sha256 stringlengths 64 64 | func_addr stringlengths 7 10 | capa listlengths 1 24 | bytes stringlengths 2 521k | disasm listlengths 1 98.5k |
|---|---|---|---|---|
9731edacc5aa9b80c51861d8132e58a053302beb794e5f265c096ce07145e0f4 | 0x402e5b | [
"Check for time delay via gettickcount",
"Write file on windows"
] | 558bec83ec5853568b7514578b7d1033db3bfb8975f87507c745f8008000003bfb895dfc897df47507c745f458d878008b45083bc37c0e8b0df8267a0003c851e8f30100008d45146a0450e8b601000085c00f849c010000f64517800f8433010000ff158c704000816514ffffff7f8945f08b4514c605a0af40000b891db8af40008945080f8e71010000bb58987800be004000003975147d038b75145653e8... | [
"push ebp",
"mov ebp, esp",
"sub esp, 0x58",
"push ebx",
"push esi",
"mov esi, dword [ebp + 0x14]",
"push edi",
"mov edi, dword [ebp + 0x10]",
"xor ebx, ebx",
"cmp edi, ebx",
"mov dword [ebp - 8], esi",
"jne 0x402e7a",
"mov dword [ebp - 8], RegEnumValueA",
"cmp edi, ebx",
"mov dword [ebp... |
9731edacc5aa9b80c51861d8132e58a053302beb794e5f265c096ce07145e0f4 | 0x4030de | [
"Accept command line arguments",
"Copy file",
"Create directory",
"Delete file",
"Get common file path",
"Get file system object information",
"Set current directory",
"Shutdown system",
"Terminate process"
] | 81ec8001000053555633db57895c2418c74424106091400033f6c644241420ff15307040006801800000ff15b070400053ff157c7240006a08a358277a00e8f12b0000a3a4267a00538d442434686001000050536868dc7900ff1558714000685491400068a01e7a00e8a4280000ff15ac704000bf00807a005057e89228000053ff150c714000803d00807a0022a3a0267a008bc7750ac644241422b801807a... | [
"sub esp, 0x180",
"push ebx",
"push ebp",
"push esi",
"xor ebx, ebx",
"push edi",
"mov dword [esp + 0x18], ebx",
"mov dword [esp + 0x10], str.Error_writing_temporary_file._Make_sure_your_temp_folder_is_valid.",
"xor esi, esi",
"mov byte [esp + 0x14], 0x20",
"call dword [sym.imp.COMCTL32.dll_Init... |
9731edacc5aa9b80c51861d8132e58a053302beb794e5f265c096ce07145e0f4 | 0x403539 | [
"Check if file exists",
"Get file attributes"
] | 83ec145355568b35b0267a00576a06e8c527000033db3bc37412ffd00fb7c0506800907a00e8eb230000eb4abfb0ec790053575368e47240006801000080c70500907a0030780000e851230000381db0ec790075165357680273400068bc7240006803000080e833230000576800907a00e85d240000e84e020000a1b8267a00bd00847a0083e02055a320277a00c7053c277a0000000100e8ee1f000085c00f... | [
"sub esp, 0x14",
"push ebx",
"push ebp",
"push esi",
"mov esi, dword [0x7a26b0]",
"push edi",
"push 6",
"call fcn.00405d12",
"xor ebx, ebx",
"cmp eax, ebx",
"je 0x403565",
"call eax",
"movzx eax, ax",
"push eax",
"push 0x7a9000",
"call fcn.0040594e",
"jmp 0x4035af",
"mov edi, 0x79e... |
9731edacc5aa9b80c51861d8132e58a053302beb794e5f265c096ce07145e0f4 | 0x405250 | [
"Create process on windows"
] | 558bec83ec108d45f0c705b80c7a00440000005033c068b80c7a00505050505050ff750850ff15cc70400085c0740cff75f4ff15ec7040008b45f0c9c20400 | [
"push ebp",
"mov ebp, esp",
"sub esp, 0x10",
"lea eax, [ebp - 0x10]",
"mov dword [0x7a0cb8], 0x44",
"push eax",
"xor eax, eax",
"push 0x7a0cb8",
"push eax",
"push eax",
"push eax",
"push eax",
"push eax",
"push eax",
"push dword [ebp + 8]",
"push eax",
"call dword [sym.imp.KERNEL32.d... |
9731edacc5aa9b80c51861d8132e58a053302beb794e5f265c096ce07145e0f4 | 0x405315 | [
"Delete directory",
"Delete file",
"Enumerate files on windows",
"Enumerate files recursively"
] | 558bec81ec4801000056578b7d0857e89b020000f6450c088945f8741757ff1544714000f7d81bc040010528277a00e994010000538b5d0c83e301895dfc741285c00f842b010000f6450c020f8421010000beb8fc79005756e87d06000085db740d682893400056e88a060000eb0657e8a0010000803f007509803db8fc79005c750b681090400057e86906000057e85d0600008bd88d85b8feffff505603df... | [
"push ebp",
"mov ebp, esp",
"sub esp, 0x148",
"push esi",
"push edi",
"mov edi, dword [ebp + 8]",
"push edi",
"call fcn.004055c4",
"test byte [ebp + 0xc], 8",
"mov dword [ebp - 8], eax",
"je 0x405349",
"push edi",
"call dword [sym.imp.KERNEL32.dll_DeleteFileA]",
"neg eax",
"sbb eax, eax"... |
9731edacc5aa9b80c51861d8132e58a053302beb794e5f265c096ce07145e0f4 | 0x4055c4 | [
"Check if file exists",
"Get file attributes"
] | 5657ff74240cbeb8007a0056e81b04000056e89cffffff8bf885ff750433c0eb5257e867060000f605b8267a0080740a8a0784c074e73c5c74e32bfeeb14e8e406000085c07405f6001074d156e814ffffff56e8ea0300003bc7567fe1e8bdfeffff56ff157870400033c983f8ff0f95c18bc15f5ec20400 | [
"push esi",
"push edi",
"push dword [esp + 0xc]",
"mov esi, 0x7a00b8",
"push esi",
"call fcn.004059f0",
"push esi",
"call fcn.00405577",
"mov edi, eax",
"test edi, edi",
"jne 0x4055e5",
"xor eax, eax",
"jmp 0x405637",
"push edi",
"call fcn.00405c52",
"test byte [0x7a26b8], 0x80",
"je... |
9731edacc5aa9b80c51861d8132e58a053302beb794e5f265c096ce07145e0f4 | 0x4056a8 | [
"Check if file exists",
"Get file attributes",
"Set file attributes"
] | ff742404ff157870400083f8ff740d24fe50ff742408ff1584704000c20400 | [
"push dword [esp + 4]",
"call dword [sym.imp.KERNEL32.dll_GetFileAttributesA]",
"cmp eax, 0xffffffff",
"je 0x4056c4",
"and al, 0xfe",
"push eax",
"push dword [esp + 8]",
"call dword [sym.imp.KERNEL32.dll_SetFileAttributesA]",
"ret 4"
] |
9731edacc5aa9b80c51861d8132e58a053302beb794e5f265c096ce07145e0f4 | 0x4056c7 | [
"Get file attributes"
] | ff742404ff15787040008bc86a0041f7d91bc923c851ff7424146a006a01ff74241cff74241cff15d4704000c20c00 | [
"push dword [esp + 4]",
"call dword [sym.imp.KERNEL32.dll_GetFileAttributesA]",
"mov ecx, eax",
"push 0",
"inc ecx",
"neg ecx",
"sbb ecx, ecx",
"and ecx, eax",
"push ecx",
"push dword [esp + 0x14]",
"push 0",
"push 1",
"push dword [esp + 0x1c]",
"push dword [esp + 0x1c]",
"call dword [sy... |
9731edacc5aa9b80c51861d8132e58a053302beb794e5f265c096ce07145e0f4 | 0x4056f6 | [
"Get common file path"
] | 558bec568b7508576a645f4fc745086e736100ff158c7040006a1a33d259f7f1568d45086a0050ff750c00550aff15d870400085c0750d85ff75d08026005f5e5dc208008bc6ebf6 | [
"push ebp",
"mov ebp, esp",
"push esi",
"mov esi, dword [ebp + 8]",
"push edi",
"push 0x64",
"pop edi",
"dec edi",
"mov dword [ebp + 8], 0x61736e",
"call dword [sym.imp.KERNEL32.dll_GetTickCount]",
"push 0x1a",
"xor edx, edx",
"pop ecx",
"div ecx",
"push esi",
"lea eax, [ebp + 8]",
"... |
9731edacc5aa9b80c51861d8132e58a053302beb794e5f265c096ce07145e0f4 | 0x40573e | [
"Get file size",
"Read file on windows",
"Write file on windows"
] | 535556576a01e8c905000085c08b74241874116a0556ff74241cffd085c00f85390100008b1d68704000c705400e7a004e554c0085f6bf00040000bd400e7a0074266a016a0056e83dffffff50ff15ec704000575556ffd385c00f84030100003bc70f8ffb000000beb8087a005756ff74241cffd385c00f84e60000003bc70f8fde0000005655683493400068b8047a00ff15007240008bd8a1b0267a0083c4... | [
"push ebx",
"push ebp",
"push esi",
"push edi",
"push 1",
"call fcn.00405d12",
"test eax, eax",
"mov esi, dword [esp + 0x18]",
"je 0x405762",
"push 5",
"push esi",
"push dword [esp + 0x1c]",
"call eax",
"test eax, eax",
"jne 0x40589b",
"mov ebx, dword [sym.imp.KERNEL32.dll_GetShortPath... |
9731edacc5aa9b80c51861d8132e58a053302beb794e5f265c096ce07145e0f4 | 0x4058d7 | [
"Query or enumerate registry value"
] | 558bec538d451856508b451833dbf7d81bc08b751425000100000d19000200881e5053ff750cff7508ff151070400085c0753e8d450cc7450c00040000508d4514565053ff7510ff7518ff150070400085c0750c837d14017408837d14027402881eff7518889eff030000ff151c7040005e5b5dc21400 | [
"push ebp",
"mov ebp, esp",
"push ebx",
"lea eax, [ebp + 0x18]",
"push esi",
"push eax",
"mov eax, dword [ebp + 0x18]",
"xor ebx, ebx",
"neg eax",
"sbb eax, eax",
"mov esi, dword [ebp + 0x14]",
"and eax, 0x100",
"or eax, 0x20019",
"mov byte [esi], bl",
"push eax",
"push ebx",
"push d... |
9731edacc5aa9b80c51861d8132e58a053302beb794e5f265c096ce07145e0f4 | 0x405a12 | [
"Get common file path"
] | 558bec83ec188b450c85c07d118b0d7c1e7a008d0485040000002bc88b018b0dd8267a008b550803c8b840167a00532bd0565781fa000800008bf80f83dc0100008b7d0883650800e9d00100008bf72bf081fe000400000f8dca0100004180fafc894d0c0f86a60100000fbe41010fbe098bf08bd983e67f83e37fc1e6070bf38bd983450c0280cf80895de88bd98bc8895dec80cd8080fafe894df08945f40f... | [
"push ebp",
"mov ebp, esp",
"sub esp, 0x18",
"mov eax, dword [ebp + 0xc]",
"test eax, eax",
"jge 0x405a30",
"mov ecx, dword [0x7a1e7c]",
