sha256 stringlengths 64 64 | func_addr stringlengths 7 14 | capa listlengths 1 30 | bytes stringlengths 2 1.17M | disasm listlengths 1 116k |
|---|---|---|---|---|
f53a5abe6cd77afda63f23dd6f0e75472256e1f40737ab4e61eea0208fed039d | 0x46f4c5 | [
"Capture webcam image"
] | 83ec445355568bf1578b463c85c00f840901000050ff154cf64b0085c00f84fa0000008b463c50e808f003008bf085f60f84e70000008b5c24588b4e1c8b2d58f64b006a0053681904000051ffd58bf885ff0f8cc50000008bcee811ffffff3bf80f8db60000008b86c40000008b96c00000008944242c8b44245c33c9895424283bc189442430894c2434894c244c894c2450897c2438750ac7442434010000... | [
"sub esp, 0x44",
"push ebx",
"push ebp",
"push esi",
"mov esi, ecx",
"push edi",
"mov eax, dword [esi + 0x3c]",
"test eax, eax",
"je 0x46f5dd",
"push eax",
"call dword [sym.imp.USER32.dll_IsWindow]",
"test eax, eax",
"je 0x46f5dd",
"mov eax, dword [esi + 0x3c]",
"push eax",
"call fcn.0... |
f53a5abe6cd77afda63f23dd6f0e75472256e1f40737ab4e61eea0208fed039d | 0x476960 | [
"Access peb ldr_data",
"Get ntdll base address"
] | 6aff6808d14b0064a100000000506489250000000083ec2c8b44244053568d4c240850518b4c244ce8c30300008bf08d54244833db528d4c241c895c2440c744244c24c05300e8db4a01008b0d881d4e008a065153568d4c2430c64424480188442430895c2434895c2438895c243ce8acd6ffffbee01d4e00897424188b44240cc644243c033bc3741d8d48ff8a40ff3ac3740a3cff7406fec88801eb0951e8... | [
"push 0xffffffffffffffff",
"push 0x4bd108",
"mov eax, dword fs:[0]",
"push eax",
"mov dword fs:[0], esp",
"sub esp, 0x2c",
"mov eax, dword [esp + 0x40]",
"push ebx",
"push esi",
"lea ecx, [esp + 8]",
"push eax",
"push ecx",
"mov ecx, dword [esp + 0x4c]",
"call fcn.00476d50",
"mov esi, ea... |
f53a5abe6cd77afda63f23dd6f0e75472256e1f40737ab4e61eea0208fed039d | 0x47d7bd | [
"Access peb ldr_data"
] | 64a1000000006aff6808d54b00506489250000000083ec148b44242853568bf133db578b564085d20f95c34385c0740380cf808d4c240ce8a45300008b54243083c9ff8bfa33c0f2aef7d149c74424280000000051528d4c2414e8f15600008d44240c53508bcee8340000008d4c240cc7442428ffffffffc744240cf8214e00e85b5500008b4c24205f5e5b64890d0000000083c420c20800 | [
"mov eax, dword fs:[0]",
"push 0xffffffffffffffff",
"push 0x4bd508",
"push eax",
"mov dword fs:[0], esp",
"sub esp, 0x14",
"mov eax, dword [esp + 0x28]",
"push ebx",
"push esi",
"mov esi, ecx",
"xor ebx, ebx",
"push edi",
"mov edx, dword [esi + 0x40]",
"test edx, edx",
"setne bl",
"inc... |
f53a5abe6cd77afda63f23dd6f0e75472256e1f40737ab4e61eea0208fed039d | 0x47e6e0 | [
"Resolve function by parsing pe exports"
] | 83ec4c5355568bf185f6570f844c0200008b460885c00f8e410200008b0e85c90f8e370200008b460485c00f8e2c0200008b7c246c85ff0f84200200008b470885c00f8e150200008b2f85ed0f8e0b0200008b570485d20f8e000200008b5c24608b44246403cb89442440894c24448b4e0403c88b442470894c24488b4c24748944242c03e803d1894c24308d44242c895424388d4c243c508d542450515289... | [
"sub esp, 0x4c",
"push ebx",
"push ebp",
"push esi",
"mov esi, ecx",
"test esi, esi",
"push edi",
"je 0x47e93d",
"mov eax, dword [esi + 8]",
"test eax, eax",
"jle 0x47e93d",
"mov ecx, dword [esi]",
"test ecx, ecx",
"jle 0x47e93d",
"mov eax, dword [esi + 4]",
"test eax, eax",
"jle 0x4... |
f53a5abe6cd77afda63f23dd6f0e75472256e1f40737ab4e61eea0208fed039d | 0x4803e0 | [
"Capture screenshot"
] | 6aff684ed64b0064a100000000506489250000000081ec84000000535556578bbc24a40000008bd98bcfe85a2803008b8c24a8000000e87d3303008b4b1c8d4424585051ff1538f64b008b7424648b4c245c8b6c24608b4424582bf12be8897424200f847003000085f60f84680300006a00ff15a4f14b00508bcfe8a12703008bd633c0f7da3bf8c744246828000000896c246c8954247066c7442474010066... | [
"push 0xffffffffffffffff",
"push 0x4bd64e",
"mov eax, dword fs:[0]",
"push eax",
"mov dword fs:[0], esp",
"sub esp, 0x84",
"push ebx",
"push ebp",
"push esi",
"push edi",
"mov edi, dword [esp + 0xa4]",
"mov ebx, ecx",
"mov ecx, edi",
"call fcn.004b2c69",
"mov ecx, dword [esp + 0xa8]",
... |
f53a5abe6cd77afda63f23dd6f0e75472256e1f40737ab4e61eea0208fed039d | 0x4826b0 | [
"Log keystrokes via polling"
] | 538bd955568b833c0100005785c07e3c8b834001000085c07e328b2d4cf54b0033f68dbb500100008b0785c0740850ffd56685c07c0e4683c70483fe0672e95f5e5d5bc3568bcbe8b4fcffff5f5e5d5bc3 | [
"push ebx",
"mov ebx, ecx",
"push ebp",
"push esi",
"mov eax, dword [ebx + 0x13c]",
"push edi",
"test eax, eax",
"jle 0x4826fc",
