe5f65e1bc24c31603a38490ee842cebc1ee2ed2d689a69f4e1dbebe4ea6ccb
CRC32 E6A5F014
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name c3182e0a64558ccd_winrar + crack.exe
Filepath C:\Windows\Temp\Winrar + crack.exe
Size 182.7KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 933cd2c88125467f2cda59c595fb806d
SHA1 2315de097464ba207a047b61b7db89fd85876640
SHA256 c3182e0a64558ccdafd8121d8391aaab6d8ca9a79cd76eef74eee8f8da62c7aa
CRC32 8B24BF7F
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 86c3bd4f18896724_key generator for all windows xp versions.exe
Filepath C:\Windows\Temp\Key generator for all windows XP versions.exe
Size 182.8KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 6f7472ddf0975a8acd80dd4774266654
SHA1 775148e3fbd75d551eb0a512ed68f668ecc53ef9
SHA256 86c3bd4f188967245613d9fce531491a547a899415a19f887aeb5933ab988f6c
CRC32 729616DA
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 8aed4de53ba6ee75_ps1 boot disc full dwonloader.exe
Filepath C:\Windows\Temp\PS1 Boot Disc Full Dwonloader.exe
Size 182.7KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 4de203309b97c7a721f66bd27b2822cd
SHA1 691c09f38b1faabe9135489d0336d00c9b6de076
SHA256 8aed4de53ba6ee7527c7fe1f88f00375561cd0abd243facf7eb6625d4576c3af
CRC32 7521CA74
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name bd2ffabc7ca417f4_moviezchannelsinstaler.exe
Filepath C:\Windows\Temp\MoviezChannelsInstaler.exe
Size 183.0KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 a7e835145f0f6e364f22a78d62c32a66
SHA1 e673cd5127773486f08ba5a8c1884eefa4aec8d8
SHA256 bd2ffabc7ca417f41675f490da5ba4b32625a6b47074f1880bd4f3d494c9355c
CRC32 8AA78587
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 8ae97eedae9f5b17_battle.net key generator (works!!).exe
Filepath C:\Windows\Temp\Battle.net key generator (WORKS!!).exe
Size 183.0KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 b51adbfbb6c013fadc08f98e79544504
SHA1 18ff2faa8ceeaf5d675b5ebc6b3627196c712e9e
SHA256 8ae97eedae9f5b17adec181b76fae7ff462c6e81942c7276e82e0fc7341a8e28
CRC32 9D65384F
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 31379da58f4cb4a8_jenna jameson - built for speed downloader.exe
Filepath C:\Windows\Temp\Jenna Jameson - Built For Speed Downloader.exe
Size 183.1KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 1462dafa811ed86545f8791020a78135
SHA1 b36c5cc5be0f1b94ee702ff82b4d9e1ed36fd786
SHA256 31379da58f4cb4a82816ec5a338c3db410b5e446f546a57d8cab2cdec88070de
CRC32 700C2ADA
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 6317caa6ebdbcfaf_[divx] lord of the rings full downloader.exe
Filepath C:\Windows\Temp\[DiVX] Lord of The Rings Full Downloader.exe
Size 182.8KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 3035bc0fc972b5adbe013c918a1ae6ec
SHA1 c1e5c94139c58e5bca9c2397066f196e354e9966
SHA256 6317caa6ebdbcfaf3f65c445ddb64d95eb55e7e0076e0b821d8495d9c5cddd51
CRC32 C377EE58
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name a03bfc3105c14bc1_winzip 8.0 + serial.exe
Filepath C:\Windows\Temp\Winzip 8.0 + serial.exe
Size 182.8KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 b2def6de0ac36996193a1f4be96739a2
SHA1 69558cee6cac2bd976cabe4641252762d9d6a339
SHA256 a03bfc3105c14bc1ef177944b64ac2b79bc57eb4baf617d0a087ee5fb40b0da8
CRC32 70D06F38
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 8a47d7ff7f3d1009_microsoft windows xp crack pack.exe
Filepath C:\Windows\Temp\Microsoft Windows XP crack pack.exe
Size 182.6KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 be79412a7660e640374820b9d5c15ef6
SHA1 ed1829c4f0744b6de9f055e570659d5fffecc398
SHA256 8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0
