Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- #MalwareMustDie - @unixfreaxjp /malware]$ date
- //Wed Feb 6 14:21:38 JST 2013
- // ZeroAccess "contacts.exe" Memory snapped strings
- 0x00004F kernel32
- 0x00006D kernel32
- 0x000077 actioncenter
- 0x000085 wscntfy
- 0x00008E kernel32
- 0x0000B7 actioncenter
- 0x0000C5 wscntfy
- 0x0000CE kernel32
- 0x0000ED !This program cannot be run in DOS mode.
- 0x000117 Rich>
- 0x00011E .text
- 0x000126 .rdata
- 0x00012E @.data
- 0x000136 .reloc
- 0x00013E SVWj j
- 0x00016E PWWj j
- 0x000176 | WWWh
- 0x00018A |\VVj
- 0x000196 t5Hu7
- 0x0001AD tOWWj j
- 0x0001E7 4SSj!j
- 0x0001F5 Zj@YS3
- 0x000203 |mSSSS
- 0x00022C QQSVWjx
- 0x000235 QQSVW
- 0x00023C GNOL1
- 0x000254 PPPPPPPPj
- 0x000265 u8SWh
- 0x00026C u+SWh@
- 0x00028A WWWh4&@
- 0x0002B2 PVVVWj
- 0x0002C0 uCj@Xf
- 0x0002C8 XPVj j
- 0x0002EB PShF-@
- 0x00031F VVVVW
- 0x000332 nhcnct3
- 0x00033B QQSWj
- 0x000342 }Vhdisc3
- 0x000357 Shrecv
- 0x00035F hShsend
- 0x00036D =disc
- 0x000374 =send
- 0x00037B =cnctt
- 0x000382 =recvt
- 0x00038A u$Phu3@
- 0x000393 VWhsend
- 0x00039C hrecv
- 0x0003A8 sendt3
- 0x0003B0 recvt
- 0x0003BD <WVSU
- 0x0003C4 RtlInitUnicodeString
- 0x0003DA LdrLoadDll
- 0x0003E6 VirtualFree
- 0x0003F3 RtlAllocateActivationContextStack
- 0x000416 AQAPRQH
- 0x00041F (YZAXAY
- 0x000428 RtlInitUnicodeString
- 0x00043E AQAPRQH
- 0x000447 (YZAXAY
- 0x000450 LdrLoadDll
- 0x00045C VirtualFree
- 0x000469 RtlAllocateActivationContextStack
- 0x00048C x HcA<E3
- 0x0004A8 ZwAllocateVirtualMemory
- 0x0004C1 ZwProtectVirtualMemory
- 0x0004D9 RtlImageDirectoryEntryToData
- 0x0004F7 RtlInitUnicodeString
- 0x00050D LdrGetDllHandle
- 0x00051E _stricmp
- 0x000528 RtlAllocateActivationContextStack
- 0x00054B VirtualFree
- 0x000558 shell32.dll
- 0x000565 Shell_NotifyIconW
- 0x000583 u6j@h
- 0x00058A AQAPRQH
- 0x000593 (YZAXAY
- 0x00059C ZwAllocateVirtualMemory
- 0x0005B5 AQAPRQH
- 0x0005BE (YZAXAY
- 0x0005C7 ZwProtectVirtualMemory
- 0x0005DF AQAPRQH
- 0x0005E8 (YZAXAY
- 0x0005F1 RtlImageDirectoryEntryToData
- 0x00060F AQAPRQH
- 0x000618 (YZAXAY
- 0x000621 RtlInitUnicodeString
- 0x000637 AQAPRQH
- 0x000640 (YZAXAY
- 0x000649 LdrGetDllHandle
- 0x00065A AQAPRQH
- 0x000663 (YZAXAY
- 0x00066C _stricmp
- 0x000676 VirtualFree
- 0x000683 shell32.dll
- 0x000690 Shell_NotifyIconW
- 0x0006A3 RtlAllocateActivationContextStack
- 0x0006FA x HcA<E3
- 0x000721 ZwAllocateVirtualMemory
- 0x00073A ZwWriteVirtualMemory
- 0x000750 ZwFreeVirtualMemory
- 0x000765 ZwQuerySystemInformation
- 0x00077F ZwQueryInformationThread
- 0x000799 ZwOpenProcess
- 0x0007A8 ZwOpenThread
- 0x0007B6 ZwQueueApcThread
- 0x0007C8 ZwClose
- 0x0007D1 RtlEqualUnicodeString
- 0x0007E8 RtlInitUnicodeString
- 0x000803 AQAPRQH
- 0x00080C (YZAXAY
- 0x000815 ZwAllocateVirtualMemory
- 0x00082E AQAPRQH
- 0x000837 (YZAXAY
- 0x000840 ZwWriteVirtualMemory
- 0x000856 AQAPRQH
- 0x00085F (YZAXAY
- 0x000868 ZwQuerySystemInformation
- 0x000882 AQAPRQH
- 0x00088B (YZAXAY
- 0x000894 ZwQueryInformationThread
- 0x0008AE AQAPRQH
- 0x0008B7 (YZAXAY
- 0x0008C0 ZwOpenProcess
- 0x0008CF AQAPRQH
- 0x0008D8 (YZAXAY
- 0x0008E1 ZwOpenThread
- 0x0008EF AQAPRQH
- 0x0008F8 (YZAXAY
- 0x000901 ZwQueueApcThread
- 0x000913 AQAPRQH
- 0x00091C (YZAXAY
- 0x000925 ZwClose
- 0x00092E AQAPRQH
- 0x000937 (YZAXAY
- 0x000940 RtlEqualUnicodeString
- 0x000957 AQAPRQH
- 0x000960 (YZAXAY
- 0x000969 RtlInitUnicodeString
- 0x00097F AQAPRQH
- 0x000988 (YZAXAY
- 0x000991 ZwFreeVirtualMemory
- 0x0009A6 x ATAUAVH
- 0x0009B7 T$HE3
- 0x0009DD p WATAUAVAWH
- 0x0009F7 D$PA+
- 0x000A18 A]A\_
- 0x000A25 IcC<B
- 0x000A41 5MSCF
- 0x000A48 EB7F
- 0x000A4F fp.exe
- 0x000A57 wU;\:P
- 0x000A64 Kz'@r
- 0x000A70 a9%vV!
- 0x000A7E -puHO
- 0x000A85 !iA|x
- 0x000AB1 OZ(1w
- 0x000AC8 VK[5,Iz
- 0x000AFD Y9Jja
- 0x000B19 8AFg'"LE
- 0x000B2E q4UDq
- 0x000B35 GL OgB
- 0x000B43 FE1EE
- 0x000B67 HtQI=
- 0x000B84 NtUAV[v
- 0x000B95 LhNkh$Q
- 0x000BA3 fXbok
- 0x000BBA RyZ,{,0&{
- 0x000BC5 'Hk;Q
- 0x000BFB g~p=r
- 0x000C1D rQem4$
- 0x000C52 :TOzm
- 0x000C59 {jbA&f
- 0x000C70 rk8\~W
- 0x000C82 r61Dl.
