# Quick analysis note about DealPly (Adware) **[kienmanowar.wordpress.com/2021/05/11/quick-analysis-note-about-dealply-adware/](https://kienmanowar.wordpress.com/2021/05/11/quick-analysis-note-about-dealply-adware/)** Overview ## Some information about DealPly can be found here: The post focuses on the following main sections: Unpack wrapper/loader to get main Dll payload. Decrypt C2url and strings are used in the malware code. Sample: May 11, 2021 ## SHA-256: 40584f79d109a18b1c4ea7e75a945324978652b6afcc9efbe62241717f0b4685 ----- Unpacking wrapper/loader to get main DLL payload ## Most of the DealPly loaders are coded in Delphi. When it runs without parameter, it only shows the following form: When executing with parameters, it unpacks a DLL to allocated memory. This DLL will be mainly responsible for connecting and interacting with C2. For unpacking, place breakpoint at VirtualAlloc, execute the program and follow the allocated memory region. Keep watching until the loader unpack a new PE (which is a dll), but it was destroyed all relevant information about DOS_HEADER and NT_HEADERS : ----- ## Dump and fix DOS_HEADER and NT_HEADERS will get the correct main Dll: Analysis of DLL payload Decrypt C2Url ## Load the above dumped Dll file into IDA, go to the code of the Run function. Here, it calls ``` f_main_proc function. The f_main_proc accepts the passed parameters, in which the third parameter is encoded C2. ``` ----- ## Diving into the code of f_main_proc will find the function responsible for performing the decoding of the malware’s C2: The code at the f_tranform_c2Url function will recalculate the bytes of enC2Url : ----- ## After completing the transform process, call to f_decrypt_c2Url function to perform decoding to C2. In essence, the function f_decrypt_c2Url function will perform xor to decrypt, xor_key is calculated from the last 2 bytes of the transformed enC2Url above: With all the above information and pseudo-code, I rewrote the code that performs decoding C2 in Python as follows: ----- ``` import numpy as np #---------------------------------------------------------------------def calc_value(c, val_0x2C): """""" tmp = val_0x2C - 0x2B if tmp: tmp2 = tmp - 2 if tmp2: if (tmp2 == 1): c = c + 0x85 else: c = c & 0xFF else: c = c + 0x4B else: c = c - 0x30 if (c < 0 or c > 0xFF): c = 0x3F return c #---------------------------------------------------------------------def int_to_bytes(value, length): """""" result = [] for i in range(0, length): result.append(value >> (i * 8) & 0xff) return result #---------------------------------------------------------------------def decrypt_c2url(encUrl, xor_tbl): """""" c2_url = "" dec_c2 = [] j = 0 len_c2 = len(encUrl) if len_c2 >= 4: i = len_c2 / 4 if (len_c2/4 -1 >= 0): counter = len_c2/4 while counter: for k in range(len(xor_tbl)): dec_c2.append(encUrl[j] ^ xor_tbl[j%len(xor_tbl)]) j+=1 counter-=1 j = 0 if (len_c2 >= 4 *i +1): counter = len_c2 - 4 * i idx = 4 * i + 1 ``` ----- ``` while counter: dec_c2.append(encUrl[idx-1] ^ xor_tbl[j]) j = (j + 1) % 4 idx +=1 counter-=1 for i in dec_c2: c2_url += chr(i) return c2_url #---------------------------------------------------------------------def main(): """""" C2_transform = [0] * len(encC2) tmp_tbl = [] val_0x2C = 0x2C i = 1 j = 1 while j <= len(encC2): c = encC2[j -1] j+=1 if ((c - 0x2B) >= 4): calced_val = calc_value(c, val_0x2C) C2_transform[i-1] = calced_val i+=1 elif (c == val_0x2C): if (j > len(encC2)): break C2_transform[i-1] = encC2[j-1] i+=1 j+=1 else: val_0x2C = c C2_transform = np.trim_zeros(C2_transform) tmp_tbl = C2_transform[len(C2_transform)-2:len(C2_transform)] C2_transform = C2_transform[:len(C2_transform)-2] tmp_val = ((tmp_tbl[1] + (tmp_tbl[0] << 8)) & 0xF) + 0x10 * (tmp_tbl[1] & 0xF0) + (((tmp_tbl[1] + (tmp_tbl[0] << 8)) & 0xF00) << 8) + (((tmp_tbl[1] + (tmp_tbl[0] << 8)) & 0xF000) << 0xC) xor_tbl = int_to_bytes(tmp_val, 4) print decrypt_c2url(C2_transform, xor_tbl) ## Execute the above script and check the results. As the result, this sample will connect to buluw[.]com : ``` ----- Decrypt strings ## All strings used by malware are encrypted and only decrypt when needed. Through the analysis of the code will find the function responsible for decoding: The code at this function is as follows: ----- ## As above picture, f_decrypt_string function will take as the argument of the address that contains the pointer to the encrypted string (ex: off_41C174 ). The function responsible for performing the decryption is f_decrypt_str, which takes an additional parameter ``` g_calc_tbl – this is table contains 256 elements, used for the calculation. The code at f_decrypt_str function looks like this: Based on the pseudo-code analyzed above, I rewrote the idapython script that decodes all the strings as follows: ``` ----- ``` import idc import idautils dec_routine = 0x00414AA8 calc_tbl = [0x00, 0xD3, 0xBA, 0x30, 0xD7, 0xD8, 0xC1, 0xC9, 0xEB, 0x84, 0xAD, 0x88, 0x9C, 0x47, 0x74, 0xBC, 0x6D, 0x43, 0x40, 0x2B, 0xAE, 0x4B, 0x60, 0x5D, 0x5A, 0xEC, 0x31, 0xF3, 0x9F, 0x56, 0x1F, 0x1E, 0x93, 0x57, 0x5B, 0xF7, 0xC0, 0x2C, 0x7C, 0xC5, 0x69, 0x29, 0x90, 0x13, 0x25, 0xE4, 0xA7, 0x99, 0x03, 0x1A, 0xCA, 0x4C, 0xDA, 0x9A, 0x9E, 0xF4, 0xDB, 0x9D, 0xA0, 0x65, 0xAF, 0xB3, 0xF5, 0x51, 0x12, 0x58, 0x7D, 0x11, 0x6A, 0x5C, 0xF0, 0x0D, 0x85, 0x7E, 0xBE, 0x15, 0x33, 0xB4, 0x7A, 0xFD, 0xAC, 0x3F, 0x81, 0xFF, 0xED, 0x5E, 0x1D, 0x21, 0x41, 0xAA, 0x18, 0x22, 0x45, 0x17, 0x55, 0x96, 0x16, 0xA3, 0x95, 0xA1, 0xD4, 0x3B, 0xEA, 0xE6, 0xBF, 0x28, 0x44, 0x89, 0xD9, 0x10, 0xE7, 0xA8, 0xAB, 0x8A, 0xCE, 0xD2, 0x0E, 0xCF, 0x8D, 0xA2, 0xDC, 0xC8, 0x4E, 0xDD, 0x26, 0x42, 0x49, 0xE5, 0x8B, 0x52, 0xA4, 0xA5, 0x09, 0x48, 0xF8, 0xA6, 0x0B, 0x6B, 0x71, 0x80, 0x92, 0x76, 0xB5, 0xF9, 0x2A, 0xB6, 0x8C, 0x20, 0xCB, 0x62, 0x5F, 0xC6, 0xEE, 0x2F, 0x35, 0xBB, 0x0C, 0x39, 0x36, 0x1C, 0x3A, 0x63, 0x77, 0x61, 0x82, 0x83, 0x87, 0x2E, 0x6F, 0xC2, 0x59, 0x70, 0x50, 0x0A, 0x14, 0x3C, 0xCC, 0xC7, 0xE8, 0x3D, 0x4D, 0x8E, 0x91, 0xC3, 0xD0, 0xE9, 0x02, 0x9B, 0x0F, 0xCD, 0x4A, 0x68, 0x24, 0x06, 0xA9, 0xB7, 0xEF, 0x27, 0x97, 0xB1, 0x79, 0x07, 0x32, 0x94, 0xB0, 0xBD, 0x72, 0x75, 0xB8, 0xF1, 0x73, 0x01, 0x64, 0xF6, 0xDE, 0x04, 0x05, 0x6C, 0x34, 0x38, 0x78, 0x7B, 0xD6, 0xFA, 0xF2, 0xFB, 0xFE, 0xFC, 0x2D, 0x7F, 0x67, 0x6E, 0xB2, 0xB9, 0x66, 0x08, 0x19, 0x54, 0x98, 0xC4, 0x46, 0xD1, 0xE0, 0x1B, 0x37, 0x3E, 0xD5, 0x23, 0x86, 0x8F, 0xDF, 0xE1, 0xE3, 0x4F, 0xE2, 0x53] #---------------------------------------------------------------------def get_encrypted_bytes(addr): """""" enc_bytes = [] enc_bytes_addr = idc.get_wide_dword(idc.get_operand_value(addr,1)) while idc.get_wide_byte(enc_bytes_addr) != 0x0: enc_bytes.append(idc.get_wide_byte(enc_bytes_addr)) enc_bytes_addr += 1 return enc_bytes #---------------------------------------------------------------------def decrypt(enc_str): """""" plaint_t = "" decStr = [0] * len(enc_str) calc_tbl_val = calc_tbl[enc_str[0]] tmp1 = calc_tbl_val % 7 tmp2 = calc_tbl_val % 9 strLen = len(enc_str) - 1 j = 2 for i in range(strLen): c = calc_tbl[enc_str[j-1]] - tmp2 * (j - 1) decStr[j-1] = c & 0xFF j+= 1 for i in decStr[tmp1+1:]: plaint_t+= chr(i) ``` ----- ``` return plaint_t #---------------------------------------------------------------------def decrypt_strings(func_addr): """""" for x in idautils.XrefsTo(func_addr, 0): org_addr = x.frm curr_addr = x.frm addr_minus_20 = curr_addr - 20 while curr_addr >= addr_minus_20: curr_addr = idc.prev_head(curr_addr) if 'edx' in idc.print_operand(curr_addr, 0) and idc.get_operand_type(curr_addr, 1) == idc.o_mem: enc_bytes = get_encrypted_bytes(curr_addr) dec_str = decrypt(enc_bytes) print("org_addr: %s, decrypted string: %s" % (hex(org_addr), dec_str)) idc.set_cmt(org_addr, dec_str, 0) elif 'eax' in idc.print_operand(curr_addr, 