CRC32 6C041FFA
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 1635d285bca07b33_zidane-screeninstaler.exe
Filepath C:\Windows\Temp\Zidane-ScreenInstaler.exe
Size 183.0KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 012bdd31296bdbcc3b42569c48c6346c
SHA1 74c56a4e2d35e291ff0c763657a7ed5550bbb854
SHA256 1635d285bca07b33dfbcee4111d14f0b963fe71e9d0538c7a135a7f7b84e3e36
CRC32 FBE57025
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name b277ef94a69360ab_aim account stealer downloader.exe
Filepath C:\Windows\Temp\AIM Account Stealer Downloader.exe
Size 182.8KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 1514ed85b49ef290957ba3a5b84b0222
SHA1 b1aa2aa29db07f5c0a577c0040911e9757a39f91
SHA256 b277ef94a69360abcd4128e62821a3f1a98e956402d9e96af12c60ac69dcdbae
CRC32 D9C3A5AA
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 762d6270b38ff18b_borland delphi 6 key generator.exe
Filepath C:\Windows\Temp\Borland Delphi 6 Key Generator.exe
Size 182.9KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 be75c6e5c0ff72a8f261397a9d7b2361
SHA1 f9212f7574b567d13f2862eb267c9302c2e9a584
SHA256 762d6270b38ff18be5acda16fe8e6a18aa6db0d6a517faa6ec18597aa4412727
CRC32 045D9217
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 8714409f8c8799bb_kazaa media desktop v2.0 unofficial.exe
Filepath C:\Windows\Temp\KaZaA media desktop v2.0 UNOFFICIAL.exe
Size 182.7KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 cc0ba2a9802e65481929cd60f07d32c3
SHA1 f2531c523a9c7aa2eff607b275276acbd9f0513d
SHA256 8714409f8c8799bbaf6fa05db84b852ab1f45d8b0c8803f73bd2efd0503efb3a
CRC32 169C3DF7
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 81ccd6dba2c26ec0_gladiator fulldownloader.exe
Filepath C:\Windows\Temp\Gladiator FullDownloader.exe
Size 182.7KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 26dcf6b9f583a2d8c01792f90eaba4fe
SHA1 c3a9ba90141736b5bb7a74ad4886fe17baa34591
SHA256 81ccd6dba2c26ec07fd426ab626f6be05ac6b71dc293f966c458cbd2999656df
CRC32 7183D54E
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name bc21b1c103c04bb6_star wars episode 2 - attack of the clones full downloader.exe
Filepath C:\Windows\Temp\Star Wars Episode 2 - Attack Of The Clones Full Downloader.exe
Size 182.9KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 edec9b98678bf0107468a801dbbd717d
SHA1 94860a3236fd1e4a870815ff76d151a62af6f016
SHA256 bc21b1c103c04bb600e8b454b507b502c21e818fc90f9e3796447314c0fc0a23
CRC32 4ABBB3D4
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name a7a905a2a86f6688_shakira fulldownloader.exe
Filepath C:\Windows\Temp\Shakira FullDownloader.exe
Size 183.1KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 e14c92d4209e08a57579b8c81da2cf5b
SHA1 6faa06e77be139ad062072afaff0c5013c4ce925
SHA256 a7a905a2a86f6688d92eebdc826e35e47807024608779f6889fd7f2637c37283
CRC32 1A17C708
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 526a60b64672ad9a_half-life won key generator.exe
Filepath C:\Windows\Temp\Half-life WON key generator.exe
Size 182.7KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 7c1b4ee4f1dd9c49418b64ad931fe553
SHA1 42de257827a21e03a196da3475bbfe9f1dd2e2f4
SHA256 526a60b64672ad9a46c0249effe318c4c8239a9ac975db78b2e120b43518c19d
CRC32 2EF98E1F
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name e2e3b0e84507fcd3_britney spears nude.exe
Filepath C:\Windows\Temp\Britney spears nude.exe
Size 182.9KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 6947481079bfea43491dffdb240394f4
SHA1 d8e7c28e605178f730faba717ed484e7fa288237
SHA256 e2e3b0e84507fcd37f29c946219729873c1b5477ebb4968a558cc87c979870b8
CRC32 B3094F64