- 0x000CA0 FD<@L3
- 0x000CB8 #K}jT
- 0x000CF2 f3mhn
- 0x000D14 W+<I|o
- 0x000D22 w7|Bt
- 0x000D2E F3in#
- 0x000D3A wq;j;f;
- 0x000D43 aVtGyZ[b
- 0x000D53 t)QFS[
- 0x000D60 ;Z7l3
- 0x000D78 &kzos
- 0x000D94 >;~vDe
- 0x000DA1 Qa3;v
- 0x000DAE 0eQTE
- 0x000DC1 G=[KE
- 0x000DCE 9NNx{6
- 0x000E3F 8YvV{J
- 0x000E47 B\eIS:a
- 0x000E76 +ruZ5
- 0x000E7D ht*&x
- 0x000E8F Oy)D7
- 0x000E9B 4M&eKD
- 0x000EA8 x_zDN
- 0x000EC0 v6FMkBT
- 0x000EC9 |y#nwC2
- 0x000ED7 b"'Wj
- 0x000F00 PEUU/r
- 0x000F08 l/xb"
- 0x000F1B ag&(g
- 0x000F22 F*JQT%
- 0x000F2A fCJ+U
- 0x000F4E t-cBT
- 0x000F72 jD0dPp
- 0x000F99 Y*9x8 d
- 0x000FA8 O7 > a.dc]W
- 0x000FE1 KnX6?
- 0x000FFD D's.P
- 0x001027 0tEB2Y
- 0x001039 F;Ans
- 0x00104B $X&sg
- 0x001052 rFcNC
- 0x001059 Q+nal
- 0x001076 J*BpCL
- 0x00107E "E~PxA
- 0x001091 gSh>H
- 0x001098 @Fx7d
- 0x00109F b}""QA
- 0x0010A7 :3;10wCY
- 0x0010B6 /Zv7Ye
- 0x0010BE 2BoDX
- 0x0010C5 at /7xO
- 0x0010E7 <o*+wI
- 0x0010F4 c@ufbc=c
- 0x00110E fV3:O{
- 0x001116 ma1 lB
- 0x001151 71cTK
- 0x001158 aw}!4O{+$
- 0x00116E ra. M
- 0x001185 r$@}Ad
- 0x00118D 44b=iBe:iFK
- 0x00119A gK-N/:
- 0x0011AC |>RxX\
- 0x0011BA 6pcg'
- 0x0011E3 .!E1hDFr
- 0x0011ED NnPbz<
- 0x0011F5 yyJX)
- 0x001211 &d_ad
- 0x001218 .]Qbd7
- 0x00122F fj<tT
- 0x001241 ZZ fa
- 0x001248 Z]8FhP
- 0x001260 <vZ;v
- 0x001271 MZh&{
- 0x00128C ZsAv]9
- 0x00129A ]]UyU
- 0x0012A7 9uS:O
- 0x0012CE w&V!m]bO
- 0x0012E3 Q&erb
- 0x00132A l\systemroot
- 0x001338 \BaseNamedObjects\{81D05F9A-5343-439f-ACAB-E7822E4416F9}
- 0x001372 A\??\ACPI#PNP0303#2&da1a3ff&0
- 0x001391 \BaseNamedObjects\Restricted\{A3D35150-6823-4462-8C6E-7417FF841D77}
- 0x0013D6 A\BaseNamedObjects\Restricted\{A3D35150-6823-4462-8C6E-7417FF841D78}
- 0x00141C AMicrosoft Base Cryptographic Provider v1.0
- 0x001449 \BaseNamedObjects\Restricted\{0C5AB9CD-2F90-6754-8374-21D4DAB28CC1}
- 0x00148E 2RECYCLER\
- 0x00149A $Recycle.Bin\
- 0x0014A9 \$%08x%04x%04x%02x%02x%02x%02x%02x%02x%02x%02x
- 0x0014D9 A%wZ\Software\Classes\clsid
- 0x0014F6 InprocServer32
- 0x001506 {fbeb8a05-beee-4442-804e-409d6c4515e9}
- 0x00152E AThreadingModel
- 0x00153F ABoth
- 0x001546 \registry\machine\Software\Classes\clsid\{5839fca9-774d-42a1-acda-d6a79037f57f}\InprocServer32
- 0x0015A6 explorer.exe
- 0x0015B4 services.exe
- 0x0015C8 TEMP=
- 0x0015CF \InstallFlashPlayer.exe
- 0x0015E8 \msimg32.dll
- 0x0015F6 \registry\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
- 0x001637 AWindows Defender
- 0x00164A Awscntfy.exe
- 0x001658 AMSASCui.exe
- 0x001666 AMpCmdRun.exe
- 0x001675 ANisSrv.exe
- 0x001682 Amsseces.exe
- 0x001690 A\registry\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\explorer\ShellServiceObjects\{FD6905CE-952F-41F1-9A6F-135D9C6622CC}
- 0x001712 A\registry\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\explorer\ShellServiceObjects\{F56F6FDD-AA9D-4618-A949-C1B91AF43B1A}
- 0x001794 AMsMpSvc
- 0x00179E windefend
- 0x0017A9 SharedAccess
- 0x0017B7 iphlpsvc
- 0x0017C1 wscsvc
- 0x0017C9 mpssvc
- 0x0017DC ATEMP=
- 0x0017E4 Arunas
- 0x0017EC @comspec=
- 0x001807 cfWk5
- 0x001829 ?[NGW+
- 0x00183A ~yuD8\
- 0x001848 t*T5B
- 0x00184F *VNyE
- 0x001860 MjC'9J+
- 0x001874 lJYLvF
- 0x001888 f;k5V
- 0x0018B3 ,v:Vw
- 0x0018C6 ve]PLo
- 0x0018F6 ~X[tY#
- 0x001903 Sv-e:#g:v
- 0x00191D XrEZ_
- 0x001933 z(ILj
- 0x001955 1}UQcJ
- 0x00195D 7lZlQQ
- 0x001965 ;TifK
- 0x001971 bY6#i
- 0x00198D rjW'~
- 0x00199E Kfb#HW
- 0x0019B0 i>?hz
- 0x0019C3 m _Nv0
- 0x0019CB 7uAUh
- 0x0019D2 PoQL,
- 0x0019D9 uNKzl
- 0x0019E0 d0|:Tw
- 0x0019ED [l2og
- 0x0019F4 Fu.z0QN
- 0x001A47 gY4[nLs
- 0x001A56 MhErw;:]
- 0x001A75 [N2gQ
- 0x001AB8 :s2oV
- 0x001AC4 dQU%m
- 0x001AD1 (L$Zj-l
- 0x001AF1 4M=h X_+Z
- 0x001B53 ?gOwN
- 0x001B7B ljMZJ
- 0x001B82 |X,$yFF
- 0x001B96 8rLb#
- 0x001B9D c)g!}T9
- 0x001BAB [vHL<
- 0x001BD8 VCWGl
- 0x001BF1 kD~S&
- 0x001BF8 !h0dHR
- 0x001C18 P|4GV
- 0x001C2F -w/I#JM
- 0x001C3E =O|nM
- 0x001C4A $lDa0+
- 0x001C5D ;TAP2!