0) and idc.get_operand_type(curr_addr, 1) == idc.o_mem: enc_bytes = get_encrypted_bytes(curr_addr) dec_str = decrypt(enc_bytes) print("org_addr: %s, decrypted string: %s" % (hex(org_addr), dec_str)) idc.set_cmt(org_addr, dec_str, 0) #---------------------------------------------------------------------def main(): """""" decrypt_strings(dec_routine) if __name__ == '__main__': main() ## Executing the above script: ``` ----- ## All the strings are decrypted: ----- ``` org_addr: 0x405529, decrypted string: IPHLPAPI.dll org_addr: 0x40555f, decrypted string: GetIfTable org_addr: 0x40558e, decrypted string: GetAdaptersInfo org_addr: 0x4055bd, decrypted string: GetNetworkParams org_addr: 0x4059a1, decrypted string: 00155D org_addr: 0x4059c7, decrypted string: 0003FF org_addr: 0x4059ed, decrypted string: 0050F2 org_addr: 0x405a13, decrypted string: 000D3A org_addr: 0x405a38, decrypted string: AZR org_addr: 0x405a51, decrypted string: 123139 org_addr: 0x405a77, decrypted string: 22000A org_addr: 0x405a9c, decrypted string: AMZ org_addr: 0x405ab5, decrypted string: 000C29 org_addr: 0x405adb, decrypted string: 000569 org_addr: 0x405b01, decrypted string: 001C14 org_addr: 0x405b27, decrypted string: 005056 org_addr: 0x405b4c, decrypted string: VMW org_addr: 0x405b65, decrypted string: 001C42 org_addr: 0x405b8a, decrypted string: PRL org_addr: 0x405ba3, decrypted string: 00163E org_addr: 0x405bc8, decrypted string: XEN org_addr: 0x405be1, decrypted string: 080027 org_addr: 0x405c0c, decrypted string: VBX org_addr: 0x405cbd, decrypted string: VMW org_addr: 0x405ce2, decrypted string: XEN org_addr: 0x405d80, decrypted string: 00059A3C7800 org_addr: 0x405da4, decrypted string: 000000 org_addr: 0x405dc1, decrypted string: 000000 org_addr: 0x405de6, decrypted string: 005345000000 org_addr: 0x405e0a, decrypted string: 00F1D000F1D0 org_addr: 0x405e2e, decrypted string: 00A0C6000000 org_addr: 0x405e52, decrypted string: 000000000010 org_addr: 0x405e76, decrypted string: 000000000030 org_addr: 0x405e9a, decrypted string: 028037EC0200 org_addr: 0x405ebe, decrypted string: FFFFFFF org_addr: 0x405edb, decrypted string: FFFFF org_addr: 0x406355, decrypted string: ldr1 org_addr: 0x406398, decrypted string: ldr2 org_addr: 0x406444, decrypted string: ShellExecuteA org_addr: 0x406461, decrypted string: shell32.dll org_addr: 0x4064d4, decrypted string: ShellExecuteExA org_addr: 0x4064f1, decrypted string: shell32.dll org_addr: 0x4069c6, decrypted string: wininet.dll org_addr: 0x4069fa, decrypted string: http:// org_addr: 0x406a20, decrypted string: https:// org_addr: 0x406a46, decrypted string: InternetOpenA org_addr: 0x406a72, decrypted string: InternetConnectA org_addr: 0x406a9e, decrypted string: HttpOpenRequestA org_addr: 0x406aca, decrypted string: HttpAddRequestHeadersA org_addr: 0x406af6, decrypted string: HttpSendRequestA org_addr: 0x406b22, decrypted string: HttpQueryInfoA org_addr: 0x406b4e, decrypted string: InternetReadFile org_addr: 0x406b7a, decrypted string: InternetCloseHandle org_addr: 0x407369, decrypted string: POST org_addr: 0x4073a0, decrypted string: GET ``` ----- ``` org_addr: 0x4074bb, decrypted string: Host: org_addr: 0x4074f8, decrypted string: Accept: */* org_addr: 0x407575, decrypted string: Host: org_addr: 0x4075ca, decrypted string: Accept: org_addr: 0x409145, decrypted string: kernel32.dll org_addr: 0x40916e, decrypted string: VirtualAlloc org_addr: 0x409235, decrypted string: $SIG org_addr: 0x409495, decrypted string: kernel32.dll org_addr: 0x4094be, decrypted string: VirtualAlloc org_addr: 0x409585, decrypted string: $SIG org_addr: 0x409700, decrypted string: Run org_addr: 0x409947, decrypted string: RunEX org_addr: 0x409982, decrypted string: https:// org_addr: 0x40999d, decrypted string: http:// org_addr: 0x4099fe, decrypted string: Run org_addr: 0x409af4, decrypted string: $UpdateSRV org_addr: 0x409b21, decrypted