"mov eax, dword [ebx + 0x140]",
"test eax, eax",
"jle 0x4826fc",
"mov ebp, dword [sym.imp.USER32.dll_GetKeyState]",
"xor esi, esi",
"lea edi, [ebx + 0x150]",
"... |
f53a5abe6cd77afda63f23dd6f0e75472256e1f40737ab4e61eea0208fed039d | 0x4859b0 | [
"Resolve function by parsing pe exports"
] | 81ec9c000000568bf1897424188b864c04000085c00f84300600008b8424a400000083f8017d05b8010000008b8c24a80000008944241483f901c744240c010000007c04894c240cdb4618538b9e440400000fafd8da7424185557f6c303895c243cdb461cda742418d95c2428740a43f6c30375fa895c243cd80d1c284e00e814390000d9442428d80d1c284e0089442450e8013900008bfb894424580faf7c... | [
"sub esp, 0x9c",
"push esi",
"mov esi, ecx",
"mov dword [esp + 0x18], esi",
"mov eax, dword [esi + 0x44c]",
"test eax, eax",
"je 0x485ffb",
"mov eax, dword [esp + 0xa4]",
"cmp eax, 1",
"jge 0x4859dc",
"mov eax, 1",
"mov ecx, dword [esp + 0xa8]",
"mov dword [esp + 0x14], eax",
"cmp ecx, 1",... |
f53a5abe6cd77afda63f23dd6f0e75472256e1f40737ab4e61eea0208fed039d | 0x4864f0 | [
"Create thread"
] | 5183b9cc0000000174568b411c85c0744f8b81b000000085c0744556ba050000008bb1bc0000003bf25e74348981b4000000c78194000000000000008991bc0000008d442400506a005168606548006a006a00ff1588f34b0050ff15d0f34b0059c3 | [
"push ecx",
"cmp dword [ecx + 0xcc], 1",
"je 0x486550",
"mov eax, dword [ecx + 0x1c]",
"test eax, eax",
"je 0x486550",
"mov eax, dword [ecx + 0xb0]",
"test eax, eax",
"je 0x486550",
"push esi",
"mov edx, 5",
"mov esi, dword [ecx + 0xbc]",
"cmp esi, edx",
"pop esi",
"je 0x486550",
"mov ... |
f53a5abe6cd77afda63f23dd6f0e75472256e1f40737ab4e61eea0208fed039d | 0x486570 | [
"Capture screenshot",
"Check for time delay via gettickcount"
] | 6aff6858d94b0064a100000000506489250000000083ec445355568bf1578b461c50ff1504f64b008bf8897c243ce8cd88ffff5057ff1578f14b008b2da4f14b0057ffd5578bd8ffd58be889bea4000000896c2410c7442418000000008b86c400000085c0740a8b86c400000085c075f6c786c4000000010000008b86c000000085c00f85b00000008b8ed80000008b96d4000000515257ff1574f14b005055... | [
"push 0xffffffffffffffff",
"push 0x4bd958",
"mov eax, dword fs:[0]",
"push eax",
"mov dword fs:[0], esp",
"sub esp, 0x44",
"push ebx",
"push ebp",
"push esi",
"mov esi, ecx",
"push edi",
"mov eax, dword [esi + 0x1c]",
"push eax",
"call dword [sym.imp.USER32.dll_GetDC]",
"mov edi, eax",
... |
f53a5abe6cd77afda63f23dd6f0e75472256e1f40737ab4e61eea0208fed039d | 0x49d4e0 | [
"Resolve function by parsing pe exports"
] | 6aff6832e74b0064a100000000506489250000000081eccc000000a020df5500535533ed5657a801896c244c754a0c01b940df5500a220df55008d44243750e83c0a00008d4c241b8d5424135152b94cdf5500c78424ec00000001000000e8ed0a000068b0dc4900c68424e800000000e89ad3feff83c4048bbc24f00000008d4424145750b94cdf5500e8511100008b18a150df55003bd80f84150100008b0d... | [
"push 0xffffffffffffffff",
"push 0x4be732",
"mov eax, dword fs:[0]",
"push eax",
"mov dword fs:[0], esp",
"sub esp, 0xcc",
"mov al, byte [0x55df20]",
"push ebx",
"push ebp",
"xor ebp, ebp",
"push esi",
"push edi",
"test al, 1",
"mov dword [esp + 0x4c], ebp",
"jne 0x49d558",
"or al, 1",... |
f53a5abe6cd77afda63f23dd6f0e75472256e1f40737ab4e61eea0208fed039d | 0x4a1460 | [
"Resolve function by parsing pe exports"
] | 64a1000000006aff68e8e84b00506489250000000083ec5c5355568bf1578b464c8b56488d7e4c3bc20f85870000008b5644bb050000002bc28be88b068b480c85c9750389580c8b46488b0e8d54242889078b095352e80587ffff8b06c7442474000000008b4008a9000004007527558d4c242c53518d4c2454e8316d00008d4c2448c644247401e8036f00008d4c2448e8aa6e00006a018d4c242ce81a66ff... | [
"mov eax, dword fs:[0]",
"push 0xffffffffffffffff",
"push 0x4be8e8",
"push eax",
"mov dword fs:[0], esp",
"sub esp, 0x5c",
"push ebx",
"push ebp",
"push esi",
"mov esi, ecx",
"push edi",
"mov eax, dword [esi + 0x4c]",
"mov edx, dword [esi + 0x48]",
"lea edi, [esi + 0x4c]",
"cmp eax, edx"... |
f53a5abe6cd77afda63f23dd6f0e75472256e1f40737ab4e61eea0208fed039d | 0x4a2a50 | [
"Access peb ldr_data",
"Get kernel32 base address"
] | 6aff6840e94b0064a100000000506489250000000083ec2c8a44243c5333db568bf188442410895c2414895c2418895c241c8b4c244453895c2440884424288b118d4c242889542424e87d50ffffa118644e008d4c24105053518d4c2430e89a4fffff8d5424208d44240852508bcec644244401e8970a00008b308b48048b4424283bc3894c240c741d8d48ff8a40ff3ac3740a3cff7406fec88801eb0951e8... | [