- 0x001C71 $)4u0rp
- 0x001C7A *KA3Ax
- 0x001C91 ;TmAW
- 0x001C9E ~G%as
- 0x001CB1 kh'Z?
- 0x001CBE 9W~wi]
- 0x001CE1 B|.NYSt
- 0x001CEA 9si\hd
- 0x001D07 6Pz?LL
- 0x001D1B >{"UQE
- 0x001D25 ?UR"u
- 0x001D2C uFM =~<
- 0x001D40 R-r-F
- 0x001D58 O|ix7
- 0x001D64 <8x\O s
- 0x001D72 &M@Vt
- 0x001D8F Z :py
- 0x001D96 !,VSQ1_
- 0x001D9F rSYbA
- 0x001DAC 8IEzB
- 0x001DBE XK~Ox
- 0x001DC5 d@=Bz
- 0x001DCC mPexxN
- 0x001DE9 L3ECB
- 0x001DFD 7jx;{V
- 0x001E25 c8Bol
- 0x001E58 yoh(,-1
- 0x001E67 t|#IP
- 0x001E79 QGKPf
- 0x001EA6 Fbj-8
- 0x001EAD l{f|RD
- 0x001EC4 >w\j+E
- 0x001ECC RqKg\~
- 0x001ED4 SLJ:rL8
- 0x001EE2 O|DMH
- 0x001EE9 w{k{t{
- 0x001F07 n<c"R
- 0x001F1F [MH:i
- 0x001F2C Z<r:J
- 0x001F33 p0Za'
- 0x001F40 MqMJnMO
- 0x001F50 o-R[K
- 0x001F73 +vP'nUX
- 0x001F7C m/kS_
- 0x001F94 0vWcu>g
- 0x001FA2 _@B*gW
- 0x001FC1 /FLgwn
- 0x001FD5 cOo)}
- 0x001FDC s58Yz
- 0x001FE3 )BB=Jx
- 0x001FF1 ..rWF8
- 0x002009 \qAJt*
- 0x002028 Wh\{kD
- 0x002042 I[gCgH
- 0x002059 xk;#\=S0
- 0x002073 bNIo)08\
- 0x002082 K<<cw
- 0x0020A4 AWb<P'
- 0x0020FD t(FuJI
- 0x002112 nK*i:
- 0x00211E qPy-q
- 0x00212B MER/%
- 0x002138 |Po?Vp
- 0x002146 HY0{sP
- 0x00216C WZ}y'P
- 0x002174 X74KS
- 0x002186 o9beNs
- 0x00218E x2A:qA$
- 0x002197 dtllh
- 0x0021B9 d*D+H
- 0x0021CB ]yyyal
- 0x0021DD kuNi<
- 0x0021F4 -E,\_RS0
- 0x00220F a/.kvw
- 0x002246 j\0;wO
- 0x002259 Judn#
- 0x002260 JmmBAe
- 0x00226D MG<u~
- 0x00228B vJ-/xLQ2
- 0x0022A5 7ZHS3
- 0x0022B1 uh#Sib
- 0x0022BF SHELL32.dll
- 0x0022CC fp.exe
- 0x0022D4 GET /5699017-3C912481A04E584CDF231C519E1DF857/counter.img?theme=%u&digits=10&siteId=%u HTTP/1.1
- 0x002335 Host: bigfatcounters.com
- 0x00234F User-Agent: Opera/9 (Windows NT %u.%u; %s; %s)
- 0x00237F Connection: close
- 0x002392 GET /app/geoip.js HTTP/1.0
- 0x0023AE Host: j.maxmind.com
- 0x0023C3 Connection: close
- 0x0023D6 geoip_country_code
- 0x0023EA j.maxmind.com
- 0x0023F9 ShellExecuteExW
- 0x00240A memcpy
- 0x002412 ZwOpenFile
- 0x00241E ZwQueryVolumeInformationFile
- 0x00243C ZwClose
- 0x002445 ZwOpenEvent
- 0x002452 swprintf
- 0x00245C RtlInitUnicodeString
- 0x002472 RtlAdjustPrivilege
- 0x002486 ZwOpenProcessToken
- 0x00249A ZwQueryInformationToken
- 0x0024B3 ZwQueryInformationProcess
- 0x0024CE RtlRandomEx
- 0x0024DB ZwCreateEvent
- 0x0024EA ZwDelayExecution
- 0x0024FC ZwOpenThread
- 0x00250A ZwImpersonateThread
- 0x00251F ZwOpenThreadTokenEx
- 0x002534 ZwAdjustPrivilegesToken
- 0x00254D ZwQuerySystemInformation
- 0x002567 ZwWaitForSingleObject
- 0x00257E ZwAlertThread
- 0x00258D LdrFindEntryForAddress
- 0x0025A5 RtlDosPathNameToNtPathName_U
- 0x0025C3 ZwQueryEaFile
- 0x0025D2 RtlFreeUnicodeString
- 0x0025E8 ZwCreateFile
- 0x0025F6 RtlTimeToSecondsSince1980
- 0x002611 ZwWriteFile
- 0x00261E RtlAppendUnicodeToString
- 0x002638 RtlConvertSidToUnicodeString
- 0x002656 RtlFormatCurrentUserKeyPath
- 0x002673 ZwCreateKey
- 0x002680 ZwSetValueKey
- 0x00268F wcslen
- 0x002697 ZwOpenKey
- 0x0026A2 ZwSetSecurityObject
- 0x0026B7 memset
- 0x0026BF wcscat
- 0x0026C7 sprintf
- 0x0026D0 RtlComputeCrc32
- 0x0026E1 ZwDuplicateObject
- 0x0026F4 ZwDeleteKey
- 0x002701 ZwDeleteValueKey
- 0x002713 RtlEqualUnicodeString
- 0x00272A ZwOpenProcess
- 0x002739 ZwTerminateProcess
- 0x00274D ZwSuspendThread
- 0x00275E RtlGetCurrentPeb
- 0x002770 RtlPrefixUnicodeString
- 0x002788 wcscpy
- 0x002790 ZwQueryInformationFile
- 0x0027A8 ZwCreateSection
- 0x0027B9 ZwMapViewOfSection
- 0x0027CD ZwUnmapViewOfSection
- 0x0027E3 strcmp
- 0x0027EB RtlIpv4StringToAddressA
- 0x002804 ZwGetContextThread
- 0x002818 ZwSetInformationFile
- 0x00282E RtlExitUserThread
- 0x002841 ZwWriteVirtualMemory
- 0x002857 ZwSetContextThread
- 0x00286B ZwTerminateThread
- 0x00287E ZwResumeThread
- 0x00288E RtlInterlockedPushEntrySList
- 0x0028AC RtlInterlockedPopEntrySList
- 0x0028C9 RtlNtStatusToDosError
- 0x0028E0 ntdll.dll