"lea eax, [eax*4 + 4]",
"sub ecx, eax",
"mov eax, dword [ecx]",
"mov ecx, dword [0x7a26d8]",
"mov edx, dword [ebp + 8]",
"add ecx, eax",
"mov eax, 0x7a16... |
9731edacc5aa9b80c51861d8132e58a053302beb794e5f265c096ce07145e0f4 | 0x405d7e | [
"Encode data using xor",
"Hash data with crc32"
] | 833d44127a000056752d33c96a088bc15e8bd080e201f6da1bd281e22083b8edd1e833c24e75ea89048d40127a004181f9000100007cd58b5424108b44240885d2f7d076238b4c240c570fb6398bf081e6ff00000033f7c1e8088b34b540127a0033c6414a75e35ff7d05ec20c00 | [
"cmp dword [0x7a1244], 0",
"push esi",
"jne 0x405db5",
"xor ecx, ecx",
"push 8",
"mov eax, ecx",
"pop esi",
"mov edx, eax",
"and dl, 1",
"neg dl",
"sbb edx, edx",
"and edx, 0xedb88320",
"shr eax, 1",
"xor eax, edx",
"dec esi",
"jne 0x405d8f",
"mov dword [ecx*4 + 0x7a1240], eax",
"i... |
97375152a03410f502c4e8e197c958df64b6f68cec13c5ddabf4af5107769e6c | 0x4013a0 | [
"Packed with generic packer"
] | 558bec81ecec070000535657c745fc00000000c78564f8ffff04000000c7857cf8ffff00000080c78568f8ffff19000200a1e48040008985d4f8ffff6a0bff15c48140006a0bff15c481400060c745e000000000c745fc00000000c745d000000000c78570f8ffff64000000c745d80c000000c745e000000000c745fc00000000c745d000000000c78570f8ffff64000000c745d80c000000c78514f8ffff30... | [
"push ebp",
"mov ebp, esp",
"sub esp, 0x7ec",
"push ebx",
"push esi",
"push edi",
"mov dword [ebp - 4], 0",
"mov dword [ebp - 0x79c], 4",
"mov dword [ebp - 0x784], 0x80000000",
"mov dword [ebp - 0x798], 0x20019",
"mov eax, dword [sym.imp.KERNEL32.dll_ReadFile]",
"mov dword [ebp - 0x72c], eax",... |
97375152a03410f502c4e8e197c958df64b6f68cec13c5ddabf4af5107769e6c | 0x4018f0 | [
"Get common file path"
] | 558bec81ec20010000c785ecfeffff14914000a1088140008985e4feffff68040100008d8df0feffff51ff150c8140008b95ecfeffff528d85f0feffff50ff95e4feffff6a0068800000006a036a006a036a018d8df0feffff51ff15108140008985e8feffff83bde8feffffff740b83bde8feffff007402eb628b5508837a04007459c785e0feffff35dc07008b450883c008a3141343008b4d088b51048915... | [
"push ebp",
"mov ebp, esp",
"sub esp, 0x120",
"mov dword [ebp - 0x114], str._ffffffffffffffff",
"mov eax, dword [sym.imp.KERNEL32.dll_lstrcatA]",
"mov dword [ebp - 0x11c], eax",
"push 0x104",
"lea ecx, [ebp - 0x110]",
"push ecx",
"call dword [sym.imp.KERNEL32.dll_GetSystemDirectoryA]",
"mov edx,... |
97375152a03410f502c4e8e197c958df64b6f68cec13c5ddabf4af5107769e6c | 0x401a60 | [
"Inspect load icon resource"
] | 558bec51c70520134300e1240000a1201343002de1240000a320134300b90100000085c90f84810000008b15201343003b550c7202eb74833d2013430000751568630200006a00ff15c081400085c0740433c0eb568b45080305201343008b08030d201343008b5508031520134300890ac745fcfa630200a1201343008b4dfc8d540102528b450803052013430050e8ccf6ffff83c4088b0d2013430083c104... | [
"push ebp",
"mov ebp, esp",
"push ecx",
"mov dword [0x431320], 0x24e1",
"mov eax, dword [0x431320]",
"sub eax, 0x24e1",
"mov dword [0x431320], eax",
"mov ecx, 1",
"test ecx, ecx",
"je 0x401b0b",
"mov edx, dword [0x431320]",
"cmp edx, dword [ebp + 0xc]",
"jb 0x401a97",
"jmp 0x401b0b",
"cm... |
9737a1ad4c67d0cec5984267dc804498c52ba402d9ec3ff86148eee05a9faf3e | 0x401150 | [
"Accept command line arguments"
] | 558bec83ec4c53568b7508576a6d56ff15402040008bd8ff15242040008d4d085150ff15382040008b3d502040006a6468005640006a6856ffd76a6468685640006a7056ffd733c068007f0000508935d0314000c745b430000000c745b8030000008945c08945c48975c8ff15682040008b3d442040006a6e568945d0ffd78b55c86a6c528945ccc745d404000000c745d86e000000c745dce8444000ffd789... | [
"push ebp",
"mov ebp, esp",
"sub esp, 0x4c",
"push ebx",
"push esi",
"mov esi, dword [ebp + 8]",
"push edi",
"push 0x6d",
"push esi",
"call dword [sym.imp.USER32.dll_LoadAcceleratorsA]",
"mov ebx, eax",
"call dword [sym.imp.KERNEL32.dll_GetCommandLineW]",
"lea ecx, [ebp + 8]",
"push ecx",
... |
9737a1ad4c67d0cec5984267dc804498c52ba402d9ec3ff86148eee05a9faf3e | 0x40128f | [
"Accept command line arguments",
"Terminate process"
] | 558bec83ec4456ff15182040008bf08a063c2275148a46014684c074043c2275f4803e22750d46eb0a3c207e0646803e207ffa8a0684c074043c207ee98365e8008d45bc50ff150c204000e8670a000068043040006800304000e83e0a0000f645e801595974060fb745eceb036a0a5850566a006a00ff151020400050e83ffeffff8bf0e8460a000056ff1514204000 | [
"push ebp",
"mov ebp, esp",
"sub esp, 0x44",
"push esi",
"call dword [sym.imp.KERNEL32.dll_GetCommandLineA]",
"mov esi, eax",
"mov al, byte [esi]",
"cmp al, 0x22",
"jne 0x4012b8",
"mov al, byte [esi + 1]",
"inc esi",
"test al, al",
"je 0x4012b0",
"cmp al, 0x22",
"jne 0x4012a4",
"cmp by... |
9737a1ad4c67d0cec5984267dc804498c52ba402d9ec3ff86148eee05a9faf3e | 0x4013d0 | [
"Hide graphical window"
] | 558bec8b4508566a00506a006a006800000080680000008068000000806800000080680000cf0068f044400068e84440006a00a3d0314000ff15702040008bf085f675035e5dc36a0056ff156c20400056ff1588204000b8010000005e5dc3 | [
"push ebp",
"mov ebp, esp",
"mov eax, dword [ebp + 8]",
"push esi",
"push 0",
"push eax",
"push 0",
"push 0",
"push 0x80000000",
"push 0x80000000",
"push 0x80000000",
"push 0x80000000",
"push 0xcf0000",
"push str.Best_Application",
"push str.Clariot",
"push 0",
"mov dword [0x4031d0],... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x4031b0 | [
"Query or enumerate registry value"
] | 558bec83c4f40fb70520a04f008945f88d45fc506a016a0068483240006802000080e8e5e1ffff85c0754d33c055682132400064ff30648920c745f4040000008d45f4508d45f8506a006a0068643240008b45fc50e8bae1ffff33c05a595964891068283240008b45fc50e894e1ffffc366a120a04f006625c0ff668b55f86683e23f660bc266a320a04f008be55dc3 | [
"push ebp",
"mov ebp, esp",
"add esp, 0xfffffff4",
"movzx eax, word [0x4fa020]",
"mov dword [ebp - 8], eax",
"lea eax, [ebp - 4]",
"push eax",
"push 1",
"push 0",
"push 0x403248",
"push 0x80000002",
"call sub.advapi32.dll_RegOpenKeyExA",
"test eax, eax",
"jne 0x403228",
"xor eax, eax",
... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x403f70 | [
"Write file on windows"
] | 51803d4ce04f0000745766813d20e24f00b2d77514833d28e24f0000760bb81ce24f00ff1538e24f006a008d442404506a1e686ca04f006af5e83ed3ffff50e858d3ffff6a008d442404506a0268f83f40006af5e823d3ffff50e83dd3ffff5ac3803d30a04f000075136a006864a04f00686ca04f006a00e847d3ffff5ac3 | [
"push ecx",
"cmp byte [0x4fe04c], 0",
"je 0x403fd1",
"cmp word [0x4fe220], 0xd7b2",
"jne 0x403f99",
"cmp dword [0x4fe228], 0",
"jbe 0x403f99",
"mov eax, 0x4fe21c",
"call dword [0x4fe238]",
"push 0",
"lea eax, [esp + 4]",
"push eax",
"push 0x1e",
"push 0x4fa06c",
"push 0xfffffffffffffff5"... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x404144 | [
"Create thread"
] | 558bec5356578bf98bf28bd8b808000000e86ae6ffff89388b5510895004c6054de04f00018b5508528b550c5250b80c414000505653e89dd1ffff5f5e5b5dc20c00 | [
"push ebp",
"mov ebp, esp",
"push ebx",
"push esi",
"push edi",
"mov edi, ecx",
"mov esi, edx",
"mov ebx, eax",
"mov eax, 8",
"call fcn.004027c4",
"mov dword [eax], edi",
"mov edx, dword [ebp + 0x10]",
"mov dword [eax + 4], edx",
"mov byte [0x4fe04d], 1",
"mov edx, dword [ebp + 8]",
"p... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x405a58 | [
"Get geographical location",
"Query or enumerate registry value"
] | 558bec81c4e0feffff53568945fc68050100008d85e3feffff506a00e8ebb8ffffc645ee008d45f8506819000f006a0068885c40006801000080e825b9ffff85c074408d45f8506819000f006a0068885c40006802000080e807b9ffff85c074228d45f8506819000f006a0068a45c40006801000080e8e9b8ffff85c00f858900000033c055685d5b400064ff30648920c745e8050000008d85e3feffffba05... | [
"push ebp",
"mov ebp, esp",
"add esp, 0xfffffee0",
"push ebx",
"push esi",
"mov dword [ebp - 4], eax",
"push 0x105",
"lea eax, [ebp - 0x11d]",
"push eax",
"push 0",
"call sub.kernel32.dll_GetModuleFileNameA",
"mov byte [ebp - 0x12], 0",
"lea eax, [ebp - 8]",
"push eax",
"push 0xf0019",
... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x40636c | [
"Get geographical location"
] | 558bec83c4f05333d28955f033d25568d263400064ff326489226a078d55f552680410000050e8c5afffff8d45f08d55f5b907000000e859e0ffff8b45f08d55fce83ac9ffff8bd8837dfc00740233db33c05a595964891068d96340008d45f0e8bfddffffc3 | [
"push ebp",
"mov ebp, esp",
"add esp, 0xfffffff0",
"push ebx",
"xor edx, edx",
"mov dword [ebp - 0x10], edx",
"xor edx, edx",
"push ebp",
"push 0x4063d2",