"push 0xffffffffffffffff",
"push 0x4be940",
"mov eax, dword fs:[0]",
"push eax",
"mov dword fs:[0], esp",
"sub esp, 0x2c",
"mov al, byte [esp + 0x3c]",
"push ebx",
"xor ebx, ebx",
"push esi",
"mov esi, ecx",
"mov byte [esp + 0x10], al",
"mov dword [esp + 0x14], ebx",
"mov dword [esp + 0x18... |
f53a5abe6cd77afda63f23dd6f0e75472256e1f40737ab4e61eea0208fed039d | 0x4a5a60 | [
"Resolve function by parsing pe exports"
] | 64a1000000006aff6810ea4b00506489250000000083ec6053558be956578b450005280100008b48048b50082bd183c20383e2fc03d18950088b450885c074218b7d00508bcd81c728010000e89f84ffff8b4f088b77048b55082bce2bc8894a048b4d00ba0801000081c128010000e8ec34ffff8b942480000000894508c74004000000008b4508c7000f0000008b7d088a4a20897c2418884c241383c708b9... | [
"mov eax, dword fs:[0]",
"push 0xffffffffffffffff",
"push 0x4bea10",
"push eax",
"mov dword fs:[0], esp",
"sub esp, 0x60",
"push ebx",
"push ebp",
"mov ebp, ecx",
"push esi",
"push edi",
"mov eax, dword [ebp]",
"add eax, 0x128",
"mov ecx, dword [eax + 4]",
"mov edx, dword [eax + 8]",
"... |
f53a5abe6cd77afda63f23dd6f0e75472256e1f40737ab4e61eea0208fed039d | 0x4a60c0 | [
"Resolve function by parsing pe exports"
] | 64a1000000006aff6876ea4b00506489250000000081ec98000000535556578bf98b0f81c128010000e8022fffff8b470885c074208b37508bcf81c628010000e84b7effff8b4e088b5e048b57082bcb2bc8894a048b0fba2000000081c128010000e8992effff8b9c24b8000000894708c74004000000008b4708c7000e0000008b4b088b53048b47082bcad1f98948088b4b182b4b14d1f9d1e989480c8b4b... | [
"mov eax, dword fs:[0]",
"push 0xffffffffffffffff",
"push 0x4bea76",
"push eax",
"mov dword fs:[0], esp",
"sub esp, 0x98",
"push ebx",
"push ebp",
"push esi",
"push edi",
"mov edi, ecx",
"mov ecx, dword [edi]",
"add ecx, 0x128",
"call fcn.00498ff0",
"mov eax, dword [edi + 8]",
"test ea... |
f53a5abe6cd77afda63f23dd6f0e75472256e1f40737ab4e61eea0208fed039d | 0x4a8e50 | [
"Resolve function by parsing pe exports"
] | 6aff68feec4b0064a100000000506489250000000081ec6401000053558bd95657b94000000033c08d7b0433edf3ab896c241c896c24208d44244889ac247c01000050e898caffff83c4048b442450c684247c010000013bc50f84280100008d5424488d4c2414e8f40300008b0883c004894c241c508d4c2424c684248001000002e839f4feff8b4c2418c684247c010000013bcd7405e8a4f3feff396c241c... | [
"push 0xffffffffffffffff",
"push 0x4becfe",
"mov eax, dword fs:[0]",
"push eax",
"mov dword fs:[0], esp",
"sub esp, 0x164",
"push ebx",
"push ebp",
"mov ebx, ecx",
"push esi",
"push edi",
"mov ecx, 0x40",
"xor eax, eax",
"lea edi, [ebx + 4]",
"xor ebp, ebp",
"rep stosd dword es:[edi], ... |
f53a5abe6cd77afda63f23dd6f0e75472256e1f40737ab4e61eea0208fed039d | 0x4aee98 | [
"Get graphical window text"
] | 568bf18b4e3885c9752eff761cff15acf44b008d4801518b4c240c50e896e0ffff50ff761cff15c0f44b008b4c24086affe859e0ffffeb0c8b01ff742408ff90880000005ec20400 | [
"push esi",
"mov esi, ecx",
"mov ecx, dword [esi + 0x38]",
"test ecx, ecx",
"jne 0x4aeed0",
"push dword [esi + 0x1c]",
"call dword [sym.imp.USER32.dll_GetWindowTextLengthA]",
"lea ecx, [eax + 1]",
"push ecx",
"mov ecx, dword [esp + 0xc]",
"push eax",
"call fcn.004acf4f",
"push eax",
"push ... |
f53a5abe6cd77afda63f23dd6f0e75472256e1f40737ab4e61eea0208fed039d | 0x4b0589 | [
"Extract resource via kernel32 functions"
] | 53565733ff397c24108bd97435e8d45f00008b700c68f0000000ff74241456ff151cf34b003bc774195056ff1520f34b003bc7750433c0eb1150ff1524f34b008bf8578bcbe8060000005f5e5bc20400 | [
"push ebx",
"push esi",
"push edi",
"xor edi, edi",
"cmp dword [esp + 0x10], edi",
"mov ebx, ecx",
"je 0x4b05cb",
"call fcn.004b656f",
"mov esi, dword [eax + 0xc]",
"push 0xf0",
"push dword [esp + 0x14]",
"push esi",
"call dword [sym.imp.KERNEL32.dll_FindResourceA]",
"cmp eax, edi",
"je ... |
f53a5abe6cd77afda63f23dd6f0e75472256e1f40737ab4e61eea0208fed039d | 0x4b6a9f | [
"Get thread local storage value"
] | 53568bf18d5e1c53ff15f4f24b00837c241000751aff36ff1524f24b0085c0742cff74240c8bce50e83affffffeb1e8b461485c0741757ff7424108b78048bce50e821ffffff85ff8bc775eb5f53ff15f8f24b005e5bc20800 | [
"push ebx",
"push esi",
"mov esi, ecx",
"lea ebx, [esi + 0x1c]",
"push ebx",
"call dword [sym.imp.KERNEL32.dll_EnterCriticalSection]",
"cmp dword [esp + 0x10], 0",
"jne 0x4b6acd",
"push dword [esi]",
"call dword [sym.imp.KERNEL32.dll_TlsGetValue]",
