- [ TECHNICAL TEAR DOWN : DIGICOUPPOAN (PUP/ADWARE) ]
- gosong.net - malware site
- some FB shared malware.
- malevolous pdf sample
- Asprotected app, I have the key constants and a working key.
- Unpacking PESpin v1.32?
- my USB another infection..
- some malware got on my usb-stick
- Using veil with a dll
- Custome Themida? packed malware
- Trusteer rapport
- new hasp envelope? unknown PE packer
- PE Section Adder and rebuilder
- Rogue dll
- obfuscated java script that result to drive-by download
- Break on ResumeThread
- PeCompact 2.X unpacking problem
- This site really seems like snakeoil + fake AV potential candidate.
- Allaple Malware analysis for illustration..
- Machine learning for malware detection and classification
- Cracking a shareware keyfile protection.
- Binary Auditor - PE format rebuilding exercise solution
- Help unpacking old malware - Malware attached
- some malwares from USB
- just today infected USB-flash
- Malware samples: broken vs tool detection
- Unpacking Dynamically Allocated Code
- PackerBreaker - Yet another universal unpacker tool
- The fully Automated "VirusBusterKit" - A Hype or Reality?
- Need Help to Unpack file packed with ApLib
- some crushing malware unpacking
- [Help] Need help to unpack files completely
- Anti-Dumping - Part 3
- Automated Static Malware Analysis with Pythonect
- Help with ASProtect 1.23 RC4 unpacking
- PPEE (puppy) 1.01
- Need tips to analyze hacked memory pointers
- Need help analyzing injected code
- Lab Hardware
- Fake AV malware to play with
- Unpacking Mac OSX Dock
- import table problem
- Olly crashes when I try to attach to a new process that malware started
- Debug a Remote Thread in Olly Debugger
- Delphi App Reversing with Olly
- finding worm injected exe name/path in memory
- Collection Of OllyDbg Bugs And Exploits
- Yet Another Anti-Debug Trick
- Setting up a mail server
- A new Anti-Olly trick
- Your free airline ticket is ready.
- An anti-attach trick.
- USPS Delivery Failure Notification "USPS report.zip"
- Cannot proceed - Packed EXE?
- [ARTeam] Analyzing an Adobe Flash Malware (CVE-2011-2110) by +NCR/CRC!
- Obfuscation affect on Dependency Walker?
- Patching Antivirus XP 2008 [Malware]
- Problem with MoleBox unpacking
- Unpacking / Patching Maleware - Help needed
- Pointers in unpacked file don't get rebased
- Thinstall Consult?
- [Unpackme] Unknown .net packer UnpackMe
- Help analyzing a malicious PDF
- Rooted/botted
- Malware(Hackarmy) - Olly hangs
- Trouble Unpacking Netsky-Q FSG 1.0 and UPX 0.80 - 1.24 DLL -> Markus & Laszlo
- MacDefender - Indicator of future malware or not?
- Honeynet Forensic Challenge 8 - "Malware Reverse Engineering"
- Is code analysis cost effective?
- Zeus sourcecode
- Compromised by a virus
- Malware Analysis - Starting out..
- Buster Sandbox Analyzer
- Trying to unpack .exe with Securom 7.00.00.0001
- LINK: Malcode Context of API Abuse
- Cracking the logic of XP security 2011 for 'fun'.
- packed dll file dropped by virus
- how to know which protection is used
- Change a intern link in a .exe file
- Amr Thabet: Reversing Stuxnet's Rootkit (MRxNet) Into C++
- Can't Dump a w32 binary (malware)?
- What packer is this?
- InternetSecurity2011
- Anti-Unpacker Tricks
- VB Header Info
- How can I handle waitforsingleobject() error while debugging?
- Extract Sequence of assembly codes during runtime ???
- ELF - problem with unpacking
- Unknown packer (MZP signature)
- CongratZ! Now .NETwill load malware
- MBR analysis
- Virtob.si yet ready to infect you..
- Restore Themida/Winlicense VM codes to original x86
- Debugging and unpacking NsPack
- Malware analysis Machine Reimaging
- Pokas x86 PE Emulator for Generic Unpacking
- Write your Own Unpacker
- analyze a dll
- How to analyze on a live system that is infected?
- immunity debugger plugin
- Unknown packed file prob Zbot variant
- {smartassembly} protection analysis + unpacker (with source)
- Armadillo help?
- Compromised by Super Private Keylogger
- Drive-by browser exploit analysis
- if WinRAR is in NullsoftInstaller, then...
- what about this sample?
- Java Malware question.
- AntiUnpacking Tricks of Malware
- KHOBE and Chicken Little
- extract runtime assembly code ?
- unlock file or folder , i hope this tool might be useful :)
- Interesting Malware analysis write up.
- IDA Debugger - strange behavior when debugging protectors
- Win32.Sinowal MBR rootkit
- Malware that tampers with debugger?