"push dword fs:[edx]",
"mov dword fs:[edx], esp",
"push 7",
"lea edx, [ebp - 0xb]",
"push edx",
"push 0x1004",
"push eax",
"call ... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x40c0dc | [
"Get geographical location"
] | 558bec81c400ffffff53568bf18b5d0868000100008d8d00ffffff515250e86da8ffff85c07e128bc8498d9500ffffff8bc3e86d81ffffeb098bc38bd6e8c680ffff5e5b8be55dc20400 | [
"push ebp",
"mov ebp, esp",
"add esp, 0xffffff00",
"push ebx",
"push esi",
"mov esi, ecx",
"mov ebx, dword [ebp + 8]",
"push pe_nt_image_headers32",
"lea ecx, [ebp - 0x100]",
"push ecx",
"push edx",
"push eax",
"call sub.kernel32.dll_GetLocaleInfoA_1",
"test eax, eax",
"jle 0x40c115",
... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x40c128 | [
"Get geographical location"
] | 535657518bd98bf28bf86a028d442404505657e82ca8ffff85c07e058a0424eb028bc35a5f5e5bc3 | [
"push ebx",
"push esi",
"push edi",
"push ecx",
"mov ebx, ecx",
"mov esi, edx",
"mov edi, eax",
"push 2",
"lea eax, [esp + 4]",
"push eax",
"push esi",
"push edi",
"call sub.kernel32.dll_GetLocaleInfoA_1",
"test eax, eax",
"jle 0x40c149",
"mov al, byte [esp]",
"jmp 0x40c14b",
"mov ... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x40c7d0 | [
"Write file on windows"
] | 81c4bcfbffff68000400008d4c2448e864feffffa1d4d04f00803800745ea100cd4f00e82463ffffe82f61ffff8d442444508d44244850e848a6ffff6a008d442404508d44244ce890ccffff508d442450506af4e863a1ffff50e8b5a2ffff6a008d442404506a026894c840006af4e848a1ffff50e89aa2ffffeb366a408d44240850a174cc4f008b400450a168e64f00e8fe8fffff50e850a9ffff68102000... | [
"add esp, 0xfffffbbc",
"push 0x400",
"lea ecx, [esp + 0x48]",
"call 0x40c648",
"mov eax, dword [0x4fd0d4]",
"cmp byte [eax], 0",
"je 0x40c84c",
"mov eax, dword [0x4fcd00]",
"call fcn.00402b1c",
"call fcn.0040292c",
"lea eax, [esp + 0x44]",
"push eax",
"lea eax, [esp + 0x48]",
"push eax",
... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x40d13c | [
"Get file version info"
] | 558bec83c4e85333d28955f88bd833c0556812d2400064ff30648920c745fcffffffff8d45f88bd3e8bf70ffff8d45f8e82f75ffff8d45f4508b45f8e8d374ffff50e88999ffff8bd885db74738bc3e83456ffff8945f033c05568f5d1400064ff306489208b45f050538b45f4508b45f8e89e74ffff50e84c99ffff85c074238d45e8508d45ec506824d240008b45f050e84299ffff85c074098b45ec8b4008... | [
"push ebp",
"mov ebp, esp",
"add esp, 0xffffffe8",
"push ebx",
"xor edx, edx",
"mov dword [ebp - 8], edx",
"mov ebx, eax",
"xor eax, eax",
"push ebp",
"push 0x40d212",
"push dword fs:[eax]",
"mov dword fs:[eax], esp",
"mov dword [ebp - 4], 0xffffffff",
"lea eax, [ebp - 8]",
"mov edx, ebx... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x40d798 | [
"Get geographical location"
] | 558bec83c4f45333d28955f433d25568fcd7400064ff326489226a078d55f952680410000050e8a991ffff8d45f48d55f9b907000000e82d6cffff8b45f450e83091ffff8bd058e8e4b5ffff8bd833c05a59596489106803d840008d45f4e89569ffffc3 | [
"push ebp",
"mov ebp, esp",
"add esp, 0xfffffff4",
"push ebx",
"xor edx, edx",
"mov dword [ebp - 0xc], edx",
"xor edx, edx",
"push ebp",
"push 0x40d7fc",
"push dword fs:[edx]",
"mov dword fs:[edx], esp",
"push 7",
"lea edx, [ebp - 7]",
"push edx",
"push 0x1004",
"push eax",
"call sub... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x425944 | [
"Suspend thread"
] | 558bec83c4f85356578945fc8b45fc8a400e8845fb33c055689159420064ff306489208b45fcc6400e018b45fc8b400450e84a11feff85c00f9dc28b45fce8d1fdffff33c05a5959648910eb185f5e5b59595dc3 | [
"push ebp",
"mov ebp, esp",
"add esp, 0xfffffff8",
"push ebx",
"push esi",
"push edi",
"mov dword [ebp - 4], eax",
"mov eax, dword [ebp - 4]",
"mov al, byte [eax + 0xe]",
"mov byte [ebp - 5], al",
"xor eax, eax",
"push ebp",
"push 0x425991",
"push dword fs:[eax]",
"mov dword fs:[eax], es... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x4259b0 | [
"Resume thread"
] | 53568bd88b430450e8bf10feff8bf085f60f9dc28bc3e88dfdffff4e7504c6430e005e5bc3 | [
"push ebx",
"push esi",
"mov ebx, eax",
"mov eax, dword [ebx + 4]",
"push eax",
"call sub.kernel32.dll_ResumeThread",
"mov esi, eax",
"test esi, esi",
"setge dl",
"mov eax, ebx",
"call fcn.00425758",
"dec esi",
"jne 0x4259d2",
"mov byte [ebx + 0xe], 0",
"pop esi",
"pop ebx",
"ret"
] |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x426b14 | [
"Allocate or change rwx memory"
] | 558bec535657bf8ce84f00833f00756c6a40680010000068001000006a00e895fffdff8bf0a188e84f0089068d5604b8cca54f00b902000000e86ebefdffbaec6a42008d4605e8adffffff8946068d5e0ac603e88d56048bc3e89affffff8943018b07894305891f83c30d8bc32bc63dfc0f00007cdb893588e84f008b078b1f8b530589178b55088953058b550c8953095f5e5b5dc20800 | [
"push ebp",
"mov ebp, esp",
"push ebx",
"push esi",
"push edi",
"mov edi, 0x4fe88c",
"cmp dword [edi], 0",
"jne 0x426b90",
"push 0x40",
"push 0x1000",
"push 0x1000",
"push 0",
"call sub.kernel32.dll_VirtualAlloc_1",
"mov esi, eax",
"mov eax, dword [0x4fe888]",
"mov dword [esi], eax",
... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x4281ec | [
"Encode data using xor"
] | 89d189c231c066c1c0053202424975f6c3 | [
"mov ecx, edx",
"mov edx, eax",
"xor eax, eax",
"rol ax, 5",
"xor al, byte [edx]",
"inc edx",
"dec ecx",
"jne 0x4281f2",
"ret"
] |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x42ab14 | [
"Get system information on windows"
] | 558bec83c4d48955f88945fc8d45d450e873befdff8b55fc8b4df84978338d45d4668378200374108b048a0fc8c1e80889048a4979f2eb195331db8b048a88c788e3c1e810c1e30888c3891c8a4979e95b8be55dc3 | [
"push ebp",
"mov ebp, esp",
"add esp, 0xffffffd4",
"mov dword [ebp - 8], edx",
"mov dword [ebp - 4], eax",
"lea eax, [ebp - 0x2c]",
"push eax",
"call sub.kernel32.dll_GetSystemInfo",
"mov edx, dword [ebp - 4]",
"mov ecx, dword [ebp - 8]",
"dec ecx",
"js 0x42ab65",
"lea eax, [ebp - 0x2c]",
... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x42de8c | [
"Capture screenshot"
] | 558bec81c468ffffff535657894df48955f88945fc33c08945f08b450c83781800741a8b450c83781c000f84250600008b450c837820000f84180600008b450c83781800751a8b450c837804000f84020600008b450c837808000f84f50500008b45fce854fbffff33c0894590837dfc00741c8d8578ffffff506a548b45fc50e8638dfdff83f8187d05e8f1c5ffff6a00e8a290fdffe805c7ffff8945e88b45... | [
"push ebp",
"mov ebp, esp",
"add esp, 0xffffff68",
"push ebx",
"push esi",
"push edi",
"mov dword [ebp - 0xc], ecx",
"mov dword [ebp - 8], edx",
"mov dword [ebp - 4], eax",
"xor eax, eax",
"mov dword [ebp - 0x10], eax",
"mov eax, dword [ebp + 0xc]",
"cmp dword [eax + 0x18], 0",
"je 0x42dec... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x437740 | [
"Read clipboard data"
] | 558bec83c4f8538bda8945fc8b45fc8b10ff52186a01e851f8fcff8945f833c05568b277430064ff30648920837df80074148b45f850e889f2fcff8bd08bc3e804ccfcffeb078bc3e803cafcff33c05a595964891068b9774300837df80074098b45f850e87bf2fcff8b45fc8b10ff5214c3 | [
"push ebp",
"mov ebp, esp",
"add esp, 0xfffffff8",
"push ebx",
"mov ebx, edx",
"mov dword [ebp - 4], eax",
"mov eax, dword [ebp - 4]",
"mov edx, dword [eax]",
"call dword [edx + 0x18]",
"push 1",
"call sub.user32.dll_GetClipboardData",
"mov dword [ebp - 8], eax",
"xor eax, eax",
"push ebp"... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x4377c0 | [
"Read clipboard data"
] | 558bec515356578bfa8945fc8b45fc8b10ff521833d255686278430064ff326489226a00e85bf7fcff8bd86685db74458bd3a1107c4200e8a84bffff84c074250fb7c350e8a3f7fcff8bf06a09e89af7fcff508bce8bd38bc7e8964affffe895c3fcffeb440fb7c350e816f7fcff8bd86685db75bb8b0d54cc4f00b201a1407a4000e81951fdffe8c0c2fcff33c05a595964891068697843008b45fc8b10ff52... | [
"push ebp",
"mov ebp, esp",
"push ecx",
"push ebx",
"push esi",
"push edi",
"mov edi, edx",
"mov dword [ebp - 4], eax",
"mov eax, dword [ebp - 4]",
"mov edx, dword [eax]",
"call dword [edx + 0x18]",
"xor edx, edx",
"push ebp",
"push 0x437862",
"push dword fs:[edx]",
"mov dword fs:[edx]... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x437870 | [
"Read clipboard data"
] | 558bec515356578bfa8945fc8b45fc8b10ff521833c05568c878430064ff306489206a02e813f7fcff8bd86a09e80af7fcff8bf0568bcb66ba02008bc78b18ff535c33c05a595964891068cf7843008b45fc8b10ff5214c3 | [
"push ebp",
"mov ebp, esp",
"push ecx",
"push ebx",
"push esi",
"push edi",
"mov edi, edx",
"mov dword [ebp - 4], eax",