string: $UpdateLTR org_addr: 0x409c53, decrypted string: Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ org_addr: 0x409c73, decrypted string: Hidden org_addr: 0x409cd0, decrypted string: HideFileExt org_addr: 0x409d2a, decrypted string: ShowSuperHidden org_addr: 0x409e5c, decrypted string: CD_UIDC org_addr: 0x409e80, decrypted string: CD_ins_guid org_addr: 0x409ea4, decrypted string: CD_host_guid org_addr: 0x409ec8, decrypted string: CD_iv org_addr: 0x409eec, decrypted string: CD_aflt org_addr: 0x409f16, decrypted string: a org_addr: 0x409f40, decrypted string: aflt org_addr: 0x409f64, decrypted string: uidp org_addr: 0x409f88, decrypted string: IDT org_addr: 0x409fbd, decrypted string: UID= org_addr: 0x409ff3, decrypted string: &UID2= org_addr: 0x40a02c, decrypted string: &UIDC= org_addr: 0x40a067, decrypted string: &mguid= org_addr: 0x40a0b0, decrypted string: &uidp= org_addr: 0x40a0eb, decrypted string: &AppName= org_addr: 0x40a116, decrypted string: &State= org_addr: 0x40a151, decrypted string: &ins_guid= org_addr: 0x40a17c, decrypted string: &host_guid= org_addr: 0x40a1b7, decrypted string: &iv= org_addr: 0x40a1e2, decrypted string: &aflt= org_addr: 0x40a21d, decrypted string: &IDT= org_addr: 0x40a248, decrypted string: &IRTYP= org_addr: 0x40a286, decrypted string: &IRVER= org_addr: 0x40a2c3, decrypted string: &OS= org_addr: 0x40a308, decrypted string: &SV= org_addr: 0x40a359, decrypted string: &lptp=1 org_addr: 0x40a38b, decrypted string: &lptp=0 org_addr: 0x40a3c1, decrypted string: &btry=1 org_addr: 0x40a3f3, decrypted string: &btry=0 org_addr: 0x40a426, decrypted string: &VMC= org_addr: 0x40a46f, decrypted string: ®= org_addr: 0x40a4a0, decrypted string: CDATA org_addr: 0x40a4da, decrypted string: SOFTWARE\ ``` ----- ``` org_addr: 0x40a564, decrypted string: &Src org_addr: 0x40a5b6, decrypted string: src.dat org_addr: 0x40a642, decrypted string: &Lang= org_addr: 0x40a690, decrypted string: &Lang= org_addr: 0x40a6de, decrypted string: &ADVF= org_addr: 0x40a734, decrypted string: &FS= org_addr: 0x40a79f, decrypted string: &sha= org_addr: 0x40a7f6, decrypted string: &st_dt= org_addr: 0x40a867, decrypted string: &ParamALL= org_addr: 0x40a9e9, decrypted string: UnNM org_addr: 0x40accc, decrypted string: Date: org_addr: 0x40af23, decrypted string: &Admin=1 org_addr: 0x40af49, decrypted string: &Admin=0 org_addr: 0x40af70, decrypted string: &Idle= org_addr: 0x40afac, decrypted string: &TDY= org_addr: 0x40afe3, decrypted string: <DY= org_addr: 0x40b028, decrypted string: &TDYC= org_addr: 0x40b0c3, decrypted string: https:// org_addr: 0x40b0e4, decrypted string: http:// org_addr: 0x40b158, decrypted string: Location: org_addr: 0x40b377, decrypted string: script org_addr: 0x40b3ac, decrypted string: Flags= org_addr: 0x40b3ed, decrypted string: CHECK org_addr: 0x40b589, decrypted string: DFN org_addr: 0x40b81a, decrypted string: UpdTask.exe org_addr: 0x40b840, decrypted string: SynHelper.exe org_addr: 0x40b866, decrypted string: Updane.exe org_addr: 0x40b892, decrypted string: Sync.exe org_addr: 0x40b8be, decrypted string: ProductUpdt.exe org_addr: 0x40b8ea, decrypted string: SyncTask.exe org_addr: 0x40b913, decrypted string: SyncVersion.exe org_addr: 0x40b956, decrypted string: .exe org_addr: 0x40ba7e, decrypted string: https:// org_addr: 0x40ba99, decrypted string: http:// org_addr: 0x40bae0, decrypted string: CR org_addr: 0x40bb1a, decrypted string: CD org_addr: 0x40bb94, decrypted string: &uid= org_addr: 0x40bbc3, decrypted string: &ins_guid= org_addr: 0x40bbf2, decrypted string: &host_guid= org_addr: 0x40bc21, decrypted string: &iv= org_addr: 0x40bc59, decrypted string: &AL= org_addr: 0x40bc8e, decrypted string: a org_addr: 0x40bcc4, decrypted string: aflt org_addr: 0x40bcf4, decrypted string: CD_UIDC org_addr: 0x40bd27, decrypted string: CD_ins_guid org_addr: 0x40bd5a, decrypted string: CD_host_guid org_addr: 