- Fake Virus Alert
- Relations Between APIs in Malware
- Easy and simple way to analyze malwares
- PHP Malware
- Parite.B virus
- Help to identify packer
- AntiDebug using GetKeyboardState?
- Autorun Malware
- unpack exe4j
- Infected, lets chase.
- JAVA malware
- Just 4 question ?
- Debugging an .msi .dll
- Setting up a malware analysis environment
- huh!? freeserials.ws Serials + Trojans!?!?
- KAV malware naming issue (funny)
- MBR worm
- Analysis of compiler infector Induc
- How Find Temporal Order Of API calls in PEs?
- Aurora Example
- Malware which password protects office files
- FSG unpacker with command line support?
- Is this malware?
- Trojan monitoring almost every browser
- Buster Sandbox Analyzer
- Visual Basic Packer???
- yoda cryptor help.
- swf exploit
- URLANDEXIT tag in WMV
- RBoT Packer Issues
- Tips for thwarting VM detection
- Best place to submit a new threat?
- Java Host Virus
- ARTeam: Swimming into Trojan and Rootkit GameThief.Win32.Magania Hostile Code
- MALWARE 0day..fun
- tools from china ->heuristic virus detection (bdv)
- problem with resource section after unpacking
- Malware for analysis - "Michael Jackson Gay" virus (Yahoo messenger spammer)
- i wrote a game music unpacker
- How to extract java classes from executable.
- [Question] How can you dump virtually allocated memory ?
- I got Trojanned
- Virii but we dont care!!!
- PDF Exploit
- exploited pdf
- Malware creates new thread, how do I follow it?
- funny comics unpacking tut
- Please help analysing new SWF exploit!
- LHA encoding/decoding
- Unpacking a MoleBox 2.5.7
- Entropy visualization utilities for packed malware?
- Trojan type infection perhaps?
- CRC calculation
- tinyPE reversing
- CrypKey Instant 6.x -> CrypKey Inc.
- Got a virus - please help analysing
- Question about an algorithm
- Trying to ID the packing in a BIOS file
- ExeCryptor kioresk Tut about lic
- psyb0t
- SANS malware analysis article
- Execryptor EC functions
- Common Malicious API's
- obscure rootkit(?) offer fr infected user, kernel detective (long post)
- Pace Interlok (iLok)
- Researchers unveil persistent BIOS attack methods
- Extracting shellcode from office docs?
- winzix fun??
- thekeys.ws virus (don't know what it is)
- securom nag
- How to deal with polymorphic code
- Where to download malware?
- VB injects DELHPI ~;
- Undetected home work
- Rootkit.Win32.TDSS.eyj Another custom packer/cryptor
- AV Emulators not able to handle far jmp, yet.
- fun malware cryptor ~;
- "HOT URL!" your PC infected, install AV2009
- Another unknown packer in malware
- Malware packed with unknown packer
- Trojan.Win32.VB.jir - Automated Analysis tools Aware
- in VB6 malware \Device\PhysicalMemory?
- today's torrent-malware fight
- Malware refuses to run properly on VMWare
- what's packer of this malware code.
- Conficker dll analyse
- fun remote DLL loading found in malware :)
- Themida protected plugin dll
- Question about Rootkit Unhooker
- Poison-Ivy RAT Packed with Molebox
- Some VB malware
- IDA - Analyzing offset independent malware
- lil malware unpacking contest here!
- Armadillo Inline Patching problem
- SVCHOST.EXE under seige.
- SecuRom 7.30.0012
- XP AntiVirus 2009
- Armadillo OEP
- Malware Challenge Contest
- Armadillo 5.x 6.x IAT problem (oep OK)
- LINK: A Quick Survey on Automatic Unpacking Techniques
- Shellcode analyzing
- PDF_stream_inflater
- Disinfecting a program.
- Themida IAT rebuild for Hardware Dependancys targets
- does this tmp5.tmp install any driver
- unpacked Srizbi
- For you guys to solve out
- recombining functions split into 1-cmd-chunks
- strange AntivirusXP2008?
- Trojan.Win32.Agent.vie
- Packed Malware - Double Packed?
- Please Dump me , Please !
- TR/Crypt.XPACK.Gen - Trojan
- Trojan horse...a Hellenes poetic fancy !!
- Unpacking Storm Worm
- Inside Parite.B virus
- Analyzing Google toolbar requests
- Trojan made in C#
- SWF Encrypt explanation.
- lARP v2.0 Ultra
- a packed exe file, can't be loaded normally
- an arma question
- Run-time Detection of Self-Replication
- Malware analysis examples @ Websense
- eEye BootRoot
- OEP of Arm 1.xx to 2.x protected Targets
- Virtual environment to test CIH (A.K.A Chernobyl) virus?
- seems to some script kiddies autit v3 virus
- Computer Viruses as Artificial Life
- SSDT Hooking + AV
- How to find a suspectious program?
- JSTrojan downloader
- Execryptor + Ollydbg