sha256
stringlengths
64
64
func_addr
stringlengths
7
14
capa
listlengths
1
30
bytes
stringlengths
2
1.17M
disasm
listlengths
1
116k
f53a5abe6cd77afda63f23dd6f0e75472256e1f40737ab4e61eea0208fed039d
0x46f4c5
[ "Capture webcam image" ]
83ec445355568bf1578b463c85c00f840901000050ff154cf64b0085c00f84fa0000008b463c50e808f003008bf085f60f84e70000008b5c24588b4e1c8b2d58f64b006a0053681904000051ffd58bf885ff0f8cc50000008bcee811ffffff3bf80f8db60000008b86c40000008b96c00000008944242c8b44245c33c9895424283bc189442430894c2434894c244c894c2450897c2438750ac7442434010000...
[ "sub esp, 0x44", "push ebx", "push ebp", "push esi", "mov esi, ecx", "push edi", "mov eax, dword [esi + 0x3c]", "test eax, eax", "je 0x46f5dd", "push eax", "call dword [sym.imp.USER32.dll_IsWindow]", "test eax, eax", "je 0x46f5dd", "mov eax, dword [esi + 0x3c]", "push eax", "call fcn.0...
f53a5abe6cd77afda63f23dd6f0e75472256e1f40737ab4e61eea0208fed039d
0x476960
[ "Access peb ldr_data", "Get ntdll base address" ]
6aff6808d14b0064a100000000506489250000000083ec2c8b44244053568d4c240850518b4c244ce8c30300008bf08d54244833db528d4c241c895c2440c744244c24c05300e8db4a01008b0d881d4e008a065153568d4c2430c64424480188442430895c2434895c2438895c243ce8acd6ffffbee01d4e00897424188b44240cc644243c033bc3741d8d48ff8a40ff3ac3740a3cff7406fec88801eb0951e8...
[ "push 0xffffffffffffffff", "push 0x4bd108", "mov eax, dword fs:[0]", "push eax", "mov dword fs:[0], esp", "sub esp, 0x2c", "mov eax, dword [esp + 0x40]", "push ebx", "push esi", "lea ecx, [esp + 8]", "push eax", "push ecx", "mov ecx, dword [esp + 0x4c]", "call fcn.00476d50", "mov esi, ea...
f53a5abe6cd77afda63f23dd6f0e75472256e1f40737ab4e61eea0208fed039d
0x47d7bd
[ "Access peb ldr_data" ]
64a1000000006aff6808d54b00506489250000000083ec148b44242853568bf133db578b564085d20f95c34385c0740380cf808d4c240ce8a45300008b54243083c9ff8bfa33c0f2aef7d149c74424280000000051528d4c2414e8f15600008d44240c53508bcee8340000008d4c240cc7442428ffffffffc744240cf8214e00e85b5500008b4c24205f5e5b64890d0000000083c420c20800
[ "mov eax, dword fs:[0]", "push 0xffffffffffffffff", "push 0x4bd508", "push eax", "mov dword fs:[0], esp", "sub esp, 0x14", "mov eax, dword [esp + 0x28]", "push ebx", "push esi", "mov esi, ecx", "xor ebx, ebx", "push edi", "mov edx, dword [esi + 0x40]", "test edx, edx", "setne bl", "inc...
f53a5abe6cd77afda63f23dd6f0e75472256e1f40737ab4e61eea0208fed039d
0x47e6e0
[ "Resolve function by parsing pe exports" ]
83ec4c5355568bf185f6570f844c0200008b460885c00f8e410200008b0e85c90f8e370200008b460485c00f8e2c0200008b7c246c85ff0f84200200008b470885c00f8e150200008b2f85ed0f8e0b0200008b570485d20f8e000200008b5c24608b44246403cb89442440894c24448b4e0403c88b442470894c24488b4c24748944242c03e803d1894c24308d44242c895424388d4c243c508d542450515289...
[ "sub esp, 0x4c", "push ebx", "push ebp", "push esi", "mov esi, ecx", "test esi, esi", "push edi", "je 0x47e93d", "mov eax, dword [esi + 8]", "test eax, eax", "jle 0x47e93d", "mov ecx, dword [esi]", "test ecx, ecx", "jle 0x47e93d", "mov eax, dword [esi + 4]", "test eax, eax", "jle 0x4...
f53a5abe6cd77afda63f23dd6f0e75472256e1f40737ab4e61eea0208fed039d
0x4803e0
[ "Capture screenshot" ]
6aff684ed64b0064a100000000506489250000000081ec84000000535556578bbc24a40000008bd98bcfe85a2803008b8c24a8000000e87d3303008b4b1c8d4424585051ff1538f64b008b7424648b4c245c8b6c24608b4424582bf12be8897424200f847003000085f60f84680300006a00ff15a4f14b00508bcfe8a12703008bd633c0f7da3bf8c744246828000000896c246c8954247066c7442474010066...
[ "push 0xffffffffffffffff", "push 0x4bd64e", "mov eax, dword fs:[0]", "push eax", "mov dword fs:[0], esp", "sub esp, 0x84", "push ebx", "push ebp", "push esi", "push edi", "mov edi, dword [esp + 0xa4]", "mov ebx, ecx", "mov ecx, edi", "call fcn.004b2c69", "mov ecx, dword [esp + 0xa8]", ...
f53a5abe6cd77afda63f23dd6f0e75472256e1f40737ab4e61eea0208fed039d
0x4826b0
[ "Log keystrokes via polling" ]
538bd955568b833c0100005785c07e3c8b834001000085c07e328b2d4cf54b0033f68dbb500100008b0785c0740850ffd56685c07c0e4683c70483fe0672e95f5e5d5bc3568bcbe8b4fcffff5f5e5d5bc3
[ "push ebx", "mov ebx, ecx", "push ebp", "push esi", "mov eax, dword [ebx + 0x13c]", "push edi", "test eax, eax", "jle 0x4826fc", "mov eax, dword [ebx + 0x140]", "test eax, eax", "jle 0x4826fc", "mov ebp, dword [sym.imp.USER32.dll_GetKeyState]", "xor esi, esi", "lea edi, [ebx + 0x150]", "...