0x40bd8d, decrypted string: CD_iv org_addr: 0x40bdc0, decrypted string: CD_aflt org_addr: 0x40bdf3, decrypted string: CD_AL org_addr: 0x40be3b, decrypted string: CD org_addr: 0x40be8a, decrypted string: Local_Inst_DT org_addr: 0x40bebb, decrypted string: SNR_FAIL org_addr: 0x40bef0, decrypted string: URL org_addr: 0x40bf23, decrypted string: AppName org_addr: 0x40bf59, decrypted string: uidp ``` ----- ``` org_addr: 0x40bf9c, decrypted string: UDAT0 org_addr: 0x40bfee, decrypted string: UDAT0 org_addr: 0x40c021, decrypted string: RKL org_addr: 0x40c06c, decrypted string: RVL org_addr: 0x40c0ad, decrypted string: RKL org_addr: 0x40c0e0, decrypted string: RVL org_addr: 0x40c113, decrypted string: RLM org_addr: 0x40c158, decrypted string: RLM org_addr: 0x40c1eb, decrypted string: Inst_DT org_addr: 0x40c221, decrypted string: IRVER org_addr: 0x40c26d, decrypted string: IRBVER org_addr: 0x40c2b5, decrypted string: IRTYP org_addr: 0x40c2f4, decrypted string: TodayFN org_addr: 0x40c327, decrypted string: TodayCntFN org_addr: 0x40c906, decrypted string: SDT org_addr: 0x40c9c2, decrypted string: Src org_addr: 0x40c9fc, decrypted string: src.dat org_addr: 0x40cad5, decrypted string: .del org_addr: 0x40cbb2, decrypted string: nosct org_addr: 0x40cd96, decrypted string: noun org_addr: 0x40cde6, decrypted string: /Uninstall org_addr: 0x40ce13, decrypted string: DelSelfDir org_addr: 0x40ce40, decrypted string: /GID= org_addr: 0x40ce9d, decrypted string: ProdName org_addr: 0x40cefd, decrypted string: prod.dat org_addr: 0x40d01e, decrypted string: BkScript org_addr: 0x40d13f, decrypted string: Flags= org_addr: 0x40d19c, decrypted string: Install org_addr: 0x40d52b, decrypted string: UReg org_addr: 0x40d610, decrypted string: UFile org_addr: 0x40d6a8, decrypted string: UDAT org_addr: 0x40d749, decrypted string: UExFile org_addr: 0x40d8e2, decrypted string: Uninstall org_addr: 0x40d918, decrypted string: Update Service org_addr: 0x40d93a, decrypted string: Uninstall completed successfully. Please restart your computer to clean up files. org_addr: 0x40d9a3, decrypted string: &APN= org_addr: 0x40d9cb, decrypted string: &S=Uninstall&IDT= org_addr: 0x40d9f3, decrypted string: IDT org_addr: 0x40da3c, decrypted string: &DT= org_addr: 0x40da67, decrypted string: &IRTYP= org_addr: 0x40daa5, decrypted string: &IRVER= org_addr: 0x40dad2, decrypted string: &UID= org_addr: 0x40db49, decrypted string: BkScript org_addr: 0x40dba9, decrypted string: config.dat org_addr: 0x40dd1c, decrypted string: DelSelfDir org_addr: 0x40dea9, decrypted string: Update Service org_addr: 0x40decb, decrypted string: Uninstall org_addr: 0x40defd, decrypted string: update process? org_addr: 0x40df56, decrypted string: Uninstall must Reboot your computer to delete files. org_addr: 0x40df75, decrypted string: Continue with uninstall? org_addr: 0x40dfec, decrypted string: Uninstall necessario riavviare il computer per eliminare i file. org_addr: 0x40e00b, decrypted string: Continuare con la disinstallazione? ``` ----- ``` org_addr: 0x40e02f, decrypted string: Désinstaller devez redémarrer votre ordinateur pour supprimer les fichiers. org_addr: 0x40e04e, decrypted string: Continuer la désinstallation? org_addr: 0x40e072, decrypted string: Uninstall müssen Starten Sie Ihren Computer, um Dateien zu löschen. org_addr: 0x40e091, decrypted string: Fahren Sie mit dem deinstallieren? org_addr: 0x40e0b5, decrypted string: Uninstall deve reiniciar o computador para apagar arquivos. org_addr: 0x40e0d4, decrypted string: Continue com a desinstalação? org_addr: 0x40e0f5, decrypted string: Desinstalación debe reiniciar el equipo para eliminar archivos. org_addr: 0x40e114, decrypted string: Continúe con la desinstalación? org_addr: 0x40e135, decrypted string: Desinstalación debe reiniciar el equipo para eliminar archivos. org_addr: 0x40e154, decrypted string: Continúe con la desinstalación? org_addr: 