sha256
stringlengths
64
64
func_addr
stringlengths
7
10
capa
listlengths
1
24
bytes
stringlengths
2
521k
disasm
listlengths
1
98.5k
9731edacc5aa9b80c51861d8132e58a053302beb794e5f265c096ce07145e0f4
0x402e5b
[ "Check for time delay via gettickcount", "Write file on windows" ]
558bec83ec5853568b7514578b7d1033db3bfb8975f87507c745f8008000003bfb895dfc897df47507c745f458d878008b45083bc37c0e8b0df8267a0003c851e8f30100008d45146a0450e8b601000085c00f849c010000f64517800f8433010000ff158c704000816514ffffff7f8945f08b4514c605a0af40000b891db8af40008945080f8e71010000bb58987800be004000003975147d038b75145653e8...
[ "push ebp", "mov ebp, esp", "sub esp, 0x58", "push ebx", "push esi", "mov esi, dword [ebp + 0x14]", "push edi", "mov edi, dword [ebp + 0x10]", "xor ebx, ebx", "cmp edi, ebx", "mov dword [ebp - 8], esi", "jne 0x402e7a", "mov dword [ebp - 8], RegEnumValueA", "cmp edi, ebx", "mov dword [ebp...
9731edacc5aa9b80c51861d8132e58a053302beb794e5f265c096ce07145e0f4
0x4030de
[ "Accept command line arguments", "Copy file", "Create directory", "Delete file", "Get common file path", "Get file system object information", "Set current directory", "Shutdown system", "Terminate process" ]
81ec8001000053555633db57895c2418c74424106091400033f6c644241420ff15307040006801800000ff15b070400053ff157c7240006a08a358277a00e8f12b0000a3a4267a00538d442434686001000050536868dc7900ff1558714000685491400068a01e7a00e8a4280000ff15ac704000bf00807a005057e89228000053ff150c714000803d00807a0022a3a0267a008bc7750ac644241422b801807a...
[ "sub esp, 0x180", "push ebx", "push ebp", "push esi", "xor ebx, ebx", "push edi", "mov dword [esp + 0x18], ebx", "mov dword [esp + 0x10], str.Error_writing_temporary_file._Make_sure_your_temp_folder_is_valid.", "xor esi, esi", "mov byte [esp + 0x14], 0x20", "call dword [sym.imp.COMCTL32.dll_Init...
9731edacc5aa9b80c51861d8132e58a053302beb794e5f265c096ce07145e0f4
0x403539
[ "Check if file exists", "Get file attributes" ]
83ec145355568b35b0267a00576a06e8c527000033db3bc37412ffd00fb7c0506800907a00e8eb230000eb4abfb0ec790053575368e47240006801000080c70500907a0030780000e851230000381db0ec790075165357680273400068bc7240006803000080e833230000576800907a00e85d240000e84e020000a1b8267a00bd00847a0083e02055a320277a00c7053c277a0000000100e8ee1f000085c00f...
[ "sub esp, 0x14", "push ebx", "push ebp", "push esi", "mov esi, dword [0x7a26b0]", "push edi", "push 6", "call fcn.00405d12", "xor ebx, ebx", "cmp eax, ebx", "je 0x403565", "call eax", "movzx eax, ax", "push eax", "push 0x7a9000", "call fcn.0040594e", "jmp 0x4035af", "mov edi, 0x79e...
9731edacc5aa9b80c51861d8132e58a053302beb794e5f265c096ce07145e0f4
0x405250
[ "Create process on windows" ]
558bec83ec108d45f0c705b80c7a00440000005033c068b80c7a00505050505050ff750850ff15cc70400085c0740cff75f4ff15ec7040008b45f0c9c20400
[ "push ebp", "mov ebp, esp", "sub esp, 0x10", "lea eax, [ebp - 0x10]", "mov dword [0x7a0cb8], 0x44", "push eax", "xor eax, eax", "push 0x7a0cb8", "push eax", "push eax", "push eax", "push eax", "push eax", "push eax", "push dword [ebp + 8]", "push eax", "call dword [sym.imp.KERNEL32.d...
9731edacc5aa9b80c51861d8132e58a053302beb794e5f265c096ce07145e0f4
0x405315
[ "Delete directory", "Delete file", "Enumerate files on windows", "Enumerate files recursively" ]
558bec81ec4801000056578b7d0857e89b020000f6450c088945f8741757ff1544714000f7d81bc040010528277a00e994010000538b5d0c83e301895dfc741285c00f842b010000f6450c020f8421010000beb8fc79005756e87d06000085db740d682893400056e88a060000eb0657e8a0010000803f007509803db8fc79005c750b681090400057e86906000057e85d0600008bd88d85b8feffff505603df...