"test eax, eax",
"je 0x4b6aeb",
"push dword... |
f53ed0aa57df018e466900aefe881b8395c6ad68a2ae305f7247c5540a0659ee | 0x402890 | [
"Create process on windows"
] | 558bec6aff684d89410064a1000000005081ec30010000a1e031420033c58945ec535657508d45f464a3000000008965f0c745d00f000000c745cc00000000c645bc008d45bcc745fc0000000050ff350c30420033d2b80800000083ec188bccc741140f000000c7411000000000c60100381558a341000f44c2506858a34100e89bf1ffff8d8d54ffffffe8503900008bc8c645fc01e8c53a000084c0c645fc... | [
"push ebp",
"mov ebp, esp",
"push 0xffffffffffffffff",
"push 0x41894d",
"mov eax, dword fs:[0]",
"push eax",
"sub esp, 0x130",
"mov eax, dword [0x4231e0]",
"xor eax, ebp",
"mov dword [ebp - 0x14], eax",
"push ebx",
"push esi",
"push edi",
"push eax",
"lea eax, [ebp - 0xc]",
"mov dword ... |
f53ed0aa57df018e466900aefe881b8395c6ad68a2ae305f7247c5540a0659ee | 0x4035f0 | [
"Create directory",
"Get common file path",
"Get file size",
"Get startup folder",
"Read file on windows",
"Write file on windows",
"Write file to startup folder"
] | 558bec6aff68788a410064a1000000005081ecb0020000a1e031420033c58945f05657508d45f464a3000000008b7d0833c089bd68fdffffc78560fdffff00000000c785b4fdffff07000000c785b0fdffff00000000668985a0fdffff8945fc8d85e8fdffff506a006a0068238000006a00ff1560a1410085c074138d85a0fdffff8bcf50e846edffffe9ba03000033c0c785e4fdffff07000000c785e0fdff... | [
"push ebp",
"mov ebp, esp",
"push 0xffffffffffffffff",
"push 0x418a78",
"mov eax, dword fs:[0]",
"push eax",
"sub esp, 0x2b0",
"mov eax, dword [0x4231e0]",
"xor eax, ebp",
"mov dword [ebp - 0x10], eax",
"push esi",
"push edi",
"push eax",
"lea eax, [ebp - 0xc]",
"mov dword fs:[0], eax",
... |
f53ed0aa57df018e466900aefe881b8395c6ad68a2ae305f7247c5540a0659ee | 0x404ae0 | [
"Delete file"
] | 568bf1837e140872048b06eb028bc650ff1538a04100837e1408720aff36e8ee2a000083c404c746140700000033c0c74610000000006689065ec3 | [
"push esi",
"mov esi, ecx",
"cmp dword [esi + 0x14], 8",
"jb 0x404aed",
"mov eax, dword [esi]",
"jmp 0x404aef",
"mov eax, esi",
"push eax",
"call dword [sym.imp.KERNEL32.dll_DeleteFileW]",
"cmp dword [esi + 0x14], 8",
"jb 0x404b06",
"push dword [esi]",
"call fcn.004075f1",
"add esp, 4",
... |
f53ed0aa57df018e466900aefe881b8395c6ad68a2ae305f7247c5540a0659ee | 0x404b20 | [
"Get common file path"
] | 558bec6aff683b8b410064a1000000005081ec34040000a1e031420033c58945f056508d45f464a3000000008b750833c0c785c0fbffff00000000c785d8fbffff07000000c785d4fbffff00000000668985c4fbffff8945fc8d85e4fdffff506805010000ff1540a0410085c074383d0501000073318d85dcfbffff506a0068b0a541008d85e4fdffff50ff153ca0410085c074128d85dcfbffff508d8dc4fb... | [
"push ebp",
"mov ebp, esp",
"push 0xffffffffffffffff",
"push 0x418b3b",
"mov eax, dword fs:[0]",
"push eax",
"sub esp, 0x434",
"mov eax, dword [0x4231e0]",
"xor eax, ebp",
"mov dword [ebp - 0x10], eax",
"push esi",
"push eax",
"lea eax, [ebp - 0xc]",
"mov dword fs:[0], eax",
"mov esi, dw... |
f53ed0aa57df018e466900aefe881b8395c6ad68a2ae305f7247c5540a0659ee | 0x4059e0 | [
"Initialize winhttp library",
"Prepare http request",
"Read http header",
"Receive http response",
"Write file on windows"
] | 558bec6aff68348c410064a1000000005081ecd4000000a1e031420033c58945f0535657508d45f464a3000000008b75088b7d0c6a006a006a006a016870a64100ff158ca141008bd8899d70ffffff85dbc745fc000000000f95c084c07528c7458c88a641008d458c508d4d80e841370000c7458044a64100687c1242008d458050e89c2300006a3c8d8520ffffff6a0050e8192f000083c40cc78520ffffff... | [
"push ebp",
"mov ebp, esp",
"push 0xffffffffffffffff",
"push 0x418c34",
"mov eax, dword fs:[0]",
"push eax",
"sub esp, 0xd4",
"mov eax, dword [0x4231e0]",
"xor eax, ebp",
"mov dword [ebp - 0x10], eax",
"push ebx",
"push esi",
"push edi",
"push eax",
"lea eax, [ebp - 0xc]",
"mov dword f... |
f53ed0aa57df018e466900aefe881b8395c6ad68a2ae305f7247c5540a0659ee | 0x4063f0 | [
"Get file size",
"Read file on windows"
] | 558bec6aff68b08c410064a1000000005083ec40a1e031420033c58945f0535657508d45f464a300000000894dcc8b45088945c88d45d850e8a3feffff83c4048378140872028b006a0068800000006a036a006a01680000008050ff1544a041008bf08975c0837dec08c745fc00000000720bff75d8e88611000083c40433c0c745ec07000000c745e800000000668945d883feff750432c0eb788945d432db... | [
"push ebp",
"mov ebp, esp",
"push 0xffffffffffffffff",