0x40e17b, decrypted string: Update Service org_addr: 0x40e1e0, decrypted string: noun org_addr: 0x40e210, decrypted string: GID org_addr: 0x40e2a9, decrypted string: /DoUninstall org_addr: 0x40e2d2, decrypted string: /Uninstall org_addr: 0x40e497, decrypted string: $UpdateSRV org_addr: 0x40e4e1, decrypted string: $UpdateLTR org_addr: 0x40e66d, decrypted string: script org_addr: 0x40e6a2, decrypted string: Flags= org_addr: 0x40e6e3, decrypted string: CHECK org_addr: 0x40eac4, decrypted string: Update org_addr: 0x40eadf, decrypted string: Install org_addr: 0x40eaf8, decrypted string: Flags= org_addr: 0x40eb50, decrypted string: IDT org_addr: 0x40ec04, decrypted string: https:// org_addr: 0x40ec1f, decrypted string: http:// org_addr: 0x40ec41, decrypted string: /sanity/ org_addr: 0x40ef16, decrypted string: Ver org_addr: 0x40ef38, decrypted string: DT: org_addr: 0x40ef69, decrypted string: Ver: org_addr: 0x40ef9f, decrypted string: BVer: org_addr: 0x40efd5, decrypted string: Typ: org_addr: 0x40f14e, decrypted string: nx org_addr: 0x41045c, decrypted string: user32.dll org_addr: 0x41048e, decrypted string: OemToCharA org_addr: 0x41092a, decrypted string: kernel32.dll org_addr: 0x410966, decrypted string: GetVersionExA org_addr: 0x410a6b, decrypted string: ProductName org_addr: 0x410a93, decrypted string: \Software\Microsoft\Windows NT\CurrentVersion\ org_addr: 0x410e2c, decrypted string: kernel32.dll org_addr: 0x410e54, decrypted string: GetFileSize org_addr: 0x411055, decrypted string: org_addr: 0x411075, decrypted string: org_addr: 0x4110ae, decrypted string: org_addr: 0x4110dd, decrypted string: <#DESC#> org_addr: 0x41110c, decrypted string: org_addr: 0x41113a, decrypted string: <#DESC#> org_addr: 0x411171, decrypted string: <#TRIGGERS#> org_addr: 0x4111a0, decrypted string: ``` ----- ``` org_addr: 0x4111cf, decrypted string: org_addr: 0x411202, decrypted string: SYSTEM org_addr: 0x411233, decrypted string: InteractiveToken org_addr: 0x411260, decrypted string: HighestAvailableLeastPrivilege org_addr: 0x4112c0, decrypted string: org_addr: 0x4112ef, decrypted string: org_addr: 0x411327, decrypted string: org_addr: 0x411362, decrypted string: true org_addr: 0x41139d, decrypted string: false org_addr: 0x4113d8, decrypted string: false org_addr: 0x411413, decrypted string: false org_addr: 0x41144e, decrypted string: PT0S org_addr: 0x411489, decrypted string: false org_addr: 0x4114c4, decrypted string: false org_addr: 0x4114ff, decrypted string: 5 org_addr: 0x41153a, decrypted string: org_addr: 0x411575, decrypted string: org_addr: 0x4115b0, decrypted string: org_addr: 0x4115eb, decrypted string: <#PROGRAM#> org_addr: 0x411626, decrypted string: <#PARAMS#> org_addr: 0x411661, decrypted string: org_addr: 0x41169c, decrypted string: org_addr: 0x4116d7, decrypted string: org_addr: 0x411729, decrypted string: <#PROGRAM#> org_addr: 0x41176f, decrypted string: <#PARAMS#> org_addr: 0x411833, decrypted string: org_addr: 0x411854, decrypted string: org_addr: 0x411899, decrypted string: org_addr: 0x4118ca, decrypted string: PT org_addr: 0x4118f3, decrypted string: M org_addr: 0x411924, decrypted string: P1D org_addr: 0x411955, decrypted string: false org_addr: 0x411986, decrypted string: org_addr: 0x4119ab, decrypted string: <#YEAR#>-<#MONTH#><#DAY#>T<#HOUR#>:<#MI org_addr: 0x4119dc, decrypted string: true org_addr: 0x411a17, decrypted string: org_addr: 0x411a4e, decrypted string: 1 org_addr: 0x411a88, decrypted string: org_addr: 0x411ac5, decrypted string: org_addr: 0x411b02, decrypted string: org_addr: 0x411c13, decrypted string: <#HOUR#> org_addr: 0x411c5d, decrypted string: <#MIN#> org_addr: 0x411ca7, decrypted string: <#SEC#> org_addr: 0x411cf1, decrypted string: <#YEAR#> org_addr: 0x411d3b, decrypted string: <#MONTH#> org_addr: 0x411d85, decrypted string: <#DAY#> org_addr: 0x411de6, decrypted string: <#TRIGGERS#> org_addr: 