f53a5abe6cd77afda63f23dd6f0e75472256e1f40737ab4e61eea0208fed039d
0x4859b0
[ "Resolve function by parsing pe exports" ]
81ec9c000000568bf1897424188b864c04000085c00f84300600008b8424a400000083f8017d05b8010000008b8c24a80000008944241483f901c744240c010000007c04894c240cdb4618538b9e440400000fafd8da7424185557f6c303895c243cdb461cda742418d95c2428740a43f6c30375fa895c243cd80d1c284e00e814390000d9442428d80d1c284e0089442450e8013900008bfb894424580faf7c...
[ "sub esp, 0x9c", "push esi", "mov esi, ecx", "mov dword [esp + 0x18], esi", "mov eax, dword [esi + 0x44c]", "test eax, eax", "je 0x485ffb", "mov eax, dword [esp + 0xa4]", "cmp eax, 1", "jge 0x4859dc", "mov eax, 1", "mov ecx, dword [esp + 0xa8]", "mov dword [esp + 0x14], eax", "cmp ecx, 1",...
f53a5abe6cd77afda63f23dd6f0e75472256e1f40737ab4e61eea0208fed039d
0x4864f0
[ "Create thread" ]
5183b9cc0000000174568b411c85c0744f8b81b000000085c0744556ba050000008bb1bc0000003bf25e74348981b4000000c78194000000000000008991bc0000008d442400506a005168606548006a006a00ff1588f34b0050ff15d0f34b0059c3
[ "push ecx", "cmp dword [ecx + 0xcc], 1", "je 0x486550", "mov eax, dword [ecx + 0x1c]", "test eax, eax", "je 0x486550", "mov eax, dword [ecx + 0xb0]", "test eax, eax", "je 0x486550", "push esi", "mov edx, 5", "mov esi, dword [ecx + 0xbc]", "cmp esi, edx", "pop esi", "je 0x486550", "mov ...
f53a5abe6cd77afda63f23dd6f0e75472256e1f40737ab4e61eea0208fed039d
0x486570
[ "Capture screenshot", "Check for time delay via gettickcount" ]
6aff6858d94b0064a100000000506489250000000083ec445355568bf1578b461c50ff1504f64b008bf8897c243ce8cd88ffff5057ff1578f14b008b2da4f14b0057ffd5578bd8ffd58be889bea4000000896c2410c7442418000000008b86c400000085c0740a8b86c400000085c075f6c786c4000000010000008b86c000000085c00f85b00000008b8ed80000008b96d4000000515257ff1574f14b005055...
[ "push 0xffffffffffffffff", "push 0x4bd958", "mov eax, dword fs:[0]", "push eax", "mov dword fs:[0], esp", "sub esp, 0x44", "push ebx", "push ebp", "push esi", "mov esi, ecx", "push edi", "mov eax, dword [esi + 0x1c]", "push eax", "call dword [sym.imp.USER32.dll_GetDC]", "mov edi, eax", ...
f53a5abe6cd77afda63f23dd6f0e75472256e1f40737ab4e61eea0208fed039d
0x49d4e0
[ "Resolve function by parsing pe exports" ]
6aff6832e74b0064a100000000506489250000000081eccc000000a020df5500535533ed5657a801896c244c754a0c01b940df5500a220df55008d44243750e83c0a00008d4c241b8d5424135152b94cdf5500c78424ec00000001000000e8ed0a000068b0dc4900c68424e800000000e89ad3feff83c4048bbc24f00000008d4424145750b94cdf5500e8511100008b18a150df55003bd80f84150100008b0d...
[ "push 0xffffffffffffffff", "push 0x4be732", "mov eax, dword fs:[0]", "push eax", "mov dword fs:[0], esp", "sub esp, 0xcc", "mov al, byte [0x55df20]", "push ebx", "push ebp", "xor ebp, ebp", "push esi", "push edi", "test al, 1", "mov dword [esp + 0x4c], ebp", "jne 0x49d558", "or al, 1",...
f53a5abe6cd77afda63f23dd6f0e75472256e1f40737ab4e61eea0208fed039d
0x4a1460
[ "Resolve function by parsing pe exports" ]
64a1000000006aff68e8e84b00506489250000000083ec5c5355568bf1578b464c8b56488d7e4c3bc20f85870000008b5644bb050000002bc28be88b068b480c85c9750389580c8b46488b0e8d54242889078b095352e80587ffff8b06c7442474000000008b4008a9000004007527558d4c242c53518d4c2454e8316d00008d4c2448c644247401e8036f00008d4c2448e8aa6e00006a018d4c242ce81a66ff...
[ "mov eax, dword fs:[0]", "push 0xffffffffffffffff", "push 0x4be8e8", "push eax", "mov dword fs:[0], esp", "sub esp, 0x5c", "push ebx", "push ebp", "push esi", "mov esi, ecx", "push edi", "mov eax, dword [esi + 0x4c]", "mov edx, dword [esi + 0x48]", "lea edi, [esi + 0x4c]", "cmp eax, edx"...
f53a5abe6cd77afda63f23dd6f0e75472256e1f40737ab4e61eea0208fed039d
0x4a2a50
[ "Access peb ldr_data", "Get kernel32 base address" ]
6aff6840e94b0064a100000000506489250000000083ec2c8a44243c5333db568bf188442410895c2414895c2418895c241c8b4c244453895c2440884424288b118d4c242889542424e87d50ffffa118644e008d4c24105053518d4c2430e89a4fffff8d5424208d44240852508bcec644244401e8970a00008b308b48048b4424283bc3894c240c741d8d48ff8a40ff3ac3740a3cff7406fec88801eb0951e8...