- 0x0028EB GetVersion
- 0x0028F7 GetTickCount
- 0x002905 ExitProcess
- 0x002912 LocalAlloc
- 0x00291E LocalFree
- 0x002929 VirtualProtect
- 0x002939 Sleep
- 0x002940 ExitThread
- 0x00294C DisableThreadLibraryCalls
- 0x002967 CreateThread
- 0x002975 GetSystemTimeAsFileTime
- 0x00298E GetLastError
- 0x00299C CreateProcessW
- 0x0029AC BindIoCompletionCallback
- 0x0029C6 DeleteTimerQueueTimer
- 0x0029DD CreateTimerQueueTimer
- 0x0029F4 KERNEL32.dll
- 0x002A02 MD5Init
- 0x002A0B MD5Update
- 0x002A16 MD5Final
- 0x002A20 CryptAcquireContextW
- 0x002A36 CryptGenRandom
- 0x002A46 CryptReleaseContext
- 0x002A5B OpenServiceW
- 0x002A69 ControlService
- 0x002A79 ChangeServiceConfigW
- 0x002A8F DeleteService
- 0x002A9E CloseServiceHandle
- 0x002AB2 OpenSCManagerW
- 0x002AC2 ADVAPI32.dll
- 0x002AD0 Cabinet.dll
- 0x002ADD WSASocketW
- 0x002AE9 WSAIoctl
- 0x002AF3 WSARecv
- 0x002AFC WSASend
- 0x002B05 WSASendTo
- 0x002B10 WSARecvFrom
- 0x002B1D WS2_32.dll
- 0x002B29 GetProcAddress
- 0x002B39 FreeLibrary
- 0x002B46 InterlockedExchange
- 0x002B5B LoadLibraryA
- 0x002B69 RaiseException
- 0x002B79 uncrypted.exe
- 0x002B88 AlphaBlend
- 0x002B94 system32\msimg32.AlphaBlend
- 0x002BB1 GradientFill
- 0x002BBF system32\msimg32.GradientFill
- 0x002BDE TransparentBlt
- 0x002BEE system32\msimg32.TransparentBlt
- 0x002C1F 1+1>1D1K1Q1Z1a1
- 0x002C30 3 393?3F3L3_3m3s3
- 0x002C43 <'</<:<B<I<o<
- 0x002C52 >(>->@>F>O>s>
- 0x002C61 0E0\0l0y0
- 0x002C6C 5'5.555B5L5Y5f5s5
- 0x002C7F 6(686B6L6[6d6m6v6
- 0x002C92 7&7?7Y7h7p7u7
- 0x002CA1 8.878<8A8H8M8R8
- 0x002CB6 3R3Y3
- 0x002CBC 3f3n3
- 0x002CC3 4$4/454;4H4Q4[4h4
- 0x002CD6 7)7=7J7Q7Z7_7
- 0x002CE5 3$484L4P4T4X4\4
- 0x002D04 Wi|LE
- 0x002D1A _(wRz
- 0x002D27 OP*IZV_
- 0x002D35 pTsBL
- 0x002D51 =_cSZ
- 0x002D58 _cuMIr
- 0x002D6A k<6:Pb+
- 0x002D79 fI&rS
- 0x002D8F \(B]X
- 0x002DA2 0UgaX
- 0x002DA9 p{bjE
- 0x002DB6 rGS(#L
- 0x002DD8 d7OtX
- 0x002DE4 =awS/c
- 0x002E13 q*CD{
- 0x002E1A (n.Pf
- 0x002E27 3o-eHx
- 0x002E35 sW1,I
- 0x002E41 <Ul%M3RMF
- 0x002E68 M4g(+m
- 0x002E70 cpO=m
- 0x002E7D Lk@]kl}
- 0x002E8B V6H)rU
- 0x002E9E $dm,y
- 0x002EBA {YscG
- 0x002ECB !_cDh\
- 0x002ED8 Y'*OY
- 0x002EFF Bp A.3P1o
- 0x002F1A 4nC<n
- 0x002F49 pwz;YB
- 0x002F51 rz?DXs
- 0x002F59 A<atY
- 0x002F72 ww=rJ]
- 0x002F7A V}qJY
- 0x002F9D 2z(u*vr
- 0x002FAC kq{Al
- 0x002FB8 !8CFQ
- 0x002FCA +P5Yu
- 0x002FE8 TrK>Z
- 0x002FFA dm0\e
- 0x003030 Tv|E[
- 0x003042 HVL_:g
- 0x003088 'RpY~B S
- 0x00309C pwTP<
- 0x0030AD B"Jk!J
- 0x0030B5 JTFkb
- 0x0030C8 Ee\uV
- 0x0030CF ,nmI7
- 0x0030F4 1_kGCH&
- 0x003112 Xv?'E c"
- 0x00316B sboLr
- 0x003172 %p[y/a
- 0x003185 Oy~y.
- 0x003192 I~S;~t
- 0x00319A Us[ybr
- 0x0031BF Cc*lB
- 0x0031D9 ~_VvK
- 0x0031E6 0TIiHUE}
- 0x0031F0 xE(S|&
- 0x003209 nJ!Vc
- 0x003215 Z!3[wi
- 0x003234 sr+A}
- 0x00325B INY9Vh;W
- 0x00326A NL8#F-
- 0x00327D p"ZT+L
- 0x003295 /BT=Z
- 0x0032A1 [>G:oj5u
- 0x0032AB WgXPHi
- 0x0032D2 v}:PQ
- 0x0032D9 N*YnM
- 0x0032E6 ")dfo
- 0x0032F2 U~EQ@
- 0x0032F9 oTB)S
- 0x003316 kbOv7'
- 0x00333D jYA$Q
- 0x003357 E8p|c;
- 0x00336A YBbP:
- 0x003371 STMZF
- 0x003378 >XfaH
- 0x00337F TpIF.
- 0x003396 doFk;z
- 0x00339E Ewh@cX
- 0x0033AB 2oq(V
- 0x0033CD .bAp]
- 0x0033EE 8XBg+|#>
- 0x0033FE v>}Bt
- 0x00341C #PUj<
- 0x003423 z0kZG
- 0x00342F &GN\B
- 0x003441 s=VIT
- 0x003457 x:Ahz
- 0x00349C [jQf%
- 0x0034AD n"/HY
- 0x0034BC [n])gf
- 0x0034F0 ,GkTvO
- 0x0034F8 JTdtU%
- 0x003506 {W!!Fk
- 0x003514 b$&msB
- 0x003547 !F\DA
- 0x00355A WH;M]
- 0x003561 !8(<EbN9
- 0x00356B jO<qi
- 0x003578 ;NjhkUE
- 0x00358B L#Kkx
- 0x00359E =/Ej+nc
- 0x0035B5 u[R1?f
- 0x0035DE k@nfQ(
- 0x0035F2 ;Spmh=T
- 0x00360D virUe
- 0x003628 @\xfQK
- 0x003649 IbUgf
- 0x00367F utz;s.
- 0x0036A4 EDY/z
- 0x0036AB xYG Va
- 0x0036CA e.WXt
- 0x0036E1 c2RjY
- 0x0036E8 UDiFn
- 0x0036F4 a,&GQ{
- 0x003701 V#[.rU
- 0x003713 gPKec
- 0x00372A iCZt!