0x411e94, decrypted string: SYSTEM org_addr: 0x411f7a, decrypted string: Tasks\ org_addr: 0x411fd5, decrypted string: *.job org_addr: 0x412461, decrypted string: /interactive ``` ----- ``` org_addr: 0x4124af, decrypted string: at.exe org_addr: 0x412551, decrypted string: Tasks\ org_addr: 0x4125a8, decrypted string: AT org_addr: 0x4125d3, decrypted string: .job org_addr: 0x41292f, decrypted string: .xml org_addr: 0x41296e, decrypted string: /create /F /tn org_addr: 0x412992, decrypted string: " /xml " org_addr: 0x4129c7, decrypted string: schtasks.exe org_addr: 0x412a25, decrypted string: /create /F /tn org_addr: 0x412a52, decrypted string: " /tr " org_addr: 0x412a97, decrypted string: /sc DAILY /ST org_addr: 0x412aea, decrypted string: /RU SYSTEM org_addr: 0x412b29, decrypted string: /IT org_addr: 0x412b62, decrypted string: schtasks.exe org_addr: 0x412d34, decrypted string: /query /xml org_addr: 0x412d51, decrypted string: schtasks.exe org_addr: 0x412d9c, decrypted string: org_addr: 0x412e04, decrypted string: org_addr: 0x412e21, decrypted string: org_addr: 0x412ea5, decrypted string: /delete /F /TN " org_addr: 0x412eda, decrypted string: schtasks.exe org_addr: 0x412f28, decrypted string: org_addr: 0x413074, decrypted string: SHGetSpecialFolderPathW org_addr: 0x413091, decrypted string: shell32.dll org_addr: 0x413c5a, decrypted string: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ org_addr: 0x413d72, decrypted string: SOFTWARE\Microsoft\Windows\CurrentVersion\ org_addr: 0x413d8e, decrypted string: Uninstall org_addr: 0x413e1b, decrypted string: DisplayIcon org_addr: 0x413e6a, decrypted string: DisplayName org_addr: 0x413eb9, decrypted string: UninstallString org_addr: 0x413f20, decrypted string: Publisher org_addr: 0x414108, decrypted string: cmd.exe /Q /D /c del " org_addr: 0x414178, decrypted string: SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce org_addr: 0x4141ad, decrypted string: cmd.exe /Q /D /c del " org_addr: 0x41421d, decrypted string: SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce org_addr: 0x414636, decrypted string: GetPwrCapabilities org_addr: 0x414824, decrypted string: open org_addr: 0x4163d5, decrypted string: 000000000000 org_addr: 0x416449, decrypted string: 000000 org_addr: 0x4164cd, decrypted string: FFFFFFFF org_addr: 0x4169f5, decrypted string: dir org_addr: 0x416a16, decrypted string: /S " org_addr: 0x416a35, decrypted string: *.* org_addr: 0x416a6b, decrypted string: TIMEOUT org_addr: 0x416bc2, decrypted string: cmd.exe org_addr: 0x416bf3, decrypted string: /d /c org_addr: 0x416c1c, decrypted string: & cmd /d /c del org_addr: 0x416c71, decrypted string: CreateProcessA org_addr: 0x416c9a, decrypted string: kernel32.dll org_addr: 0x416dad, decrypted string: cmd.exe org_addr: 0x416dde, decrypted string: /d /c org_addr: 0x416e0d, decrypted string: & cmd /d /c rd /S /Q ``` ----- ``` org_addr: 0x416e6e, decrypted string: CreateProcessA org_addr: 0x416e97, decrypted string: kernel32.dll org_addr: 0x4170a7, decrypted string: MachineGuid org_addr: 0x4170cf, decrypted string: Software\Microsoft\Cryptography org_addr: 0x417116, decrypted string: MachineGuid org_addr: 0x41713e, decrypted string: Software\Microsoft\Cryptography org_addr: 0x417253, decrypted string: user32.dll org_addr: 0x41727f, decrypted string: GetLastInputInfo org_addr: 0x41734c, decrypted string: GetUserDefaultUILanguage org_addr: 0x417369, decrypted string: kernel32.dll org_addr: 0x417a58, decrypted string: .ini org_addr: 0x417ab4, decrypted string: .txt org_addr: 0x417ad7, decrypted string: .txt org_addr: 0x4182d5, decrypted string: cmd.exe org_addr: 0x418376, decrypted string: 1.dat org_addr: 0x4183a9, decrypted string: 2.dat org_addr: 0x418448, decrypted string: /d /c org_addr: 0x4184a3, decrypted string: cmd /d /c copy /B /Y /V org_addr: 0x4184fd, decrypted string: & cmd /d /c del " org_addr: 