[ "push 0xffffffffffffffff", "push 0x4be940", "mov eax, dword fs:[0]", "push eax", "mov dword fs:[0], esp", "sub esp, 0x2c", "mov al, byte [esp + 0x3c]", "push ebx", "xor ebx, ebx", "push esi", "mov esi, ecx", "mov byte [esp + 0x10], al", "mov dword [esp + 0x14], ebx", "mov dword [esp + 0x18...
f53a5abe6cd77afda63f23dd6f0e75472256e1f40737ab4e61eea0208fed039d
0x4a5a60
[ "Resolve function by parsing pe exports" ]
64a1000000006aff6810ea4b00506489250000000083ec6053558be956578b450005280100008b48048b50082bd183c20383e2fc03d18950088b450885c074218b7d00508bcd81c728010000e89f84ffff8b4f088b77048b55082bce2bc8894a048b4d00ba0801000081c128010000e8ec34ffff8b942480000000894508c74004000000008b4508c7000f0000008b7d088a4a20897c2418884c241383c708b9...
[ "mov eax, dword fs:[0]", "push 0xffffffffffffffff", "push 0x4bea10", "push eax", "mov dword fs:[0], esp", "sub esp, 0x60", "push ebx", "push ebp", "mov ebp, ecx", "push esi", "push edi", "mov eax, dword [ebp]", "add eax, 0x128", "mov ecx, dword [eax + 4]", "mov edx, dword [eax + 8]", "...
f53a5abe6cd77afda63f23dd6f0e75472256e1f40737ab4e61eea0208fed039d
0x4a60c0
[ "Resolve function by parsing pe exports" ]
64a1000000006aff6876ea4b00506489250000000081ec98000000535556578bf98b0f81c128010000e8022fffff8b470885c074208b37508bcf81c628010000e84b7effff8b4e088b5e048b57082bcb2bc8894a048b0fba2000000081c128010000e8992effff8b9c24b8000000894708c74004000000008b4708c7000e0000008b4b088b53048b47082bcad1f98948088b4b182b4b14d1f9d1e989480c8b4b...
[ "mov eax, dword fs:[0]", "push 0xffffffffffffffff", "push 0x4bea76", "push eax", "mov dword fs:[0], esp", "sub esp, 0x98", "push ebx", "push ebp", "push esi", "push edi", "mov edi, ecx", "mov ecx, dword [edi]", "add ecx, 0x128", "call fcn.00498ff0", "mov eax, dword [edi + 8]", "test ea...
f53a5abe6cd77afda63f23dd6f0e75472256e1f40737ab4e61eea0208fed039d
0x4a8e50
[ "Resolve function by parsing pe exports" ]
6aff68feec4b0064a100000000506489250000000081ec6401000053558bd95657b94000000033c08d7b0433edf3ab896c241c896c24208d44244889ac247c01000050e898caffff83c4048b442450c684247c010000013bc50f84280100008d5424488d4c2414e8f40300008b0883c004894c241c508d4c2424c684248001000002e839f4feff8b4c2418c684247c010000013bcd7405e8a4f3feff396c241c...
[ "push 0xffffffffffffffff", "push 0x4becfe", "mov eax, dword fs:[0]", "push eax", "mov dword fs:[0], esp", "sub esp, 0x164", "push ebx", "push ebp", "mov ebx, ecx", "push esi", "push edi", "mov ecx, 0x40", "xor eax, eax", "lea edi, [ebx + 4]", "xor ebp, ebp", "rep stosd dword es:[edi], ...
f53a5abe6cd77afda63f23dd6f0e75472256e1f40737ab4e61eea0208fed039d
0x4aee98
[ "Get graphical window text" ]
568bf18b4e3885c9752eff761cff15acf44b008d4801518b4c240c50e896e0ffff50ff761cff15c0f44b008b4c24086affe859e0ffffeb0c8b01ff742408ff90880000005ec20400
[ "push esi", "mov esi, ecx", "mov ecx, dword [esi + 0x38]", "test ecx, ecx", "jne 0x4aeed0", "push dword [esi + 0x1c]", "call dword [sym.imp.USER32.dll_GetWindowTextLengthA]", "lea ecx, [eax + 1]", "push ecx", "mov ecx, dword [esp + 0xc]", "push eax", "call fcn.004acf4f", "push eax", "push ...
f53a5abe6cd77afda63f23dd6f0e75472256e1f40737ab4e61eea0208fed039d
0x4b0589
[ "Extract resource via kernel32 functions" ]
53565733ff397c24108bd97435e8d45f00008b700c68f0000000ff74241456ff151cf34b003bc774195056ff1520f34b003bc7750433c0eb1150ff1524f34b008bf8578bcbe8060000005f5e5bc20400
[ "push ebx", "push esi", "push edi", "xor edi, edi", "cmp dword [esp + 0x10], edi", "mov ebx, ecx", "je 0x4b05cb", "call fcn.004b656f", "mov esi, dword [eax + 0xc]", "push 0xf0", "push dword [esp + 0x14]", "push esi", "call dword [sym.imp.KERNEL32.dll_FindResourceA]", "cmp eax, edi", "je ...
f53a5abe6cd77afda63f23dd6f0e75472256e1f40737ab4e61eea0208fed039d
0x4b6a9f
[ "Get thread local storage value" ]
53568bf18d5e1c53ff15f4f24b00837c241000751aff36ff1524f24b0085c0742cff74240c8bce50e83affffffeb1e8b461485c0741757ff7424108b78048bce50e821ffffff85ff8bc775eb5f53ff15f8f24b005e5bc20800
[ "push ebx", "push esi", "mov esi, ecx", "lea ebx, [esi + 0x1c]", "push ebx", "call dword [sym.imp.KERNEL32.dll_EnterCriticalSection]", "cmp dword [esp + 0x10], 0", "jne 0x4b6acd", "push dword [esi]", "call dword [sym.imp.KERNEL32.dll_TlsGetValue]", "test eax, eax", "je 0x4b6aeb", "push dword...
f53ed0aa57df018e466900aefe881b8395c6ad68a2ae305f7247c5540a0659ee
0x402890
[ "Create process on windows" ]
558bec6aff684d89410064a1000000005081ec30010000a1e031420033c58945ec535657508d45f464a3000000008965f0c745d00f000000c745cc00000000c645bc008d45bcc745fc0000000050ff350c30420033d2b80800000083ec188bccc741140f000000c7411000000000c60100381558a341000f44c2506858a34100e89bf1ffff8d8d54ffffffe8503900008bc8c645fc01e8c53a000084c0c645fc...