- 0x003747 /s~2l?4T
- 0x00004F kernel32
- 0x00006D kernel32
- 0x000077 actioncenter
- 0x000085 wscntfy
- 0x00008E kernel32
- 0x0000B7 actioncenter
- 0x0000C5 wscntfy
- 0x0000CE kernel32
- 0x0000ED !This program cannot be run in DOS mode.
- 0x000117 Rich>
- 0x00011E .text
- 0x000126 .rdata
- 0x00012E @.data
- 0x000136 .reloc
- 0x00013E SVWj j
- 0x00016E PWWj j
- 0x000176 | WWWh
- 0x00018A |\VVj
- 0x000196 t5Hu7
- 0x0001AD tOWWj j
- 0x0001E7 4SSj!j
- 0x0001F5 Zj@YS3
- 0x000203 |mSSSS
- 0x00022C QQSVWjx
- 0x000235 QQSVW
- 0x00023C GNOL1
- 0x000254 PPPPPPPPj
- 0x000265 u8SWh
- 0x00026C u+SWh@
- 0x00028A WWWh4&@
- 0x0002B2 PVVVWj
- 0x0002C0 uCj@Xf
- 0x0002C8 XPVj j
- 0x0002EB PShF-@
- 0x00031F VVVVW
- 0x000332 nhcnct3
- 0x00033B QQSWj
- 0x000342 }Vhdisc3
- 0x000357 Shrecv
- 0x00035F hShsend
- 0x00036D =disc
- 0x000374 =send
- 0x00037B =cnctt
- 0x000382 =recvt
- 0x00038A u$Phu3@
- 0x000393 VWhsend
- 0x00039C hrecv
- 0x0003A8 sendt3
- 0x0003B0 recvt
- 0x0003BD <WVSU
- 0x0003C4 RtlInitUnicodeString
- 0x0003DA LdrLoadDll
- 0x0003E6 VirtualFree
- 0x0003F3 RtlAllocateActivationContextStack
- 0x000416 AQAPRQH
- 0x00041F (YZAXAY
- 0x000428 RtlInitUnicodeString
- 0x00043E AQAPRQH
- 0x000447 (YZAXAY
- 0x000450 LdrLoadDll
- 0x00045C VirtualFree
- 0x000469 RtlAllocateActivationContextStack
- 0x00048C x HcA<E3
- 0x0004A8 ZwAllocateVirtualMemory
- 0x0004C1 ZwProtectVirtualMemory
- 0x0004D9 RtlImageDirectoryEntryToData
- 0x0004F7 RtlInitUnicodeString
- 0x00050D LdrGetDllHandle
- 0x00051E _stricmp
- 0x000528 RtlAllocateActivationContextStack
- 0x00054B VirtualFree
- 0x000558 shell32.dll
- 0x000565 Shell_NotifyIconW
- 0x000583 u6j@h
- 0x00058A AQAPRQH
- 0x000593 (YZAXAY
- 0x00059C ZwAllocateVirtualMemory
- 0x0005B5 AQAPRQH
- 0x0005BE (YZAXAY
- 0x0005C7 ZwProtectVirtualMemory
- 0x0005DF AQAPRQH
- 0x0005E8 (YZAXAY
- 0x0005F1 RtlImageDirectoryEntryToData
- 0x00060F AQAPRQH
- 0x000618 (YZAXAY
- 0x000621 RtlInitUnicodeString
- 0x000637 AQAPRQH
- 0x000640 (YZAXAY
- 0x000649 LdrGetDllHandle
- 0x00065A AQAPRQH
- 0x000663 (YZAXAY
- 0x00066C _stricmp
- 0x000676 VirtualFree
- 0x000683 shell32.dll
- 0x000690 Shell_NotifyIconW
- 0x0006A3 RtlAllocateActivationContextStack
- 0x0006FA x HcA<E3
- 0x000721 ZwAllocateVirtualMemory
- 0x00073A ZwWriteVirtualMemory
- 0x000750 ZwFreeVirtualMemory
- 0x000765 ZwQuerySystemInformation
- 0x00077F ZwQueryInformationThread
- 0x000799 ZwOpenProcess
- 0x0007A8 ZwOpenThread
- 0x0007B6 ZwQueueApcThread
- 0x0007C8 ZwClose
- 0x0007D1 RtlEqualUnicodeString
- 0x0007E8 RtlInitUnicodeString
- 0x000803 AQAPRQH
- 0x00080C (YZAXAY
- 0x000815 ZwAllocateVirtualMemory
- 0x00082E AQAPRQH
- 0x000837 (YZAXAY
- 0x000840 ZwWriteVirtualMemory
- 0x000856 AQAPRQH
- 0x00085F (YZAXAY
- 0x000868 ZwQuerySystemInformation
- 0x000882 AQAPRQH
- 0x00088B (YZAXAY
- 0x000894 ZwQueryInformationThread
- 0x0008AE AQAPRQH
- 0x0008B7 (YZAXAY
- 0x0008C0 ZwOpenProcess
- 0x0008CF AQAPRQH
- 0x0008D8 (YZAXAY
- 0x0008E1 ZwOpenThread
- 0x0008EF AQAPRQH
- 0x0008F8 (YZAXAY
- 0x000901 ZwQueueApcThread
- 0x000913 AQAPRQH
- 0x00091C (YZAXAY
- 0x000925 ZwClose
- 0x00092E AQAPRQH
- 0x000937 (YZAXAY
- 0x000940 RtlEqualUnicodeString
- 0x000957 AQAPRQH
- 0x000960 (YZAXAY
- 0x000969 RtlInitUnicodeString
- 0x00097F AQAPRQH
- 0x000988 (YZAXAY
- 0x000991 ZwFreeVirtualMemory
- 0x0009A6 x ATAUAVH
- 0x0009B7 T$HE3
- 0x0009DD p WATAUAVAWH
- 0x0009F7 D$PA+
- 0x000A18 A]A\_
- 0x000A25 IcC<B
- 0x000A41 5MSCF
- 0x000A48 EB7F
- 0x000A4F fp.exe
- 0x000A57 wU;\:P
- 0x000A64 Kz'@r
- 0x000A70 a9%vV!
- 0x000A7E -puHO
- 0x000A85 !iA|x
- 0x000AB1 OZ(1w
- 0x000AC8 VK[5,Iz
- 0x000AFD Y9Jja
- 0x000B19 8AFg'"LE
- 0x000B2E q4UDq
- 0x000B35 GL OgB
- 0x000B43 FE1EE
- 0x000B67 HtQI=
- 0x000B84 NtUAV[v
- 0x000B95 LhNkh$Q
- 0x000BA3 fXbok
- 0x000BBA RyZ,{,0&{
- 0x000BC5 'Hk;Q
- 0x000BFB g~p=r
- 0x000C1D rQem4$
- 0x000C52 :TOzm
- 0x000C59 {jbA&f
- 0x000C70 rk8\~W
- 0x000C82 r61Dl.