[ "push ebp", "mov ebp, esp", "sub esp, 0x148", "push esi", "push edi", "mov edi, dword [ebp + 8]", "push edi", "call fcn.004055c4", "test byte [ebp + 0xc], 8", "mov dword [ebp - 8], eax", "je 0x405349", "push edi", "call dword [sym.imp.KERNEL32.dll_DeleteFileA]", "neg eax", "sbb eax, eax"...
9731edacc5aa9b80c51861d8132e58a053302beb794e5f265c096ce07145e0f4
0x4055c4
[ "Check if file exists", "Get file attributes" ]
5657ff74240cbeb8007a0056e81b04000056e89cffffff8bf885ff750433c0eb5257e867060000f605b8267a0080740a8a0784c074e73c5c74e32bfeeb14e8e406000085c07405f6001074d156e814ffffff56e8ea0300003bc7567fe1e8bdfeffff56ff157870400033c983f8ff0f95c18bc15f5ec20400
[ "push esi", "push edi", "push dword [esp + 0xc]", "mov esi, 0x7a00b8", "push esi", "call fcn.004059f0", "push esi", "call fcn.00405577", "mov edi, eax", "test edi, edi", "jne 0x4055e5", "xor eax, eax", "jmp 0x405637", "push edi", "call fcn.00405c52", "test byte [0x7a26b8], 0x80", "je...
9731edacc5aa9b80c51861d8132e58a053302beb794e5f265c096ce07145e0f4
0x4056a8
[ "Check if file exists", "Get file attributes", "Set file attributes" ]
ff742404ff157870400083f8ff740d24fe50ff742408ff1584704000c20400
[ "push dword [esp + 4]", "call dword [sym.imp.KERNEL32.dll_GetFileAttributesA]", "cmp eax, 0xffffffff", "je 0x4056c4", "and al, 0xfe", "push eax", "push dword [esp + 8]", "call dword [sym.imp.KERNEL32.dll_SetFileAttributesA]", "ret 4" ]
9731edacc5aa9b80c51861d8132e58a053302beb794e5f265c096ce07145e0f4
0x4056c7
[ "Get file attributes" ]
ff742404ff15787040008bc86a0041f7d91bc923c851ff7424146a006a01ff74241cff74241cff15d4704000c20c00
[ "push dword [esp + 4]", "call dword [sym.imp.KERNEL32.dll_GetFileAttributesA]", "mov ecx, eax", "push 0", "inc ecx", "neg ecx", "sbb ecx, ecx", "and ecx, eax", "push ecx", "push dword [esp + 0x14]", "push 0", "push 1", "push dword [esp + 0x1c]", "push dword [esp + 0x1c]", "call dword [sy...
9731edacc5aa9b80c51861d8132e58a053302beb794e5f265c096ce07145e0f4
0x4056f6
[ "Get common file path" ]
558bec568b7508576a645f4fc745086e736100ff158c7040006a1a33d259f7f1568d45086a0050ff750c00550aff15d870400085c0750d85ff75d08026005f5e5dc208008bc6ebf6
[ "push ebp", "mov ebp, esp", "push esi", "mov esi, dword [ebp + 8]", "push edi", "push 0x64", "pop edi", "dec edi", "mov dword [ebp + 8], 0x61736e", "call dword [sym.imp.KERNEL32.dll_GetTickCount]", "push 0x1a", "xor edx, edx", "pop ecx", "div ecx", "push esi", "lea eax, [ebp + 8]", "...
9731edacc5aa9b80c51861d8132e58a053302beb794e5f265c096ce07145e0f4
0x40573e
[ "Get file size", "Read file on windows", "Write file on windows" ]
535556576a01e8c905000085c08b74241874116a0556ff74241cffd085c00f85390100008b1d68704000c705400e7a004e554c0085f6bf00040000bd400e7a0074266a016a0056e83dffffff50ff15ec704000575556ffd385c00f84030100003bc70f8ffb000000beb8087a005756ff74241cffd385c00f84e60000003bc70f8fde0000005655683493400068b8047a00ff15007240008bd8a1b0267a0083c4...