"mov eax, dword [ebp - 4]",
"mov edx, dword [eax]",
"call dword [edx + 0x18]",
"xor eax, eax",
"push ebp",
"push 0x4378c8",
"push dword fs:[eax]",
"mov dword fs:[eax]... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x4378d8 | [
"Read clipboard data"
] | 558bec5153568bf28945fc8b45fc8b10ff521833d255682d79430064ff326489226a03e8acf6fcff8bd86a09e8a3f6fcff508bcb66ba03008bc68b18ff535c33c05a595964891068347943008b45fc8b10ff5214c3 | [
"push ebp",
"mov ebp, esp",
"push ecx",
"push ebx",
"push esi",
"mov esi, edx",
"mov dword [ebp - 4], eax",
"mov eax, dword [ebp - 4]",
"mov edx, dword [eax]",
"call dword [edx + 0x18]",
"xor edx, edx",
"push ebp",
"push 0x43792d",
"push dword fs:[edx]",
"mov dword fs:[edx], esp",
"pus... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x4379a4 | [
"Write clipboard data"
] | 558bec83c4f0538bda8945fc8b45fc8b10ff521833c05568197a430064ff306489208b45fce8aefcffff33c08945f08d45f0508d4df88d55f68bc3e89449ffff8b45f8500fb745f650e8aaf8fcff837df000740b8b45f0506a09e899f8fcff33c05a595964891068207a43008b45fc8b10ff5214c3 | [
"push ebp",
"mov ebp, esp",
"add esp, 0xfffffff0",
"push ebx",
"mov ebx, edx",
"mov dword [ebp - 4], eax",
"mov eax, dword [ebp - 4]",
"mov edx, dword [eax]",
"call dword [edx + 0x18]",
"xor eax, eax",
"push ebp",
"push 0x437a19",
"push dword fs:[eax]",
"mov dword fs:[eax], esp",
"mov ea... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x437a28 | [
"Write clipboard data"
] | 558bec83c4f0538bda8945fc8b45fc8b10ff521833c055689d7a430064ff306489208b45fce82afcffff33c08945f08d45f0508d4df88d55f68bc38b18ff53608b45f8500fb745f650e826f8fcff837df000740b8b45f0506a09e815f8fcff33c05a595964891068a47a43008b45fc8b10ff5214c3 | [
"push ebp",
"mov ebp, esp",
"add esp, 0xfffffff0",
"push ebx",
"mov ebx, edx",
"mov dword [ebp - 4], eax",
"mov eax, dword [ebp - 4]",
"mov edx, dword [eax]",
"call dword [edx + 0x18]",
"xor eax, eax",
"push ebp",
"push 0x437a9d",
"push dword fs:[eax]",
"mov dword fs:[eax], esp",
"mov ea... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x4522e0 | [
"Enumerate gui resources"
] | c6400c00c6400d0033d289500450682c224500e85c4cfbffc3 | [
"mov byte [eax + 0xc], 0",
"mov byte [eax + 0xd], 0",
"xor edx, edx",
"mov dword [eax + 4], edx",
"push eax",
"push 0x45222c",
"call sub.user32.dll_EnumWindows",
"ret"
] |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x452400 | [
"Check for time delay via gettickcount"
] | 558bec6a0053568bf033c055687d24450064ff306489208bc6e842faffffe89145fbff8bd86a00e89046fbffe88345fbff2bc33de803000076eb8d4dfc33d28bc6e81af6ffff837dfc00741b6a006a098b45fce8f821fbff508b461c8b10ff520c50e83d4ffbff33c05a595964891068842445008d45fce8141dfbffc3 | [
"push ebp",
"mov ebp, esp",
"push 0",
"push ebx",
"push esi",
"mov esi, eax",
"xor eax, eax",
"push ebp",
"push 0x45247d",
"push dword fs:[eax]",
"mov dword fs:[eax], esp",
"mov eax, esi",
"call fcn.00451e60",
"call sub.kernel32.dll_GetTickCount",
"mov ebx, eax",
"push 0",
"call sub.... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x455ac0 | [
"Log keystrokes via polling"
] | 558bec83c4d85356578bf08d7df7a5a58955f033c08945e8833d6ceb4f00000f842a0100006a11e81815fbff66a900800f95c08b15f8cf4f008b123282b40000000f8408010000a170eb4f008b10ff5208a16ceb4f008b58084b85db0f8cbc0000004333ff8bd7a16ceb4f00e8436cfcff8945ec8b45ec3b45f00f84960000008b45ec80b8a6010000000f84860000008b45ec8b10ff525084c0747a8b45ece8... | [
"push ebp",
"mov ebp, esp",
"add esp, 0xffffffd8",
"push ebx",
"push esi",
"push edi",
"mov esi, eax",
"lea edi, [ebp - 9]",
"movsd dword es:[edi], dword [esi]",
"movsd dword es:[edi], dword [esi]",
"mov dword [ebp - 0x10], edx",
"xor eax, eax",
"mov dword [ebp - 0x18], eax",
"cmp dword [0... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x459224 | [
"Log keystrokes via polling"
] | 558bec81c4ecfeffff5356578bda8bf0f6461c1074368bc6e8bb5e01008945ec837dec0074268b45ec83b85002000000741a8bcb8b45ec8b80500200008bd68b38ff572484c00f853f0100008b033d0001000072373d0801000077308bc6e8755e01008945ec837dec000f84120100008bcb8bd68b45ec8b38ff97f000000084c00f8504010000e9f60000008b033d000200000f82d20000003d0a0200000f87... | [
"push ebp",
"mov ebp, esp",
"add esp, 0xfffffeec",
"push ebx",
"push esi",
"push edi",
"mov ebx, edx",
"mov esi, eax",
"test byte [esi + 0x1c], 0x10",
"je 0x459270",
"mov eax, esi",
"call fcn.0046f0fc",
"mov dword [ebp - 0x14], eax",
"cmp dword [ebp - 0x14], 0",
"je 0x459270",
"mov eax... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x45c91c | [
"Capture screenshot"
] | 558bec83c4945356578bf28bd880bbf8010000007406837e0400742df643550175198bc3e877ebffff85c0750e8bd68bc38b08ff51f0e91e0100008bd68bc3e8e0faffffe9100100006a00e858a6faff8bf88d55a48bc38b08ff51448b45b0508d55948bc38b08ff51448b459c5057e8bca1faff8945f8576a00e8b1a8faff6a00e8b2a1faff8945fc8b45f8508b45fc50e8baa3faff8945f433c055686eca45... | [
"push ebp",
"mov ebp, esp",
"add esp, 0xffffff94",
"push ebx",
"push esi",
"push edi",
"mov esi, edx",
"mov ebx, eax",
"cmp byte [ebx + 0x1f8], 0",
"je 0x45c938",
"cmp dword [esi + 4], 0",
"je 0x45c965",
"test byte [ebx + 0x55], 1",
"jne 0x45c957",
"mov eax, ebx",
"call fcn.0045b4bc",
... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x4631a0 | [
"Link many functions at runtime"
] | 558bec5153a1d4d24f0080780c000f84590100006800800000e8ce38faff8945fc33c055680633460064ff30648920833d7ceb4f0000751c6814334600e89a37faff8bd8681c33460053e89537faffa37ceb4f00833d84af4f00000f85ee000000682c334600e83138faffa384af4f00833d84af4f00000f84d20000006838334600a184af4f0050e85737faffa380eb4f006848334600a184af4f0050e84237... | [
"push ebp",
"mov ebp, esp",
"push ecx",
"push ebx",
"mov eax, dword [0x4fd2d4]",
"cmp byte [eax + 0xc], 0",
"je 0x46330d",
"push 0x8000",
"call sub.kernel32.dll_SetErrorMode",
"mov dword [ebp - 4], eax",
"xor eax, eax",
"push ebp",
"push 0x463306",
"push dword fs:[eax]",
"mov dword fs:[e... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x467700 | [
"Log keystrokes",
"Log keystrokes via polling"
] | 558bec81c4fcfeffff538bda668945fe8bc3e879caf9ff6a0033c08a45fe50e8a0faf9ffc1e01085c0742468000100008d95fefeffff5250e8bff8f9ff8bc38d95fefeffffb900010000e8b1ccf9ff5b8be55dc3 | [
"push ebp",
"mov ebp, esp",
"add esp, 0xfffffefc",
"push ebx",
"mov ebx, edx",
"mov word [ebp - 2], ax",
"mov eax, ebx",
"call fcn.00404190",
"push 0",
"xor eax, eax",
"mov al, byte [ebp - 2]",
"push eax",
"call sub.user32.dll_MapVirtualKeyA",
"shl eax, 0x10",
"test eax, eax",
"je 0x46... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x46ef90 | [
"Log keystrokes via polling"
] | 53568bf08a1de0ef460066f7c60400740380cb0166f7c60800740380cb0466f7c60100740380cb0866f7c60200740380cb1066f7c61000740380cb206a12e83180f9ff6685c07d0380cb028bc35e5bc3 | [
"push ebx",
"push esi",
"mov esi, eax",
"mov bl, byte [0x46efe0]",
"test si, 4",
"je 0x46efa4",
"or bl, 1",
"test si, 8",
"je 0x46efae",
"or bl, 4",
"test si, 1",
"je 0x46efb8",
"or bl, 8",
"test si, 2",
"je 0x46efc2",
"or bl, 0x10",
"test si, 0x10",
"je 0x46efcc",
"or bl, 0x20",... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x46efe4 | [
"Log keystrokes via polling"
] | 53568bf08a1d1cf046006a10e80f80f9ff6685c07d0380cb016a11e80080f9ff6685c07d0380cb04f7c600000020740380cb028bc35e5bc3 | [
"push ebx",
"push esi",
"mov esi, eax",
"mov bl, byte [0x46f01c]",
"push 0x10",
"call sub.user32.dll_GetKeyState",
"test ax, ax",
"jge 0x46effd",
"or bl, 1",
"push 0x11",
"call sub.user32.dll_GetKeyState",
"test ax, ax",
"jge 0x46f00c",
"or bl, 4",
"test esi, 0x20000000",
"je 0x46f017"... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x46f06c | [
"Log keystrokes via polling"
] | 5381c400ffffff54e8a37ff9ff8bc4e8a0ffffff8bd88bc381c4000100005bc3 | [
"push ebx",
"add esp, 0xffffff00",
"push esp",
"call sub.user32.dll_GetKeyboardState",
"mov eax, esp",
"call fcn.0046f020",
"mov ebx, eax",
"mov eax, ebx",
"add esp, 0x100",
"pop ebx",
"ret"
] |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x4756e4 | [
"Get keyboard layout"
] | 558bec51535684d2740883c4f0e8aedff8ff8855ff8bd833d28bc3e88003fbffa18ccc4f00895804c700885a4700a1a0cc4f00895804c700945a47008bc3e8790300006a00e8de18f9ff89433cb201a1849c4100e8d3dbf8ff89434cb201a1849c4100e8c4dbf8ff894350b201a1849c4100e8b5dbf8ff894354b201a1849c4100e8a6dbf8ff894358b201a1849c4100e897dbf8ff89437c6a00e84118f9ff8b... | [