[ "push ebp", "mov ebp, esp", "push 0xffffffffffffffff", "push 0x41894d", "mov eax, dword fs:[0]", "push eax", "sub esp, 0x130", "mov eax, dword [0x4231e0]", "xor eax, ebp", "mov dword [ebp - 0x14], eax", "push ebx", "push esi", "push edi", "push eax", "lea eax, [ebp - 0xc]", "mov dword ...
f53ed0aa57df018e466900aefe881b8395c6ad68a2ae305f7247c5540a0659ee
0x4035f0
[ "Create directory", "Get common file path", "Get file size", "Get startup folder", "Read file on windows", "Write file on windows", "Write file to startup folder" ]
558bec6aff68788a410064a1000000005081ecb0020000a1e031420033c58945f05657508d45f464a3000000008b7d0833c089bd68fdffffc78560fdffff00000000c785b4fdffff07000000c785b0fdffff00000000668985a0fdffff8945fc8d85e8fdffff506a006a0068238000006a00ff1560a1410085c074138d85a0fdffff8bcf50e846edffffe9ba03000033c0c785e4fdffff07000000c785e0fdff...
[ "push ebp", "mov ebp, esp", "push 0xffffffffffffffff", "push 0x418a78", "mov eax, dword fs:[0]", "push eax", "sub esp, 0x2b0", "mov eax, dword [0x4231e0]", "xor eax, ebp", "mov dword [ebp - 0x10], eax", "push esi", "push edi", "push eax", "lea eax, [ebp - 0xc]", "mov dword fs:[0], eax", ...
f53ed0aa57df018e466900aefe881b8395c6ad68a2ae305f7247c5540a0659ee
0x404ae0
[ "Delete file" ]
568bf1837e140872048b06eb028bc650ff1538a04100837e1408720aff36e8ee2a000083c404c746140700000033c0c74610000000006689065ec3
[ "push esi", "mov esi, ecx", "cmp dword [esi + 0x14], 8", "jb 0x404aed", "mov eax, dword [esi]", "jmp 0x404aef", "mov eax, esi", "push eax", "call dword [sym.imp.KERNEL32.dll_DeleteFileW]", "cmp dword [esi + 0x14], 8", "jb 0x404b06", "push dword [esi]", "call fcn.004075f1", "add esp, 4", ...
f53ed0aa57df018e466900aefe881b8395c6ad68a2ae305f7247c5540a0659ee
0x404b20
[ "Get common file path" ]
558bec6aff683b8b410064a1000000005081ec34040000a1e031420033c58945f056508d45f464a3000000008b750833c0c785c0fbffff00000000c785d8fbffff07000000c785d4fbffff00000000668985c4fbffff8945fc8d85e4fdffff506805010000ff1540a0410085c074383d0501000073318d85dcfbffff506a0068b0a541008d85e4fdffff50ff153ca0410085c074128d85dcfbffff508d8dc4fb...
[ "push ebp", "mov ebp, esp", "push 0xffffffffffffffff", "push 0x418b3b", "mov eax, dword fs:[0]", "push eax", "sub esp, 0x434", "mov eax, dword [0x4231e0]", "xor eax, ebp", "mov dword [ebp - 0x10], eax", "push esi", "push eax", "lea eax, [ebp - 0xc]", "mov dword fs:[0], eax", "mov esi, dw...
f53ed0aa57df018e466900aefe881b8395c6ad68a2ae305f7247c5540a0659ee
0x4059e0
[ "Initialize winhttp library", "Prepare http request", "Read http header", "Receive http response", "Write file on windows" ]
558bec6aff68348c410064a1000000005081ecd4000000a1e031420033c58945f0535657508d45f464a3000000008b75088b7d0c6a006a006a006a016870a64100ff158ca141008bd8899d70ffffff85dbc745fc000000000f95c084c07528c7458c88a641008d458c508d4d80e841370000c7458044a64100687c1242008d458050e89c2300006a3c8d8520ffffff6a0050e8192f000083c40cc78520ffffff...
[ "push ebp", "mov ebp, esp", "push 0xffffffffffffffff", "push 0x418c34", "mov eax, dword fs:[0]", "push eax", "sub esp, 0xd4", "mov eax, dword [0x4231e0]", "xor eax, ebp", "mov dword [ebp - 0x10], eax", "push ebx", "push esi", "push edi", "push eax", "lea eax, [ebp - 0xc]", "mov dword f...
f53ed0aa57df018e466900aefe881b8395c6ad68a2ae305f7247c5540a0659ee
0x4063f0
[ "Get file size", "Read file on windows" ]
558bec6aff68b08c410064a1000000005083ec40a1e031420033c58945f0535657508d45f464a300000000894dcc8b45088945c88d45d850e8a3feffff83c4048378140872028b006a0068800000006a036a006a01680000008050ff1544a041008bf08975c0837dec08c745fc00000000720bff75d8e88611000083c40433c0c745ec07000000c745e800000000668945d883feff750432c0eb788945d432db...