[ "push ebx", "push ebp", "push esi", "push edi", "push 1", "call fcn.00405d12", "test eax, eax", "mov esi, dword [esp + 0x18]", "je 0x405762", "push 5", "push esi", "push dword [esp + 0x1c]", "call eax", "test eax, eax", "jne 0x40589b", "mov ebx, dword [sym.imp.KERNEL32.dll_GetShortPath...
9731edacc5aa9b80c51861d8132e58a053302beb794e5f265c096ce07145e0f4
0x4058d7
[ "Query or enumerate registry value" ]
558bec538d451856508b451833dbf7d81bc08b751425000100000d19000200881e5053ff750cff7508ff151070400085c0753e8d450cc7450c00040000508d4514565053ff7510ff7518ff150070400085c0750c837d14017408837d14027402881eff7518889eff030000ff151c7040005e5b5dc21400
[ "push ebp", "mov ebp, esp", "push ebx", "lea eax, [ebp + 0x18]", "push esi", "push eax", "mov eax, dword [ebp + 0x18]", "xor ebx, ebx", "neg eax", "sbb eax, eax", "mov esi, dword [ebp + 0x14]", "and eax, 0x100", "or eax, 0x20019", "mov byte [esi], bl", "push eax", "push ebx", "push d...
9731edacc5aa9b80c51861d8132e58a053302beb794e5f265c096ce07145e0f4
0x405a12
[ "Get common file path" ]
558bec83ec188b450c85c07d118b0d7c1e7a008d0485040000002bc88b018b0dd8267a008b550803c8b840167a00532bd0565781fa000800008bf80f83dc0100008b7d0883650800e9d00100008bf72bf081fe000400000f8dca0100004180fafc894d0c0f86a60100000fbe41010fbe098bf08bd983e67f83e37fc1e6070bf38bd983450c0280cf80895de88bd98bc8895dec80cd8080fafe894df08945f40f...
[ "push ebp", "mov ebp, esp", "sub esp, 0x18", "mov eax, dword [ebp + 0xc]", "test eax, eax", "jge 0x405a30", "mov ecx, dword [0x7a1e7c]", "lea eax, [eax*4 + 4]", "sub ecx, eax", "mov eax, dword [ecx]", "mov ecx, dword [0x7a26d8]", "mov edx, dword [ebp + 8]", "add ecx, eax", "mov eax, 0x7a16...
9731edacc5aa9b80c51861d8132e58a053302beb794e5f265c096ce07145e0f4
0x405d7e
[ "Encode data using xor", "Hash data with crc32" ]
833d44127a000056752d33c96a088bc15e8bd080e201f6da1bd281e22083b8edd1e833c24e75ea89048d40127a004181f9000100007cd58b5424108b44240885d2f7d076238b4c240c570fb6398bf081e6ff00000033f7c1e8088b34b540127a0033c6414a75e35ff7d05ec20c00
[ "cmp dword [0x7a1244], 0", "push esi", "jne 0x405db5", "xor ecx, ecx", "push 8", "mov eax, ecx", "pop esi", "mov edx, eax", "and dl, 1", "neg dl", "sbb edx, edx", "and edx, 0xedb88320", "shr eax, 1", "xor eax, edx", "dec esi", "jne 0x405d8f", "mov dword [ecx*4 + 0x7a1240], eax", "i...
97375152a03410f502c4e8e197c958df64b6f68cec13c5ddabf4af5107769e6c
0x4013a0
[ "Packed with generic packer" ]
558bec81ecec070000535657c745fc00000000c78564f8ffff04000000c7857cf8ffff00000080c78568f8ffff19000200a1e48040008985d4f8ffff6a0bff15c48140006a0bff15c481400060c745e000000000c745fc00000000c745d000000000c78570f8ffff64000000c745d80c000000c745e000000000c745fc00000000c745d000000000c78570f8ffff64000000c745d80c000000c78514f8ffff30...
[ "push ebp", "mov ebp, esp", "sub esp, 0x7ec", "push ebx", "push esi", "push edi", "mov dword [ebp - 4], 0", "mov dword [ebp - 0x79c], 4", "mov dword [ebp - 0x784], 0x80000000", "mov dword [ebp - 0x798], 0x20019", "mov eax, dword [sym.imp.KERNEL32.dll_ReadFile]", "mov dword [ebp - 0x72c], eax",...