"push ebp",
"mov ebp, esp",
"push ecx",
"push ebx",
"push esi",
"test dl, dl",
"je 0x4756f6",
"add esp, 0xfffffff0",
"call fcn.004036a4",
"mov byte [ebp - 1], dl",
"mov ebx, eax",
"xor edx, edx",
"mov eax, ebx",
"call fcn.00425a84",
"mov eax, dword [0x4fcc8c]",
"mov dword [eax + 4], eb... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x475bc8 | [
"Get keyboard layout",
"Query or enumerate registry value"
] | 558bec81c4a0fdffff5333d28995a0fdffff8945fc33c05568735d470064ff306489208b45fc837834000f855c010000b201a194a44100e80cd7f8ff8b55fc8942348b45fc83c038e87be5f8ff8d85ecfeffff506a40e8f113f9ff4885c00f8c17010000408945f08d85ecfeffff8945ec8b45ec8b00e8bdd8feff84c00f84eb0000008d45f45068190002006a006a008b45ec8b008985a4fdffffc685a8fdff... | [
"push ebp",
"mov ebp, esp",
"add esp, 0xfffffda0",
"push ebx",
"xor edx, edx",
"mov dword [ebp - 0x260], edx",
"mov dword [ebp - 4], eax",
"xor eax, eax",
"push ebp",
"push 0x475d73",
"push dword fs:[eax]",
"mov dword fs:[eax], esp",
"mov eax, dword [ebp - 4]",
"cmp dword [eax + 0x34], 0",... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x4766f0 | [
"Create thread",
"Set global application hook"
] | 51a1c8eb4f0080b8a5000000007562833de0eb4f0000751ae81f02f9ff506a00b8ac664700506a03e8070cf9ffa3e0eb4f00833ddceb4f000075126a006a006a006a00e81c01f9ffa3dceb4f00833de4eb4f0000751b546a006a00685066470068e80300006a00e83001f9ffa3e4eb4f005ac3 | [
"push ecx",
"mov eax, dword [0x4febc8]",
"cmp byte [eax + 0xa5], 0",
"jne 0x476761",
"cmp dword [0x4febe0], 0",
"jne 0x476722",
"call sub.kernel32.dll_GetCurrentThreadId_1",
"push eax",
"push 0",
"mov eax, 0x4766ac",
"push eax",
"push 3",
"call sub.user32.dll_SetWindowsHookExA",
"mov dword... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x476858 | [
"Inspect load icon resource"
] | 558bec81c4fcfeffff535684d2740883c4f0e835cef8ff8855ff8bd833d28bc3e807f2faffa1f0ce4f006683780200750ea1f0ce4f00895804c700487f4700a140d04f006683780200750ea140d04f00895804c70040814700c6433400b201a1849c4100e84fcaf8ff898390000000b201a1849c4100e83dcaf8ff8983a800000033c089436033c0898384000000c7435c180000ffc74378f4010000c6437c01... | [
"push ebp",
"mov ebp, esp",
"add esp, 0xfffffefc",
"push ebx",
"push esi",
"test dl, dl",
"je 0x47686f",
"add esp, 0xfffffff0",
"call fcn.004036a4",
"mov byte [ebp - 1], dl",
"mov ebx, eax",
"xor edx, edx",
"mov eax, ebx",
"call fcn.00425a84",
"mov eax, dword [0x4fcef0]",
"cmp word [ea... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x476de0 | [
"Enumerate gui resources"
] | 535683c4f88bd8a1c8eb4f00837830000f849400000083bb94000000000f85810000008b4330890424885424048bc45068706d4700e83a01f9ff8b839000000083780800745e6a038b44240450e8aa02f9ff8bf08934246aec56e8ad02f9ffa8087407c70424feffffff8b83900000008b70084e83fe007c2b68130200006a006a006a006a008b442414508bd68b8390000000e8fc58faff50e89604f9ff4e83... | [
"push ebx",
"push esi",
"add esp, 0xfffffff8",
"mov ebx, eax",
"mov eax, dword [0x4febc8]",
"cmp dword [eax + 0x30], 0",
"je 0x476e8a",
"cmp dword [ebx + 0x94], 0",
"jne 0x476e84",
"mov eax, dword [ebx + 0x30]",
"mov dword [esp], eax",
"mov byte [esp + 4], dl",
"mov eax, esp",
"push eax",
... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x4779ec | [
"Get graphical window text"
] | 535681c400ffffff8bf28bd880bba400000000742068000100008d442404508b433050e8f8f6f8ff8bc88bd48bc6e861c8f8ffeb0d8bc68b938c000000e8b6c7f8ff81c4000100005e5bc3 | [
"push ebx",
"push esi",
"add esp, 0xffffff00",
"mov esi, edx",
"mov ebx, eax",
"cmp byte [ebx + 0xa4], 0",
"je 0x477a21",
"push pe_nt_image_headers32",
"lea eax, [esp + 4]",
"push eax",
"mov eax, dword [ebx + 0x30]",
"push eax",
"call sub.user32.dll_GetWindowTextA",
"mov ecx, eax",
"mov ... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x478a98 | [
"Hide graphical window"
] | 53568bd88bb38400000085f674338bc6e81b60feff84c074288b8384000000e8085dfeff50e8c2e6f8ff85c074136a008b8384000000e8f15cfeff50e873e8f8ff5e5bc3 | [
"push ebx",
"push esi",
"mov ebx, eax",
"mov esi, dword [ebx + 0x84]",
"test esi, esi",
"je 0x478ad9",
"mov eax, esi",
"call fcn.0045eac8",
"test al, al",
"je 0x478ad9",
"mov eax, dword [ebx + 0x84]",
"call fcn.0045e7c4",
"push eax",
"call sub.user32.dll_IsWindowVisible",
"test eax, eax"... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x48aa50 | [
"Check for software breakpoints"
] | 538bd8817b14ca00000075228bc3e8a10a0000837b4000740ec74314cf000000b8010000005bc3c74314cb000000817b14cb00000075688b93b4010000837a1000744e837b080074078bc38b5008ff128bc38b90b4010000ff1285c0750433c05bc383f802742a837b080074d683f80374034875ce8b5308ff42048b4a048b43083b48087cbd8b9340010000015008ebb28b8b90000000898b98000000eb1e81... | [
"push ebx",
"mov ebx, eax",
"cmp dword [ebx + 0x14], 0xca",
"jne 0x48aa7e",
"mov eax, ebx",
"call fcn.0048b504",
"cmp dword [ebx + 0x40], 0",
"je 0x48aa77",
"mov dword [ebx + 0x14], 0xcf",
"mov eax, 1",
"pop ebx",
"ret",
"mov dword [ebx + 0x14], 0xcb",
"cmp dword [ebx + 0x14], 0xcb",
"jn... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x49be1c | [
"Query or enumerate registry value"
] | 558bec83c4f45356578bf98955fc8bf08b5d088bc3e85a83f6ff8d45f4508bc6e80f88f6ff5057e8e4a9f6ff85c0757733c05568bcbe490064ff30648920c745f8000100008bc38b55f8e87189f6ff8d45f8508b03e8da87f6ff506a006a008b45fce8cd87f6ff508b45f450e8afa9f6ff85c0750d8b55f84a8bc3e84089f6ffeb078bc3e8eb82f6ff33c05a595964891068c3be49008b45f450e869a9f6ffc3... | [
"push ebp",
"mov ebp, esp",
"add esp, 0xfffffff4",
"push ebx",
"push esi",
"push edi",
"mov edi, ecx",
"mov dword [ebp - 4], edx",
"mov esi, eax",
"mov ebx, dword [ebp + 8]",
"mov eax, ebx",
"call fcn.00404190",
"lea eax, [ebp - 0xc]",
"push eax",
"mov eax, esi",
"call fcn.00404650",
... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x49bf04 | [
"Get hostname"
] | 558bec83c4b853565733db895dbc895db88bf98bf28bd88d45f08b1590914100e85f8df6ff33c0556848c0490064ff30648920833decc04f000075178b0d10cb4f00b201a1407a4000e80e0af7ffe8b57bf6ff8d45e033c9ba10000000e8666df6ff8bc3e8938af6ff8945e45657be58c049008d7dd0a5a5a5a55f5e8d45d08945f08d45f4e8a69ef6ff33c08945f88bc3e8768af6ff85c07e51c745fc100000... | [
"push ebp",
"mov ebp, esp",
"add esp, 0xffffffb8",
"push ebx",
"push esi",
"push edi",
"xor ebx, ebx",
"mov dword [ebp - 0x44], ebx",
"mov dword [ebp - 0x48], ebx",
"mov edi, ecx",
"mov esi, edx",
"mov ebx, eax",
"lea eax, [ebp - 0x10]",
"mov edx, dword [0x419190]",
"call fcn.00404c88",
... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x49dd84 | [
"Check os version"
] | 81c46cffffffc704249400000054e8358cf6ff837c2404057712837c2404057507837c240801730433c0eb02b001a278ee4f0081c494000000c3 | [
"add esp, 0xffffff6c",
"mov dword [esp], 0x94",
"push esp",
"call sub.kernel32.dll_GetVersionExA",
"cmp dword [esp + 4], 5",
"ja 0x49ddb0",
"cmp dword [esp + 4], 5",
"jne 0x49ddac",
"cmp dword [esp + 8], 1",
"jae 0x49ddb0",
"xor eax, eax",
"jmp 0x49ddb2",
"mov al, 1",
"mov byte [0x4fee78],... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x49ddc0 | [
"Link many functions at runtime"
] | 5356bb1cc14f00be7cee4f0068d8e049008b0350e8ab8bf6ff890668e8e049008b0350e89c8bf6ff89460468fce049008b0350e88c8bf6ff894608680ce149008b0350e87c8bf6ff89460c681ce149008b0350e86c8bf6ff8946106838e149008b0350e85c8bf6ff8946146848e149008b0350e84c8bf6ff8946186864e149008b0350e83c8bf6ff89461c6878e149008b0350e82c8bf6ff8946206890e14900... | [
"push ebx",
"push esi",
"mov ebx, 0x4fc11c",
"mov esi, 0x4fee7c",
"push 0x49e0d8",
"mov eax, dword [ebx]",
"push eax",
"call sub.kernel32.dll_GetProcAddress_1",
"mov dword [esi], eax",
"push 0x49e0e8",
"mov eax, dword [ebx]",
"push eax",
"call sub.kernel32.dll_GetProcAddress_1",
"mov dword... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x4b4708 | [
"Log keystrokes via polling"
] | 5381c400ffffff54e80729f5ff8bc4e804a9fbff8bd88bc381c4000100005bc3 | [
"push ebx",
"add esp, 0xffffff00",
"push esp",
"call sub.user32.dll_GetKeyboardState",
"mov eax, esp",
"call fcn.0046f020",
"mov ebx, eax",
"mov eax, ebx",
"add esp, 0x100",
"pop ebx",
"ret"
] |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x4c5430 | [
"Access peb ldr_data",