- 0x000CA0 FD<@L3
- 0x000CB8 #K}jT
- 0x000CF2 f3mhn
- 0x000D14 W+<I|o
- 0x000D22 w7|Bt
- 0x000D2E F3in#
- 0x000D3A wq;j;f;
- 0x000D43 aVtGyZ[b
- 0x000D53 t)QFS[
- 0x000D60 ;Z7l3
- 0x000D78 &kzos
- 0x000D94 >;~vDe
- 0x000DA1 Qa3;v
- 0x000DAE 0eQTE
- 0x000DC1 G=[KE
- 0x000DCE 9NNx{6
- 0x000E3F 8YvV{J
- 0x000E47 B\eIS:a
- 0x000E76 +ruZ5
- 0x000E7D ht*&x
- 0x000E8F Oy)D7
- 0x000E9B 4M&eKD
- 0x000EA8 x_zDN
- 0x000EC0 v6FMkBT
- 0x000EC9 |y#nwC2
- 0x000ED7 b"'Wj
- 0x000F00 PEUU/r
- 0x000F08 l/xb"
- 0x000F1B ag&(g
- 0x000F22 F*JQT%
- 0x000F2A fCJ+U
- 0x000F4E t-cBT
- 0x000F72 jD0dPp
- 0x000F99 Y*9x8 d
- 0x000FA8 O7 > a.dc]W
- 0x000FE1 KnX6?
- 0x000FFD D's.P
- 0x001027 0tEB2Y
- 0x001039 F;Ans
- 0x00104B $X&sg
- 0x001052 rFcNC
- 0x001059 Q+nal
- 0x001076 J*BpCL
- 0x00107E "E~PxA
- 0x001091 gSh>H
- 0x001098 @Fx7d
- 0x00109F b}""QA
- 0x0010A7 :3;10wCY
- 0x0010B6 /Zv7Ye
- 0x0010BE 2BoDX
- 0x0010C5 at /7xO
- 0x0010E7 <o*+wI
- 0x0010F4 c@ufbc=c
- 0x00110E fV3:O{
- 0x001116 ma1 lB
- 0x001151 71cTK
- 0x001158 aw}!4O{+$
- 0x00116E ra. M
- 0x001185 r$@}Ad
- 0x00118D 44b=iBe:iFK
- 0x00119A gK-N/:
- 0x0011AC |>RxX\
- 0x0011BA 6pcg'
- 0x0011E3 .!E1hDFr
- 0x0011ED NnPbz<
- 0x0011F5 yyJX)
- 0x001211 &d_ad
- 0x001218 .]Qbd7
- 0x00122F fj<tT
- 0x001241 ZZ fa
- 0x001248 Z]8FhP
- 0x001260 <vZ;v
- 0x001271 MZh&{
- 0x00128C ZsAv]9
- 0x00129A ]]UyU
- 0x0012A7 9uS:O
- 0x0012CE w&V!m]bO
- 0x0012E3 Q&erb
- 0x00132A l\systemroot
- 0x001338 \BaseNamedObjects\{81D05F9A-5343-439f-ACAB-E7822E4416F9}
- 0x001372 A\??\ACPI#PNP0303#2&da1a3ff&0
- 0x001391 \BaseNamedObjects\Restricted\{A3D35150-6823-4462-8C6E-7417FF841D77}
- 0x0013D6 A\BaseNamedObjects\Restricted\{A3D35150-6823-4462-8C6E-7417FF841D78}
- 0x00141C AMicrosoft Base Cryptographic Provider v1.0
- 0x001449 \BaseNamedObjects\Restricted\{0C5AB9CD-2F90-6754-8374-21D4DAB28CC1}
- 0x00148E 2RECYCLER\
- 0x00149A $Recycle.Bin\
- 0x0014A9 \$%08x%04x%04x%02x%02x%02x%02x%02x%02x%02x%02x
- 0x0014D9 A%wZ\Software\Classes\clsid
- 0x0014F6 InprocServer32
- 0x001506 {fbeb8a05-beee-4442-804e-409d6c4515e9}
- 0x00152E AThreadingModel
- 0x00153F ABoth
- 0x001546 \registry\machine\Software\Classes\clsid\{5839fca9-774d-42a1-acda-d6a79037f57f}\InprocServer32
- 0x0015A6 explorer.exe
- 0x0015B4 services.exe
- 0x0015C8 TEMP=
- 0x0015CF \InstallFlashPlayer.exe
- 0x0015E8 \msimg32.dll
- 0x0015F6 \registry\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
- 0x001637 AWindows Defender
- 0x00164A Awscntfy.exe
- 0x001658 AMSASCui.exe
- 0x001666 AMpCmdRun.exe
- 0x001675 ANisSrv.exe
- 0x001682 Amsseces.exe
- 0x001690 A\registry\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\explorer\ShellServiceObjects\{FD6905CE-952F-41F1-9A6F-135D9C6622CC}
- 0x001712 A\registry\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\explorer\ShellServiceObjects\{F56F6FDD-AA9D-4618-A949-C1B91AF43B1A}
- 0x001794 AMsMpSvc
- 0x00179E windefend
- 0x0017A9 SharedAccess
- 0x0017B7 iphlpsvc
- 0x0017C1 wscsvc
- 0x0017C9 mpssvc
- 0x0017DC ATEMP=
- 0x0017E4 Arunas
- 0x0017EC @comspec=
- 0x001807 cfWk5
- 0x001829 ?[NGW+
- 0x00183A ~yuD8\
- 0x001848 t*T5B
- 0x00184F *VNyE
- 0x001860 MjC'9J+
- 0x001874 lJYLvF
- 0x001888 f;k5V
- 0x0018B3 ,v:Vw
- 0x0018C6 ve]PLo
- 0x0018F6 ~X[tY#
- 0x001903 Sv-e:#g:v
- 0x00191D XrEZ_
- 0x001933 z(ILj
- 0x001955 1}UQcJ
- 0x00195D 7lZlQQ
- 0x001965 ;TifK
- 0x001971 bY6#i
- 0x00198D rjW'~
- 0x00199E Kfb#HW
- 0x0019B0 i>?hz
- 0x0019C3 m _Nv0
- 0x0019CB 7uAUh
- 0x0019D2 PoQL,
- 0x0019D9 uNKzl
- 0x0019E0 d0|:Tw
- 0x0019ED [l2og
- 0x0019F4 Fu.z0QN
- 0x001A47 gY4[nLs
- 0x001A56 MhErw;:]
- 0x001A75 [N2gQ
- 0x001AB8 :s2oV
- 0x001AC4 dQU%m
- 0x001AD1 (L$Zj-l
- 0x001AF1 4M=h X_+Z
- 0x001B53 ?gOwN
- 0x001B7B ljMZJ
- 0x001B82 |X,$yFF
- 0x001B96 8rLb#
- 0x001B9D c)g!}T9
- 0x001BAB [vHL<
- 0x001BD8 VCWGl
- 0x001BF1 kD~S&
- 0x001BF8 !h0dHR
- 0x001C18 P|4GV
- 0x001C2F -w/I#JM
- 0x001C3E =O|nM
- 0x001C4A $lDa0+
- 0x001C5D ;TAP2!