97375152a03410f502c4e8e197c958df64b6f68cec13c5ddabf4af5107769e6c
0x4018f0
[ "Get common file path" ]
558bec81ec20010000c785ecfeffff14914000a1088140008985e4feffff68040100008d8df0feffff51ff150c8140008b95ecfeffff528d85f0feffff50ff95e4feffff6a0068800000006a036a006a036a018d8df0feffff51ff15108140008985e8feffff83bde8feffffff740b83bde8feffff007402eb628b5508837a04007459c785e0feffff35dc07008b450883c008a3141343008b4d088b51048915...
[ "push ebp", "mov ebp, esp", "sub esp, 0x120", "mov dword [ebp - 0x114], str._ffffffffffffffff", "mov eax, dword [sym.imp.KERNEL32.dll_lstrcatA]", "mov dword [ebp - 0x11c], eax", "push 0x104", "lea ecx, [ebp - 0x110]", "push ecx", "call dword [sym.imp.KERNEL32.dll_GetSystemDirectoryA]", "mov edx,...
97375152a03410f502c4e8e197c958df64b6f68cec13c5ddabf4af5107769e6c
0x401a60
[ "Inspect load icon resource" ]
558bec51c70520134300e1240000a1201343002de1240000a320134300b90100000085c90f84810000008b15201343003b550c7202eb74833d2013430000751568630200006a00ff15c081400085c0740433c0eb568b45080305201343008b08030d201343008b5508031520134300890ac745fcfa630200a1201343008b4dfc8d540102528b450803052013430050e8ccf6ffff83c4088b0d2013430083c104...
[ "push ebp", "mov ebp, esp", "push ecx", "mov dword [0x431320], 0x24e1", "mov eax, dword [0x431320]", "sub eax, 0x24e1", "mov dword [0x431320], eax", "mov ecx, 1", "test ecx, ecx", "je 0x401b0b", "mov edx, dword [0x431320]", "cmp edx, dword [ebp + 0xc]", "jb 0x401a97", "jmp 0x401b0b", "cm...
9737a1ad4c67d0cec5984267dc804498c52ba402d9ec3ff86148eee05a9faf3e
0x401150
[ "Accept command line arguments" ]
558bec83ec4c53568b7508576a6d56ff15402040008bd8ff15242040008d4d085150ff15382040008b3d502040006a6468005640006a6856ffd76a6468685640006a7056ffd733c068007f0000508935d0314000c745b430000000c745b8030000008945c08945c48975c8ff15682040008b3d442040006a6e568945d0ffd78b55c86a6c528945ccc745d404000000c745d86e000000c745dce8444000ffd789...
[ "push ebp", "mov ebp, esp", "sub esp, 0x4c", "push ebx", "push esi", "mov esi, dword [ebp + 8]", "push edi", "push 0x6d", "push esi", "call dword [sym.imp.USER32.dll_LoadAcceleratorsA]", "mov ebx, eax", "call dword [sym.imp.KERNEL32.dll_GetCommandLineW]", "lea ecx, [ebp + 8]", "push ecx", ...
9737a1ad4c67d0cec5984267dc804498c52ba402d9ec3ff86148eee05a9faf3e
0x40128f
[ "Accept command line arguments", "Terminate process" ]
558bec83ec4456ff15182040008bf08a063c2275148a46014684c074043c2275f4803e22750d46eb0a3c207e0646803e207ffa8a0684c074043c207ee98365e8008d45bc50ff150c204000e8670a000068043040006800304000e83e0a0000f645e801595974060fb745eceb036a0a5850566a006a00ff151020400050e83ffeffff8bf0e8460a000056ff1514204000
[ "push ebp", "mov ebp, esp", "sub esp, 0x44", "push esi", "call dword [sym.imp.KERNEL32.dll_GetCommandLineA]", "mov esi, eax", "mov al, byte [esi]", "cmp al, 0x22", "jne 0x4012b8", "mov al, byte [esi + 1]", "inc esi", "test al, al", "je 0x4012b0", "cmp al, 0x22", "jne 0x4012a4", "cmp by...