[ "push ebp", "mov ebp, esp", "push 0xffffffffffffffff", "push 0x418cb0", "mov eax, dword fs:[0]", "push eax", "sub esp, 0x40", "mov eax, dword [0x4231e0]", "xor eax, ebp", "mov dword [ebp - 0x10], eax", "push ebx", "push esi", "push edi", "push eax", "lea eax, [ebp - 0xc]", "mov dword f...
f53ed0aa57df018e466900aefe881b8395c6ad68a2ae305f7247c5540a0659ee
0x406ae0
[ "Encode data using base64 via winapi" ]
558bec6aff68308d410064a1000000005083ec40a1e031420033c58945f05657508d45f464a3000000008b7d088d45bc8b352ca04100506a006a01ff7510c745b400000000ff750cc745bc00000000ffd685c07512c7471407000000894710668907e91901000033c0c745ec07000000c745e800000000668945d88945fc8b45bc85c0750c33c98945e866894c45d8eb0b6a00508d4dd8e854cfffff837dec08...
[ "push ebp", "mov ebp, esp", "push 0xffffffffffffffff", "push 0x418d30", "mov eax, dword fs:[0]", "push eax", "sub esp, 0x40", "mov eax, dword [0x4231e0]", "xor eax, ebp", "mov dword [ebp - 0x10], eax", "push esi", "push edi", "push eax", "lea eax, [ebp - 0xc]", "mov dword fs:[0], eax", ...
f53ed0aa57df018e466900aefe881b8395c6ad68a2ae305f7247c5540a0659ee
0x406f90
[ "Create new key via cryptacquirecontext", "Hash data via wincrypt", "Import public key", "Initialize hashing via wincrypt" ]
558bec6aff68b88d410064a1000000005083ec5c535657a1e031420033c5508d45f464a3000000008bd98b3d28a041008d45f06a006a00506a006a00ff751cc745f000000000ff7518ffd785c0751632c08b4df464890d00000000595f5e5b8be55dc21800ff75f08d4d98e850fdffff8b75988d45f06a006a0050566a00ff751cc745fc00000000ff7518ffd785c00f84bb010000ff75f08d4d98e820f1ffff...
[ "push ebp", "mov ebp, esp", "push 0xffffffffffffffff", "push 0x418db8", "mov eax, dword fs:[0]", "push eax", "sub esp, 0x5c", "push ebx", "push esi", "push edi", "mov eax, dword [0x4231e0]", "xor eax, ebp", "push eax", "lea eax, [ebp - 0xc]", "mov dword fs:[0], eax", "mov ebx, ecx", ...
f53ed0aa57df018e466900aefe881b8395c6ad68a2ae305f7247c5540a0659ee
0x40fad8
[ "Link many functions at runtime", "Print debug messages" ]
558bec83ec24a1e031420033c58945fc8b4508538b1dc0a0410056578945e433f68b450c568945e0ffd38bf8897de8e832c3ffff8945ec3935205042000f85b000000068000800005668e8e84100ff1530a141008bf885ff7526ff15a0a0410083f8570f856a010000565668e8e84100ff1530a141008bf885ff0f84530100006800e9410057ff1514a1410085c00f843f01000050ffd3680ce9410057a32050...
[ "push ebp", "mov ebp, esp", "sub esp, 0x24", "mov eax, dword [0x4231e0]", "xor eax, ebp", "mov dword [ebp - 4], eax", "mov eax, dword [ebp + 8]", "push ebx", "mov ebx, dword [sym.imp.KERNEL32.dll_EncodePointer]", "push esi", "push edi", "mov dword [ebp - 0x1c], eax", "xor esi, esi", "mov e...
f5491aaba089deddef82b9d59c00099a19c77bb194571ec372d50ae80a0f5628
0x419b00
[ "Resolve function by parsing pe exports" ]
60be152041008dbeebeffeff5789e58d9c2480c1ffff29c05039dc75fb46465368317701005783c3045368e67a00005683c3045350c703030002005557565383ec7c8b942490000000c744247400000000c6442473008bac249c0000008d42048944247890906a01580fb64a02505bd3e389d949894c246c0fb64a01d3e048894424688b8424a80000000fb632c7450000000000c744246000000000c7000000...
[ "pushal", "mov esi, 0x412015", "lea edi, [esi - 0x11015]", "push edi", "mov ebp, esp", "lea ebx, [esp - 0x3e80]", "sub eax, eax", "push eax", "cmp esp, ebx", "jne 0x419b18", "inc esi", "inc esi", "push ebx", "push 0x17731", "push edi", "add ebx, 4", "push ebx", "push 0x7ae6", "pu...
f54fed420a3e936b639e7a30cfbe84d0f5a5f57932bba6870ffbe1d5c114a499
0x401c0a
[ "Hash data using sha1" ]
8b44240433c9c70001234567c7400489abcdefc74008fedcba98c7400c76543210c74010f0e1d2c389481489481889485cc3
[ "mov eax, dword [esp + 4]", "xor ecx, ecx", "mov dword [eax], 0x67452301", "mov dword [eax + 4], 0xefcdab89", "mov dword [eax + 8], 0x98badcfe", "mov dword [eax + 0xc], 0x10325476", "mov dword [eax + 0x10], 0xc3d2e1f0", "mov dword [eax + 0x14], ecx", "mov dword [eax + 0x18], ecx", "mov dword [eax ...
f54fed420a3e936b639e7a30cfbe84d0f5a5f57932bba6870ffbe1d5c114a499
0x401ce4
[ "Encode data using xor" ]
558bec81ec540100008b45085356578d501c8db5acfeffffc74508100000008b0a83c2048bf98bd981e70000ff00c1eb100bfb8bd981e300ff0000c1e1100bd9c1ef08c1e3080bfb893e83c604ff4d0875cd6a408d95b4feffff5e8b4a2c334a18334af8330a83c2048bf903c9c1ef1f0bf94e897a3475e38b78048b50088b700c8b088bdf23d7f7d323de8bf10bda8bd1c1ea1bc1e6050bd68b701003f303d6...