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 08e5054c043e9987_half-life online key generator.exe
Filepath C:\Windows\Temp\Half-life ONLINE key generator.exe
Size 182.8KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 e80cd2a0eab14f4d292e3e08dfdc6320
SHA1 aebfdc6cc43e0e1a98fb1aaac01a12958d7c1971
SHA256 08e5054c043e9987a0d6225f60b72adf947cf0db67a56fb8935fa057ef865dd1
CRC32 B27116B6
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name b5bdb875c7bd6506_macromedia key generator (all products).exe
Filepath C:\Windows\Temp\Macromedia key generator (all products).exe
Size 182.9KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 4d53f23dc1c028663260c3fffad74797
SHA1 227e469968155fe663677b42343200571e593bea
SHA256 b5bdb875c7bd650693c69fcd19c9b26d51aaf68d6b80e6192b60b83fc425330f
CRC32 401DE32C
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name c9c7caf5ee72d238_internet and computer speed booster.exe
Filepath C:\Windows\Temp\Internet and Computer Speed Booster.exe
Size 183.0KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 64d49a4e890461306f813b00af301927
SHA1 1fc8f38b19c482b2cc6ef8b0dfd076f6e35b2d82
SHA256 c9c7caf5ee72d238050a7cda8ccd26cc24ea637cfbe8f0a444e7399279ecaaf2
CRC32 D43E7E76
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name dc3cc988798914ef_cat attacks child full downloader.exe
Filepath C:\Windows\Temp\Cat Attacks Child Full Downloader.exe
Size 182.8KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 25f788950b3b501e65bad87e38a0c43a
SHA1 fb3d8971224a09e2cf8a9284125d62a3bd702e66
SHA256 dc3cc988798914ef83ff5f6d4a10d0cfe6c28b1bae7cb29c18b8f92ac7aeff2d
CRC32 8FB34A14
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name e657bbba6ae3fb56_microsoft key generator, works for all microsoft products!!.exe
Filepath C:\Windows\Temp\Microsoft key generator, works for ALL microsoft products!!.exe
Size 183.0KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 67e528c3b469e6f97101d01883270d06
SHA1 f0f8583e76a45178c403a8559b135c29bf1206f6
SHA256 e657bbba6ae3fb56b33a510ed3fbe1fbf6127d0520187e248d58964fd626dfa4
CRC32 74B707A1
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name e93a667404b36ef0_aikaquest3hentai fulldownloader.exe
Filepath C:\Windows\Temp\AikaQuest3Hentai FullDownloader.exe
Size 182.9KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 3bd26e3093ba7b534a98d64806cee1ce
SHA1 04bc9f2d1f7a0907d76a2b3b5f64b10446671e58
SHA256 e93a667404b36ef0d2a4ec025975d24650945b32083b9cb71a0fab4bd0e05cfd
CRC32 7FA9DF74
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 5d6f2e4b7d6f25ce_windows xp full downloader.exe
Filepath C:\Windows\Temp\Windows XP Full Downloader.exe
Size 182.6KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 6634666d36f7a2ab51c25551620df6a1
SHA1 fd4f49aa6846b9ce1f9180d1744d9994c58c912e
SHA256 5d6f2e4b7d6f25ce8c4bd063e3b78066760361254b291d9f07bb7df1d3a6aadf
CRC32 2DF8F9E2
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 9a7d103f8a65e27f_lordoftherings-fulldownloader.exe
Filepath C:\Windows\Temp\LordOfTheRings-FullDownloader.exe
Size 183.1KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 f2739f4b37521748cd34340f83d53862
SHA1 bbdbc4cbe298fb6bbb39c2aa80f9dc62e03b1dfe
SHA256 9a7d103f8a65e27f09cf7f8cb45d96a66dc4e0a9f7587829f310144bbc15060d
CRC32 B7C28038
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 26ff565ef0119e44_star wars episode 2 downloader.exe
Filepath C:\Windows\Temp\Star wars episode 2 downloader.exe
Size 182.8KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 44940c8b581ff13bbca38385c8188405
SHA1 1a670edb7a1c478ba42e00a27bd89c2a3aaab35d
SHA256 26ff565ef0119e44eac276bcbd19387246c26402e8a375a9629adf0457df61c7
CRC32 6F70DF80