9737a1ad4c67d0cec5984267dc804498c52ba402d9ec3ff86148eee05a9faf3e
0x4013d0
[ "Hide graphical window" ]
558bec8b4508566a00506a006a006800000080680000008068000000806800000080680000cf0068f044400068e84440006a00a3d0314000ff15702040008bf085f675035e5dc36a0056ff156c20400056ff1588204000b8010000005e5dc3
[ "push ebp", "mov ebp, esp", "mov eax, dword [ebp + 8]", "push esi", "push 0", "push eax", "push 0", "push 0", "push 0x80000000", "push 0x80000000", "push 0x80000000", "push 0x80000000", "push 0xcf0000", "push str.Best_Application", "push str.Clariot", "push 0", "mov dword [0x4031d0],...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x4031b0
[ "Query or enumerate registry value" ]
558bec83c4f40fb70520a04f008945f88d45fc506a016a0068483240006802000080e8e5e1ffff85c0754d33c055682132400064ff30648920c745f4040000008d45f4508d45f8506a006a0068643240008b45fc50e8bae1ffff33c05a595964891068283240008b45fc50e894e1ffffc366a120a04f006625c0ff668b55f86683e23f660bc266a320a04f008be55dc3
[ "push ebp", "mov ebp, esp", "add esp, 0xfffffff4", "movzx eax, word [0x4fa020]", "mov dword [ebp - 8], eax", "lea eax, [ebp - 4]", "push eax", "push 1", "push 0", "push 0x403248", "push 0x80000002", "call sub.advapi32.dll_RegOpenKeyExA", "test eax, eax", "jne 0x403228", "xor eax, eax", ...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x403f70
[ "Write file on windows" ]
51803d4ce04f0000745766813d20e24f00b2d77514833d28e24f0000760bb81ce24f00ff1538e24f006a008d442404506a1e686ca04f006af5e83ed3ffff50e858d3ffff6a008d442404506a0268f83f40006af5e823d3ffff50e83dd3ffff5ac3803d30a04f000075136a006864a04f00686ca04f006a00e847d3ffff5ac3
[ "push ecx", "cmp byte [0x4fe04c], 0", "je 0x403fd1", "cmp word [0x4fe220], 0xd7b2", "jne 0x403f99", "cmp dword [0x4fe228], 0", "jbe 0x403f99", "mov eax, 0x4fe21c", "call dword [0x4fe238]", "push 0", "lea eax, [esp + 4]", "push eax", "push 0x1e", "push 0x4fa06c", "push 0xfffffffffffffff5"...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x404144
[ "Create thread" ]
558bec5356578bf98bf28bd8b808000000e86ae6ffff89388b5510895004c6054de04f00018b5508528b550c5250b80c414000505653e89dd1ffff5f5e5b5dc20c00
[ "push ebp", "mov ebp, esp", "push ebx", "push esi", "push edi", "mov edi, ecx", "mov esi, edx", "mov ebx, eax", "mov eax, 8", "call fcn.004027c4", "mov dword [eax], edi", "mov edx, dword [ebp + 0x10]", "mov dword [eax + 4], edx", "mov byte [0x4fe04d], 1", "mov edx, dword [ebp + 8]", "p...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x405a58
[ "Get geographical location", "Query or enumerate registry value" ]
558bec81c4e0feffff53568945fc68050100008d85e3feffff506a00e8ebb8ffffc645ee008d45f8506819000f006a0068885c40006801000080e825b9ffff85c074408d45f8506819000f006a0068885c40006802000080e807b9ffff85c074228d45f8506819000f006a0068a45c40006801000080e8e9b8ffff85c00f858900000033c055685d5b400064ff30648920c745e8050000008d85e3feffffba05...