[ "push ebp", "mov ebp, esp", "sub esp, 0x154", "mov eax, dword [ebp + 8]", "push ebx", "push esi", "push edi", "lea edx, [eax + 0x1c]", "lea esi, [ebp - 0x154]", "mov dword [ebp + 8], 0x10", "mov ecx, dword [edx]", "add edx, 4", "mov edi, ecx", "mov ebx, ecx", "and edi, 0xff0000", "shr ...
f5506cb24e69dc3a95f704898f4113aaf4be6887d6c8d937a98a69cf1a158c56
0x41c230
[ "Packed with generic packer" ]
60be007041008dbe00a0feff5783cdffeb108a064688074701db75078b1e83eefc11db72edb80100000001db75078b1e83eefc11db11c001db73ef75098b1e83eefc11db73e431c983e803720dc1e0088a064683f0ff747489c501db75078b1e83eefc11db11c901db75078b1e83eefc11db11c975204101db75078b1e83eefc11db11c901db73ef75098b1e83eefc11db73e483c10281fd00f3ffff83d1018d...
[ "pushal", "mov esi, section.UPX1", "lea edi, [esi - 0x16000]", "push edi", "or ebp, 0xffffffff", "jmp 0x41c252", "mov al, byte [esi]", "inc esi", "mov byte [edi], al", "inc edi", "add ebx, ebx", "jne 0x41c259", "mov ebx, dword [esi]", "sub esi, 0xfffffffc", "adc ebx, ebx", "jb 0x41c248...
f553d1e3fde5eb2077e84279fa19d2a79b2d87bfff28b4feef5bf32ec813691e
0x411f00
[ "Parse pe header" ]
558bec83ec1868b632400064a1000000005064892500000000b814020000e88d13ffff5356578965e8c745ec401c4000c745f000000000c745f400000000c745fc01000000c745fc020000006affff15ac104000c745fc030000008b450850e8cc3800008bd08d4dc0ff15441240008d4dc051e858f6ffff8bd08d4dd0ff15441240008d4dc0ff1574124000c745fc040000008b55d052ff152410400085c075...
[ "push ebp", "mov ebp, esp", "sub esp, 0x18", "push 0x4032b6", "mov eax, dword fs:[0]", "push eax", "mov dword fs:[0], esp", "mov eax, 0x214", "call sub.MSVBVM60.DLL___vbaChkstk", "push ebx", "push esi", "push edi", "mov dword [ebp - 0x18], esp", "mov dword [ebp - 0x14], 0x401c40", "mov d...
f553d1e3fde5eb2077e84279fa19d2a79b2d87bfff28b4feef5bf32ec813691e
0x41a2b0
[ "Acquire debug privileges" ]
558bec83ec1868b632400064a1000000005064892500000000b870000000e8dd8ffeff5356578965e8c745eca0244000c745f000000000c745f400000000c745fc01000000c745fc020000006affff15ac104000c745fc03000000e8a0befeff894594ff15741040008d459c506a288b4d9451e83cbefeff894590ff157410400033d2837d90000f95c2f7da0fbfc285c00f841e010000c745fc0400000033c9...
[ "push ebp", "mov ebp, esp", "sub esp, 0x18", "push 0x4032b6", "mov eax, dword fs:[0]", "push eax", "mov dword fs:[0], esp", "mov eax, 0x70", "call sub.MSVBVM60.DLL___vbaChkstk", "push ebx", "push esi", "push edi", "mov dword [ebp - 0x18], esp", "mov dword [ebp - 0x14], 0x4024a0", "mov dw...
f553d1e3fde5eb2077e84279fa19d2a79b2d87bfff28b4feef5bf32ec813691e
0x41a5a0
[ "Check http status code" ]
558bec83ec1868b632400064a1000000005064892500000000b8e0040000e8ed8cfeff5356578965e8c745ec48254000c745f000000000c745f400000000c745fc010000008b55088d8d7cfdffffff15d41140006a0368788040008d45b850ff150c114000c745fc020000006affff15ac104000c745fc030000006a006a0fe818b7feff89856cfdffffff15741040008b8d6cfdffff894dd8c745fc04000000...
[ "push ebp", "mov ebp, esp", "sub esp, 0x18", "push 0x4032b6", "mov eax, dword fs:[0]", "push eax", "mov dword fs:[0], esp", "mov eax, 0x4e0", "call sub.MSVBVM60.DLL___vbaChkstk", "push ebx", "push esi", "push edi", "mov dword [ebp - 0x18], esp", "mov dword [ebp - 0x14], 0x402548", "mov d...
f55c6daaec3d891d1af94703dc87a9d90b9f91db056bfbac0f8f1922f45698ed
0x408df0
[ "Packed with generic packer" ]
60be158040008dbeeb8fffff57eb0b8a064688074701db75078b1e83eefc11db72edb80100000001db75078b1e83eefc11db11c001db73ef75098b1e83eefc11db73e431c983e803720dc1e0088a064683f0ff747489c501db75078b1e83eefc11db11c901db75078b1e83eefc11db11c975204101db75078b1e83eefc11db11c901db73ef75098b1e83eefc11db73e483c10281fd00f3ffff83d1018d142f83...