"Get process heap flags",
"Get process heap force flags"
] | 558becb9140000006a006a004975f953bbacf24f0033c055685c574c0064ff306489208d55f8a1c0d14f00e8b40ef4ff8b45f88d55fce80986fdff8b55fc8bc3e86fedf3ff8d55f0a160d04f00e8920ef4ff8b45f08d55f4e8e785fdff8b55f48d4304e84cedf3ff8d55e8a154d04f00e86f0ef4ff8b45e88d55ece8c485fdff8b55ec8d4308e829edf3ff8d55e0a10ccc4f00e84c0ef4ff8b45e08d55e4e8a1... | [
"push ebp",
"mov ebp, esp",
"mov ecx, 0x14",
"push 0",
"push 0",
"dec ecx",
"jne 0x4c5438",
"push ebx",
"mov ebx, 0x4ff2ac",
"xor eax, eax",
"push ebp",
"push 0x4c575c",
"push dword fs:[eax]",
"mov dword fs:[eax], esp",
"lea edx, [ebp - 8]",
"mov eax, dword [0x4fd1c0]",
"call fcn.004... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x4c6c78 | [
"Check os version"
] | 81c46cffffffc704249400000054e841fdf3ff837c2410017507837c2408007512837c2410027507837c240405740433c0eb02b001a22cc84f0081c494000000c3 | [
"add esp, 0xffffff6c",
"mov dword [esp], 0x94",
"push esp",
"call sub.kernel32.dll_GetVersionExA",
"cmp dword [esp + 0x10], 1",
"jne 0x4c6c99",
"cmp dword [esp + 8], 0",
"jne 0x4c6cab",
"cmp dword [esp + 0x10], 2",
"jne 0x4c6ca7",
"cmp dword [esp + 4], 5",
"je 0x4c6cab",
"xor eax, eax",
"j... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x4d4c08 | [
"Get file system object information"
] | 81c4a0feffff833de8c84f00ff7527681040000068600100008d442408506880000000684c4c4d00e8e3f4f5ff8b442404a3e8c84f00a1e8c84f0081c460010000c3 | [
"add esp, 0xfffffea0",
"cmp dword [0x4fc8e8], 0xffffffff",
"jne 0x4d4c3e",
"push 0x4010",
"push 0x160",
"lea eax, [esp + 8]",
"push eax",
"push 0x80",
"push 0x4d4c4c",
"call sub.shell32.dll_SHGetFileInfoA",
"mov eax, dword [esp + 4]",
"mov dword [0x4fc8e8], eax",
"mov eax, dword [0x4fc8e8]",... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x4d4c60 | [
"Get file system object information"
] | 81c4a0feffff833decc84f00ff7524681040000068600100008d442408506a1068a04c4d00e88ef4f5ff8b442404a3ecc84f00a1ecc84f0081c460010000c3 | [
"add esp, 0xfffffea0",
"cmp dword [0x4fc8ec], 0xffffffff",
"jne 0x4d4c93",
"push 0x4010",
"push 0x160",
"lea eax, [esp + 8]",
"push eax",
"push 0x10",
"push 0x4d4ca0",
"call sub.shell32.dll_SHGetFileInfoA",
"mov eax, dword [esp + 4]",
"mov dword [0x4fc8ec], eax",
"mov eax, dword [0x4fc8ec]",... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x4d4cb4 | [
"Get file system object information"
] | 81c4a0feffff833df0c84f00ff7524681240000068600100008d442408506a1068f44c4d00e83af4f5ff8b442404a3f0c84f00a1f0c84f0081c460010000c3 | [
"add esp, 0xfffffea0",
"cmp dword [0x4fc8f0], 0xffffffff",
"jne 0x4d4ce7",
"push 0x4012",
"push 0x160",
"lea eax, [esp + 8]",
"push eax",
"push 0x10",
"push 0x4d4cf4",
"call sub.shell32.dll_SHGetFileInfoA",
"mov eax, dword [esp + 4]",
"mov dword [0x4fc8f0], eax",
"mov eax, dword [0x4fc8f0]",... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x4d6918 | [
"Create thread"
] | 53518bd86a006a006aff6a00e82bfff2ff8943086a006a006aff6a00e81bfff2ff8943206a006a006aff6a00e80bfff2ff894324546a0053681c544d006a006a00e82efff2ff89430c5a5bc3 | [
"push ebx",
"push ecx",
"mov ebx, eax",
"push 0",
"push 0",
"push 0xffffffffffffffff",
"push 0",
"call sub.kernel32.dll_CreateEventA",
"mov dword [ebx + 8], eax",
"push 0",
"push 0",
"push 0xffffffffffffffff",
"push 0",
"call sub.kernel32.dll_CreateEventA",
"mov dword [ebx + 0x20], eax",... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x4d6d60 | [
"Get file system object information"
] | 558bec81c484feffff535633db899d84feffff8bd98955f88945fc8b45f8e825f1f2ff33c05568cd704d0064ff306489208b45fc807834000f850e0300008b45fc807835000f85010300008b45fcc640350133d25568a5704d0064ff326489228b45fc837830007514b98d090000bae4704d00b858714d00e80fd3f2ff8b45fc8b403085c0750ae8cccdf2ffe9bb0200008bd08bc3e886e1ffff8945f033c055... | [
"push ebp",
"mov ebp, esp",
"add esp, 0xfffffe84",
"push ebx",
"push esi",
"xor ebx, ebx",
"mov dword [ebp - 0x17c], ebx",
"mov ebx, ecx",
"mov dword [ebp - 8], edx",
"mov dword [ebp - 4], eax",
"mov eax, dword [ebp - 8]",
"call fcn.00405ea8",
"xor eax, eax",
"push ebp",
"push 0x4d70cd",... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x4d7ed4 | [
"Link many functions at runtime"
] | 53bbfcc84f006a00e8db15f4ff68547f4d00e851ebf2ff890368607f4d008b0350e88aeaf2ffa32cf34f006a028b0350e87beaf2ffa320f34f006a048b0350e86ceaf2ffa324f34f0068747f4d008b0350e85aeaf2ffa3f4c84f00688c7f4d008b0350e848eaf2ffa3f8c84f006a006aff6a00e820e9f2ffa334f34f005bc3 | [
"push ebx",
"mov ebx, 0x4fc8fc",
"push 0",
"call sub.ole32.dll_OleInitialize",
"push 0x4d7f54",
"call sub.kernel32.dll_LoadLibraryA",
"mov dword [ebx], eax",
"push 0x4d7f60",
"mov eax, dword [ebx]",
"push eax",
"call sub.kernel32.dll_GetProcAddress_1",
"mov dword [0x4ff32c], eax",
"push 2",
... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x4d8f60 | [
"Get file system object information"
] | 558bec81c49cfeffff535684d2740883c4f0e82da7f2ff8855ff8bd833d28bc3e8bfd6f6ff8bcbb201a1dc3f4d00e8a5d6ffff8983ac0300006a008bcbb201a158814d00e85fc8ffff8bf089b3bc030000895e34c74630b0a24d00b201a1f4404d00e859eeffff8983900300008bcbb201a140824d00e8c1fcffff8983b80300008bcbb201a1b4804d00e809cdffff8983a8030000680140000068600100008d... | [
"push ebp",
"mov ebp, esp",
"add esp, 0xfffffe9c",
"push ebx",
"push esi",
"test dl, dl",
"je 0x4d8f77",
"add esp, 0xfffffff0",
"call fcn.004036a4",
"mov byte [ebp - 1], dl",
"mov ebx, eax",
"xor edx, edx",
"mov eax, ebx",
"call fcn.00446644",
"mov ecx, ebx",
"mov dl, 1",
"mov eax, d... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x4d9e20 | [
"Access peb ldr_data"
] | 558bec83c4e053565733db895de48bf28d7df4a5a58bd98945fc33c05568c79f4d0064ff306489208d4de88d55f48b45fce85edcf7ff8b4dec8b55e88b45fce830f6f6ff8945f0837df00075768b45fc83b8980300000075148b45fc83b88c030000007408c60300e9240100008b45fce897040000c603018d45e4e894bff2ff5068d89f4d008b45fce81649f8ff508b45fc8b80a80300008b4018508b00ff50... | [
"push ebp",
"mov ebp, esp",
"add esp, 0xffffffe0",
"push ebx",
"push esi",
"push edi",
"xor ebx, ebx",
"mov dword [ebp - 0x1c], ebx",
"mov esi, edx",
"lea edi, [ebp - 0xc]",
"movsd dword es:[edi], dword [esi]",
"movsd dword es:[edi], dword [esi]",
"mov ebx, ecx",
"mov dword [ebp - 4], eax"... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x4da438 | [
"Get file system object information"
] | 558bec81c4a0feffffc785a8feffff00000020680808020068600100008d95a0feffff526a0050e8b49cf5fff685abfeffff200f95c08be55dc3 | [
"push ebp",
"mov ebp, esp",
"add esp, 0xfffffea0",
"mov dword [ebp - 0x158], 0x20000000",
"push 0x20808",
"push 0x160",
"lea edx, [ebp - 0x160]",
"push edx",
"push 0",
"push eax",
"call sub.shell32.dll_SHGetFileInfoA",
"test byte [ebp - 0x155], 0x20",
"setne al",
"mov esp, ebp",
"pop ebp... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x4daad8 | [
"Get file system object information"
] | 558bec81c49cfeffff535684d2740883c4f0e8b58bf2ff8855ff8bd833d28bc3e8736ef6ff8bcbb201a1dc3f4d00e82dbbffff8983580300006a008bcbb201a184864d00e8e7acffff8bf089b36c030000895e34c74630b0c44d00b201a1f4404d00e8e1d2ffff8bf089b344030000895e0c8b038b80040100008946088bcbb201a1d4874d00e8b5ccffff8bf089b364030000895e1cc7461840c54d00b201a1... | [
"push ebp",
"mov ebp, esp",
"add esp, 0xfffffe9c",
"push ebx",
"push esi",
"test dl, dl",
"je 0x4daaef",
"add esp, 0xfffffff0",
"call fcn.004036a4",
"mov byte [ebp - 1], dl",
"mov ebx, eax",
"xor edx, edx",
"mov eax, ebx",
"call fcn.00441970",
"mov ecx, ebx",
"mov dl, 1",
"mov eax, d... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x4daf18 | [
"Access peb ldr_data"
] | 558bec83c4ec5333d28955f48955f08bd833c05568d4b04d0064ff306489208bc3e89277f6ffe86156f6ff85c00f846b0100008bc3e87e77f6ffe84d56f6ff8b400c8945fc8b45fce81fafffff33c05568afb04d0064ff306489208bc3e85677f6ffe8ad58f6ff8b55fc8b520c8b52084a3bc27e0ae8268cf2ffe91f0100008bc3e83277f6ffe88958f6ff8bd08b45fc8b400ce8c417f4ff8b4030e8f4a1ffff... | [
"push ebp",
"mov ebp, esp",
"add esp, 0xffffffec",
"push ebx",
"xor edx, edx",
"mov dword [ebp - 0xc], edx",
"mov dword [ebp - 0x10], edx",
"mov ebx, eax",
"xor eax, eax",
"push ebp",
"push 0x4db0d4",
"push dword fs:[eax]",
"mov dword fs:[eax], esp",
"mov eax, ebx",
"call fcn.004426d0",
... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x4db9bc | [
"Access peb ldr_data"
] | 558bec83c4dc53565733db895de4895ddc8bf18d7df4a5a58bda8945fc33c05568c9bb4d0064ff306489208d4de88d55f48b45fce8bfc0f7ff8b4dec8b55e88b45fce8d16af6ff8945f0837df000750d8b45fce8c8080000e9920100008b45fc8b80680300003b45f075148b45fc83b840030000007408c60300e9700100008b45fce899080000c603018b45f0e8564bf6ff85c075468b45f08b580c837b1800... | [
"push ebp",
"mov ebp, esp",
"add esp, 0xffffffdc",
"push ebx",
"push esi",
"push edi",
"xor ebx, ebx",
"mov dword [ebp - 0x1c], ebx",
"mov dword [ebp - 0x24], ebx",
"mov esi, ecx",
"lea edi, [ebp - 0xc]",
"movsd dword es:[edi], dword [esi]",
"movsd dword es:[edi], dword [esi]",
"mov ebx, e... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x4dd31c | [
"Get file system object information"
] | 558bec81c490feffff5333db899d90feffff894dfc8955f48945f88b45f4e8698bf2ff33c055680dd44d0064ff306489208b45f88b550c89501c680842000068600100008d8594feffff506a008b45fc50e8a66df5ff55e800ffffff5984c075228d9590feffff8d85a0feffffe80ac3f2ff8b9590feffff8b45f88b401ce8ad2af6ff8b9598feffff8b450ce8d32cf6ff680a40000068600100008d8594feff... | [
"push ebp",
"mov ebp, esp",
"add esp, 0xfffffe90",
"push ebx",
"xor ebx, ebx",
"mov dword [ebp - 0x170], ebx",
"mov dword [ebp - 4], ecx",
"mov dword [ebp - 0xc], edx",
"mov dword [ebp - 8], eax",
"mov eax, dword [ebp - 0xc]",
"call fcn.00405ea8",
"xor eax, eax",
"push ebp",
"push 0x4dd40d... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x4de350 | [
"Get common file path"
] | 558bec33c95151515151515153565733c055688ae44d0064ff306489208d45fce87b63ffff33ffbe54f34f008bde8d430450576a00e85e5ff5ff85c0742633c0890333c08943048d4308e8f15df2ff8d430ce8e95df2ff8d4310e8e15df2ffe99e0000008d4df433d28b4304e827fbffff8b55f48d4308e8185ef2ff8d55f08b4308e899a4f2ff8b55f08d4310e8025ef2ff8d55e48b4304e8536cffff8b55e4... | [
"push ebp",
"mov ebp, esp",
"xor ecx, ecx",
"push ecx",
"push ecx",
"push ecx",
"push ecx",
"push ecx",
"push ecx",
"push ecx",
"push ebx",
"push esi",
"push edi",
"xor eax, eax",
"push ebp",
"push 0x4de48a",
"push dword fs:[eax]",
"mov dword fs:[eax], esp",
"lea eax, [ebp - 4]",... |
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2 | 0x4f8294 | [
"Get common file path"
] | 558bec6a006a0053568bf033c0556818834f0064ff30648920e89228f1ff83c4f8dd1c249b8d55fcb830834f00e8ca34f1ffb8ff000000e8f4a4f0ff8bd868ff00000053e8f7e6f0ff8d55f88bc3e8b113f1ff8b55f88bc6b944834f00e8a6c1f0ff8bc3e8e7a4f0ff33c05a5959648910681f834f008d45f8ba02000000e89dbef0ffc3 | [
"push ebp",
"mov ebp, esp",
"push 0",
"push 0",
"push ebx",
"push esi",
"mov esi, eax",
"xor eax, eax",
"push ebp",
"push 0x4f8318",
"push dword fs:[eax]",
"mov dword fs:[eax], esp",
"call fcn.0040ab44",
"add esp, 0xfffffff8",
"fstp qword [esp]",
"wait",
"lea edx, [ebp - 4]",
"mov ... |
97405f4e365f32ff090711a1825c329f3338516069eb7486d01fd01e35be6411 | 0x401434 | [
"Copy file",
"Create directory",
"Create process on windows",
"Create shortcut via ishelllink",
"Delete file",
"Delete registry value",
"Enumerate files on windows",
"Get file attributes",
"Get file version info",
"Move file",
"Query environment variable",
"Query or enumerate registry key",
... | 558bec81eca4010000a1a83e420053568b7508576a07598d7dd88945cc33dbf3a58b45dc8b55e08bf08bfac1e60ab900404200895dfcc1e70a03f103f98d4ddc890d9c9340008b4dd883c1fe83f9410f87f4130000ff248d8f2840005350e84a390000e9640d0000ff056c364200395dcc0f84550d000053ff15f8714000e9490d000050e8b0feffff485350e8c4feffffe9be1300005350e810390000e9a713... | [
"push ebp",
"mov ebp, esp",
"sub esp, 0x1a4",
"mov eax, dword [0x423ea8]",
"push ebx",
"push esi",
"mov esi, dword [ebp + 8]",
"push edi",
"push 7",
"pop ecx",
"lea edi, [ebp - 0x28]",
"mov dword [ebp - 0x34], eax",
"xor ebx, ebx",
"rep movsd dword es:[edi], dword [esi]",
"mov eax, dword... |
97405f4e365f32ff090711a1825c329f3338516069eb7486d01fd01e35be6411 | 0x402a28 | [
"Delete registry key",
"Query or enumerate registry key"
] | 558bec81ec0c01000053568d45fc5750a1503f42000c0833db5053ff750cff7508ff15107040003bc375698b3508704000bf05010000eb19395d10754b8d85f4feffff5350ff75fce8b3ffffff85c075128d85f4feffff575053ff75fcffd685c074d5ff75fcff151c7040006a02e8c63200003bc3742453ff35503f4200ff750cff7508ffd0eb0cff75fcff151c70400033c0405f5e5bc9c20c00391d503f42... | [
"push ebp",
"mov ebp, esp",
"sub esp, 0x10c",
"push ebx",
"push esi",
"lea eax, [ebp - 4]",
"push edi",
"push eax",
"mov eax, dword [0x423f50]",
"or al, 8",
"xor ebx, ebx",
"push eax",
"push ebx",
"push dword [ebp + 0xc]",
"push dword [ebp + 8]",
"call dword [sym.imp.ADVAPI32.dll_RegOp... |
97405f4e365f32ff090711a1825c329f3338516069eb7486d01fd01e35be6411 | 0x402c5b | [
"Get file size"
] | 558bec81ec28010000535633db57895dfc895df8ff158c704000be00ac4200680004000005e80300005653a3ac3e4200ff15987040006a03680000008056e87c2a00008bf883ffff893d10904000750ab86c914000e94502000056be009c420056e8822d000056e8b6280000506800b04200e8712d00005357ff15947040003bc3a348f041008bf00f8eea000000a1b43e42008bfef7d81bc025007e00000500... | [
"push ebp",
"mov ebp, esp",
"sub esp, 0x128",
"push ebx",
"push esi",
"xor ebx, ebx",
"push edi",
"mov dword [ebp - 4], ebx",
"mov dword [ebp - 8], ebx",
"call dword [sym.imp.KERNEL32.dll_GetTickCount]",
"mov esi, 0x42ac00",
"push 0x400",
"add eax, 0x3e8",
"push esi",
"push ebx",
"mov ... |
97405f4e365f32ff090711a1825c329f3338516069eb7486d01fd01e35be6411 | 0x402f01 | [
"Read file on windows",
"Write file on windows"
] | 558bec51518b450853565733ff3bc77c1c8b0df83e42005703c15750a33c704100ff3514904000ff15347140006a045e56e8f50000003bc70f8ce60000008d45fc8b1d2c71400057508d45085650ff3514904000ffd385c00f84c30000003975fc0f85ba000000ff750801353c704100e8b60000003bc78945f80f8ca4000000397d10756b397d080f8e8e000000be38304100bf00400000397d087d038b7d08... | [
"push ebp",
"mov ebp, esp",
"push ecx",
"push ecx",
"mov eax, dword [ebp + 8]",
"push ebx",
"push esi",
"push edi",
"xor edi, edi",
"cmp eax, edi",
"jl 0x402f2e",
"mov ecx, dword [0x423ef8]",
"push edi",
"add eax, ecx",
"push edi",
"push eax",
"mov dword [0x41703c], eax",
"push dwo... |
97405f4e365f32ff090711a1825c329f3338516069eb7486d01fd01e35be6411 | 0x40302c | [
"Write file on windows"
] | 515355568b353c7041002b35a8af40005703742418ff158c70400033db05f40100003bf3a3ac3e42000f8e3b010000ff354cf04100e8740100005353ff35a8af4000ff3514904000ff1534714000893548f04100891d38704100bd38b04000a140704100bf004000002b054cf041003bc77f028bf8be383041005756e8fb00000085c00f84d3000000013d4cf041008935c8af4000893dccaf4000391db03e42... | [
"push ecx",
"push ebx",
"push ebp",
"push esi",
"mov esi, dword [0x41703c]",
"sub esi, dword [0x40afa8]",
"push edi",
"add esi, dword [esp + 0x18]",
"call dword [sym.imp.KERNEL32.dll_GetTickCount]",
"xor ebx, ebx",
"add eax, 0x1f4",
"cmp esi, ebx",
"mov dword [0x423eac], eax",
"jle 0x40319... |
97405f4e365f32ff090711a1825c329f3338516069eb7486d01fd01e35be6411 | 0x403225 | [
"Accept command line arguments",
"Copy file",
"Create directory",
"Delete file",
"Get common file path",
"Get file system object information",
"Set current directory",
"Shutdown system",
"Terminate process"
] | 81ec8001000053555633db57895c2418c74424102891400033f6c644241420ff15307040006801800000ff15b470400053ff157c7240006a08a3583f4200e8f92a0000a3a43e4200538d442434686001000050536850f44100ff155871400068b091400068a0364200e8b0270000ff15b0704000bf009042005057e89e27000053ff150c714000803d0090420022a3a03e42008bc7750ac644241422b8019042... | [
"sub esp, 0x180",
"push ebx",
"push ebp",
"push esi",
"xor ebx, ebx",
"push edi",
"mov dword [esp + 0x18], ebx",
"mov dword [esp + 0x10], str.Error_writing_temporary_file._Make_sure_your_temp_folder_is_valid.",
"xor esi, esi",
"mov byte [esp + 0x14], 0x20",
"call dword [sym.imp.COMCTL32.dll_Init... |
97405f4e365f32ff090711a1825c329f3338516069eb7486d01fd01e35be6411 | 0x4035e3 | [
"Check if file exists",
"Get file attributes"
] | 83ec145355568b35b03e4200576a06e86a27000033db3bc37412ffd00fb7c0506800a04200e894230000eb4abf9804420053575368e47240006801000080c70500a0420030780000e8fa220000381d9804420075165357680273400068bc7240006803000080e8dc220000576800a04200e806240000e839020000a1b83e4200bd0094420083e02055a3203f4200e8a11f000085c00f85810000008b4e483bcb... | [