0x418528, decrypted string: " & cmd /d /c del " org_addr: 0x41857b, decrypted string: CreateProcessA org_addr: 0x4185a4, decrypted string: kernel32.dll org_addr: 0x41878f, decrypted string: psapi.dll org_addr: 0x4187ce, decrypted string: GetModuleFileNameExA org_addr: 0x4187f6, decrypted string: EnumProcessModules org_addr: 0x418d30, decrypted string: mnprstghklbcdf org_addr: 0x418d56, decrypted string: iuaaooee org_addr: 0x41a1e7, decrypted string: kernel32.dll org_addr: 0x41a20d, decrypted string: FreeLibrary org_addr: 0x41a237, decrypted string: EnterCriticalSection org_addr: 0x41a261, decrypted string: LeaveCriticalSection org_addr: 0x41a28b, decrypted string: WaitForSingleObject org_addr: 0x41a2b5, decrypted string: CloseHandle org_addr: 0x41a2df, decrypted string: GetExitCodeProcess org_addr: 0x41a309, decrypted string: GetSystemDirectoryW org_addr: 0x41a333, decrypted string: GetModuleFileNameW org_addr: 0x41a35d, decrypted string: DeleteFileA org_addr: 0x41a387, decrypted string: CreateFileW org_addr: 0x41a3b1, decrypted string: CreateFileA org_addr: 0x41a3db, decrypted string: ReadFile org_addr: 0x41a405, decrypted string: WriteFile org_addr: 0x41a42f, decrypted string: SetFilePointer org_addr: 0x41a459, decrypted string: MoveFileW org_addr: 0x41a48c, decrypted string: MoveFileA org_addr: 0x41a4c2, decrypted string: FindFirstFileW org_addr: 0x41a4f8, decrypted string: FindNextFileW org_addr: 0x41a52e, decrypted string: FindClose org_addr: 0x41a564, decrypted string: CreateProcessW org_addr: 0x41a59a, decrypted string: CreateProcessA org_addr: 0x41a5d0, decrypted string: GetStartupInfoA org_addr: 0x41a606, decrypted string: CopyFileW org_addr: 0x41a63c, decrypted string: GetTempPathA org_addr: 0x41a6cf, decrypted string: PeekNamedPipe org_addr: 0x41a705, decrypted string: CreatePipe org_addr: 0x41a73b, decrypted string: GetFileAttributesW ``` ----- ``` org_addr: 0x41a771, decrypted string: GetShortPathNameA org_addr: 0x41a7a7, decrypted string: GetShortPathNameW org_addr: 0x41a7dd, decrypted string: GetComputerNameA org_addr: 0x41a813, decrypted string: CreateDirectoryA org_addr: 0x41a849, decrypted string: CreateDirectoryW org_addr: 0x41a87f, decrypted string: RemoveDirectoryA org_addr: 0x41a8b5, decrypted string: GetCurrentProcess org_addr: 0x41a8eb, decrypted string: SetFileTime org_addr: 0x41a921, decrypted string: GetVolumeInformationA org_addr: 0x41a957, decrypted string: GetTickCount org_addr: 0x41a98d, decrypted string: ExitThread org_addr: 0x41a9c3, decrypted string: CreateThread org_addr: 0x41a9f9, decrypted string: ResumeThread org_addr: 0x41aa2f, decrypted string: GetLocalTime org_addr: 0x41aa65, decrypted string: OpenProcess org_addr: 0x41aa9b, decrypted string: GetSystemPowerStatus org_addr: 0x41aad1, decrypted string: GetWindowsDirectoryW org_addr: 0x41ab07, decrypted string: SetFileAttributesW org_addr: 0x41ab3d, decrypted string: Sleep org_addr: 0x41ab73, decrypted string: TerminateProcess org_addr: 0x41ac02, decrypted string: advapi32.dll org_addr: 0x41ac28, decrypted string: RegCloseKey org_addr: 0x41ac52, decrypted string: RegOpenKeyExW org_addr: 0x41ac7c, decrypted string: RegDeleteKeyW org_addr: 0x41aca6, decrypted string: RegCreateKeyExW org_addr: 0x41acd0, decrypted string: RegSetValueExW org_addr: 0x41acfa, decrypted string: RegQueryValueExW org_addr: 0x41ad24, decrypted string: RegDeleteValueW org_addr: 0x41ad4e, decrypted string: RegEnumValueW org_addr: 0x41ad78, decrypted string: RegEnumKeyW org_addr: 0x41ae05, decrypted string: user32.dll org_addr: 0x41ae2b, decrypted string: GetWindowThreadProcessId org_addr: 0x41ae55, decrypted string: EnumWindows org_addr: 0x41ae7f, decrypted string: WaitForInputIdle org_addr: 0x41afaa, decrypted string: kernel32.dll org_addr: 0x41afeb, decrypted string: LoadLibraryA org_addr: 0x41b01c, decrypted string: GetProcAddress ## End. m4n0w4r ``` -----