"push 0x418cb0",
"mov eax, dword fs:[0]",
"push eax",
"sub esp, 0x40",
"mov eax, dword [0x4231e0]",
"xor eax, ebp",
"mov dword [ebp - 0x10], eax",
"push ebx",
"push esi",
"push edi",
"push eax",
"lea eax, [ebp - 0xc]",
"mov dword f... |
f53ed0aa57df018e466900aefe881b8395c6ad68a2ae305f7247c5540a0659ee | 0x406ae0 | [
"Encode data using base64 via winapi"
] | 558bec6aff68308d410064a1000000005083ec40a1e031420033c58945f05657508d45f464a3000000008b7d088d45bc8b352ca04100506a006a01ff7510c745b400000000ff750cc745bc00000000ffd685c07512c7471407000000894710668907e91901000033c0c745ec07000000c745e800000000668945d88945fc8b45bc85c0750c33c98945e866894c45d8eb0b6a00508d4dd8e854cfffff837dec08... | [
"push ebp",
"mov ebp, esp",
"push 0xffffffffffffffff",
"push 0x418d30",
"mov eax, dword fs:[0]",
"push eax",
"sub esp, 0x40",
"mov eax, dword [0x4231e0]",
"xor eax, ebp",
"mov dword [ebp - 0x10], eax",
"push esi",
"push edi",
"push eax",
"lea eax, [ebp - 0xc]",
"mov dword fs:[0], eax",
... |
f53ed0aa57df018e466900aefe881b8395c6ad68a2ae305f7247c5540a0659ee | 0x406f90 | [
"Create new key via cryptacquirecontext",
"Hash data via wincrypt",
"Import public key",
"Initialize hashing via wincrypt"
] | 558bec6aff68b88d410064a1000000005083ec5c535657a1e031420033c5508d45f464a3000000008bd98b3d28a041008d45f06a006a00506a006a00ff751cc745f000000000ff7518ffd785c0751632c08b4df464890d00000000595f5e5b8be55dc21800ff75f08d4d98e850fdffff8b75988d45f06a006a0050566a00ff751cc745fc00000000ff7518ffd785c00f84bb010000ff75f08d4d98e820f1ffff... | [
"push ebp",
"mov ebp, esp",
"push 0xffffffffffffffff",
"push 0x418db8",
"mov eax, dword fs:[0]",
"push eax",
"sub esp, 0x5c",
"push ebx",
"push esi",
"push edi",
"mov eax, dword [0x4231e0]",
"xor eax, ebp",
"push eax",
"lea eax, [ebp - 0xc]",
"mov dword fs:[0], eax",
"mov ebx, ecx",
... |
f53ed0aa57df018e466900aefe881b8395c6ad68a2ae305f7247c5540a0659ee | 0x40fad8 | [
"Link many functions at runtime",
"Print debug messages"
] | 558bec83ec24a1e031420033c58945fc8b4508538b1dc0a0410056578945e433f68b450c568945e0ffd38bf8897de8e832c3ffff8945ec3935205042000f85b000000068000800005668e8e84100ff1530a141008bf885ff7526ff15a0a0410083f8570f856a010000565668e8e84100ff1530a141008bf885ff0f84530100006800e9410057ff1514a1410085c00f843f01000050ffd3680ce9410057a32050... | [
"push ebp",
"mov ebp, esp",
"sub esp, 0x24",
"mov eax, dword [0x4231e0]",
"xor eax, ebp",
"mov dword [ebp - 4], eax",
"mov eax, dword [ebp + 8]",
"push ebx",
"mov ebx, dword [sym.imp.KERNEL32.dll_EncodePointer]",
"push esi",
"push edi",
"mov dword [ebp - 0x1c], eax",
"xor esi, esi",
"mov e... |
f5491aaba089deddef82b9d59c00099a19c77bb194571ec372d50ae80a0f5628 | 0x419b00 | [
"Resolve function by parsing pe exports"
] | 60be152041008dbeebeffeff5789e58d9c2480c1ffff29c05039dc75fb46465368317701005783c3045368e67a00005683c3045350c703030002005557565383ec7c8b942490000000c744247400000000c6442473008bac249c0000008d42048944247890906a01580fb64a02505bd3e389d949894c246c0fb64a01d3e048894424688b8424a80000000fb632c7450000000000c744246000000000c7000000... | [
"pushal",
"mov esi, 0x412015",
"lea edi, [esi - 0x11015]",
"push edi",
"mov ebp, esp",
"lea ebx, [esp - 0x3e80]",
"sub eax, eax",
"push eax",
"cmp esp, ebx",
"jne 0x419b18",
"inc esi",
"inc esi",
"push ebx",
"push 0x17731",
"push edi",
"add ebx, 4",
"push ebx",
"push 0x7ae6",
"pu... |
f54fed420a3e936b639e7a30cfbe84d0f5a5f57932bba6870ffbe1d5c114a499 | 0x401c0a | [
"Hash data using sha1"
] | 8b44240433c9c70001234567c7400489abcdefc74008fedcba98c7400c76543210c74010f0e1d2c389481489481889485cc3 | [
"mov eax, dword [esp + 4]",
"xor ecx, ecx",
"mov dword [eax], 0x67452301",
"mov dword [eax + 4], 0xefcdab89",
"mov dword [eax + 8], 0x98badcfe",
"mov dword [eax + 0xc], 0x10325476",
"mov dword [eax + 0x10], 0xc3d2e1f0",
"mov dword [eax + 0x14], ecx",
"mov dword [eax + 0x18], ecx",
"mov dword [eax ... |
f54fed420a3e936b639e7a30cfbe84d0f5a5f57932bba6870ffbe1d5c114a499 | 0x401ce4 | [
"Encode data using xor"
] | 558bec81ec540100008b45085356578d501c8db5acfeffffc74508100000008b0a83c2048bf98bd981e70000ff00c1eb100bfb8bd981e300ff0000c1e1100bd9c1ef08c1e3080bfb893e83c604ff4d0875cd6a408d95b4feffff5e8b4a2c334a18334af8330a83c2048bf903c9c1ef1f0bf94e897a3475e38b78048b50088b700c8b088bdf23d7f7d323de8bf10bda8bd1c1ea1bc1e6050bd68b701003f303d6... | [