[ "push ebp", "mov ebp, esp", "add esp, 0xfffffee0", "push ebx", "push esi", "mov dword [ebp - 4], eax", "push 0x105", "lea eax, [ebp - 0x11d]", "push eax", "push 0", "call sub.kernel32.dll_GetModuleFileNameA", "mov byte [ebp - 0x12], 0", "lea eax, [ebp - 8]", "push eax", "push 0xf0019", ...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x40636c
[ "Get geographical location" ]
558bec83c4f05333d28955f033d25568d263400064ff326489226a078d55f552680410000050e8c5afffff8d45f08d55f5b907000000e859e0ffff8b45f08d55fce83ac9ffff8bd8837dfc00740233db33c05a595964891068d96340008d45f0e8bfddffffc3
[ "push ebp", "mov ebp, esp", "add esp, 0xfffffff0", "push ebx", "xor edx, edx", "mov dword [ebp - 0x10], edx", "xor edx, edx", "push ebp", "push 0x4063d2", "push dword fs:[edx]", "mov dword fs:[edx], esp", "push 7", "lea edx, [ebp - 0xb]", "push edx", "push 0x1004", "push eax", "call ...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x40c0dc
[ "Get geographical location" ]
558bec81c400ffffff53568bf18b5d0868000100008d8d00ffffff515250e86da8ffff85c07e128bc8498d9500ffffff8bc3e86d81ffffeb098bc38bd6e8c680ffff5e5b8be55dc20400
[ "push ebp", "mov ebp, esp", "add esp, 0xffffff00", "push ebx", "push esi", "mov esi, ecx", "mov ebx, dword [ebp + 8]", "push pe_nt_image_headers32", "lea ecx, [ebp - 0x100]", "push ecx", "push edx", "push eax", "call sub.kernel32.dll_GetLocaleInfoA_1", "test eax, eax", "jle 0x40c115", ...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x40c128
[ "Get geographical location" ]
535657518bd98bf28bf86a028d442404505657e82ca8ffff85c07e058a0424eb028bc35a5f5e5bc3
[ "push ebx", "push esi", "push edi", "push ecx", "mov ebx, ecx", "mov esi, edx", "mov edi, eax", "push 2", "lea eax, [esp + 4]", "push eax", "push esi", "push edi", "call sub.kernel32.dll_GetLocaleInfoA_1", "test eax, eax", "jle 0x40c149", "mov al, byte [esp]", "jmp 0x40c14b", "mov ...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x40c7d0
[ "Write file on windows" ]
81c4bcfbffff68000400008d4c2448e864feffffa1d4d04f00803800745ea100cd4f00e82463ffffe82f61ffff8d442444508d44244850e848a6ffff6a008d442404508d44244ce890ccffff508d442450506af4e863a1ffff50e8b5a2ffff6a008d442404506a026894c840006af4e848a1ffff50e89aa2ffffeb366a408d44240850a174cc4f008b400450a168e64f00e8fe8fffff50e850a9ffff68102000...
[ "add esp, 0xfffffbbc", "push 0x400", "lea ecx, [esp + 0x48]", "call 0x40c648", "mov eax, dword [0x4fd0d4]", "cmp byte [eax], 0", "je 0x40c84c", "mov eax, dword [0x4fcd00]", "call fcn.00402b1c", "call fcn.0040292c", "lea eax, [esp + 0x44]", "push eax", "lea eax, [esp + 0x48]", "push eax", ...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x40d13c
[ "Get file version info" ]
558bec83c4e85333d28955f88bd833c0556812d2400064ff30648920c745fcffffffff8d45f88bd3e8bf70ffff8d45f8e82f75ffff8d45f4508b45f8e8d374ffff50e88999ffff8bd885db74738bc3e83456ffff8945f033c05568f5d1400064ff306489208b45f050538b45f4508b45f8e89e74ffff50e84c99ffff85c074238d45e8508d45ec506824d240008b45f050e84299ffff85c074098b45ec8b4008...
[ "push ebp", "mov ebp, esp", "add esp, 0xffffffe8", "push ebx", "xor edx, edx", "mov dword [ebp - 8], edx", "mov ebx, eax", "xor eax, eax", "push ebp", "push 0x40d212", "push dword fs:[eax]", "mov dword fs:[eax], esp", "mov dword [ebp - 4], 0xffffffff", "lea eax, [ebp - 8]", "mov edx, ebx...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x40d798
[ "Get geographical location" ]
558bec83c4f45333d28955f433d25568fcd7400064ff326489226a078d55f952680410000050e8a991ffff8d45f48d55f9b907000000e82d6cffff8b45f450e83091ffff8bd058e8e4b5ffff8bd833c05a59596489106803d840008d45f4e89569ffffc3