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name bf51eb2cbf8eded1_warcraft 3 online key generator.exe
Filepath C:\Windows\Temp\Warcraft 3 ONLINE key generator.exe
Size 183.0KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 4010f8d199fad38b4b1290fba7dddde7
SHA1 50e92628e44c24420cd90100ea84603889010893
SHA256 bf51eb2cbf8eded16fee26de3528e7c2672405d0103afeb081bcbfed12145c84
CRC32 ED576FD0
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name dc7230087bf79403_[divx] harry potter and the sorcerors stone full downloader.exe
Filepath C:\Windows\Temp\[DiVX] Harry Potter And The Sorcerors Stone Full Downloader.exe
Size 182.9KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 e2b02fb23893e0f5918a0282c7d24173
SHA1 cfabd66a10b9ae3c221092103a79af73c315de67
SHA256 dc7230087bf79403767722a79daeda3dd8a9a8bba7f879c4590bb078934b3d1b
CRC32 0559EBED
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 613bd21ea913cd79_windows xp serial generator.exe
Filepath C:\Windows\Temp\Windows XP serial generator.exe
Size 183.0KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 81b0c6d7896d7f35c3f7aac215af9e15
SHA1 eae97bf8b553db40149cf9f7052ef3d42b4f5a80
SHA256 613bd21ea913cd7950ce9bc2c80ea222b5cc3924f7cf315418335b4960f76ef9
CRC32 F6229C13
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name ce84487c1dd521d5_grand theft auto 3 cd1 crack.exe
Filepath C:\Windows\Temp\Grand theft auto 3 CD1 crack.exe
Size 182.9KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 c4ec1bf06a6c348a58a2fa1d521e965a
SHA1 520f3ee8f3c39c1eeaa02f071621aeaafc682a96
SHA256 ce84487c1dd521d54a8095e88c0a8102ce553d2fa29a476373722f755b8b0ed1
CRC32 B82F30A3
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name c39d8d7784205a64_divx.exe
Filepath C:\Windows\Temp\DivX.exe
Size 183.0KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 caafb1607ab54796ee1f32134c5031ad
SHA1 232f203af88dc82499477d7f787465a2e58e0721
SHA256 c39d8d7784205a6498af96e89a81e29fcbecb0e654927c0fa0c859a422523fc8
CRC32 7726BE45
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 77e0bf06f65390cb_windows xp key generator.exe
Filepath C:\Windows\Temp\Windows XP key generator.exe
Size 182.7KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 5f2ba39a66e3dc58817c9895a62b468e
SHA1 dcde288f2e2798d48bba18aa1d95ffeedbb00ab9
SHA256 77e0bf06f65390cb1c0f813af59ca18abfcb5522ae90fb6119d5820594a536d9
CRC32 99CE857A
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 85c649f148c39155_gta3 crack.exe
Filepath C:\Windows\Temp\GTA3 crack.exe
Size 183.1KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 112ee4a8643bda5fc913eed31072e8a2
SHA1 e233a76b238e81ae98dbb1c47a5f15b67c6d02e1
SHA256 85c649f148c39155b36451fd9101c7e0956ed1407271c88348626da38ff9deb4
CRC32 D3ED30E5
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 01c59bda6873890b_how to hack websites.exe
Filepath C:\Windows\Temp\How To Hack Websites.exe
Size 183.0KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 37fd033c2058c0ebef45379b6c1a69cb
SHA1 8df1aff7b20b70a330cd95caff80a31c2d6c0511
SHA256 01c59bda6873890bf97f003143033d3f0d71946c477d5a5c496d8192c145370e
CRC32 0D3392AF
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 5de62aee51662cb8_hacking tool collection.exe
Filepath C:\Windows\Temp\Hacking Tool Collection.exe
Size 183.0KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 65f62680aed37119047ee7ab5261e06a
SHA1 cf0c9bc8b38708c7a02f0447f976e428c690ab5b
SHA256 5de62aee51662cb83a537635221cee5c059bf93aae75a7c319cf93759f4d593f
CRC32 814672F4
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 37903adbd10653ce_msn password hacker and stealer.exe