[ "pushal", "mov esi, 0x408015", "lea edi, [esi - 0x7015]", "push edi", "jmp 0x408e0a", "mov al, byte [esi]", "inc esi", "mov byte [edi], al", "inc edi", "add ebx, ebx", "jne 0x408e11", "mov ebx, dword [esi]", "sub esi, 0xfffffffc", "adc ebx, ebx", "jb 0x408e00", "mov eax, 1", "add ebx...
f56c4cfc3716988563fa638cd5738cf671b04be187b4078bd9afe8e64f6f22fc
0x401100
[ "Hide graphical window" ]
558bec518b4508a3445040006a008b4d08516a006a006a00680000008068000000806800000080680000cf00682852400068905240006a00ff15bc4040008945fc837dfc00750433c0eb1b6a008b55fc52ff15c04040008b45fc50ff15c4404000b8010000008be55dc3
[ "push ebp", "mov ebp, esp", "push ecx", "mov eax, dword [ebp + 8]", "mov dword [0x405044], eax", "push 0", "mov ecx, dword [ebp + 8]", "push ecx", "push 0", "push 0", "push 0", "push 0x80000000", "push 0x80000000", "push 0x80000000", "push 0xcf0000", "push 0x405228", "push 0x405290",...
f56dc2a420f834a09ad7817cc02299db26683d0c0550cabab9e4a3d66391e382
0x430004
[ "Encode data using xor", "Packed with generic packer" ]
6090b800104000906a0490909090905f909090909083f800909090909090744e90bbcc8e40009090909089d99029c190909090909031d29090905090909089c89090909090f7f790909090909090919058909090909090be29577e66909090903130909001f8909090909090e2eeb800b042009083f800909090909074509090bbd0e14200909090909089d99029c1909090909031d290909090509090909089...
[ "pushal", "nop", "mov eax, section..text", "nop", "push 4", "nop", "nop", "nop", "nop", "nop", "pop edi", "nop", "nop", "nop", "nop", "nop", "cmp eax, 0", "nop", "nop", "nop", "nop", "nop", "nop", "je 0x430072", "nop", "mov ebx, 0x408ecc", "nop", "nop", "nop",...
f5784fbeed208d5ef5f30ce29f24edd674b471ae90eb8f485bb9124f6743034a
0x4039f6
[ "Enumerate pe sections", "Parse pe header" ]
83ec688d4424105355565750e84f0500008b74247c66813e4d5a740c5f5e5d33c05b83c468c204008b5e3c03de895c2418813b50450000740c5f5e5d33c05b83c468c204008b4b508b53346a0468002000005152ff5424388bf885ff897c241075268b43506a0468002000005057ff54243885c089442410750a5f5e5d5b83c468c204008b7c24106a146a00ff54243c50ff5424508be86a046a08897d04c745...
[ "sub esp, 0x68", "lea eax, [esp + 0x10]", "push ebx", "push ebp", "push esi", "push edi", "push eax", "call fcn.00403f56", "mov esi, dword [esp + 0x7c]", "cmp word [esi], 0x5a4d", "je 0x403a1e", "pop edi", "pop esi", "pop ebp", "xor eax, eax", "pop ebx", "add esp, 0x68", "ret 4", ...
f5784fbeed208d5ef5f30ce29f24edd674b471ae90eb8f485bb9124f6743034a
0x403da6
[ "Enumerate pe sections" ]
83ec50558d4424285750e8a10100008b4c245c33d233edc744240c010000008b39c744241008000000c744241402000000c744241804000000668b571466396f06c744241c10000000c744242080000000c744242420000000c7442428400000008d443a180f869300000053568d58248b038bc88bd0c1e91dc1ea1e8bf083e10183e201c1ee1fa90000000274138b43ec8b4be468004000005051ff54244ceb...
[ "sub esp, 0x50", "push ebp", "lea eax, [esp + 0x28]", "push edi", "push eax", "call fcn.00403f56", "mov ecx, dword [esp + 0x5c]", "xor edx, edx", "xor ebp, ebp", "mov dword [esp + 0xc], 1", "mov edi, dword [ecx]", "mov dword [esp + 0x10], 8", "mov dword [esp + 0x14], 2", "mov dword [esp + ...
f5784fbeed208d5ef5f30ce29f24edd674b471ae90eb8f485bb9124f6743034a
0x403f56
[ "Access peb ldr_data", "Contain obfuscated stackstrings", "Get number of processors" ]
558bec81ec940000005356575351525633c9648b71308b760c8b761c8b46088b7e208b36384f1875f3909089856cffffff558be88b453c8b54057803d58b4a188b5a2003dd498b348b03f5b847657450390675f1b8726f634139460475e78b5a2403dd668b0c4b8b5a1c03dd8b048b03c55d5e5a595b898570ffffffb172b261b06532dbc68574ffffff56c68575ffffff69888d76ffffffc68577ffffff74c6...
[ "push ebp", "mov ebp, esp", "sub esp, 0x94", "push ebx", "push esi", "push edi", "push ebx", "push ecx", "push edx", "push esi", "xor ecx, ecx", "mov esi, dword fs:[ecx + 0x30]", "mov esi, dword [esi + 0xc]", "mov esi, dword [esi + 0x1c]", "mov eax, dword [esi + 8]", "mov edi, dword [e...
f5784fbeed208d5ef5f30ce29f24edd674b471ae90eb8f485bb9124f6743034a
0x432ed0
[ "Resolve function by parsing pe exports" ]
6aff68f073500064a100000000506489250000000083ec508b4c246833c03bc88944243c89442438894424488944244c89442440894424440f84000300008d44243850518b4c246c51e8f206020083f8010f85e70200008b54246053558b6c247456578b45008b5d088b75048b4d0c2bd82bce83ea00895c2410894c24748bf80f84210200004a0f844d0100004a0f859c0200008b4424788b68048b40083beb...
[ "push 0xffffffffffffffff", "push 0x5073f0", "mov eax, dword fs:[0]", "push eax", "mov dword fs:[0], esp", "sub esp, 0x50", "mov ecx, dword [esp + 0x68]", "xor eax, eax", "cmp ecx, eax", "mov dword [esp + 0x3c], eax", "mov dword [esp + 0x38], eax", "mov dword [esp + 0x48], eax", "mov dword [e...
f5784fbeed208d5ef5f30ce29f24edd674b471ae90eb8f485bb9124f6743034a
0x435fb0
[ "Enumerate files on windows" ]
6aff684b77500064a100000000506489250000000081ec8001000053558be98d4c24088d454050e8c3500c008b4c2408c7842490010000000000008b41f885c074408d5424106a01528d4c2410e89b250c008b0068a0325b0050e895160a0083c4088d4c241085c00f95c3e80a530c0084db740e68a0325b008d4c240ce888560c0068646f5b008d4c240ce87a560c008b4c24088d4424485051ff15a4e35000...
[ "push 0xffffffffffffffff", "push 0x50774b", "mov eax, dword fs:[0]", "push eax", "mov dword fs:[0], esp", "sub esp, 0x180", "push ebx", "push ebp", "mov ebp, ecx", "lea ecx, [esp + 8]", "lea eax, [ebp + 0x40]", "push eax", "call fcn.004fb09f", "mov ecx, dword [esp + 8]", "mov dword [esp ...
f5784fbeed208d5ef5f30ce29f24edd674b471ae90eb8f485bb9124f6743034a
0x437390
[ "Query or enumerate registry value" ]
8b4c24088b54240481ec0c0100008d44240056506a016a005152ff150ce050008bf085f6753c8b5424048d4424088d4c240c50515652c744241804010000ff1504e050008b8c241c0100008d44240c5051ff154ce350008b54240452ff1510e050008bc65e81c40c010000c20c00
[ "mov ecx, dword [esp + 8]", "mov edx, dword [esp + 4]", "sub esp, 0x10c", "lea eax, [esp]", "push esi", "push eax", "push 1", "push 0", "push ecx", "push edx", "call dword [fcn.0050e00c]", "mov esi, eax", "test esi, esi", "jne 0x4373f2", "mov edx, dword [esp + 4]", "lea eax, [esp + 8]"...
f5784fbeed208d5ef5f30ce29f24edd674b471ae90eb8f485bb9124f6743034a
0x437400
[ "Create process on windows" ]
6aff68ab78500064a100000000506489250000000081ec0c020000a108cd5c0056578bf9894424088b4744c784241c0200000000000085c00f85fa0000008b4f488d77488b41f885c0751b8d4c2408c784241c020000ffffffffe8cb3e0c0033c0e94901000068a46f5b008d4c240ce8f33f0c00568d4c240ce878420c008b4c240853558bac242c020000556a006a0051689c6f5b006a00ff1578e450008bf0...
[ "push 0xffffffffffffffff", "push 0x5078ab", "mov eax, dword fs:[0]", "push eax", "mov dword fs:[0], esp", "sub esp, 0x20c", "mov eax, dword [0x5ccd08]", "push esi", "push edi", "mov edi, ecx", "mov dword [esp + 8], eax", "mov eax, dword [edi + 0x44]", "mov dword [esp + 0x21c], 0", "test ea...
f5784fbeed208d5ef5f30ce29f24edd674b471ae90eb8f485bb9124f6743034a
0x442e10
[ "Resolve function by parsing pe exports" ]
81ecd400000053555633f657565668e9030000c74424386400000089742424e8bc2500008be8568b9c24ec00000056896c24588d7b148bcf897c241ce8afcfffff3bc60f845105000039b424ec00000075418d701856e8f5cbfeff03f056e8edcbfeff03f083c4088b3685f674238b461c50ff15ace6500085c074158b86b401000085c074206a006a008bcee84f65000033f683bc24f400000001755489b424...
[ "sub esp, 0xd4", "push ebx", "push ebp", "push esi", "xor esi, esi", "push edi", "push esi", "push esi", "push 0x3e9", "mov dword [esp + 0x38], 0x64", "mov dword [esp + 0x24], esi", "call fcn.004453f0", "mov ebp, eax", "push esi", "mov ebx, dword [esp + 0xec]", "push esi", "mov dword...
f5784fbeed208d5ef5f30ce29f24edd674b471ae90eb8f485bb9124f6743034a
0x444fc0
[ "Terminate process" ]
558bec5153568bf1578975fc8b8ee00100008b86340200004185c0898ee00100007459ff152ce350003b8634020000744b8b86f00300008b7d0885c0742050ff15ace6500085c074158b86f00300006a005768e783000050ff15b8e650008b862804000085c00f851203000057ff1530e350005f5e5b8be55dc204008bcec7862804000001000000e803edffff8b96040100008d8e04010000ff52088b861c04...
[ "push ebp", "mov ebp, esp", "push ecx", "push ebx", "push esi", "mov esi, ecx", "push edi", "mov dword [ebp - 4], esi", "mov ecx, dword [esi + 0x1e0]", "mov eax, dword [esi + 0x234]", "inc ecx", "test eax, eax", "mov dword [esi + 0x1e0], ecx", "je 0x44503c", "call dword [fcn.0050e32c]", ...
f5784fbeed208d5ef5f30ce29f24edd674b471ae90eb8f485bb9124f6743034a
0x445550
[ "Access peb ldr_data" ]
6aff68f887500064a100000000506489250000000083ec3055578bf933ed8b4c24488d4424485550518d8f04010000897c2414896c2418896c241ce8c0aeffff85c0752855686c715b008bcfe82ff2ffff8b44240c8b5424105f5d8b4c243064890d0000000083c43cc210008b542448538b5c2450565555538d4a14e8afa8ffff8d4c242c8bf0e8f499feff53896c244ce81ab0ffff83c40485c0747283c618...
[ "push 0xffffffffffffffff", "push 0x5087f8", "mov eax, dword fs:[0]", "push eax", "mov dword fs:[0], esp", "sub esp, 0x30", "push ebp", "push edi", "mov edi, ecx", "xor ebp, ebp", "mov ecx, dword [esp + 0x48]", "lea eax, [esp + 0x48]", "push ebp", "push eax", "push ecx", "lea ecx, [edi ...