"push ebp",
"mov ebp, esp",
"sub esp, 0x154",
"mov eax, dword [ebp + 8]",
"push ebx",
"push esi",
"push edi",
"lea edx, [eax + 0x1c]",
"lea esi, [ebp - 0x154]",
"mov dword [ebp + 8], 0x10",
"mov ecx, dword [edx]",
"add edx, 4",
"mov edi, ecx",
"mov ebx, ecx",
"and edi, 0xff0000",
"shr ... |
f5506cb24e69dc3a95f704898f4113aaf4be6887d6c8d937a98a69cf1a158c56 | 0x41c230 | [
"Packed with generic packer"
] | 60be007041008dbe00a0feff5783cdffeb108a064688074701db75078b1e83eefc11db72edb80100000001db75078b1e83eefc11db11c001db73ef75098b1e83eefc11db73e431c983e803720dc1e0088a064683f0ff747489c501db75078b1e83eefc11db11c901db75078b1e83eefc11db11c975204101db75078b1e83eefc11db11c901db73ef75098b1e83eefc11db73e483c10281fd00f3ffff83d1018d... | [
"pushal",
"mov esi, section.UPX1",
"lea edi, [esi - 0x16000]",
"push edi",
"or ebp, 0xffffffff",
"jmp 0x41c252",
"mov al, byte [esi]",
"inc esi",
"mov byte [edi], al",
"inc edi",
"add ebx, ebx",
"jne 0x41c259",
"mov ebx, dword [esi]",
"sub esi, 0xfffffffc",
"adc ebx, ebx",
"jb 0x41c248... |
f553d1e3fde5eb2077e84279fa19d2a79b2d87bfff28b4feef5bf32ec813691e | 0x411f00 | [
"Parse pe header"
] | 558bec83ec1868b632400064a1000000005064892500000000b814020000e88d13ffff5356578965e8c745ec401c4000c745f000000000c745f400000000c745fc01000000c745fc020000006affff15ac104000c745fc030000008b450850e8cc3800008bd08d4dc0ff15441240008d4dc051e858f6ffff8bd08d4dd0ff15441240008d4dc0ff1574124000c745fc040000008b55d052ff152410400085c075... | [
"push ebp",
"mov ebp, esp",
"sub esp, 0x18",
"push 0x4032b6",
"mov eax, dword fs:[0]",
"push eax",
"mov dword fs:[0], esp",
"mov eax, 0x214",
"call sub.MSVBVM60.DLL___vbaChkstk",
"push ebx",
"push esi",
"push edi",
"mov dword [ebp - 0x18], esp",
"mov dword [ebp - 0x14], 0x401c40",
"mov d... |
f553d1e3fde5eb2077e84279fa19d2a79b2d87bfff28b4feef5bf32ec813691e | 0x41a2b0 | [
"Acquire debug privileges"
] | 558bec83ec1868b632400064a1000000005064892500000000b870000000e8dd8ffeff5356578965e8c745eca0244000c745f000000000c745f400000000c745fc01000000c745fc020000006affff15ac104000c745fc03000000e8a0befeff894594ff15741040008d459c506a288b4d9451e83cbefeff894590ff157410400033d2837d90000f95c2f7da0fbfc285c00f841e010000c745fc0400000033c9... | [
"push ebp",
"mov ebp, esp",
"sub esp, 0x18",
"push 0x4032b6",
"mov eax, dword fs:[0]",
"push eax",
"mov dword fs:[0], esp",
"mov eax, 0x70",
"call sub.MSVBVM60.DLL___vbaChkstk",
"push ebx",
"push esi",
"push edi",
"mov dword [ebp - 0x18], esp",
"mov dword [ebp - 0x14], 0x4024a0",
"mov dw... |
f553d1e3fde5eb2077e84279fa19d2a79b2d87bfff28b4feef5bf32ec813691e | 0x41a5a0 | [
"Check http status code"
] | 558bec83ec1868b632400064a1000000005064892500000000b8e0040000e8ed8cfeff5356578965e8c745ec48254000c745f000000000c745f400000000c745fc010000008b55088d8d7cfdffffff15d41140006a0368788040008d45b850ff150c114000c745fc020000006affff15ac104000c745fc030000006a006a0fe818b7feff89856cfdffffff15741040008b8d6cfdffff894dd8c745fc04000000... | [
"push ebp",
"mov ebp, esp",
"sub esp, 0x18",
"push 0x4032b6",
"mov eax, dword fs:[0]",
"push eax",
"mov dword fs:[0], esp",
"mov eax, 0x4e0",
"call sub.MSVBVM60.DLL___vbaChkstk",
"push ebx",
"push esi",
"push edi",
"mov dword [ebp - 0x18], esp",
"mov dword [ebp - 0x14], 0x402548",
"mov d... |
f55c6daaec3d891d1af94703dc87a9d90b9f91db056bfbac0f8f1922f45698ed | 0x408df0 | [
"Packed with generic packer"
] | 60be158040008dbeeb8fffff57eb0b8a064688074701db75078b1e83eefc11db72edb80100000001db75078b1e83eefc11db11c001db73ef75098b1e83eefc11db73e431c983e803720dc1e0088a064683f0ff747489c501db75078b1e83eefc11db11c901db75078b1e83eefc11db11c975204101db75078b1e83eefc11db11c901db73ef75098b1e83eefc11db73e483c10281fd00f3ffff83d1018d142f83... | [
"pushal",
"mov esi, 0x408015",
"lea edi, [esi - 0x7015]",
"push edi",
"jmp 0x408e0a",
"mov al, byte [esi]",
"inc esi",
"mov byte [edi], al",
"inc edi",
"add ebx, ebx",
"jne 0x408e11",
"mov ebx, dword [esi]",
"sub esi, 0xfffffffc",
"adc ebx, ebx",
"jb 0x408e00",
"mov eax, 1",
"add ebx... |
f56c4cfc3716988563fa638cd5738cf671b04be187b4078bd9afe8e64f6f22fc | 0x401100 | [
"Hide graphical window"
] | 558bec518b4508a3445040006a008b4d08516a006a006a00680000008068000000806800000080680000cf00682852400068905240006a00ff15bc4040008945fc837dfc00750433c0eb1b6a008b55fc52ff15c04040008b45fc50ff15c4404000b8010000008be55dc3 | [