- 0x001C71 $)4u0rp
- 0x001C7A *KA3Ax
- 0x001C91 ;TmAW
- 0x001C9E ~G%as
- 0x001CB1 kh'Z?
- 0x001CBE 9W~wi]
- 0x001CE1 B|.NYSt
- 0x001CEA 9si\hd
- 0x001D07 6Pz?LL
- 0x001D1B >{"UQE
- 0x001D25 ?UR"u
- 0x001D2C uFM =~<
- 0x001D40 R-r-F
- 0x001D58 O|ix7
- 0x001D64 <8x\O s
- 0x001D72 &M@Vt
- 0x001D8F Z :py
- 0x001D96 !,VSQ1_
- 0x001D9F rSYbA
- 0x001DAC 8IEzB
- 0x001DBE XK~Ox
- 0x001DC5 d@=Bz
- 0x001DCC mPexxN
- 0x001DE9 L3ECB
- 0x001DFD 7jx;{V
- 0x001E25 c8Bol
- 0x001E58 yoh(,-1
- 0x001E67 t|#IP
- 0x001E79 QGKPf
- 0x001EA6 Fbj-8
- 0x001EAD l{f|RD
- 0x001EC4 >w\j+E
- 0x001ECC RqKg\~
- 0x001ED4 SLJ:rL8
- 0x001EE2 O|DMH
- 0x001EE9 w{k{t{
- 0x001F07 n<c"R
- 0x001F1F [MH:i
- 0x001F2C Z<r:J
- 0x001F33 p0Za'
- 0x001F40 MqMJnMO
- 0x001F50 o-R[K
- 0x001F73 +vP'nUX
- 0x001F7C m/kS_
- 0x001F94 0vWcu>g
- 0x001FA2 _@B*gW
- 0x001FC1 /FLgwn
- 0x001FD5 cOo)}
- 0x001FDC s58Yz
- 0x001FE3 )BB=Jx
- 0x001FF1 ..rWF8
- 0x002009 \qAJt*
- 0x002028 Wh\{kD
- 0x002042 I[gCgH
- 0x002059 xk;#\=S0
- 0x002073 bNIo)08\
- 0x002082 K<<cw
- 0x0020A4 AWb<P'
- 0x0020FD t(FuJI
- 0x002112 nK*i:
- 0x00211E qPy-q
- 0x00212B MER/%
- 0x002138 |Po?Vp
- 0x002146 HY0{sP
- 0x00216C WZ}y'P
- 0x002174 X74KS
- 0x002186 o9beNs
- 0x00218E x2A:qA$
- 0x002197 dtllh
- 0x0021B9 d*D+H
- 0x0021CB ]yyyal
- 0x0021DD kuNi<
- 0x0021F4 -E,\_RS0
- 0x00220F a/.kvw
- 0x002246 j\0;wO
- 0x002259 Judn#
- 0x002260 JmmBAe
- 0x00226D MG<u~
- 0x00228B vJ-/xLQ2
- 0x0022A5 7ZHS3
- 0x0022B1 uh#Sib
- 0x0022BF SHELL32.dll
- 0x0022CC fp.exe
- 0x0022D4 GET /5699017-3C912481A04E584CDF231C519E1DF857/counter.img?theme=%u&digits=10&siteId=%u HTTP/1.1
- 0x002335 Host: bigfatcounters.com
- 0x00234F User-Agent: Opera/9 (Windows NT %u.%u; %s; %s)
- 0x00237F Connection: close
- 0x002392 GET /app/geoip.js HTTP/1.0
- 0x0023AE Host: j.maxmind.com
- 0x0023C3 Connection: close
- 0x0023D6 geoip_country_code
- 0x0023EA j.maxmind.com
- 0x0023F9 ShellExecuteExW
- 0x00240A memcpy
- 0x002412 ZwOpenFile
- 0x00241E ZwQueryVolumeInformationFile
- 0x00243C ZwClose
- 0x002445 ZwOpenEvent
- 0x002452 swprintf
- 0x00245C RtlInitUnicodeString
- 0x002472 RtlAdjustPrivilege
- 0x002486 ZwOpenProcessToken
- 0x00249A ZwQueryInformationToken
- 0x0024B3 ZwQueryInformationProcess
- 0x0024CE RtlRandomEx
- 0x0024DB ZwCreateEvent
- 0x0024EA ZwDelayExecution
- 0x0024FC ZwOpenThread
- 0x00250A ZwImpersonateThread
- 0x00251F ZwOpenThreadTokenEx
- 0x002534 ZwAdjustPrivilegesToken
- 0x00254D ZwQuerySystemInformation
- 0x002567 ZwWaitForSingleObject
- 0x00257E ZwAlertThread
- 0x00258D LdrFindEntryForAddress
- 0x0025A5 RtlDosPathNameToNtPathName_U
- 0x0025C3 ZwQueryEaFile
- 0x0025D2 RtlFreeUnicodeString
- 0x0025E8 ZwCreateFile
- 0x0025F6 RtlTimeToSecondsSince1980
- 0x002611 ZwWriteFile
- 0x00261E RtlAppendUnicodeToString
- 0x002638 RtlConvertSidToUnicodeString
- 0x002656 RtlFormatCurrentUserKeyPath
- 0x002673 ZwCreateKey
- 0x002680 ZwSetValueKey
- 0x00268F wcslen
- 0x002697 ZwOpenKey
- 0x0026A2 ZwSetSecurityObject
- 0x0026B7 memset
- 0x0026BF wcscat
- 0x0026C7 sprintf
- 0x0026D0 RtlComputeCrc32
- 0x0026E1 ZwDuplicateObject
- 0x0026F4 ZwDeleteKey
- 0x002701 ZwDeleteValueKey
- 0x002713 RtlEqualUnicodeString
- 0x00272A ZwOpenProcess
- 0x002739 ZwTerminateProcess
- 0x00274D ZwSuspendThread
- 0x00275E RtlGetCurrentPeb
- 0x002770 RtlPrefixUnicodeString
- 0x002788 wcscpy
- 0x002790 ZwQueryInformationFile
- 0x0027A8 ZwCreateSection
- 0x0027B9 ZwMapViewOfSection
- 0x0027CD ZwUnmapViewOfSection
- 0x0027E3 strcmp
- 0x0027EB RtlIpv4StringToAddressA
- 0x002804 ZwGetContextThread
- 0x002818 ZwSetInformationFile
- 0x00282E RtlExitUserThread
- 0x002841 ZwWriteVirtualMemory
- 0x002857 ZwSetContextThread
- 0x00286B ZwTerminateThread
- 0x00287E ZwResumeThread
- 0x00288E RtlInterlockedPushEntrySList
- 0x0028AC RtlInterlockedPopEntrySList
- 0x0028C9 RtlNtStatusToDosError
- 0x0028E0 ntdll.dll
- 0x0028EB GetVersion