"sub esp, 0x14",
"push ebx",
"push ebp",
"push esi",
"mov esi, dword [0x423eb0]",
"push edi",
"push 6",
"call fcn.00405d61",
"xor ebx, ebx",
"cmp eax, ebx",
"je 0x40360f",
"call eax",
"movzx eax, ax",
"push eax",
"push 0x42a000",
"call fcn.004059a1",
"jmp 0x403659",
"mov edi, 0x420... |
97405f4e365f32ff090711a1825c329f3338516069eb7486d01fd01e35be6411 | 0x4052a3 | [
"Create process on windows"
] | 558bec83ec108d45f0c705a0244200440000005033c068a0244200505050505050ff750850ff15d070400085c0740cff75f4ff15ec7040008b45f0c9c20400 | [
"push ebp",
"mov ebp, esp",
"sub esp, 0x10",
"lea eax, [ebp - 0x10]",
"mov dword [0x4224a0], 0x44",
"push eax",
"xor eax, eax",
"push 0x4224a0",
"push eax",
"push eax",
"push eax",
"push eax",
"push eax",
"push eax",
"push dword [ebp + 8]",
"push eax",
"call dword [sym.imp.KERNEL32.d... |
97405f4e365f32ff090711a1825c329f3338516069eb7486d01fd01e35be6411 | 0x405368 | [
"Delete directory",
"Delete file",
"Enumerate files on windows",
"Enumerate files recursively"
] | 558bec81ec4801000056578b7d0857e89b020000f6450c088945f8741757ff1544714000f7d81bc0400105283f4200e994010000538b5d0c83e301895dfc741285c00f842b010000f6450c020f8421010000bea01442005756e87d06000085db740d684093400056e88a060000eb0657e8a0010000803f007509803da01442005c750b680c90400057e86906000057e85d0600008bd88d85b8feffff505603df... | [
"push ebp",
"mov ebp, esp",
"sub esp, 0x148",
"push esi",
"push edi",
"mov edi, dword [ebp + 8]",
"push edi",
"call fcn.00405617",
"test byte [ebp + 0xc], 8",
"mov dword [ebp - 8], eax",
"je 0x40539c",
"push edi",
"call dword [sym.imp.KERNEL32.dll_DeleteFileA]",
"neg eax",
"sbb eax, eax"... |
97405f4e365f32ff090711a1825c329f3338516069eb7486d01fd01e35be6411 | 0x405617 | [
"Check if file exists",
"Get file attributes"
] | 5657ff74240cbea018420056e81b04000056e89cffffff8bf885ff750433c0eb5257e863060000f605b83e420080740a8a0784c074e73c5c74e32bfeeb14e8e006000085c07405f6001074d156e814ffffff56e8ea0300003bc7567fe1e8bdfeffff56ff157870400033c983f8ff0f95c18bc15f5ec20400 | [
"push esi",
"push edi",
"push dword [esp + 0xc]",
"mov esi, 0x4218a0",
"push esi",
"call fcn.00405a43",
"push esi",
"call fcn.004055ca",
"mov edi, eax",
"test edi, edi",
"jne 0x405638",
"xor eax, eax",
"jmp 0x40568a",
"push edi",
"call fcn.00405ca1",
"test byte [0x423eb8], 0x80",
"je... |
97405f4e365f32ff090711a1825c329f3338516069eb7486d01fd01e35be6411 | 0x4056fb | [
"Check if file exists",
"Get file attributes",
"Set file attributes"
] | ff742404ff157870400083f8ff740d24fe50ff742408ff1584704000c20400 | [
"push dword [esp + 4]",
"call dword [sym.imp.KERNEL32.dll_GetFileAttributesA]",
"cmp eax, 0xffffffff",
"je 0x405717",
"and al, 0xfe",
"push eax",
"push dword [esp + 8]",
"call dword [sym.imp.KERNEL32.dll_SetFileAttributesA]",
"ret 4"
] |
97405f4e365f32ff090711a1825c329f3338516069eb7486d01fd01e35be6411 | 0x40571a | [
"Get file attributes"
] | ff742404ff15787040008bc86a0041f7d91bc923c851ff7424146a006a01ff74241cff74241cff1590704000c20c00 | [
"push dword [esp + 4]",
"call dword [sym.imp.KERNEL32.dll_GetFileAttributesA]",
"mov ecx, eax",
"push 0",
"inc ecx",
"neg ecx",
"sbb ecx, ecx",
"and ecx, eax",
"push ecx",
"push dword [esp + 0x14]",
"push 0",
"push 1",
"push dword [esp + 0x1c]",
"push dword [esp + 0x1c]",
"call dword [sy... |
97405f4e365f32ff090711a1825c329f3338516069eb7486d01fd01e35be6411 | 0x405749 | [
"Get common file path"
] | 558bec568b7508576a645f4fc745086e736100ff158c7040006a1a33d259f7f1568d45086a0050ff750c00550aff15d870400085c0750d85ff75d08026005f5e5dc208008bc6ebf6 | [
"push ebp",
"mov ebp, esp",
"push esi",
"mov esi, dword [ebp + 8]",
"push edi",
"push 0x64",
"pop edi",
"dec edi",
"mov dword [ebp + 8], 0x61736e",
"call dword [sym.imp.KERNEL32.dll_GetTickCount]",
"push 0x1a",
"xor edx, edx",
"pop ecx",
"div ecx",
"push esi",
"lea eax, [ebp + 8]",
"... |
97405f4e365f32ff090711a1825c329f3338516069eb7486d01fd01e35be6411 | 0x405791 | [
"Get file size",
"Read file on windows",
"Write file on windows"
] | 535556576a01e8c505000085c08b74241874116a0556ff74241cffd085c00f85390100008b1d68704000c705282642004e554c0085f6bf00040000bd2826420074266a016a0056e83dffffff50ff15ec704000575556ffd385c00f84030100003bc70f8ffb000000bea02042005756ff74241cffd385c00f84e60000003bc70f8fde0000005655684c93400068a01c4200ff15007240008bd8a1b03e420083c4... | [
"push ebx",
"push ebp",
"push esi",
"push edi",
"push 1",
"call fcn.00405d61",
"test eax, eax",
"mov esi, dword [esp + 0x18]",
"je 0x4057b5",
"push 5",
"push esi",
"push dword [esp + 0x1c]",
"call eax",
"test eax, eax",
"jne 0x4058ee",
"mov ebx, dword [sym.imp.KERNEL32.dll_GetShortPath... |
97405f4e365f32ff090711a1825c329f3338516069eb7486d01fd01e35be6411 | 0x40592a | [
"Query or enumerate registry value"
] | 558bec538d451856508b451833dbf7d81bc08b751425000100000d19000200881e5053ff750cff7508ff151070400085c0753e8d450cc7450c00040000508d4514565053ff7510ff7518ff150070400085c0750c837d14017408837d14027402881eff7518889eff030000ff151c7040005e5b5dc21400 | [
"push ebp",
"mov ebp, esp",
"push ebx",
"lea eax, [ebp + 0x18]",
"push esi",
"push eax",
"mov eax, dword [ebp + 0x18]",
"xor ebx, ebx",
"neg eax",
"sbb eax, eax",
"mov esi, dword [ebp + 0x14]",
"and eax, 0x100",
"or eax, 0x20019",
"mov byte [esi], bl",
"push eax",
"push ebx",
"push d... |
97405f4e365f32ff090711a1825c329f3338516069eb7486d01fd01e35be6411 | 0x405a65 | [
"Get common file path"
] | 558bec83ec188b450c85c07d118b0d7c3642008d0485040000002bc88b018b0dd83e42008b550803c8b8402e4200532bd0565781fa000800008bf80f83d80100008b7d0883650800e9cc0100008bf72bf081fe000400000f8dc60100004180fafc894d0c0f86a20100000fbe41010fbe098bf083450c0283e67f8bd9c1e60783e37f8945f00bf38bd980cd8080cc8080fafe895de8894dec8945f40f85150100... | [
"push ebp",
"mov ebp, esp",
"sub esp, 0x18",
"mov eax, dword [ebp + 0xc]",
"test eax, eax",
"jge 0x405a83",
"mov ecx, dword [0x42367c]",
"lea eax, [eax*4 + 4]",
"sub ecx, eax",
"mov eax, dword [ecx]",
"mov ecx, dword [0x423ed8]",
"mov edx, dword [ebp + 8]",
"add ecx, eax",
"mov eax, 0x422e... |
97405f4e365f32ff090711a1825c329f3338516069eb7486d01fd01e35be6411 | 0x405dcd | [
"Encode data using xor",
"Hash data with crc32"
] | 833d2c2a42000056752d33c96a088bc15e8bd080e201f6da1bd281e22083b8edd1e833c24e75ea89048d282a42004181f9000100007cd58b5424108b44240885d2f7d076238b4c240c570fb6398bf081e6ff00000033f7c1e8088b34b5282a420033c6414a75e35ff7d05ec20c00 | [
"cmp dword [0x422a2c], 0",
"push esi",
"jne 0x405e04",
"xor ecx, ecx",
"push 8",
"mov eax, ecx",
"pop esi",
"mov edx, eax",
"and dl, 1",
"neg dl",
"sbb edx, edx",
"and edx, 0xedb88320",
"shr eax, 1",
"xor eax, edx",
"dec esi",
"jne 0x405dde",
"mov dword [ecx*4 + 0x422a28], eax",
"i... |
974819705b68ff75ca54365b190ad1fd237d1712269d8dfe120200b35a882cac | 0x410180 | [
"Check http status code"
] | 558bec83ec1868e625400064a1000000005064892500000000b8e0040000e83d24ffff5356578965e8c745eca81d4000c745f000000000c745f400000000c745fc010000008b55088d8d7cfdffffff15981140006a0368a06840008d45b850ff15ec104000c745fc020000006affff1594104000c745fc030000006a006a0fe84c4bffff89856cfdffffff15681040008b8d6cfdffff894dd8c745fc04000000... | [
"push ebp",
"mov ebp, esp",
"sub esp, 0x18",
"push 0x4025e6",
"mov eax, dword fs:[0]",
"push eax",
"mov dword fs:[0], esp",
"mov eax, 0x4e0",
"call sub.MSVBVM60.DLL___vbaChkstk",
"push ebx",
"push esi",
"push edi",
"mov dword [ebp - 0x18], esp",
"mov dword [ebp - 0x14], 0x401da8",
"mov d... |
974819705b68ff75ca54365b190ad1fd237d1712269d8dfe120200b35a882cac | 0x410c70 | [
"Acquire debug privileges"
] | 558bec83ec1868e625400064a1000000005064892500000000b870000000e84d19ffff5356578965e8c745ec201f4000c745f000000000c745f400000000c745fc01000000c745fc020000006affff1594104000c745fc03000000e80843ffff894594ff15681040008d459c506a288b4d9451e85043ffff894590ff156810400033d2837d90000f95c2f7da0fbfc285c00f841e010000c745fc0400000033c9... | [
"push ebp",
"mov ebp, esp",
"sub esp, 0x18",
"push 0x4025e6",
"mov eax, dword fs:[0]",
"push eax",
"mov dword fs:[0], esp",
"mov eax, 0x70",
"call sub.MSVBVM60.DLL___vbaChkstk",
"push ebx",
"push esi",
"push edi",
"mov dword [ebp - 0x18], esp",
"mov dword [ebp - 0x14], 0x401f20",
"mov dw... |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.