Filepath C:\Windows\Temp\MSN Password Hacker and Stealer.exe
Size 183.1KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 bcbe0d8e18ff5a8820f826c48a74acd9
SHA1 b92c7dfdd7818ec01eb31122b62f299ada22b1e7
SHA256 37903adbd10653cebbcb08edb30e850d197e9033b1135bd7e902a25a0a96a69c
CRC32 CBF8A895
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 984fbb57156019ef_sony play station boot disc - downloader.exe
Filepath C:\Windows\Temp\Sony Play station boot disc - Downloader.exe
Size 183.0KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 4a130497c14c9c4c72f37c5cbb6d91bf
SHA1 ab4759ed1bf16a95ff47354261fc1f4b0344a6a3
SHA256 984fbb57156019ef53556cf80636f5f7b31e3484b053ab8ec7c909a77ba148e2
CRC32 AB6F4256
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 24ebccf3d582ca29_dsl modem uncapper.exe
Filepath C:\Windows\Temp\DSL Modem Uncapper.exe
Size 183.1KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 e2ffd3d8f814e5e2a4b0884b877833c0
SHA1 b1f946924cd44df96f4dc7ab2b21ab04b47c11da
SHA256 24ebccf3d582ca29082fdecbb62ff3b11e71aeff16bf0594d8f22ae0046dc96c
CRC32 34AE6ED1
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name c02d4dccc7bc1268_quake 4 beta.exe
Filepath C:\Windows\Temp\Quake 4 BETA.exe
Size 183.0KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 43723d1864876c758032c8f7a0429d8b
SHA1 b0f180e37264facfbdb77d7294714a2f115a331b
SHA256 c02d4dccc7bc12685b5fb3a631ec31e75c93d96ae7f5407463f9d2a5455257e0
CRC32 066DE111
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 9ca24f08c0872ae7_macromedia flash 5.0 full downloader.exe
Filepath C:\Windows\Temp\Macromedia Flash 5.0 Full Downloader.exe
Size 182.8KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 1d8d92e501a0bb74cf8fc5cf9de28281
SHA1 c1b3dccf3cc900b034faf5bc39bb84371dbd9c63
SHA256 9ca24f08c0872ae7de501b3a63df62792ffff36207fb450f63257b2757452510
CRC32 53381B29
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name 1f8de80baaf82dcd_spiderman fulldownloader.exe
Filepath C:\Windows\Temp\Spiderman FullDownloader.exe
Size 183.0KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 29fcb1852115dea12bfc3250f97e6bca
SHA1 79d1a7f1e3b1e210a59a1761d2d483b3452b5dbc
SHA256 1f8de80baaf82dcd283415f6b4713c0e5cfab5c61b0917130e390d9857719ace
CRC32 B825903E
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name d1268195342bdebd_cky3 - bam margera world industries alien workshop full downloader.exe
Filepath C:\Windows\Temp\CKY3 - Bam Margera World Industries Alien Workshop Full Downloader.exe
Size 182.6KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 c45d3c22c5ed86f2a084afde5778f48d
SHA1 5e3d48c7b7f2260a7e92a32b41b1398b045831e1
SHA256 d1268195342bdebdd505f61406b6675443b4a11fa884fc1cfddc53212a0d52e0
CRC32 9BF2D399
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name a12b3f1bd0b5850e_hack into any computer!!.exe
Filepath C:\Windows\Temp\Hack into any computer!!.exe
Size 183.0KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 6b98bf5b3f6aca3c2bf3b40d2445ea0b
SHA1 24cd351161892f3297a01a5147928090948f5bab
SHA256 a12b3f1bd0b5850e24928ad83cbd1417576582407b51ae6fac675a4ff9620b7d
CRC32 FE7734B7
ssdeep None
Yara None matched
VirusTotal Search for analysis
Name db140585497d4a7c_xbox.info.exe
Filepath C:\Windows\Temp\Xbox.info.exe
Size 182.8KB
Processes 2244 (8a47d7ff7f3d10096b76f7ca4668e8efe948086d1d2e6025ccaede8bd4c819c0.exe)
Type PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
MD5 f8207b736978b44ef85f3879ed1ed448
SHA1 6406842186cdddc6db3a853b3318a1eab3638d7b
SHA256 db140585497d4a7c780930b914ff77e6b3a088b0127b1ee497b424551a3c1a10
CRC32 67ABB6B8
ssdeep None
Yara None matched
VirusTotal Search for analysis
Sorry! No dropped buffers.