<?xml version="1.0" encoding="UTF-8"?>
<!-- generator="wordpress.com" -->
<urlset xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xsi:schemaLocation="http://www.sitemaps.org/schemas/sitemap/0.9 http://www.sitemaps.org/schemas/sitemap/0.9/sitemap.xsd"><url><loc>https://evilcodeanalysis.com/2022/01/14/java-bytecode-for-fun-khonsari/</loc><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2022/01/classmodes.png</image:loc><image:title>classmodes</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2022/01/jbe.png</image:loc><image:title>jbe</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2022/01/static_bytecode.png</image:loc><image:title>static_bytecode</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2022/01/classes.png</image:loc><image:title>classes</image:title></image:image><lastmod>2023-01-01T01:52:41+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://evilcodeanalysis.com/2022/12/31/net-cil-for-fun/</loc><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2022/12/net.png</image:loc><image:title>net</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2022/12/java.png</image:loc><image:title>java</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2022/12/deob_str.png</image:loc><image:title>deob_str</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2022/12/new_code.png</image:loc><image:title>new_code</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2022/12/instr.png</image:loc><image:title>instr</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2022/12/epilogue.png</image:loc><image:title>epilogue</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2022/12/cajlqock.png</image:loc><image:title>cajlqock</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2022/12/deob2.png</image:loc><image:title>deob2</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2022/12/3.png</image:loc><image:title>3</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2022/12/4.png</image:loc><image:title>4</image:title></image:image><lastmod>2023-01-01T01:51:26+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://evilcodeanalysis.com/2021/04/02/potential-anti-analysis-with-xlm-now-function-icedid-delivery/</loc><lastmod>2021-04-04T04:20:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://evilcodeanalysis.com/2021/03/01/asyncrat-delivery-technique-10-minute-analysis/</loc><lastmod>2021-03-02T05:02:58+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://evilcodeanalysis.com/2020/01/01/backdooring-nsis-based-installer-a-cautionary-tale/</loc><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2020/01/feat.png</image:loc><image:title>feat</image:title></image:image><lastmod>2020-01-03T18:29:48+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://evilcodeanalysis.com/2019/10/02/api-address-resolution-emotet/</loc><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2019/10/crc_loop.png</image:loc><image:title>crc_loop</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2019/10/ldr_list.png</image:loc><image:title>ldr_list</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2019/10/peb.png</image:loc><image:title>peb</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2019/10/getpeb.png</image:loc><image:title>getpeb</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2019/10/resolvedlladdress.png</image:loc><image:title>resolvedlladdress</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2019/10/functioncall.png</image:loc><image:title>functioncall</image:title></image:image><lastmod>2019-12-23T16:43:04+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://evilcodeanalysis.com/2019/11/10/ta505-campaign-macro-analysis/</loc><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2019/11/screen-shot-2019-11-10-at-10.53.48-am.png</image:loc><image:title>Screen Shot 2019-11-10 at 10.53.48 AM</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2019/11/screen-shot-2019-11-10-at-10.50.40-am.png</image:loc><image:title>Screen Shot 2019-11-10 at 10.50.40 AM</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2019/11/ptrsafe.png</image:loc><image:title>ptrsafe</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2019/11/2compiler_error.png</image:loc><image:title>2compiler_error</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2019/11/1sem_code.png</image:loc><image:title>1sem_code</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2019/11/xls.png</image:loc><image:title>xls</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2019/11/page.png</image:loc><image:title>page</image:title></image:image><lastmod>2019-11-12T17:45:00+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://evilcodeanalysis.com/about/</loc><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/01/wp_20130601_030.jpg</image:loc><image:title>wp_20130601_030</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/01/stairs-lights-abstract-bubbles1.jpg</image:loc><image:title>Placeholder Image</image:title></image:image><lastmod>2019-10-03T01:49:39+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://evilcodeanalysis.com/2017/03/12/reversing-locky-osiris-part-ii/</loc><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/03/httprequest.png</image:loc><image:title>httprequest</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/03/encrypt_comm2.png</image:loc><image:title>encrypt_comm2</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/03/windowscheck.png</image:loc><image:title>windowscheck</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/03/mutexes.png</image:loc><image:title>mutexes</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/03/mutexfromcomputerid.png</image:loc><image:title>mutexfromcomputerid</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/03/crypthashdata_sub_1000701a.png</image:loc><image:title>crypthashdata_sub_1000701A</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/03/computerid.png</image:loc><image:title>computerid</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/03/sleep.png</image:loc><image:title>sleep</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/03/plan.png</image:loc><image:title>plan</image:title></image:image><lastmod>2017-03-15T03:05:23+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://evilcodeanalysis.com/2017/02/08/reversing-locky-osiris-part-i/</loc><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/02/ida_strings.png</image:loc><image:title>ida_strings</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/02/ida_imports.png</image:loc><image:title>ida_imports</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/02/ida_exports.png</image:loc><image:title>ida_exports</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/02/scylla6.png</image:loc><image:title>scylla6</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/02/scylla5.png</image:loc><image:title>scylla5</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/02/scylla4.png</image:loc><image:title>scylla4</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/02/scylla3.png</image:loc><image:title>scylla3</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/02/scylla2.png</image:loc><image:title>scylla2</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/02/scylla1.png</image:loc><image:title>scylla1</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/02/dump_ok.png</image:loc><image:title>dump_ok</image:title></image:image><lastmod>2019-03-29T23:53:51+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://evilcodeanalysis.com/2017/01/22/static-analysis-locky-osiris/</loc><lastmod>2017-02-09T18:19:25+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://evilcodeanalysis.com/2017/01/13/locky-osiris-properties/</loc><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/01/prochacker1.png</image:loc><image:title>prochacker</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/01/tempdir.png</image:loc><image:title>tempdir</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/01/strings2.png</image:loc><image:title>strings2</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/01/rundllpropertiesthreads.png</image:loc><image:title>rundllpropertiesthreads</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/01/prochacker.png</image:loc><image:title>prochacker</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/01/osirishtml.png</image:loc><image:title>osirishtml</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/01/osirisfiles.png</image:loc><image:title>osirisfiles</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/01/osiriscontent.png</image:loc><image:title>osiriscontent</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/01/oledump_stream_dump.png</image:loc><image:title>oledump_stream_dump</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/01/oledump.png</image:loc><image:title>oledump</image:title></image:image><lastmod>2017-02-09T17:40:55+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://evilcodeanalysis.com/2017/01/28/macros-locky-osiris/</loc><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/01/81.png</image:loc><image:title>8</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/01/8.png</image:loc><image:title>8</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/01/7.png</image:loc><image:title>7</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/01/6.png</image:loc><image:title>6</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/01/5.png</image:loc><image:title>5</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/01/41.png</image:loc><image:title>4</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/01/4.png</image:loc><image:title>4</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/01/3.png</image:loc><image:title>3</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/01/21.png</image:loc><image:title>2</image:title></image:image><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/01/2.png</image:loc><image:title>2</image:title></image:image><lastmod>2017-02-09T17:34:52+00:00</lastmod><changefreq>monthly</changefreq></url><url><loc>https://evilcodeanalysis.com/contact/</loc><image:image><image:loc>https://evilcodeanalysis.com/wp-content/uploads/2017/01/person-smartphone-office-table.jpeg</image:loc><image:title>Placeholder Image</image:title></image:image><lastmod>2017-01-14T15:37:04+00:00</lastmod><changefreq>weekly</changefreq><priority>0.6</priority></url><url><loc>https://evilcodeanalysis.com</loc><changefreq>daily</changefreq><priority>1.0</priority><lastmod>2023-01-01T01:52:41+00:00</lastmod></url></urlset>