"push ebp",
"mov ebp, esp",
"push ecx",
"mov eax, dword [ebp + 8]",
"mov dword [0x405044], eax",
"push 0",
"mov ecx, dword [ebp + 8]",
"push ecx",
"push 0",
"push 0",
"push 0",
"push 0x80000000",
"push 0x80000000",
"push 0x80000000",
"push 0xcf0000",
"push 0x405228",
"push 0x405290",... |
f56dc2a420f834a09ad7817cc02299db26683d0c0550cabab9e4a3d66391e382 | 0x430004 | [
"Encode data using xor",
"Packed with generic packer"
] | 6090b800104000906a0490909090905f909090909083f800909090909090744e90bbcc8e40009090909089d99029c190909090909031d29090905090909089c89090909090f7f790909090909090919058909090909090be29577e66909090903130909001f8909090909090e2eeb800b042009083f800909090909074509090bbd0e14200909090909089d99029c1909090909031d290909090509090909089... | [
"pushal",
"nop",
"mov eax, section..text",
"nop",
"push 4",
"nop",
"nop",
"nop",
"nop",
"nop",
"pop edi",
"nop",
"nop",
"nop",
"nop",
"nop",
"cmp eax, 0",
"nop",
"nop",
"nop",
"nop",
"nop",
"nop",
"je 0x430072",
"nop",
"mov ebx, 0x408ecc",
"nop",
"nop",
"nop",... |
f5784fbeed208d5ef5f30ce29f24edd674b471ae90eb8f485bb9124f6743034a | 0x4039f6 | [
"Enumerate pe sections",
"Parse pe header"
] | 83ec688d4424105355565750e84f0500008b74247c66813e4d5a740c5f5e5d33c05b83c468c204008b5e3c03de895c2418813b50450000740c5f5e5d33c05b83c468c204008b4b508b53346a0468002000005152ff5424388bf885ff897c241075268b43506a0468002000005057ff54243885c089442410750a5f5e5d5b83c468c204008b7c24106a146a00ff54243c50ff5424508be86a046a08897d04c745... | [
"sub esp, 0x68",
"lea eax, [esp + 0x10]",
"push ebx",
"push ebp",
"push esi",
"push edi",
"push eax",
"call fcn.00403f56",
"mov esi, dword [esp + 0x7c]",
"cmp word [esi], 0x5a4d",
"je 0x403a1e",
"pop edi",
"pop esi",
"pop ebp",
"xor eax, eax",
"pop ebx",
"add esp, 0x68",
"ret 4",
... |
f5784fbeed208d5ef5f30ce29f24edd674b471ae90eb8f485bb9124f6743034a | 0x403da6 | [
"Enumerate pe sections"
] | 83ec50558d4424285750e8a10100008b4c245c33d233edc744240c010000008b39c744241008000000c744241402000000c744241804000000668b571466396f06c744241c10000000c744242080000000c744242420000000c7442428400000008d443a180f869300000053568d58248b038bc88bd0c1e91dc1ea1e8bf083e10183e201c1ee1fa90000000274138b43ec8b4be468004000005051ff54244ceb... | [
"sub esp, 0x50",
"push ebp",
"lea eax, [esp + 0x28]",
"push edi",
"push eax",
"call fcn.00403f56",
"mov ecx, dword [esp + 0x5c]",
"xor edx, edx",
"xor ebp, ebp",
"mov dword [esp + 0xc], 1",
"mov edi, dword [ecx]",
"mov dword [esp + 0x10], 8",
"mov dword [esp + 0x14], 2",
"mov dword [esp + ... |
f5784fbeed208d5ef5f30ce29f24edd674b471ae90eb8f485bb9124f6743034a | 0x403f56 | [
"Access peb ldr_data",
"Contain obfuscated stackstrings",
"Get number of processors"
] | 558bec81ec940000005356575351525633c9648b71308b760c8b761c8b46088b7e208b36384f1875f3909089856cffffff558be88b453c8b54057803d58b4a188b5a2003dd498b348b03f5b847657450390675f1b8726f634139460475e78b5a2403dd668b0c4b8b5a1c03dd8b048b03c55d5e5a595b898570ffffffb172b261b06532dbc68574ffffff56c68575ffffff69888d76ffffffc68577ffffff74c6... | [
"push ebp",
"mov ebp, esp",
"sub esp, 0x94",
"push ebx",
"push esi",
"push edi",
"push ebx",
"push ecx",
"push edx",
"push esi",
"xor ecx, ecx",
"mov esi, dword fs:[ecx + 0x30]",
"mov esi, dword [esi + 0xc]",
"mov esi, dword [esi + 0x1c]",
"mov eax, dword [esi + 8]",
"mov edi, dword [e... |
f5784fbeed208d5ef5f30ce29f24edd674b471ae90eb8f485bb9124f6743034a | 0x432ed0 | [
"Resolve function by parsing pe exports"
] | 6aff68f073500064a100000000506489250000000083ec508b4c246833c03bc88944243c89442438894424488944244c89442440894424440f84000300008d44243850518b4c246c51e8f206020083f8010f85e70200008b54246053558b6c247456578b45008b5d088b75048b4d0c2bd82bce83ea00895c2410894c24748bf80f84210200004a0f844d0100004a0f859c0200008b4424788b68048b40083beb... | [
"push 0xffffffffffffffff",
"push 0x5073f0",
"mov eax, dword fs:[0]",
"push eax",
"mov dword fs:[0], esp",
"sub esp, 0x50",
"mov ecx, dword [esp + 0x68]",
"xor eax, eax",
"cmp ecx, eax",
"mov dword [esp + 0x3c], eax",
"mov dword [esp + 0x38], eax",
"mov dword [esp + 0x48], eax",
"mov dword [e... |
f5784fbeed208d5ef5f30ce29f24edd674b471ae90eb8f485bb9124f6743034a | 0x435fb0 | [
"Enumerate files on windows"