- 0x0028F7 GetTickCount
- 0x002905 ExitProcess
- 0x002912 LocalAlloc
- 0x00291E LocalFree
- 0x002929 VirtualProtect
- 0x002939 Sleep
- 0x002940 ExitThread
- 0x00294C DisableThreadLibraryCalls
- 0x002967 CreateThread
- 0x002975 GetSystemTimeAsFileTime
- 0x00298E GetLastError
- 0x00299C CreateProcessW
- 0x0029AC BindIoCompletionCallback
- 0x0029C6 DeleteTimerQueueTimer
- 0x0029DD CreateTimerQueueTimer
- 0x0029F4 KERNEL32.dll
- 0x002A02 MD5Init
- 0x002A0B MD5Update
- 0x002A16 MD5Final
- 0x002A20 CryptAcquireContextW
- 0x002A36 CryptGenRandom
- 0x002A46 CryptReleaseContext
- 0x002A5B OpenServiceW
- 0x002A69 ControlService
- 0x002A79 ChangeServiceConfigW
- 0x002A8F DeleteService
- 0x002A9E CloseServiceHandle
- 0x002AB2 OpenSCManagerW
- 0x002AC2 ADVAPI32.dll
- 0x002AD0 Cabinet.dll
- 0x002ADD WSASocketW
- 0x002AE9 WSAIoctl
- 0x002AF3 WSARecv
- 0x002AFC WSASend
- 0x002B05 WSASendTo
- 0x002B10 WSARecvFrom
- 0x002B1D WS2_32.dll
- 0x002B29 GetProcAddress
- 0x002B39 FreeLibrary
- 0x002B46 InterlockedExchange
- 0x002B5B LoadLibraryA
- 0x002B69 RaiseException
- 0x002B79 uncrypted.exe
- 0x002B88 AlphaBlend
- 0x002B94 system32\msimg32.AlphaBlend
- 0x002BB1 GradientFill
- 0x002BBF system32\msimg32.GradientFill
- 0x002BDE TransparentBlt
- 0x002BEE system32\msimg32.TransparentBlt
- 0x002C1F 1+1>1D1K1Q1Z1a1
- 0x002C30 3 393?3F3L3_3m3s3
- 0x002C43 <'</<:<B<I<o<
- 0x002C52 >(>->@>F>O>s>
- 0x002C61 0E0\0l0y0
- 0x002C6C 5'5.555B5L5Y5f5s5
- 0x002C7F 6(686B6L6[6d6m6v6
- 0x002C92 7&7?7Y7h7p7u7
- 0x002CA1 8.878<8A8H8M8R8
- 0x002CB6 3R3Y3
- 0x002CBC 3f3n3
- 0x002CC3 4$4/454;4H4Q4[4h4
- 0x002CD6 7)7=7J7Q7Z7_7
- 0x002CE5 3$484L4P4T4X4\4
- 0x002D04 Wi|LE
- 0x002D1A _(wRz
- 0x002D27 OP*IZV_
- 0x002D35 pTsBL
- 0x002D51 =_cSZ
- 0x002D58 _cuMIr
- 0x002D6A k<6:Pb+
- 0x002D79 fI&rS
- 0x002D8F \(B]X
- 0x002DA2 0UgaX
- 0x002DA9 p{bjE
- 0x002DB6 rGS(#L
- 0x002DD8 d7OtX
- 0x002DE4 =awS/c
- 0x002E13 q*CD{
- 0x002E1A (n.Pf
- 0x002E27 3o-eHx
- 0x002E35 sW1,I
- 0x002E41 <Ul%M3RMF
- 0x002E68 M4g(+m
- 0x002E70 cpO=m
- 0x002E7D Lk@]kl}
- 0x002E8B V6H)rU
- 0x002E9E $dm,y
- 0x002EBA {YscG
- 0x002ECB !_cDh\
- 0x002ED8 Y'*OY
- 0x002EFF Bp A.3P1o
- 0x002F1A 4nC<n
- 0x002F49 pwz;YB
- 0x002F51 rz?DXs
- 0x002F59 A<atY
- 0x002F72 ww=rJ]
- 0x002F7A V}qJY
- 0x002F9D 2z(u*vr
- 0x002FAC kq{Al
- 0x002FB8 !8CFQ
- 0x002FCA +P5Yu
- 0x002FE8 TrK>Z
- 0x002FFA dm0\e
- 0x003030 Tv|E[
- 0x003042 HVL_:g
- 0x003088 'RpY~B S
- 0x00309C pwTP<
- 0x0030AD B"Jk!J
- 0x0030B5 JTFkb
- 0x0030C8 Ee\uV
- 0x0030CF ,nmI7
- 0x0030F4 1_kGCH&
- 0x003112 Xv?'E c"
- 0x00316B sboLr
- 0x003172 %p[y/a
- 0x003185 Oy~y.
- 0x003192 I~S;~t
- 0x00319A Us[ybr
- 0x0031BF Cc*lB
- 0x0031D9 ~_VvK
- 0x0031E6 0TIiHUE}
- 0x0031F0 xE(S|&
- 0x003209 nJ!Vc
- 0x003215 Z!3[wi
- 0x003234 sr+A}
- 0x00325B INY9Vh;W
- 0x00326A NL8#F-
- 0x00327D p"ZT+L
- 0x003295 /BT=Z
- 0x0032A1 [>G:oj5u
- 0x0032AB WgXPHi
- 0x0032D2 v}:PQ
- 0x0032D9 N*YnM
- 0x0032E6 ")dfo
- 0x0032F2 U~EQ@
- 0x0032F9 oTB)S
- 0x003316 kbOv7'
- 0x00333D jYA$Q
- 0x003357 E8p|c;
- 0x00336A YBbP:
- 0x003371 STMZF
- 0x003378 >XfaH
- 0x00337F TpIF.
- 0x003396 doFk;z
- 0x00339E Ewh@cX
- 0x0033AB 2oq(V
- 0x0033CD .bAp]
- 0x0033EE 8XBg+|#>
- 0x0033FE v>}Bt
- 0x00341C #PUj<
- 0x003423 z0kZG
- 0x00342F &GN\B
- 0x003441 s=VIT
- 0x003457 x:Ahz
- 0x00349C [jQf%
- 0x0034AD n"/HY
- 0x0034BC [n])gf
- 0x0034F0 ,GkTvO
- 0x0034F8 JTdtU%
- 0x003506 {W!!Fk
- 0x003514 b$&msB
- 0x003547 !F\DA
- 0x00355A WH;M]
- 0x003561 !8(<EbN9
- 0x00356B jO<qi
- 0x003578 ;NjhkUE
- 0x00358B L#Kkx
- 0x00359E =/Ej+nc
- 0x0035B5 u[R1?f
- 0x0035DE k@nfQ(
- 0x0035F2 ;Spmh=T
- 0x00360D virUe
- 0x003628 @\xfQK
- 0x003649 IbUgf
- 0x00367F utz;s.
- 0x0036A4 EDY/z
- 0x0036AB xYG Va
- 0x0036CA e.WXt
- 0x0036E1 c2RjY
- 0x0036E8 UDiFn
- 0x0036F4 a,&GQ{
- 0x003701 V#[.rU
- 0x003713 gPKec
- 0x00372A iCZt!
- 0x003747 /s~2l?4T
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement