sha256 stringlengths 64 64 | func_addr stringlengths 7 10 | capa listlengths 1 24 | bytes stringlengths 2 521k | disasm listlengths 1 98.5k |
|---|---|---|---|---|
004a986f93f16fd4892b60889ea1f5b0f560b0dce3d81243aff25d6efb278170 | 0x41ce54 | [
"Get hostname",
"Get session user name"
] | 5381c4fcfeffff8bdac704240001000084c0740d548d44240850e8b97ffeffeb0b548d44240850e82c80feff8bc38d542404b900010000e84c6afeff81c4040100005bc3 | [
"push ebx",
"add esp, 0xfffffefc",
"mov ebx, edx",
"mov dword [esp], pe_nt_image_headers32",
"test al, al",
"je 0x41ce75",
"push esp",
"lea eax, [esp + 8]",
"push eax",
"call sub.advapi32.dll_GetUserNameA",
"jmp 0x41ce80",
"push esp",
"lea eax, [esp + 8]",
"push eax",
"call sub.kernel32.... |
004a986f93f16fd4892b60889ea1f5b0f560b0dce3d81243aff25d6efb278170 | 0x41ce98 | [
"Get common file path"
] | 5381c410fcffff8bda54506a00e82ad8ffff8d442404508b44240450e813d8ffff8b042450e8bed6ffff8bc38d542404b9e9030000e80a6afeff81c4f00300005bc3 | [
"push ebx",
"add esp, 0xfffffc10",
"mov ebx, edx",
"push esp",
"push eax",
"push 0",
"call sub.shell32.dll_SHGetSpecialFolderLocation",
"lea eax, [esp + 4]",
"push eax",
"mov eax, dword [esp + 4]",
"push eax",
"call sub.shell32.dll_SHGetPathFromIDListA",
"mov eax, dword [esp]",
"push eax",... |
004a986f93f16fd4892b60889ea1f5b0f560b0dce3d81243aff25d6efb278170 | 0x41e80c | [
"Create process on windows"
] | 558bec83c4b053565733d28955f48955f08955ec8845ff33c05568ebe9410064ff30648920a1f88742008b008b90e4000000a104a042008b405ce821d0feffa1408842008b00e80dd5feffb828000000e8d74200008bf84f85ff0f8c640100004733db8bf303f68d3476a1f48742008b008b44b010e87aeefeff33d28a55ff3bc20f8535010000a1f48742008b008b44b0048d4df433d2e8d8ebffffa1f48742... | [
"push ebp",
"mov ebp, esp",
"add esp, 0xffffffb0",
"push ebx",
"push esi",
"push edi",
"xor edx, edx",
"mov dword [ebp - 0xc], edx",
"mov dword [ebp - 0x10], edx",
"mov dword [ebp - 0x14], edx",
"mov byte [ebp - 1], al",
"xor eax, eax",
"push ebp",
"push 0x41e9eb",
"push dword fs:[eax]",... |
004a986f93f16fd4892b60889ea1f5b0f560b0dce3d81243aff25d6efb278170 | 0x41eecc | [
"Delete file"
] | 5383c4f08bd8833d2ca04200007e10a138a04200e80f4cfeff50e8995ffeff8bc3e82ebcfeff8904248b0424baa0ef4100e8667bfeffb875000000e82c3c00003b052ca042007515b876000000e81a3c000099894424088954240ceb13b85f000000e8053c000099894424088954240c833d34a04200017526b85f000000e8e93b00008bd00faf152ca04200a12c8842000310a130a0420033c9e8e57bfeffff... | [
"push ebx",
"add esp, 0xfffffff0",
"mov ebx, eax",
"cmp dword [0x42a02c], 0",
"jle 0x41eeeb",
"mov eax, dword [0x42a038]",
"call fcn.00403af4",
"push eax",
"call sub.kernel32.dll_DeleteFileA",
"mov eax, ebx",
"call fcn.0040ab20",
"mov dword [esp], eax",
"mov eax, dword [esp]",
"mov edx, 0x... |
004a986f93f16fd4892b60889ea1f5b0f560b0dce3d81243aff25d6efb278170 | 0x41f208 | [
"Check if file exists",
"Delete file",
"Get file attributes",
"Set file attributes"
] | 558bec83c4d853565733db895dd8895ddc8bf28d7de4a5a5894df48bf033c05568c6f3410064ff30648920c645e3018d04768b155c8842008b128b04828d4ddc33d2e831e2ffff8b55dc8b45f4e88e44feff8b45f48b00e89048feff50e85a5cfeff8bd883fbff0f84e8000000f6c3100f85df0000006a0068800000006a036a006a0068000000808b45f48b00e85a48feff50e8dc5bfeff8bf88d45ec506a00... | [
"push ebp",
"mov ebp, esp",
"add esp, 0xffffffd8",
"push ebx",
"push esi",
"push edi",
"xor ebx, ebx",
"mov dword [ebp - 0x28], ebx",
"mov dword [ebp - 0x24], ebx",
"mov esi, edx",
"lea edi, [ebp - 0x1c]",
"movsd dword es:[edi], dword [esi]",
"movsd dword es:[edi], dword [esi]",
"mov dword... |
004a986f93f16fd4892b60889ea1f5b0f560b0dce3d81243aff25d6efb278170 | 0x41f594 | [
"Delete file",
"Set file attributes"
] | 558bec83c4bc53565733d28955bc8955c48955c08955c88955cc8955d08955e08bd833c05568c8f8410064ff30648920c70534a0420001000000b870a04200e8bc40feffa1f88742008b008b90cc0000008b435ce87fc2feffa1408842008b00e86bc7feff8d55d033c0e88d63feff8b45d0e8edb4feffa330a04200a1608842008038000f84a000000033c0a32ca04200c70568a0420000000000c7056ca042... | [
"push ebp",
"mov ebp, esp",
"add esp, 0xffffffbc",
"push ebx",
"push esi",
"push edi",
"xor edx, edx",
"mov dword [ebp - 0x44], edx",
"mov dword [ebp - 0x3c], edx",
"mov dword [ebp - 0x40], edx",
"mov dword [ebp - 0x38], edx",
"mov dword [ebp - 0x34], edx",
"mov dword [ebp - 0x30], edx",
"... |
004a986f93f16fd4892b60889ea1f5b0f560b0dce3d81243aff25d6efb278170 | 0x420704 | [
"Create process on windows",
"Hide graphical window",
"Set current directory",
"Shutdown system"
] | 558bec83c4b053565733d28955b08955b48955b88955bc8955c08955f08955ec8bf033c055680911420064ff3064892033c0a0ac8742008b1558a042008a1c0280fb020f94c28b86e40000008b08ff510884db760580fb09720433c0eb02b0018845ff8b46208a55ffe87eb1feff8b46308a55ffe873b1feff803dac874200000f97c28b4630e8b1acfeff8b86a40000008a55ffe853b1feff8b86a80000008a... | [
"push ebp",
"mov ebp, esp",
"add esp, 0xffffffb0",
"push ebx",
"push esi",
"push edi",
"xor edx, edx",
"mov dword [ebp - 0x50], edx",
"mov dword [ebp - 0x4c], edx",
"mov dword [ebp - 0x48], edx",
"mov dword [ebp - 0x44], edx",
"mov dword [ebp - 0x40], edx",
"mov dword [ebp - 0x10], edx",
"... |
004a986f93f16fd4892b60889ea1f5b0f560b0dce3d81243aff25d6efb278170 | 0x422c0c | [
"Delete directory",
"Delete file"
] | 558bec33c951515151515356578bd833c05568e52c420064ff3064892033ff8d4dfc33d28bc7e811ffffff8b45fce8b50efeff50e83f22feff4783ff1275e084db7453b81a000000e8dffeffff8bf083c61483ee147c3f46bf140000008d4df833d28bc7e8d3feffff8b45f8e8770efeff50e80122feff8d4df48d471e33d2e8b8feffff8b45f4e85c0efeff50e8e621feff474e75c78d4dec33d2b801000000... | [
"push ebp",
"mov ebp, esp",
"xor ecx, ecx",
"push ecx",
"push ecx",
"push ecx",
"push ecx",
"push ecx",
"push ebx",
"push esi",
"push edi",
"mov ebx, eax",
"xor eax, eax",
"push ebp",
"push 0x422ce5",
"push dword fs:[eax]",
"mov dword fs:[eax], esp",
"xor edi, edi",
"lea ecx, [eb... |
004a986f93f16fd4892b60889ea1f5b0f560b0dce3d81243aff25d6efb278170 | 0x42307c | [
"Compare security identifiers"
] | 53565783c4f0c60424008d442404506aff6a08e83c17feff50e8e616feff8bd885db7520e84b17feff3df003000075148d442404506a08e81017feff50e8ba16feff8bd885db0f848f000000b800040000e85ef7fdff8bf08d442408506800040000566a028b44241450e88516feff8bd88b44240450e89916feff85db74558d44240c506a006a006a006a006a006a0068200200006a206a0268d0874200e839... | [
"push ebx",
"push esi",
"push edi",
"add esp, 0xfffffff0",
"mov byte [esp], 0",
"lea eax, [esp + 4]",
"push eax",
"push 0xffffffffffffffff",
"push 8",
"call sub.kernel32.dll_GetCurrentThread",
"push eax",
"call sub.advapi32.dll_OpenThreadToken",
"mov ebx, eax",
"test ebx, ebx",
"jne 0x42... |
004a986f93f16fd4892b60889ea1f5b0f560b0dce3d81243aff25d6efb278170 | 0x423450 | [
"Enumerate gui resources"
] | 558bec83c4f85333d28955f88945fc8b45fce87d06feff33c05568c134420064ff306489208d55f88b45fce83475feff8b55f8b8dca04200e85b02feff33c0a3d8a042006a006864334200e87815feff8b1dd8a0420033c05a595964891068c83442008d45f8ba02000000e8f801feffc3 | [
"push ebp",
"mov ebp, esp",
"add esp, 0xfffffff8",
"push ebx",
"xor edx, edx",
"mov dword [ebp - 8], edx",
"mov dword [ebp - 4], eax",
"mov eax, dword [ebp - 4]",
"call fcn.00403ae4",
"xor eax, eax",
"push ebp",
"push 0x4234c1",
"push dword fs:[eax]",
"mov dword fs:[eax], esp",
"lea edx,... |
004a986f93f16fd4892b60889ea1f5b0f560b0dce3d81243aff25d6efb278170 | 0x4234d0 | [
"Terminate process"
] | 535657518bf033db85f67905e833f8fdff566aff68ff0f1f00e85a13feff8bf885ff7905e81bf8fdff548bf785f67905e80ff8fdff56e8cd12feff85ff74198b04245085ff7905e8f8f7fdff56e86613feff83f8011bdb4385ff7905e8e3f7fdff56e85912feff8bc35a5f5e5bc3 | [
"push ebx",
"push esi",
"push edi",
"push ecx",
"mov esi, eax",
"xor ebx, ebx",
"test esi, esi",
"jns 0x4234e1",
"call fcn.00402d14",
"push esi",
"push 0xffffffffffffffff",
"push 0x1f0fff",
"call sub.kernel32.dll_OpenProcess",
"mov edi, eax",
"test edi, edi",
"jns 0x4234f9",
"call fc... |
004a986f93f16fd4892b60889ea1f5b0f560b0dce3d81243aff25d6efb278170 | 0x423840 | [
"Accept command line arguments",
"Create process on windows"
] | 558becb91f0000006a006a004975f9515356578945fc33c05568e750420064ff306489208d55d0b801000000e81f21feff8b45d0ba00514200e8c201feff75116a016808514200e80c10feffe80bfdfdff8d4dc833d233c0e8abf2ffff8b45c88d55cce8e423feff8b45cce83424feff8d55c433c0e8d620feff8b45c4e83672feff8945f08b45f0b102badcffffffe87c32feffbab4a042008b45f0b9080000... | [
"push ebp",
"mov ebp, esp",
"mov ecx, 0x1f",
"push 0",
"push 0",
"dec ecx",
"jne 0x423848",
"push ecx",
"push ebx",
"push esi",
"push edi",
"mov dword [ebp - 4], eax",
"xor eax, eax",
"push ebp",
"push 0x4250e7",
"push dword fs:[eax]",
"mov dword fs:[eax], esp",
"lea edx, [ebp - 0x... |
005360f36d6b7bf31717fb5ba88f844bdf5455dfbd9f84894a8c1e53f7f5ef51 | 0x4011e0 | [
"Encode data using add xor sub operations",
"Encode data using xor"
] | 558bec535657c1cef4f7da81c7b1000000c1c75f83c26fc1c00dc1d7170fcac1c63df7e8f7ee81c2a9000000f7dff7def7d247f7d2f7dfc1daa0f7db400fce83eb0ec1c22c0dd900000081cb8e000000c1c0dbc1c8a5c1ca4a0fce81c399000000c1ce11f7ee0fcbf7e8c1c24583c6294642c1dfa8c1cfc24081c69a00000083c35d1dc600000081dac7000000f7d8f7d681e7a8000000f7d233c933ff81c7e8... | [
"push ebp",
"mov ebp, esp",
"push ebx",
"push esi",
"push edi",
"ror esi, 0xf4",
"neg edx",
"add edi, 0xb1",
"rol edi, 0x5f",
"add edx, 0x6f",
"rol eax, 0xd",
"rcl edi, 0x17",
"bswap edx",
"rol esi, 0x3d",
"imul eax",
"imul esi",
"add edx, 0xa9",
"neg edi",
"neg esi",
"not edx"... |
005360f36d6b7bf31717fb5ba88f844bdf5455dfbd9f84894a8c1e53f7f5ef51 | 0x405d83 | [
"Link many functions at runtime"
] | 8bff558bec83ec14535657e8dfeeffff8365fc00833d60e24000008bd80f858e00000068dcb84000ff1518b040008bf885ff0f842a0100008b3514b0400068d0b8400057ffd685c00f841401000050e829eeffffc70424c0b8400057a360e24000ffd650e814eeffffc70424acb8400057a364e24000ffd650e8ffedffffc7042490b8400057a368e24000ffd650e8eaedffff59a370e2400085c074146878b8... | [
"mov edi, edi",
"push ebp",
"mov ebp, esp",
"sub esp, 0x14",
"push ebx",
"push esi",
"push edi",
"call fcn.00404c72",
"and dword [ebp - 4], 0",
"cmp dword [0x40e260], 0",
"mov ebx, eax",
"jne 0x405e34",
"push str.USER32.DLL",
"call dword [sym.imp.KERNEL32.dll_LoadLibraryA]",
"mov edi, ea... |
005360f36d6b7bf31717fb5ba88f844bdf5455dfbd9f84894a8c1e53f7f5ef51 | 0x407889 | [
"Terminate process"
] | 3b0d08da40007502f3c3e9ed140000 | [
"cmp ecx, dword [0x40da08]",
"jne 0x407893",
"repz ret",
"jmp fcn.00408d85"
] |
00594ca41fa14c153261faf52ab2eac2d2d554028b4c3925cb603c25674b9689 | 0x403d61 | [
"Encode data using xor"
] | 5053b899040000b9984440008a1980ebf2c0c30228cbc0cb018819494875edb81d260000b9643740008a19c0c307c0cb0228cb80f3918819494875ed5b5881c11a2c0000ffe1 | [
"push eax",
"push ebx",
"mov eax, 0x499",
"mov ecx, 0x404498",
"mov bl, byte [ecx]",
"sub bl, 0xf2",
"rol bl, 2",
"sub bl, cl",
"ror bl, 1",
"mov byte [ecx], bl",
"dec ecx",
"dec eax",
"jne 0x403d6d",
"mov eax, 0x261d",
"mov ecx, 0x403764",
"mov bl, byte [ecx]",
"rol bl, 7",
"ror b... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x402e0c | [
"Accept command line arguments"
] | 535681c4f4feffff8bda8bf08bc3e87916000085f6752068050100008d442408506a00e848e4ffff8bc88d5424048bc3e847170000eb21e824e4ffff8904248bd38b0424e853feffff89042485f67408833b0074034eebe781c40c0100005e5bc3 | [
"push ebx",
"push esi",
"add esp, 0xfffffef4",
"mov ebx, edx",
"mov esi, eax",
"mov eax, ebx",
"call fcn.00404498",
"test esi, esi",
"jne 0x402e43",
"push 0x105",
"lea eax, [esp + 8]",
"push eax",
"push 0",
"call sub.kernel32.dll_GetModuleFileNameA",
"mov ecx, eax",
"lea edx, [esp + 4]... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x403538 | [
"Query or enumerate registry value"
] | 558bec83c4f40fb70520d048008945f88d45fc506a016a0068d03540006802000080e875ddffff85c0754d33c05568a935400064ff30648920c745f4040000008d45f4508d45f8506a006a0068ec3540008b45fc50e84addffff33c05a595964891068b03540008b45fc50e824ddffffc366a120d048006625c0ff668b55f86683e23f660bc266a320d048008be55dc3 | [
"push ebp",
"mov ebp, esp",
"add esp, 0xfffffff4",
"movzx eax, word [0x48d020]",
"mov dword [ebp - 8], eax",
"lea eax, [ebp - 4]",
"push eax",
"push 1",
"push 0",
"push 0x4035d0",
"push 0x80000002",
"call sub.advapi32.dll_RegOpenKeyExA",
"test eax, eax",
"jne 0x4035b0",
"xor eax, eax",
... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x404314 | [
"Write file on windows"
] | 51803d4c00490000745766813d20024900b2d77514833d2802490000760bb81c024900ff15380249006a008d442404506a1e686cd048006af5e8c2ceffff50e8dcceffff6a008d442404506a02689c4340006af5e8a7ceffff50e8c1ceffff5ac3803d30d048000075136a006864d04800686cd048006a00e8bbceffff5ac3 | [
"push ecx",
"cmp byte [0x49004c], 0",
"je 0x404375",
"cmp word [0x490220], 0xd7b2",
"jne 0x40433d",
"cmp dword [0x490228], 0",
"jbe 0x40433d",
"mov eax, 0x49021c",
"call dword [0x490238]",
"push 0",
"lea eax, [esp + 4]",
"push eax",
"push 0x1e",
"push 0x48d06c",
"push 0xfffffffffffffff5"... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x405a48 | [
"Get geographical location",
"Query or enumerate registry value"
] | 558bec81c4dcfeffff538945fc68050100008d85dffeffff506a00e814b8ffffc645ee008d45f8506819000f006a00688c5c40006801000080e84eb8ffff85c074408d45f8506819000f006a00688c5c40006802000080e830b8ffff85c074228d45f8506819000f006a0068a85c40006801000080e812b8ffff85c00f858900000033c055684c5b400064ff30648920c745e8050000008d85dffeffffba0501... | [
"push ebp",
"mov ebp, esp",
"add esp, 0xfffffedc",
"push ebx",
"mov dword [ebp - 4], eax",
"push 0x105",
"lea eax, [ebp - 0x121]",
"push eax",
"push 0",
"call sub.kernel32.dll_GetModuleFileNameA",
"mov byte [ebp - 0x12], 0",
"lea eax, [ebp - 8]",
"push eax",
"push 0xf0019",
"push 0",
"... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x4063d0 | [
"Get geographical location"
] | 558bec83c4f05333d28955f033d255683664400064ff326489226a078d55f552680410000050e879aeffff8d45f08d55f5b907000000e8fde2ffff8b45f08d55fce8e6ccffff8bd8837dfc00740233db33c05a5959648910683d6440008d45f0e863e0ffffc3 | [
"push ebp",
"mov ebp, esp",
"add esp, 0xfffffff0",
"push ebx",
"xor edx, edx",
"mov dword [ebp - 0x10], edx",
"xor edx, edx",
"push ebp",
"push 0x406436",
"push dword fs:[edx]",
"mov dword fs:[edx], esp",
"push 7",
"lea edx, [ebp - 0xb]",
"push edx",
"push 0x1004",
"push eax",
"call ... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x408f0c | [
"Check if file exists",
"Get file attributes"
] | 538bd88bc3e842baffff50e828daffff83f8ff7404a810750433c05bc3b0015bc3 | [
"push ebx",
"mov ebx, eax",
"mov eax, ebx",
"call fcn.00404958",
"push eax",
"call sub.kernel32.dll_GetFileAttributesA",
"cmp eax, 0xffffffff",
"je 0x408f25",
"test al, 0x10",
"jne 0x408f29",
"xor eax, eax",
"pop ebx",
"ret",
"mov al, 1",
"pop ebx",
"ret"
] |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x40ba9c | [
"Get geographical location"
] | 558bec81c400ffffff53568bf18b5d0868000100008d8d00ffffff515250e8adaeffff85c07e128bc8498d9500ffffff8bc3e8b58affffeb098bc38bd6e80e8affff5e5b8be55dc20400 | [
"push ebp",
"mov ebp, esp",
"add esp, 0xffffff00",
"push ebx",
"push esi",
"mov esi, ecx",
"mov ebx, dword [ebp + 8]",
"push pe_nt_image_headers32",
"lea ecx, [ebp - 0x100]",
"push ecx",
"push edx",
"push eax",
"call sub.kernel32.dll_GetLocaleInfoA_1",
"test eax, eax",
"jle 0x40bad5",
... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x40bae8 | [
"Get geographical location"
] | 535657518bd98bf28bf86a028d442404505657e86caeffff85c07e058a0424eb028bc35a5f5e5bc3 | [
"push ebx",
"push esi",
"push edi",
"push ecx",
"mov ebx, ecx",
"mov esi, edx",
"mov edi, eax",
"push 2",
"lea eax, [esp + 4]",
"push eax",
"push esi",
"push edi",
"call sub.kernel32.dll_GetLocaleInfoA_1",
"test eax, eax",
"jle 0x40bb09",
"mov al, byte [esp]",
"jmp 0x40bb0b",
"mov ... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x40c1a0 | [
"Write file on windows"
] | 81c4bcfbffff68000400008d4c2448e854feffffa1a0f34800803800745ea1d0f04800e8646dffffe8076affff8d442444508d44244850e898abffff6a008d442404508d44244ce858d0ffff508d442450506af4e893a7ffff50e8d5a8ffff6a008d442404506a026864c240006af4e878a7ffff50e8baa8ffffeb366a408d44240850a160f048008b400450a168064900e8c695ffff50e858aeffff68102000... | [
"add esp, 0xfffffbbc",
"push 0x400",
"lea ecx, [esp + 0x48]",
"call 0x40c008",
"mov eax, dword [0x48f3a0]",
"cmp byte [eax], 0",
"je 0x40c21c",
"mov eax, dword [0x48f0d0]",
"call fcn.00402f2c",
"call fcn.00402bd4",
"lea eax, [esp + 0x44]",
"push eax",
"lea eax, [esp + 0x48]",
"push eax",
... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x40cb2c | [
"Get file version info"
] | 558bec83c4e85333d28955f88bd833c0556802cc400064ff30648920c745fcffffffff8d45f88bd3e8d779ffff8d45f8e8477effff8d45f4508b45f8e8eb7dffff50e8819fffff8bd885db74738bc3e8c85effff8945f033c05568e5cb400064ff306489208b45f050538b45f4508b45f8e8b67dffff50e8449fffff85c074238d45e8508d45ec506814cc40008b45f050e83a9fffff85c074098b45ec8b4008... | [
"push ebp",
"mov ebp, esp",
"add esp, 0xffffffe8",
"push ebx",
"xor edx, edx",
"mov dword [ebp - 8], edx",
"mov ebx, eax",
"xor eax, eax",
"push ebp",
"push 0x40cc02",
"push dword fs:[eax]",
"mov dword fs:[eax], esp",
"mov dword [ebp - 4], 0xffffffff",
"lea eax, [ebp - 8]",
"mov edx, ebx... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x40d21c | [
"Get geographical location"
] | 558bec83c4f45333d28955f433d2556880d2400064ff326489226a078d55f952680410000050e82597ffff8d45f48d55f9b907000000e8b174ffff8b45f450e8a496ffff8bd058e8dcb7ffff8bd833c05a59596489106887d240008d45f4e81972ffffc3 | [
"push ebp",
"mov ebp, esp",
"add esp, 0xfffffff4",
"push ebx",
"xor edx, edx",
"mov dword [ebp - 0xc], edx",
"xor edx, edx",
"push ebp",
"push 0x40d280",
"push dword fs:[edx]",
"mov dword fs:[edx], esp",
"push 7",
"lea edx, [ebp - 7]",
"push edx",
"push 0x1004",
"push eax",
"call sub... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x40e05c | [
"Query environment variable"
] | 5356575581c400fcffff8bf28bf88bc6e82764ffff68000400008d442404508bc7e8d668ffff8be855e8b288ffff8bd881fb000400007d0d8bd48bc68bcbe8e964ffffeb198bd34a8bc6e8396affff538b06e8a568ffff5055e88288ffff81c4000400005d5f5e5bc3 | [
"push ebx",
"push esi",
"push edi",
"push ebp",
"add esp, 0xfffffc00",
"mov esi, edx",
"mov edi, eax",
"mov eax, esi",
"call fcn.00404498",
"push 0x400",
"lea eax, [esp + 4]",
"push eax",
"mov eax, edi",
"call fcn.00404958",
"mov ebp, eax",
"push ebp",
"call sub.kernel32.dll_GetEnvir... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x422858 | [
"Allocate or change rwx memory"
] | 558bec535657bf88084900833f00756c6a40680010000068001000006a00e84142feff8bf0a18408490089068d5604b8a4d44800b902000000e8d203feffba302842008d4605e8adffffff8946068d5e0ac603e88d56048bc3e89affffff8943018b07894305891f83c30d8bc32bc63dfc0f00007cdb8935840849008b078b1f8b530589178b55088953058b550c8953095f5e5b5dc20800 | [
"push ebp",
"mov ebp, esp",
"push ebx",
"push esi",
"push edi",
"mov edi, 0x490888",
"cmp dword [edi], 0",
"jne 0x4228d4",
"push 0x40",
"push 0x1000",
"push 0x1000",
"push 0",
"call sub.kernel32.dll_VirtualAlloc_1",
"mov esi, eax",
"mov eax, dword [0x490884]",
"mov dword [esi], eax",
... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x423e68 | [
"Encode data using xor"
] | 89d189c231c066c1c0053202424975f6c3 | [
"mov ecx, edx",
"mov edx, eax",
"xor eax, eax",
"rol ax, 5",
"xor al, byte [edx]",
"inc edx",
"dec ecx",
"jne 0x423e6e",
"ret"
] |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x4263ec | [
"Get system information on windows"
] | 558bec83c4d48955f88945fc8d45d450e8a305feff8b55fc8b4df84978338d45d4668378200374108b048a0fc8c1e80889048a4979f2eb195331db8b048a88c788e3c1e810c1e30888c3891c8a4979e95b8be55dc3 | [
"push ebp",
"mov ebp, esp",
"add esp, 0xffffffd4",
"mov dword [ebp - 8], edx",
"mov dword [ebp - 4], eax",
"lea eax, [ebp - 0x2c]",
"push eax",
"call sub.kernel32.dll_GetSystemInfo",
"mov edx, dword [ebp - 4]",
"mov ecx, dword [ebp - 8]",
"dec ecx",
"js 0x42643d",
"lea eax, [ebp - 0x2c]",
... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x429140 | [
"Capture screenshot"
] | 558bec81c468ffffff535657894df48955f88945fc33c08945f08b450c83781800741a8b450c83781c000f84250600008b450c837820000f84180600008b450c83781800751a8b450c837804000f84020600008b450c837808000f84f50500008b45fce854fbffff33c0894590837dfc00741c8d8578ffffff506a548b45fc50e83fdafdff83f8187d05e809ccffff6a00e8f6dcfdffe81dcdffff8945e88b45... | [
"push ebp",
"mov ebp, esp",
"add esp, 0xffffff68",
"push ebx",
"push esi",
"push edi",
"mov dword [ebp - 0xc], ecx",
"mov dword [ebp - 8], edx",
"mov dword [ebp - 4], eax",
"xor eax, eax",
"mov dword [ebp - 0x10], eax",
"mov eax, dword [ebp + 0xc]",
"cmp dword [eax + 0x18], 0",
"je 0x42917... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x42f808 | [
"Open clipboard",
"Write clipboard data"
] | 558bec83c4f45356578955fc8b45fce82c51fdff33c0556838f9420064ff306489206a00e89b78fdff85c00f84d200000033c0556804f9420064ff306489208b45fce8094ffdff40506802200000e88971fdff8945f833c05568d9f8420064ff306489208b45f850e88f71fdff8945f433c05568c8f8420064ff306489208b45fce8ca4efdff40508b45fce8c050fdff8b55f459e8c733fdffe88e75fdff8b45... | [
"push ebp",
"mov ebp, esp",
"add esp, 0xfffffff4",
"push ebx",
"push esi",
"push edi",
"mov dword [ebp - 4], edx",
"mov eax, dword [ebp - 4]",
"call fcn.00404948",
"xor eax, eax",
"push ebp",
"push 0x42f938",
"push dword fs:[eax]",
"mov dword fs:[eax], esp",
"push 0",
"call sub.user32.... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x42f948 | [
"Contain obfuscated stackstrings"
] | 558bec83c48c53565733c9894d90894d8c894de4894dec894de8894df0894df8894df48955fc8bd833c05568f9fa420064ff306489208d4df0ba1b000000b02de8bb51fdff8b55f08d45f8b910fb4200e8074efdff8bc3e84824ffff8bf84f85ff7c554733f68bd68bc3e80924ffff8b15ec1c4400e8a23efdff84c07436ff75f48bd68bc3e8ee23ffff8d55ece88a720200ff75ec8d4de8ba03000000b020e8... | [
"push ebp",
"mov ebp, esp",
"add esp, 0xffffff8c",
"push ebx",
"push esi",
"push edi",
"xor ecx, ecx",
"mov dword [ebp - 0x70], ecx",
"mov dword [ebp - 0x74], ecx",
"mov dword [ebp - 0x1c], ecx",
"mov dword [ebp - 0x14], ecx",
"mov dword [ebp - 0x18], ecx",
"mov dword [ebp - 0x10], ecx",
"... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x434494 | [
"Query or enumerate registry value"
] | 558bec83c4f45356578bf98bf28bd833c08945fc8d450c50578d45fc506a008bc6e89e04fdff508b430450e89023fdff85c074248975f4c645f80b8d45f4506a008b0d24f54800b201a14c404300e89d7efdffe8c0f9fcff8b5d0c8b45fce85dfcffff8b550888028bc35f5e5b8be55dc20800 | [
"push ebp",
"mov ebp, esp",
"add esp, 0xfffffff4",
"push ebx",
"push esi",
"push edi",
"mov edi, ecx",
"mov esi, edx",
"mov ebx, eax",
"xor eax, eax",
"mov dword [ebp - 4], eax",
"lea eax, [ebp + 0xc]",
"push eax",
"push edi",
"lea eax, [ebp - 4]",
"push eax",
"push 0",
"mov eax, e... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x444960 | [
"Enumerate gui resources"
] | c6400c00c6400d0033d28950045068ac484400e8ec24fcffc3 | [
"mov byte [eax + 0xc], 0",
"mov byte [eax + 0xd], 0",
"xor edx, edx",
"mov dword [eax + 4], edx",
"push eax",
"push 0x4448ac",
"call sub.user32.dll_EnumWindows",
"ret"
] |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x444a80 | [
"Check for time delay via gettickcount"
] | 558bec6a0053568bf033c05568fd4a440064ff306489208bc6e842faffffe8191ffcff8bd86a00e80020fcffe80b1ffcff2bc33de803000076eb8d4dfc33d28bc6e81af6ffff837dfc00741b6a006a098b45fce880fefbff508b461c8b10ff520c50e86d27fcff33c05a595964891068044b44008d45fce89cf9fbffc3 | [
"push ebp",
"mov ebp, esp",
"push 0",
"push ebx",
"push esi",
"mov esi, eax",
"xor eax, eax",
"push ebp",
"push 0x444afd",
"push dword fs:[eax]",
"mov dword fs:[eax], esp",
"mov eax, esi",
"call fcn.004444e0",
"call sub.kernel32.dll_GetTickCount",
"mov ebx, eax",
"push 0",
"call sub.... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x446da8 | [
"Log keystrokes via polling"
] | 53568bf08a1df86d440066f7c60400740380cb0166f7c60800740380cb0466f7c60100740380cb0866f7c60200740380cb1066f7c61000740380cb206a12e81901fcff6685c07d0380cb028bc35e5bc3 | [
"push ebx",
"push esi",
"mov esi, eax",
"mov bl, byte [0x446df8]",
"test si, 4",
"je 0x446dbc",
"or bl, 1",
"test si, 8",
"je 0x446dc6",
"or bl, 4",
"test si, 1",
"je 0x446dd0",
"or bl, 8",
"test si, 2",
"je 0x446dda",
"or bl, 0x10",
"test si, 0x10",
"je 0x446de4",
"or bl, 0x20",... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x446dfc | [
"Log keystrokes via polling"
] | 53568bf08a1d346e44006a10e8f700fcff6685c07d0380cb016a11e8e800fcff6685c07d0380cb04f7c600000020740380cb028bc35e5bc3 | [
"push ebx",
"push esi",
"mov esi, eax",
"mov bl, byte [0x446e34]",
"push 0x10",
"call sub.user32.dll_GetKeyState",
"test ax, ax",
"jge 0x446e15",
"or bl, 1",
"push 0x11",
"call sub.user32.dll_GetKeyState",
"test ax, ax",
"jge 0x446e24",
"or bl, 4",
"test esi, 0x20000000",
"je 0x446e2f"... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x44d4f8 | [
"Get keyboard layout"
] | 558bec51535684d2740883c4f0e83a65fbff8855ff8bd833d28bc3e8b042fdffa170f04800895804c7009cd84400a17cf04800895804c700a8d844008bc3e8790300006a00e8ca99fbff89433cb201a1046b4100e84b61fbff89434cb201a1046b4100e83c61fbff894350b201a1046b4100e82d61fbff894354b201a1046b4100e81e61fbff894358b201a1046b4100e80f61fbff89437c6a00e83599fbff8b... | [
"push ebp",
"mov ebp, esp",
"push ecx",
"push ebx",
"push esi",
"test dl, dl",
"je 0x44d50a",
"add esp, 0xfffffff0",
"call fcn.00403a44",
"mov byte [ebp - 1], dl",
"mov ebx, eax",
"xor edx, edx",
"mov eax, ebx",
"call fcn.004217c8",
"mov eax, dword [0x48f070]",
"mov dword [eax + 4], eb... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x44da1c | [
"Get keyboard layout",
"Query or enumerate registry value"
] | 558bec81c4a0fdffff5333d28995a0fdffff8945fc33c05568c7db440064ff306489208b45fc837834000f855c010000b201a168714100e8445cfbff8b55fc8942348b45fc83c038e82f6afbff8d85ecfeffff506a40e89d94fbff4885c00f8c17010000408945f08d85ecfeffff8945ec8b45ec8b00e83547010084c00f84eb0000008d45f45068190002006a006a008b45ec8b008985a4fdffffc685a8fdff... | [
"push ebp",
"mov ebp, esp",
"add esp, 0xfffffda0",
"push ebx",
"xor edx, edx",
"mov dword [ebp - 0x260], edx",
"mov dword [ebp - 4], eax",
"xor eax, eax",
"push ebp",
"push 0x44dbc7",
"push dword fs:[eax]",
"mov dword fs:[eax], esp",
"mov eax, dword [ebp - 4]",
"cmp dword [eax + 0x34], 0",... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x44e558 | [
"Create thread",
"Set global application hook"
] | 51a1500b490080b8a5000000007562833d680b490000751ae8af83fbff506a00b814e54400506a03e8678cfbffa3680b4900833d640b49000075126a006a006a006a00e8d482fbffa3640b4900833d6c0b490000751b546a006a0068b8e4440068e80300006a00e8c882fbffa36c0b49005ac3 | [
"push ecx",
"mov eax, dword [0x490b50]",
"cmp byte [eax + 0xa5], 0",
"jne 0x44e5c9",
"cmp dword [0x490b68], 0",
"jne 0x44e58a",
"call sub.kernel32.dll_GetCurrentThreadId_1",
"push eax",
"push 0",
"mov eax, 0x44e514",
"push eax",
"push 3",
"call sub.user32.dll_SetWindowsHookExA",
"mov dword... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x44ec5c | [
"Enumerate gui resources"
] | 535683c4f88bd8a1500b4900837830000f849400000083bb94000000000f85810000008b4330890424885424048bc45068eceb4400e8ce81fbff8b839000000083780800745e6a038b44240450e81683fbff8bf08934246aec56e81983fbffa8087407c70424feffffff8b83900000008b70084e83fe007c2b68130200006a006a006a006a008b442414508bd68b8390000000e894a6fcff50e8e284fbff4e83... | [
"push ebx",
"push esi",
"add esp, 0xfffffff8",
"mov ebx, eax",
"mov eax, dword [0x490b50]",
"cmp dword [eax + 0x30], 0",
"je 0x44ed06",
"cmp dword [ebx + 0x94], 0",
"jne 0x44ed00",
"mov eax, dword [ebx + 0x30]",
"mov dword [esp], eax",
"mov byte [esp + 4], dl",
"mov eax, esp",
"push eax",
... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x44f864 | [
"Get graphical window text"
] | 535681c400ffffff8bf28bd880bba400000000742068000100008d442404508b433050e86077fbff8bc88bd48bc6e8f14cfbffeb0d8bc68b938c000000e8464cfbff81c4000100005e5bc3 | [
"push ebx",
"push esi",
"add esp, 0xffffff00",
"mov esi, edx",
"mov ebx, eax",
"cmp byte [ebx + 0xa4], 0",
"je 0x44f899",
"push pe_nt_image_headers32",
"lea eax, [esp + 4]",
"push eax",
"mov eax, dword [ebx + 0x30]",
"push eax",
"call sub.user32.dll_GetWindowTextA",
"mov ecx, eax",
"mov ... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x450a60 | [
"Hide graphical window"
] | 53568bd88bb38400000085f674338bc6e8cfcc000084c074288b8384000000e8e8c9000050e8d265fbff85c074136a008b8384000000e8d1c9000050e86b67fbff5e5bc3 | [
"push ebx",
"push esi",
"mov ebx, eax",
"mov esi, dword [ebx + 0x84]",
"test esi, esi",
"je 0x450aa1",
"mov eax, esi",
"call fcn.0045d744",
"test al, al",
"je 0x450aa1",
"mov eax, dword [ebx + 0x84]",
"call fcn.0045d46c",
"push eax",
"call sub.user32.dll_IsWindowVisible",
"test eax, eax"... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x4547a0 | [
"Log keystrokes via polling"
] | 558bec83c4d85356578bf08d7df7a5a58955f033c08945e8833db40b4900000f842a0100006a11e83827fbff66a900800f95c08b1514f348008b123282b40000000f8408010000a1b80b49008b10ff5208a1b40b49008b58084b85db0f8cbc0000004333ff8bd7a1b40b4900e8774bfcff8945ec8b45ec3b45f00f84960000008b45ec80b8a6010000000f84860000008b45ec8b10ff525084c0747a8b45ece8... | [
"push ebp",
"mov ebp, esp",
"add esp, 0xffffffd8",
"push ebx",
"push esi",
"push edi",
"mov esi, eax",
"lea edi, [ebp - 9]",
"movsd dword es:[edi], dword [esi]",
"movsd dword es:[edi], dword [esi]",
"mov dword [ebp - 0x10], edx",
"xor eax, eax",
"mov dword [ebp - 0x18], eax",
"cmp dword [0... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x457ef0 | [
"Log keystrokes via polling"
] | 558bec81c4ecfeffff5356578bda8bf0f6461c1074368bc6e8e7effeff8945ec837dec0074268b45ec83b85002000000741a8bcb8b45ec8b80500200008bd68b38ff572484c00f853f0100008b033d0001000072373d0801000077308bc6e8a1effeff8945ec837dec000f84120100008bcb8bd68b45ec8b38ff97f000000084c00f8504010000e9f60000008b033d000200000f82d20000003d0a0200000f87... | [
"push ebp",
"mov ebp, esp",
"add esp, 0xfffffeec",
"push ebx",
"push esi",
"push edi",
"mov ebx, edx",
"mov esi, eax",
"test byte [esi + 0x1c], 0x10",
"je 0x457f3c",
"mov eax, esi",
"call fcn.00446ef4",
"mov dword [ebp - 0x14], eax",
"cmp dword [ebp - 0x14], 0",
"je 0x457f3c",
"mov eax... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x45b5fc | [
"Capture screenshot"
] | 558bec83c4945356578bf28bd880bbf8010000007406837e0400742df643550175198bc3e877ebffff85c0750e8bd68bc38b08ff51f0e91e0100008bd68bc3e8e0faffffe9100100006a00e880b8faff8bf88d55a48bc38b08ff51448b45b0508d55948bc38b08ff51448b459c5057e8b4b4faff8945f8576a00e8a1bafaff6a00e8aab4faff8945fc8b45f8508b45fc50e81ab6faff8945f433c055684eb745... | [
"push ebp",
"mov ebp, esp",
"add esp, 0xffffff94",
"push ebx",
"push esi",
"push edi",
"mov esi, edx",
"mov ebx, eax",
"cmp byte [ebx + 0x1f8], 0",
"je 0x45b618",
"cmp dword [esi + 4], 0",
"je 0x45b645",
"test byte [ebx + 0x55], 1",
"jne 0x45b637",
"mov eax, ebx",
"call fcn.0045a19c",
... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x461e6c | [
"Link many functions at runtime"
] | 558bec5153a118f5480080780c000f84590100006800800000e8fa4bfaff8945fc33c05568d21f460064ff30648920833dc40b490000751c68e01f4600e8ce4afaff8bd868e81f460053e8c94afaffa3c40b4900833d3cde4800000f85ee00000068f81f4600e8654bfaffa33cde4800833d3cde4800000f84d20000006804204600a13cde480050e88b4afaffa3c80b49006814204600a13cde480050e8764a... | [
"push ebp",
"mov ebp, esp",
"push ecx",
"push ebx",
"mov eax, dword [0x48f518]",
"cmp byte [eax + 0xc], 0",
"je 0x461fd9",
"push 0x8000",
"call sub.kernel32.dll_SetErrorMode",
"mov dword [ebp - 4], eax",
"xor eax, eax",
"push ebp",
"push 0x461fd2",
"push dword fs:[eax]",
"mov dword fs:[e... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x463508 | [
"Log keystrokes",
"Log keystrokes via polling"
] | 558bec81c4fcfeffff538bda668945fe8bc3e8790ffaff6a0033c08a45fe50e8703bfaffc1e01085c0742468000100008d95fefeffff5250e8b739faff8bc38d95fefeffffb900010000e8b111faff5b8be55dc3 | [
"push ebp",
"mov ebp, esp",
"add esp, 0xfffffefc",
"push ebx",
"mov ebx, edx",
"mov word [ebp - 2], ax",
"mov eax, ebx",
"call fcn.00404498",
"push 0",
"xor eax, eax",
"mov al, byte [ebp - 2]",
"push eax",
"call sub.user32.dll_MapVirtualKeyA",
"shl eax, 0x10",
"test eax, eax",
"je 0x46... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x4704e0 | [
"Check for software breakpoints"
] | 538bd8817b14ca00000075228bc3e8a10a0000837b4000740ec74314cf000000b8010000005bc3c74314cb000000817b14cb00000075688b93b4010000837a1000744e837b080074078bc38b5008ff128bc38b90b4010000ff1285c0750433c05bc383f802742a837b080074d683f80374034875ce8b5308ff42048b4a048b43083b48087cbd8b9340010000015008ebb28b8b90000000898b98000000eb1e81... | [
"push ebx",
"mov ebx, eax",
"cmp dword [ebx + 0x14], 0xca",
"jne 0x47050e",
"mov eax, ebx",
"call fcn.00470f94",
"cmp dword [ebx + 0x40], 0",
"je 0x470507",
"mov dword [ebx + 0x14], 0xcf",
"mov eax, 1",
"pop ebx",
"ret",
"mov dword [ebx + 0x14], 0xcb",
"cmp dword [ebx + 0x14], 0xcb",
"jn... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x480fbc | [
"Encrypt data using rc4 ksa"
] | 558bec83c4ac535657894df48955f88945fc8b45fc8b40048b55fc0fb7520ef7eae852fbffff8945e08b45e00500d4000005004000008945d48b45d4e8dbc1feff8945c455685314480064ff3500000000648925000000008b45fc8b40048b55fcf76a0803c0e8b1c1feff8945c055683614480064ff3500000000648925000000008b45c48945b4ba00c000008b45c4e8efc1feff8945b8ba00d400008b45c4... | [
"push ebp",
"mov ebp, esp",
"add esp, 0xffffffac",
"push ebx",
"push esi",
"push edi",
"mov dword [ebp - 0xc], ecx",
"mov dword [ebp - 8], edx",
"mov dword [ebp - 4], eax",
"mov eax, dword [ebp - 4]",
"mov eax, dword [eax + 4]",
"mov edx, dword [ebp - 4]",
"movzx edx, word [edx + 0xe]",
"i... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x48b6ac | [
"Enumerate gui resources"
] | 558bec83c4f053565733c9894df4894df08955f88945fc33c055689cb7480064ff306489208b45f88b10ff5244b201a168714100e8b77ff7ff8b55fc89425833c055687ab7480064ff306489208b45fc506884b14800e85db7f7ff8b45fc8b40588b10ff52148bf04e85f67c484633db8d4df08b45fc8b40588bd38b38ff570c8b45f0e848d3f7ff8bd08d4df48b45fce86b0000008b45f4508b45fc8b40588b... | [
"push ebp",
"mov ebp, esp",
"add esp, 0xfffffff0",
"push ebx",
"push esi",
"push edi",
"xor ecx, ecx",
"mov dword [ebp - 0xc], ecx",
"mov dword [ebp - 0x10], ecx",
"mov dword [ebp - 8], edx",
"mov dword [ebp - 4], eax",
"xor eax, eax",
"push ebp",
"push 0x48b79c",
"push dword fs:[eax]",
... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x48b998 | [
"Enumerate gui resources",
"Terminate process"
] | 558bec83c4f853837d0c007508837d08007671eb027e6d8b5d08536a0068ff0f1f00e8a5b0f7ff8945fc53689cb04800e897b4f7ff837dfc00764d33d2556815ba480064ff3264892268f40100008b45fc50e8ddb0f7ff85c0740b6a008b45fc50e8b6b0f7ff33c05a59596489106820ba48008b45fc50e848aef7ffc3c645fb018a45fb5b59595dc20800 | [
"push ebp",
"mov ebp, esp",
"add esp, 0xfffffff8",
"push ebx",
"cmp dword [ebp + 0xc], 0",
"jne 0x48b9ad",
"cmp dword [ebp + 8], 0",
"jbe 0x48ba1c",
"jmp 0x48b9af",
"jle 0x48ba1c",
"mov ebx, dword [ebp + 8]",
"push ebx",
"push 0",
"push 0x1f0fff",
"call sub.kernel32.dll_OpenProcess",
"... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x48bb98 | [
"Get hostname"
] | 5381c47cffffff8bda8d44240433c9ba80000000e82b75f7ffc7042480000000548d44240850e851adf7ff8bc38d542404b980000000e8358bf7ff81c4840000005bc3 | [
"push ebx",
"add esp, 0xffffff7c",
"mov ebx, edx",
"lea eax, [esp + 4]",
"xor ecx, ecx",
"mov edx, 0x80",
"call fcn.004030dc",
"mov dword [esp], 0x80",
"push esp",
"lea eax, [esp + 8]",
"push eax",
"call sub.kernel32.dll_GetComputerNameA",
"mov eax, ebx",
"lea edx, [esp + 4]",
"mov ecx, ... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x48bfc8 | [
"Check for time delay via gettickcount"
] | 53566830c048006844c04800e8a3aef7ff8bd885db760f6a006a00687f0b000053e8eeb0f7ffe8c9a9f7ff8bf085db762f6830c048006844c04800e874aef7ff8bd8a114f348008b00e88e3bfcffe8a1a9f7ff2bc63d983a0000770485db77d18bc35e5bc3 | [
"push ebx",
"push esi",
"push 0x48c030",
"push 0x48c044",
"call sub.user32.dll_FindWindowA",
"mov ebx, eax",
"test ebx, ebx",
"jbe 0x48bfee",
"push 0",
"push 0",
"push 0xb7f",
"push ebx",
"call sub.user32.dll_PostMessageA",
"call sub.kernel32.dll_GetTickCount",
"mov esi, eax",
"test eb... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x48c160 | [
"Create process on windows"
] | 558bec83c4a8538955fc8b45fce8d687f7ff33c05568f5c1480064ff306489208d45b833c9ba44000000e84d6ff7ff8d45a833c9ba10000000e83e6ff7ffc745b8440000008d45fcba0cc24800e8ae85f7ff8d45a8508d45b8506a006a0068200200006a006a006a008b45fce88787f7ff506a00e8aba6f7ff83f8011bdb4333c05a595964891068fcc148008d45fce8a482f7ffc3 | [
"push ebp",
"mov ebp, esp",
"add esp, 0xffffffa8",
"push ebx",
"mov dword [ebp - 4], edx",
"mov eax, dword [ebp - 4]",
"call fcn.00404948",
"xor eax, eax",
"push ebp",
"push 0x48c1f5",
"push dword fs:[eax]",
"mov dword fs:[eax], esp",
"lea eax, [ebp - 0x48]",
"xor ecx, ecx",
"mov edx, 0x... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x48c24c | [
"Get common file path"
] | 558bec81c478feffff5333d289957cffffff899578feffff8bd833c055680ec3480064ff306489208bc3e81d82f7ff8d458033c9ba80000000e8526ef7ff68800000008d458050e83ca7f7ff85c0764e8d8578feffff8d5580b980000000e85984f7ff8b8578feffffe89e86f7ff8bd08d857cfeffffe8096ff7ff8d957cfeffff8d857cffffffe82484f7ff8b957cffffff8bc3b924c34800e8ba84f7ff33c0... | [
"push ebp",
"mov ebp, esp",
"add esp, 0xfffffe78",
"push ebx",
"xor edx, edx",
"mov dword [ebp - 0x84], edx",
"mov dword [ebp - 0x188], edx",
"mov ebx, eax",
"xor eax, eax",
"push ebp",
"push 0x48c30e",
"push dword fs:[eax]",
"mov dword fs:[eax], esp",
"mov eax, ebx",
"call fcn.00404498"... |
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7 | 0x48c328 | [
"Get common file path"
] | 558bec81c478feffff5333d289957cffffff899578feffff8bd833c05568eac3480064ff306489208bc3e84181f7ff8d458033c9ba80000000e8766df7ff68800000008d458050e828a6f7ff85c0764e8d8578feffff8d5580b980000000e87d83f7ff8b8578feffffe8c285f7ff8bd08d857cfeffffe82d6ef7ff8d957cfeffff8d857cffffffe84883f7ff8b957cffffff8bc3b900c44800e8de83f7ff33c0... | [
"push ebp",
"mov ebp, esp",
"add esp, 0xfffffe78",
"push ebx",
"xor edx, edx",
"mov dword [ebp - 0x84], edx",
"mov dword [ebp - 0x188], edx",
"mov ebx, eax",
"xor eax, eax",
"push ebp",
"push 0x48c3ea",
"push dword fs:[eax]",
"mov dword fs:[eax], esp",
"mov eax, ebx",
"call fcn.00404498"... |
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189 | 0x401670 | [
"Initialize winsock library"
] | 81ec900100008d442400568bf1506802020000c706ccb54000ff1580b3400033c08946048946088bc65e81c490010000c3 | [
"sub esp, 0x190",
"lea eax, [esp]",
"push esi",
"mov esi, ecx",
"push eax",
"push 0x202",
"mov dword [esi], 0x40b5cc",
"call dword [sym.imp.WS2_32.dll_WSAStartup]",
"xor eax, eax",
"mov dword [esi + 4], eax",
"mov dword [esi + 8], eax",
"mov eax, esi",
"pop esi",
"add esp, 0x190",
"ret"
... |
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189 | 0x401760 | [
"Set socket configuration"
] | 51568bf18b460485c0740a83f8ff7405e86b0000008b44240c6a0085c074046a01eb026a026a02ff1574b3400083f8ff894604743b8b4c2410578b3d78b340008d5424086a0452680610000068ffff000050894c241cffd78b4e048d4424086a0450680510000068ffff000051ffd75f8b4e0433c083f9ff5e0f95c059c20800 | [
"push ecx",
"push esi",
"mov esi, ecx",
"mov eax, dword [esi + 4]",
"test eax, eax",
"je 0x401775",
"cmp eax, 0xffffffff",
"je 0x401775",
"call fcn.004017e0",
"mov eax, dword [esp + 0xc]",
"push 0",
"test eax, eax",
"je 0x401783",
"push 1",
"jmp 0x401785",
"push 2",
"push 2",
"call... |
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189 | 0x401810 | [
"Resolve dns"
] | 538b5c24088bcb33c0568b742410890185f689410489410889410c750a6affff1584b34000eb3c56ff1558b3400085c074250fbf480a8b500c578d7b048b328bd1c1e902f3a58bca83e103f3a4668b40085f668903eb1456ff1568b3400083f8ff741f89430466c70302008b4c241451ff156cb34000668943025eb8010000005bc35e33c05bc3 | [
"push ebx",
"mov ebx, dword [esp + 8]",
"mov ecx, ebx",
"xor eax, eax",
"push esi",
"mov esi, dword [esp + 0x10]",
"mov dword [ecx], eax",
"test esi, esi",
"mov dword [ecx + 4], eax",
"mov dword [ecx + 8], eax",
"mov dword [ecx + 0xc], eax",
"jne 0x401837",
"push 0xffffffffffffffff",
"call... |
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189 | 0x4018a0 | [
"Connect socket"
] | 83ec10568bf18b460485c0740c8b460885c07405e827ffffff8b44241c8b4c2418508d5424085152c7460800000000e83cffffff83c40c85c074198b4e048d4424046a105051ff1564b34000f7d81bc0408946088b46085e83c410c20800 | [
"sub esp, 0x10",
"push esi",
"mov esi, ecx",
"mov eax, dword [esi + 4]",
"test eax, eax",
"je 0x4018b9",
"mov eax, dword [esi + 8]",
"test eax, eax",
"je 0x4018b9",
"call fcn.004017e0",
"mov eax, dword [esp + 0x1c]",
"mov ecx, dword [esp + 0x18]",
"push eax",
"lea edx, [esp + 8]",
"push ... |
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189 | 0x401930 | [
"Receive data",
"Receive data on socket"
] | 568bf18b460885c074188b44240c8b4c24088b56046a00505152ff155cb34000eb048b44240c85c075038946085ec20800 | [
"push esi",
"mov esi, ecx",
"mov eax, dword [esi + 8]",
"test eax, eax",
"je 0x401952",
"mov eax, dword [esp + 0xc]",
"mov ecx, dword [esp + 8]",
"mov edx, dword [esi + 4]",
"push 0",
"push eax",
"push ecx",
"push edx",
"call dword [sym.imp.WS2_32.dll_recv]",
"jmp 0x401956",
"mov eax, dw... |
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189 | 0x401ed0 | [
"Read data from internet",
"Receive data"
] | 8b5424088b490c8d442408508b442408525051ff1534b3400085c0750683c8ffc208008b442408c20800 | [
"mov edx, dword [esp + 8]",
"mov ecx, dword [ecx + 0xc]",
"lea eax, [esp + 8]",
"push eax",
"mov eax, dword [esp + 8]",
"push edx",
"push eax",
"push ecx",
"call dword [sym.imp.WININET.dll_InternetReadFile]",
"test eax, eax",
"jne 0x401ef3",
"or eax, 0xffffffff",
"ret 8",
"mov eax, dword [... |
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189 | 0x402c40 | [
"Read file on windows"
] | 8b442404566864d1400050ff15b4b240008bf083c40885f6745153578b7c241c85ff740f8b0f6a005156ff1564b2400083c40c8b5424188b44241456526a0150ff1568b2400083c4108bd885ff740c56ff156cb2400083c404890756ff15acb2400083c4048bc35f5b5ec333c05ec3 | [
"mov eax, dword [esp + 4]",
"push esi",
"push 0x40d164",
"push eax",
"call dword [sym.imp.MSVCRT.dll_fopen]",
"mov esi, eax",
"add esp, 8",
"test esi, esi",
"je 0x402cab",
"push ebx",
"push edi",
"mov edi, dword [esp + 0x1c]",
"test edi, edi",
"je 0x402c73",
"mov ecx, dword [edi]",
"pu... |
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189 | 0x402d80 | [
"Write file on windows"
] | 64a1000000006aff6846a4400050b8bc42020064892500000000e8817300005355568bf18d4c241089742438e8bfe8ffff8bac24d84202006a0333db6a2055899c24dc420200e885f6ffff83c60483c40c8bcee868e8ffff6a3268000100008bcee85ae7ffff68701700006a018d4c2418e86ae9ffff85c00f84bd0b00006a6e558d4c2418e896eaffff85c00f84a90b0000578bbc24f442020085ff740e803f... | [
"mov eax, dword fs:[0]",
"push 0xffffffffffffffff",
"push 0x40a446",
"push eax",
"mov eax, 0x242bc",
"mov dword fs:[0], esp",
"call fcn.0040a120",
"push ebx",
"push ebp",
"push esi",
"mov esi, ecx",
"lea ecx, [esp + 0x10]",
"mov dword [esp + 0x38], esi",
"call fcn.00401670",
"mov ebp, dw... |
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189 | 0x4044a0 | [
"Query or enumerate registry value"
] | 83ec088b542410538b5c241056578bf98d44240c8d4c2410508b470453516a005250c744242800000000c744242404000000ff1508b040008bf085f675128b4f088b13505152e865e3ffff83c40c89038bc65f5e5b83c408c20800 | [
"sub esp, 8",
"mov edx, dword [esp + 0x10]",
"push ebx",
"mov ebx, dword [esp + 0x10]",
"push esi",
"push edi",
"mov edi, ecx",
"lea eax, [esp + 0xc]",
"lea ecx, [esp + 0x10]",
"push eax",
"mov eax, dword [edi + 4]",
"push ebx",
"push ecx",
"push 0",
"push edx",
"push eax",
"mov dwor... |
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189 | 0x404500 | [
"Query or enumerate registry value"
] | 83ec08535556578b7c24248bf185ffc744241400000000c74424100004000074068b07894424108b6c241c8b4424208d4c24108d542414518b4e0455526a005051ff1508b0400085ff8bd874068b542410891785db75188b460885c074118b078a4e0850515355e864e3ffff83c4105f5e8bc35d5b83c408c20c00 | [
"sub esp, 8",
"push ebx",
"push ebp",
"push esi",
"push edi",
"mov edi, dword [esp + 0x24]",
"mov esi, ecx",
"test edi, edi",
"mov dword [esp + 0x14], 0",
"mov dword [esp + 0x10], 0x400",
"je 0x404527",
"mov eax, dword [edi]",
"mov dword [esp + 0x10], eax",
"mov ebp, dword [esp + 0x1c]",
... |
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189 | 0x404580 | [
"Set registry value"
] | 568bf18b4c24086a008b46085051e8bde2ffff8b4e0483c40c8d542408894424088b44240c6a04526a046a005051ff1500b040005ec20800 | [
"push esi",
"mov esi, ecx",
"mov ecx, dword [esp + 8]",
"push 0",
"mov eax, dword [esi + 8]",
"push eax",
"push ecx",
"call fcn.00402850",
"mov ecx, dword [esi + 4]",
"add esp, 0xc",
"lea edx, [esp + 8]",
"mov dword [esp + 8], eax",
"mov eax, dword [esp + 0xc]",
"push 4",
"push edx",
"... |
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189 | 0x4045c0 | [
"Set registry value"
] | 568bf1578b7c240c8b460885c0740e6a00506a0157e8f6e2ffff83c41057ff1584b040008b4c24108b56044050576a016a005152ff1500b040005f5ec20800 | [
"push esi",
"mov esi, ecx",
"push edi",
"mov edi, dword [esp + 0xc]",
"mov eax, dword [esi + 8]",
"test eax, eax",
"je 0x4045dd",
"push 0",
"push eax",
"push 1",
"push edi",
"call fcn.004028d0",
"add esp, 0x10",
"push edi",
"call dword [sym.imp.KERNEL32.dll_lstrlenA]",
"mov ecx, dword ... |
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189 | 0x404600 | [
"Check os version"
] | 81ec94000000538b9c249c000000555657b92500000033c08d7c2410f3ab85dbc744241094000000bd630000007420bff8d2400083c9fff2aef7d12bf98bc18bf78bfbc1e902f3a58bc883e103f3a48d4c241051ff1588b0400085c00f84090100008b4c24148b4424208b54241883f904754685d2752083f8020f849300000085dbbd0a0000000f84de000000bff0d24000e98b00000083fa5a75228b442420... | [
"sub esp, 0x94",
"push ebx",
"mov ebx, dword [esp + 0x9c]",
"push ebp",
"push esi",
"push edi",
"mov ecx, 0x25",
"xor eax, eax",
"lea edi, [esp + 0x10]",
"rep stosd dword es:[edi], eax",
"test ebx, ebx",
"mov dword [esp + 0x10], 0x94",
"mov ebp, 0x63",
"je 0x40464f",
"mov edi, 0x40d2f8",... |
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189 | 0x404780 | [
"Terminate process"
] | 81ec280900008b84243409000053558bac2434090000565785c0c7442414000000007e0e85ed0f847e030000c6450000eb2285ed7406807d000075188b84244009000085c00f845f0300008338000f84560300006854d34000ff15a0b040008bd885db895c24280f84f40200008b359cb040006844d3400053ffd66830d34000538bf8ffd66818d340005389442428ffd68bf085ff897424240f84bb0200008b... | [
"sub esp, 0x928",
"mov eax, dword [esp + 0x934]",
"push ebx",
"push ebp",
"mov ebp, dword [esp + 0x934]",
"push esi",
"push edi",
"test eax, eax",
"mov dword [esp + 0x14], 0",
"jle 0x4047b2",
"test ebp, ebp",
"je 0x404b2a",
"mov byte [ebp], 0",
"jmp 0x4047d4",
"test ebp, ebp",
"je 0x40... |
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189 | 0x404b40 | [
"Terminate process"
] | 81ec380100005355568bac24480100005733f6b94900000033c08d7c242489742420f3ab8b842454010000897424103bc67e0e3bee0f84ec020000c6450000eb213bee7406807d000075178b8424500100003bc60f84cd02000039300f84c5020000689cd34000c744242428010000ff15a0b040008bd83bde895c24140f84950200008b359cb040006880d3400053ffd66870d34000538bf8ffd68bd88b4424... | [
"sub esp, 0x138",
"push ebx",
"push ebp",
"push esi",
"mov ebp, dword [esp + 0x148]",
"push edi",
"xor esi, esi",
"mov ecx, 0x49",
"xor eax, eax",
"lea edi, [esp + 0x24]",
"mov dword [esp + 0x20], esi",
"rep stosd dword es:[edi], eax",
"mov eax, dword [esp + 0x154]",
"mov dword [esp + 0x10... |
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189 | 0x405000 | [
"Check if file exists",
"Get file attributes"
] | 8b44240450ff15a8b0400033c983f8ff0f95c18bc1c3 | [
"mov eax, dword [esp + 4]",
"push eax",
"call dword [sym.imp.KERNEL32.dll_GetFileAttributesA]",
"xor ecx, ecx",
"cmp eax, 0xffffffff",
"setne cl",
"mov eax, ecx",
"ret"
] |
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189 | 0x405240 | [
"Copy file",
"Create process on windows"
] | 81ec0c020000538b1d9cb24000558bac2418020000565733ff6814d1400055897c2418ffd383c40885c00f84650200008d44241c68ff0000005057ff1550b0400085c00f844c0200008b35b8b240008d4c241c6a5c51ffd683c40885c00f8432020000682cd44000ff15a0b040008bf885ff897c24140f840a0200006814d4400057ff159cb0400085c0894424180f84eb0100008bbc242402000085ff0f8501... | [
"sub esp, 0x20c",
"push ebx",
"mov ebx, dword [sym.imp.MSVCRT.dll_strstr]",
"push ebp",
"mov ebp, dword [esp + 0x218]",
"push esi",
"push edi",
"xor edi, edi",
"push 0x40d114",
"push ebp",
"mov dword [esp + 0x18], edi",
"call ebx",
"add esp, 8",
"test eax, eax",
"je 0x4054d5",
"lea eax... |
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189 | 0x4054f0 | [
"Read file on windows",
"Set file attributes",
"Timestomp file",
"Write file on windows"
] | 81ecb4040000535556578bbc24c804000033ed3bfd896c2424896c2428896c242c74366a5c57ff1598b2400083c40885c0742683c9ff33c0f2aef7d12bf98d9424c00000008bc18bf78bfac1e902f3a58bc883e103f3a4eb148d8c24c000000068ff0000005155ff1550b040008d5424386a018d8424c40000005250ff1544b040008bf03bf574198d4c24308d54242451555256ff1540b0400056ff153cb040... | [
"sub esp, 0x4b4",
"push ebx",
"push ebp",
"push esi",
"push edi",
"mov edi, dword [esp + 0x4c8]",
"xor ebp, ebp",
"cmp edi, ebp",
"mov dword [esp + 0x24], ebp",
"mov dword [esp + 0x28], ebp",
"mov dword [esp + 0x2c], ebp",
"je 0x405549",
"push 0x5c",
"push edi",
"call dword [sym.imp.MSVC... |
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189 | 0x4058a0 | [
"Delete file",
"Get common file path",
"Persist via run registry key"
] | 6aff687ba4400064a100000000506489250000000081ec2c030000535556578d4c2410e848eaffff8b8c245803000033c03bc889842444030000c744243002000080c7442434010000808944241c0f843e0500008d44243c68ff00000050ff1564b040008b2d80b040008b1d20b0400085c00f847a010000bfb0dd400083c9ff33c08d54243cf2aef7d12bf9508bf78bfa8bd183c9fff2ae8bca4fc1e902f3a5... | [
"push 0xffffffffffffffff",
"push 0x40a47b",
"mov eax, dword fs:[0]",
"push eax",
"mov dword fs:[0], esp",
"sub esp, 0x32c",
"push ebx",
"push ebp",
"push esi",
"push edi",
"lea ecx, [esp + 0x10]",
"call fcn.00404310",
"mov ecx, dword [esp + 0x358]",
"xor eax, eax",
"cmp ecx, eax",
"mov... |
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189 | 0x4061b0 | [
"Delete file",
"Get common file path",
"Move file"
] | 6aff689ba4400064a100000000506489250000000081ec0c0200005556578d4c240ce839e1ffff8d44241868ff00000050c784242802000000000000ff1560b04000bf3cd4400083c9ff33c08d542418f2aef7d12bf9508bf78be98bfa83c9fff2ae8bcd4fc1e902f3a58bcd8d54241c83e10350f3a4bf95d4400083c9fff2aef7d12bf9683f000f008bf78be98bfa83c9fff2ae8bcd4fc1e902f3a58bcd5083... | [
"push 0xffffffffffffffff",
"push 0x40a49b",
"mov eax, dword fs:[0]",
"push eax",
"mov dword fs:[0], esp",
"sub esp, 0x20c",
"push ebp",
"push esi",
"push edi",
"lea ecx, [esp + 0xc]",
"call fcn.00404310",
"lea eax, [esp + 0x18]",
"push 0xff",
"push eax",
"mov dword [esp + 0x228], 0",
"... |
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189 | 0x406700 | [
"Create directory",
"Create process on windows",
"Get common file path"
] | 81ec000100008d44240053565768ff00000050ff1564b040006a00e8e0deffff83c40483f8148d54240c7c37bf4cde400083c9ff33c068afd44000f2aef7d12bf98bf78bd98bfa83c9fff2ae8bcb4fc1e902f3a58bcb83e103f3a4ff1574b24000eb35bf40de400083c9ff33c068afd44000f2aef7d12bf98bf78bd98bfa83c9fff2ae8bcb4fc1e902f3a58bcb83e103f3a4ff1578b2400083c4048d44240c6a... | [
"sub esp, 0x100",
"lea eax, [esp]",
"push ebx",
"push esi",
"push edi",
"push 0xff",
"push eax",
"call dword [sym.imp.KERNEL32.dll_GetWindowsDirectoryA]",
"push 0",
"call fcn.00404600",
"add esp, 4",
"cmp eax, 0x14",
"lea edx, [esp + 0xc]",
"jl 0x406763",
"mov edi, 0x40de4c",
"or ecx, ... |
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189 | 0x406b30 | [
"Delete file",
"Get common file path"
] | 6aff68dba4400064a100000000506489250000000081ec10020000535556578d4c2410e8b8d7ffff33ed556aff5568a8de400089ac2438020000896c242ce80de3ffff6a016a015568b8e34000e81eedffff8b1d80b0400083c42068e8030000ffd36a01e817f6ffff83c4048d44242068ff00000050ff1564b0400055e84edaffff83c40483f8148d542420bf4cde40007d05bf40de400083c9ff33c0f2aef7... | [
"push 0xffffffffffffffff",
"push 0x40a4db",
"mov eax, dword fs:[0]",
"push eax",
"mov dword fs:[0], esp",
"sub esp, 0x210",
"push ebx",
"push ebp",
"push esi",
"push edi",
"lea ecx, [esp + 0x10]",
"call fcn.00404310",
"xor ebp, ebp",
"push ebp",
"push 0xffffffffffffffff",
"push ebp",
... |
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189 | 0x407000 | [
"Check for time delay via gettickcount",
"Create process on windows",
"Delete file",
"Delete registry value",
"Get common file path",
"Persist via run registry key",
"Read file on windows",
"Set file attributes",
"Set registry value",
"Timestomp file",
"Write and execute a file",
"Write file o... | 81ec9c060000535556578bbc24b006000033db3bfb895c2418895c242c74366a5c57ff1598b2400083c40885c0742683c9ff33c0f2aef7d12bf98d94241c0200008bc18bf78bfac1e902f3a58bc883e103f3a4eb148d8c241c02000068ff0000005153ff1550b040008d94241c0200006864d1400052ff15b4b240008be883c4083beb896c24140f84520b00008b8424b40600003bc37402891883c9ffbfbcde... | [
"sub esp, 0x69c",
"push ebx",
"push ebp",
"push esi",
"push edi",
"mov edi, dword [esp + 0x6b0]",
"xor ebx, ebx",
"cmp edi, ebx",
"mov dword [esp + 0x18], ebx",
"mov dword [esp + 0x2c], ebx",
"je 0x407055",
"push 0x5c",
"push edi",
"call dword [sym.imp.MSVCRT.dll_strchr]",
"add esp, 8",
... |
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189 | 0x408520 | [
"Create process on windows",
"Hide graphical window",
"Query or enumerate registry value"
] | 81ec3c02000053555657b908000000be1ce140008dbc244801000033c0f3a5a4b9080000008dbc2469010000f3abb909000000bef4e040008dbc248901000033dbf3a566a5b9060000008dbc24af010000f3ab66abaab909000000bed0e040008dbc24ca01000033c0f3a5b9070000008dbc24ee010000f3abaab90a000000bea4e040008dbc240b02000033c0f3a5a4b9060000008dbc2434020000f3aba0b8... | [
"sub esp, 0x23c",
"push ebx",
"push ebp",
"push esi",
"push edi",
"mov ecx, 8",
"mov esi, 0x40e11c",
"lea edi, [esp + 0x148]",
"xor eax, eax",
"rep movsd dword es:[edi], dword [esi]",
"movsb byte es:[edi], byte [esi]",
"mov ecx, 8",
"lea edi, [esp + 0x169]",
"rep stosd dword es:[edi], eax"... |
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189 | 0x408f30 | [
"Create process on windows",
"Delete file"
] | 6aff6826a5400064a100000000506489250000000081ec70020000535556578d4c2424e8589dffff33f68d4c241889b42488020000e8a6b3ffff897424108bb424900200006a2e56c684249002000001ff1598b2400083c40885c00f84280200008bac2494020000807d00000f84170200008bbc2498020000803f000f84070200008b1d88b240006865d540008d84248401000068a0de400050ffd383c40c8d... | [
"push 0xffffffffffffffff",
"push 0x40a526",
"mov eax, dword fs:[0]",
"push eax",
"mov dword fs:[0], esp",
"sub esp, 0x270",
"push ebx",
"push ebp",
"push esi",
"push edi",
"lea ecx, [esp + 0x24]",
"call fcn.00402cb0",
"xor esi, esi",
"lea ecx, [esp + 0x18]",
"mov dword [esp + 0x288], esi... |
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189 | 0x409200 | [
"Create process on windows"
] | 6aff683ba5400064a100000000506489250000000081ec5001000055568d4c2408e8eab0ffff33f68d4c24085656683f000f0056566865d54000680200008089b4247c01000033ede8b3b1ffff85c07573538b1d88b24000578b3dc4b24000568d4424206888de400050ffd383c40c8d4c241c8d5424606a0051528d4c241ce87cb2ffff85c0752b5050508d44246c50e8ebbbffff83c41085c075176a05508d... | [
"push 0xffffffffffffffff",
"push 0x40a53b",
"mov eax, dword fs:[0]",
"push eax",
"mov dword fs:[0], esp",
"sub esp, 0x150",
"push ebp",
"push esi",
"lea ecx, [esp + 8]",
"call fcn.00404310",
"xor esi, esi",
"lea ecx, [esp + 8]",
"push esi",
"push esi",
"push 0xf003f",
"push esi",
"pu... |
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189 | 0x409400 | [
"Get graphical window text"
] | 8b44240c8b4c240881ec00010000c60000c60100535556578bbc241401000057ff15e8b2400085c00f84200300008d54241068ff0000005257ff15dcb2400085c00f8407030000be30e040008d4424108a108a1e8aca3ad3751e84c974168a50018a5e018aca3ad3750e83c00283c60284c975dc33c0eb051bc083d8ff85c00f85c90200008b35d0b24000506830e040005057ffd685c0740e6a006830e04000... | [
"mov eax, dword [esp + 0xc]",
"mov ecx, dword [esp + 8]",
"sub esp, 0x100",
"mov byte [eax], 0",
"mov byte [ecx], 0",
"push ebx",
"push ebp",
"push esi",
"push edi",
"mov edi, dword [esp + 0x114]",
"push edi",
"call dword [sym.imp.USER32.dll_IsWindowVisible]",
"test eax, eax",
"je 0x40974e... |
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189 | 0x409770 | [
"Get graphical window text"
] | 81ecd40d0000535556578bbc24ec0d0000c74424100000000085ff742383c9ff33c0f2aef7d12bf98d5424288bc18bf78bfac1e902f3a58bc883e103f3a4eb128d4c242868ff000000516a00ff1550b040008bac24e80d000055ff15e8b2400085c00f848d0400008d54242852e81eb8ffff83c40485c00f84780400008b35b8b240008d4424286a5c50ffd683c40885c00f845e0400008d4c24286a5c51ffd6... | [
"sub esp, 0xdd4",
"push ebx",
"push ebp",
"push esi",
"push edi",
"mov edi, dword [esp + 0xdec]",
"mov dword [esp + 0x10], 0",
"test edi, edi",
"je 0x4097b0",
"or ecx, 0xffffffff",
"xor eax, eax",
"repne scasb al, byte es:[edi]",
"not ecx",
"sub edi, ecx",
"lea edx, [esp + 0x28]",
"mov... |
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189 | 0x409e20 | [
"Get common file path",
"Move file"
] | 81ec000200008d44240068ff00000050ff1564b0400085c00f848d00000053568d4c240857518d9424100100006844e2400052ff1588b24000bf3ce2400083c9ff33c083c40cf2aef7d12bf98d54240c8bf78bd98bfa83c9fff2ae8bcb4fc1e902f3a58b8424100200008bcb83e103f3a45f5e85c05b741d8d8424000100008d4c24005051ff154cb2400083c40881c400020000c38d5424008d842400010000... | [
"sub esp, 0x200",
"lea eax, [esp]",
"push 0xff",
"push eax",
"call dword [sym.imp.KERNEL32.dll_GetWindowsDirectoryA]",
"test eax, eax",
"je 0x409ecb",
"push ebx",
"push esi",
"lea ecx, [esp + 8]",
"push edi",
"push ecx",
"lea edx, [esp + 0x110]",
"push 0x40e244",
"push edx",
"call dwor... |
0086498d0fcd5fc1246d4575ad4278654ede09e92b73b20b7c9e6dca6b651034 | 0x405d20 | [
"Contain obfuscated stackstrings"
] | 558bec6aff68bd58440064a1000000005081ec280100005657a10070460033c5508d45f464a3000000008bf9897dccc70700000000c7470400000000c7470800000000c745fc00000000c7470c32000000c6471000833de0894600000f85a50d00006a0733c0c745e40700000068b4c944008d4dd0c745e000000000668945d0e80bf4ffffc745e8000000008d45d0c645fc0150e8576500005083c01050518d... | [
"push ebp",
"mov ebp, esp",
"push 0xffffffffffffffff",
"push 0x4458bd",
"mov eax, dword fs:[0]",
"push eax",
"sub esp, 0x128",
"push esi",
"push edi",
"mov eax, dword [section..data]",
"xor eax, ebp",
"push eax",
"lea eax, [ebp - 0xc]",
"mov dword fs:[0], eax",
"mov edi, ecx",
"mov dwo... |
0086498d0fcd5fc1246d4575ad4278654ede09e92b73b20b7c9e6dca6b651034 | 0x409450 | [
"Check if file exists",
"Get file attributes"
] | 8379140872028b0951ff1510c1440083f8ff7407a8107403b001c332c0c3 | [
"cmp dword [ecx + 0x14], 8",
"jb 0x409458",
"mov ecx, dword [ecx]",
"push ecx",
"call dword [sym.imp.KERNEL32.dll_GetFileAttributesW]",
"cmp eax, 0xffffffff",
"je 0x40946b",
"test al, 0x10",
"je 0x40946b",
"mov al, 1",
"ret",
"xor al, al",
"ret"
] |
0086498d0fcd5fc1246d4575ad4278654ede09e92b73b20b7c9e6dca6b651034 | 0x40d7a0 | [
"Get memory capacity"
] | 558bec83ec48a10070460033c58945fc8b410483f802744f83f801744a8d45b8c745b84000000050ff1564c044008b4dc08b45c40facc114c1e81485c00f85be00000081f9002200000f87b20000005051e8ca13030083c4088b4dfc33cde8cd6c03008be55dc38d45b8c745b84000000050ff1564c044008b4dc08b45c40facc114c1e81485c0757881f900220000777085c0755981f9001c0000775185c075... | [
"push ebp",
"mov ebp, esp",
"sub esp, 0x48",
"mov eax, dword [section..data]",
"xor eax, ebp",
"mov dword [ebp - 4], eax",
"mov eax, dword [ecx + 4]",
"cmp eax, 2",
"je 0x40d807",
"cmp eax, 1",
"je 0x40d807",
"lea eax, [ebp - 0x48]",
"mov dword [ebp - 0x48], 0x40",
"push eax",
"call dwor... |
0086498d0fcd5fc1246d4575ad4278654ede09e92b73b20b7c9e6dca6b651034 | 0x40db70 | [
"Get memory capacity"
] | 558bec83ec50a10070460033c58945f88b4508535657837814088bfa8bd972028b0050ff1504c344008bf083c40481fe0001000072618d45b4c745b00020000050c745b440000000ff1564c044008b4dbc8d55f48b45c00facc114c1e81481f9002000008d45b0894df40f4ec23b3077268b0b8d45f45068300245008975f4e84ce0ffffb0015f5e5b8b4df833cde8cd6803008be55dc36a106840e844008bcf... | [
"push ebp",
"mov ebp, esp",
"sub esp, 0x50",
"mov eax, dword [section..data]",
"xor eax, ebp",
"mov dword [ebp - 8], eax",
"mov eax, dword [ebp + 8]",
"push ebx",
"push esi",
"push edi",
"cmp dword [eax + 0x14], 8",
"mov edi, edx",
"mov ebx, ecx",
"jb 0x40db92",
"mov eax, dword [eax]",
... |
0086498d0fcd5fc1246d4575ad4278654ede09e92b73b20b7c9e6dca6b651034 | 0x40ff40 | [
"Check mutex on windows"
] | 558bec6aff68f165440064a1000000005081ece0020000a10070460033c58945ec535657508d45f464a3000000008b45080f57c0660fd645e0c745e8000000008945c4c745e000000000c745e400000000c745e800000000b9108a4600c745fc00000000e8176f020083ec188bc4c70054eb44008d4de0894804b9108a4600894010c645fc00e8f55202008b5de433d28b7de08bc38b352cc344002bc78955d8... | [
"push ebp",
"mov ebp, esp",
"push 0xffffffffffffffff",
"push 0x4465f1",
"mov eax, dword fs:[0]",
"push eax",
"sub esp, 0x2e0",
"mov eax, dword [section..data]",
"xor eax, ebp",
"mov dword [ebp - 0x14], eax",
"push ebx",
"push esi",
"push edi",
"push eax",
"lea eax, [ebp - 0xc]",
"mov d... |
0086498d0fcd5fc1246d4575ad4278654ede09e92b73b20b7c9e6dca6b651034 | 0x410a50 | [
"Check mutex on windows"
] | 558bec6aff682367440064a1000000005081ece4010000a10070460033c58945f0535657508d45f464a3000000008b4d0cb8abaaaa2a8b7d0833db894d94897d988b318b49042bce895dacf7e9c1fa028bc2c1e81f03c20f84970600008b3d2cc3440033c9894d9c3bc30f86c2060000837c3114088d043172028b0050ff1504c3440083c4048945a08d886179feff81f96079fe000f96c184c974438d8d64ff... | [
"push ebp",
"mov ebp, esp",
"push 0xffffffffffffffff",
"push 0x446723",
"mov eax, dword fs:[0]",
"push eax",
"sub esp, 0x1e4",
"mov eax, dword [section..data]",
"xor eax, ebp",
"mov dword [ebp - 0x10], eax",
"push ebx",
"push esi",
"push edi",
"push eax",
"lea eax, [ebp - 0xc]",
"mov d... |
0086498d0fcd5fc1246d4575ad4278654ede09e92b73b20b7c9e6dca6b651034 | 0x411190 | [
"Check mutex on windows"
] | 558bec8b450883ec20538b5d0c56578b388b40042bc7c1f8063bd80f8dc60100008b75188bd3c1e20689550c8d642400ff343a8bcee8f641020084c0740d8b4d0cc744393c03000000eb1c8b450c8bceff3438e8784202008b4d0c84c07408c744393c04000000807d10008b04398bf0740881ce00000001eb0e807d140074088bf081ce00000005508d45e4c744393c000000008b4d1850e863390200837814... | [
"push ebp",
"mov ebp, esp",
"mov eax, dword [ebp + 8]",
"sub esp, 0x20",
"push ebx",
"mov ebx, dword [ebp + 0xc]",
"push esi",
"push edi",
"mov edi, dword [eax]",
"mov eax, dword [eax + 4]",
"sub eax, edi",
"sar eax, 6",
"cmp ebx, eax",
"jge 0x411377",
"mov esi, dword [ebp + 0x18]",
"m... |
0086498d0fcd5fc1246d4575ad4278654ede09e92b73b20b7c9e6dca6b651034 | 0x414e80 | [
"Write file on windows"
] | 558bec83e4f86aff68c86d440064a1000000005083ec30a10070460033c489442428535657a10070460033c4508d44244064a3000000008bf18b5d0883fbff750733c0e9870100008b46208b0885c974228b56308b3a8d040f3bc873168d47ff89028b4e208b118d42018901881ae95a010000837e5000750883c8ffe94e0100008b460c8b088d46443bc87510ff763c8b46388bce5050ff15e8c14400837e40... | [
"push ebp",
"mov ebp, esp",
"and esp, 0xfffffff8",
"push 0xffffffffffffffff",
"push 0x446dc8",
"mov eax, dword fs:[0]",
"push eax",
"sub esp, 0x30",
"mov eax, dword [section..data]",
"xor eax, esp",
"mov dword [esp + 0x28], eax",
"push ebx",
"push esi",
"push edi",
"mov eax, dword [secti... |
0086498d0fcd5fc1246d4575ad4278654ede09e92b73b20b7c9e6dca6b651034 | 0x415ee0 | [
"Write file on windows"
] | 558bec83e4f86aff68586f440064a1000000005083ec28a10070460033c489442420535657a10070460033c4508d44243864a3000000008bf1837e40000f84ee000000807e45000f84e40000008b066affff500c83f8ff750732c0e9d300000083ec088d4c2420e8844e0000c7442440000000008d7e488b5c242c8d442414508b44242c8d54241c83fb108d4c241c0f434c241c0f4354241c03c250518b4e40... | [
"push ebp",
"mov ebp, esp",
"and esp, 0xfffffff8",
"push 0xffffffffffffffff",
"push 0x446f58",
"mov eax, dword fs:[0]",
"push eax",
"sub esp, 0x28",
"mov eax, dword [section..data]",
"xor eax, esp",
"mov dword [esp + 0x20], eax",
"push ebx",
"push esi",
"push edi",
"mov eax, dword [secti... |
0086498d0fcd5fc1246d4575ad4278654ede09e92b73b20b7c9e6dca6b651034 | 0x41baf0 | [
"Enumerate files on windows",
"Enumerate files recursively"
] | 558bec6aff68a773440064a1000000005081ec0c030000a10070460033c58945f0535657508d45f464a3000000008bc2898504fdffff8bf989bd24fdffff50e80c91000083c404c7458c0700000033c0c74588000000008d8d78ffffff66898578ffffff6aff5057e8d392feff6a0468bc0e45008d8d78ffffffc745fc00000000e81a83feff837d8c088d8d28fdffff8d8578ffffff0f438578ffffff5150ff... | [
"push ebp",
"mov ebp, esp",
"push 0xffffffffffffffff",
"push 0x4473a7",
"mov eax, dword fs:[0]",
"push eax",
"sub esp, 0x30c",
"mov eax, dword [section..data]",
"xor eax, ebp",
"mov dword [ebp - 0x10], eax",
"push ebx",
"push esi",
"push edi",
"push eax",
"lea eax, [ebp - 0xc]",
"mov d... |
0086498d0fcd5fc1246d4575ad4278654ede09e92b73b20b7c9e6dca6b651034 | 0x41f060 | [
"Get number of processors"
] | 558bec6aff688a77440064a100000000505156a10070460033c5508d45f464a3000000008bf18975f0c7461000000000c745fc0000000033c0c7462c07000000c746280000000066894618c746440f00000089464088463083ec08c645fc0289464889464ce8060600008946488d4650c645fc036a0250ff1528c2440083c40885c0740a50ff1524c2440083c4048d4654c645fc0450ff1540c2440083c40485... | [
"push ebp",
"mov ebp, esp",
"push 0xffffffffffffffff",
"push 0x44778a",
"mov eax, dword fs:[0]",
"push eax",
"push ecx",
"push esi",
"mov eax, dword [section..data]",
"xor eax, ebp",
"push eax",
"lea eax, [ebp - 0xc]",
"mov dword fs:[0], eax",
"mov esi, ecx",
"mov dword [ebp - 0x10], esi... |
0086498d0fcd5fc1246d4575ad4278654ede09e92b73b20b7c9e6dca6b651034 | 0x4208a0 | [
"Get mac address on windows"
] | 558bec6aff68db79440064a1000000005081ec40020000a10070460033c58945ec535657508d45f464a3000000008bd9e86bfaffff8b350cc044008d85d0fdffff506a00c785d0fdffff00000000ffd685c0740583f86f752fffb5d0fdffff6a40ff151cc044008bf889bdccfdffff85ff74158d85d0fdffff5057ffd685c0742557ff1518c0440033c08b4df464890d00000000595f5e5b8b4dec33cde88e3b... | [
"push ebp",
"mov ebp, esp",
"push 0xffffffffffffffff",
"push 0x4479db",
"mov eax, dword fs:[0]",
"push eax",
"sub esp, 0x240",
"mov eax, dword [section..data]",
"xor eax, ebp",
"mov dword [ebp - 0x14], eax",
"push ebx",
"push esi",
"push edi",
"push eax",
"lea eax, [ebp - 0xc]",
"mov d... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.