] | 6aff684b77500064a100000000506489250000000081ec8001000053558be98d4c24088d454050e8c3500c008b4c2408c7842490010000000000008b41f885c074408d5424106a01528d4c2410e89b250c008b0068a0325b0050e895160a0083c4088d4c241085c00f95c3e80a530c0084db740e68a0325b008d4c240ce888560c0068646f5b008d4c240ce87a560c008b4c24088d4424485051ff15a4e35000... | [
"push 0xffffffffffffffff",
"push 0x50774b",
"mov eax, dword fs:[0]",
"push eax",
"mov dword fs:[0], esp",
"sub esp, 0x180",
"push ebx",
"push ebp",
"mov ebp, ecx",
"lea ecx, [esp + 8]",
"lea eax, [ebp + 0x40]",
"push eax",
"call fcn.004fb09f",
"mov ecx, dword [esp + 8]",
"mov dword [esp ... |
f5784fbeed208d5ef5f30ce29f24edd674b471ae90eb8f485bb9124f6743034a | 0x437390 | [
"Query or enumerate registry value"
] | 8b4c24088b54240481ec0c0100008d44240056506a016a005152ff150ce050008bf085f6753c8b5424048d4424088d4c240c50515652c744241804010000ff1504e050008b8c241c0100008d44240c5051ff154ce350008b54240452ff1510e050008bc65e81c40c010000c20c00 | [
"mov ecx, dword [esp + 8]",
"mov edx, dword [esp + 4]",
"sub esp, 0x10c",
"lea eax, [esp]",
"push esi",
"push eax",
"push 1",
"push 0",
"push ecx",
"push edx",
"call dword [fcn.0050e00c]",
"mov esi, eax",
"test esi, esi",
"jne 0x4373f2",
"mov edx, dword [esp + 4]",
"lea eax, [esp + 8]"... |
f5784fbeed208d5ef5f30ce29f24edd674b471ae90eb8f485bb9124f6743034a | 0x437400 | [
"Create process on windows"
] | 6aff68ab78500064a100000000506489250000000081ec0c020000a108cd5c0056578bf9894424088b4744c784241c0200000000000085c00f85fa0000008b4f488d77488b41f885c0751b8d4c2408c784241c020000ffffffffe8cb3e0c0033c0e94901000068a46f5b008d4c240ce8f33f0c00568d4c240ce878420c008b4c240853558bac242c020000556a006a0051689c6f5b006a00ff1578e450008bf0... | [
"push 0xffffffffffffffff",
"push 0x5078ab",
"mov eax, dword fs:[0]",
"push eax",
"mov dword fs:[0], esp",
"sub esp, 0x20c",
"mov eax, dword [0x5ccd08]",
"push esi",
"push edi",
"mov edi, ecx",
"mov dword [esp + 8], eax",
"mov eax, dword [edi + 0x44]",
"mov dword [esp + 0x21c], 0",
"test ea... |
f5784fbeed208d5ef5f30ce29f24edd674b471ae90eb8f485bb9124f6743034a | 0x442e10 | [
"Resolve function by parsing pe exports"
] | 81ecd400000053555633f657565668e9030000c74424386400000089742424e8bc2500008be8568b9c24ec00000056896c24588d7b148bcf897c241ce8afcfffff3bc60f845105000039b424ec00000075418d701856e8f5cbfeff03f056e8edcbfeff03f083c4088b3685f674238b461c50ff15ace6500085c074158b86b401000085c074206a006a008bcee84f65000033f683bc24f400000001755489b424... | [
"sub esp, 0xd4",
"push ebx",
"push ebp",
"push esi",
"xor esi, esi",
"push edi",
"push esi",
"push esi",
"push 0x3e9",
"mov dword [esp + 0x38], 0x64",
"mov dword [esp + 0x24], esi",
"call fcn.004453f0",
"mov ebp, eax",
"push esi",
"mov ebx, dword [esp + 0xec]",
"push esi",
"mov dword... |
f5784fbeed208d5ef5f30ce29f24edd674b471ae90eb8f485bb9124f6743034a | 0x444fc0 | [
"Terminate process"
] | 558bec5153568bf1578975fc8b8ee00100008b86340200004185c0898ee00100007459ff152ce350003b8634020000744b8b86f00300008b7d0885c0742050ff15ace6500085c074158b86f00300006a005768e783000050ff15b8e650008b862804000085c00f851203000057ff1530e350005f5e5b8be55dc204008bcec7862804000001000000e803edffff8b96040100008d8e04010000ff52088b861c04... | [
"push ebp",
"mov ebp, esp",
"push ecx",
"push ebx",
"push esi",
"mov esi, ecx",
"push edi",
"mov dword [ebp - 4], esi",
"mov ecx, dword [esi + 0x1e0]",
"mov eax, dword [esi + 0x234]",
"inc ecx",
"test eax, eax",
"mov dword [esi + 0x1e0], ecx",
"je 0x44503c",
"call dword [fcn.0050e32c]",
... |
f5784fbeed208d5ef5f30ce29f24edd674b471ae90eb8f485bb9124f6743034a | 0x445550 | [
"Access peb ldr_data"
] | 6aff68f887500064a100000000506489250000000083ec3055578bf933ed8b4c24488d4424485550518d8f04010000897c2414896c2418896c241ce8c0aeffff85c0752855686c715b008bcfe82ff2ffff8b44240c8b5424105f5d8b4c243064890d0000000083c43cc210008b542448538b5c2450565555538d4a14e8afa8ffff8d4c242c8bf0e8f499feff53896c244ce81ab0ffff83c40485c0747283c618... | [
"push 0xffffffffffffffff",
"push 0x5087f8",
"mov eax, dword fs:[0]",
"push eax",
"mov dword fs:[0], esp",
"sub esp, 0x30",
"push ebp",
"push edi",
"mov edi, ecx",
"xor ebp, ebp",
"mov ecx, dword [esp + 0x48]",
"lea eax, [esp + 0x48]",
"push ebp",
"push eax",
"push ecx",
"lea ecx, [edi ... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.