[ "push ebp", "mov ebp, esp", "add esp, 0xfffffff4", "push ebx", "xor edx, edx", "mov dword [ebp - 0xc], edx", "xor edx, edx", "push ebp", "push 0x40d7fc", "push dword fs:[edx]", "mov dword fs:[edx], esp", "push 7", "lea edx, [ebp - 7]", "push edx", "push 0x1004", "push eax", "call sub...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x425944
[ "Suspend thread" ]
558bec83c4f85356578945fc8b45fc8a400e8845fb33c055689159420064ff306489208b45fcc6400e018b45fc8b400450e84a11feff85c00f9dc28b45fce8d1fdffff33c05a5959648910eb185f5e5b59595dc3
[ "push ebp", "mov ebp, esp", "add esp, 0xfffffff8", "push ebx", "push esi", "push edi", "mov dword [ebp - 4], eax", "mov eax, dword [ebp - 4]", "mov al, byte [eax + 0xe]", "mov byte [ebp - 5], al", "xor eax, eax", "push ebp", "push 0x425991", "push dword fs:[eax]", "mov dword fs:[eax], es...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x4259b0
[ "Resume thread" ]
53568bd88b430450e8bf10feff8bf085f60f9dc28bc3e88dfdffff4e7504c6430e005e5bc3
[ "push ebx", "push esi", "mov ebx, eax", "mov eax, dword [ebx + 4]", "push eax", "call sub.kernel32.dll_ResumeThread", "mov esi, eax", "test esi, esi", "setge dl", "mov eax, ebx", "call fcn.00425758", "dec esi", "jne 0x4259d2", "mov byte [ebx + 0xe], 0", "pop esi", "pop ebx", "ret" ]
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x426b14
[ "Allocate or change rwx memory" ]
558bec535657bf8ce84f00833f00756c6a40680010000068001000006a00e895fffdff8bf0a188e84f0089068d5604b8cca54f00b902000000e86ebefdffbaec6a42008d4605e8adffffff8946068d5e0ac603e88d56048bc3e89affffff8943018b07894305891f83c30d8bc32bc63dfc0f00007cdb893588e84f008b078b1f8b530589178b55088953058b550c8953095f5e5b5dc20800
[ "push ebp", "mov ebp, esp", "push ebx", "push esi", "push edi", "mov edi, 0x4fe88c", "cmp dword [edi], 0", "jne 0x426b90", "push 0x40", "push 0x1000", "push 0x1000", "push 0", "call sub.kernel32.dll_VirtualAlloc_1", "mov esi, eax", "mov eax, dword [0x4fe888]", "mov dword [esi], eax", ...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x4281ec
[ "Encode data using xor" ]
89d189c231c066c1c0053202424975f6c3
[ "mov ecx, edx", "mov edx, eax", "xor eax, eax", "rol ax, 5", "xor al, byte [edx]", "inc edx", "dec ecx", "jne 0x4281f2", "ret" ]
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x42ab14
[ "Get system information on windows" ]
558bec83c4d48955f88945fc8d45d450e873befdff8b55fc8b4df84978338d45d4668378200374108b048a0fc8c1e80889048a4979f2eb195331db8b048a88c788e3c1e810c1e30888c3891c8a4979e95b8be55dc3
[ "push ebp", "mov ebp, esp", "add esp, 0xffffffd4", "mov dword [ebp - 8], edx", "mov dword [ebp - 4], eax", "lea eax, [ebp - 0x2c]", "push eax", "call sub.kernel32.dll_GetSystemInfo", "mov edx, dword [ebp - 4]", "mov ecx, dword [ebp - 8]", "dec ecx", "js 0x42ab65", "lea eax, [ebp - 0x2c]", ...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x42de8c
[ "Capture screenshot" ]
558bec81c468ffffff535657894df48955f88945fc33c08945f08b450c83781800741a8b450c83781c000f84250600008b450c837820000f84180600008b450c83781800751a8b450c837804000f84020600008b450c837808000f84f50500008b45fce854fbffff33c0894590837dfc00741c8d8578ffffff506a548b45fc50e8638dfdff83f8187d05e8f1c5ffff6a00e8a290fdffe805c7ffff8945e88b45...
[ "push ebp", "mov ebp, esp", "add esp, 0xffffff68", "push ebx", "push esi", "push edi", "mov dword [ebp - 0xc], ecx", "mov dword [ebp - 8], edx", "mov dword [ebp - 4], eax", "xor eax, eax", "mov dword [ebp - 0x10], eax", "mov eax, dword [ebp + 0xc]", "cmp dword [eax + 0x18], 0", "je 0x42dec...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x437740
[ "Read clipboard data" ]
558bec83c4f8538bda8945fc8b45fc8b10ff52186a01e851f8fcff8945f833c05568b277430064ff30648920837df80074148b45f850e889f2fcff8bd08bc3e804ccfcffeb078bc3e803cafcff33c05a595964891068b9774300837df80074098b45f850e87bf2fcff8b45fc8b10ff5214c3
[ "push ebp", "mov ebp, esp", "add esp, 0xfffffff8", "push ebx", "mov ebx, edx", "mov dword [ebp - 4], eax", "mov eax, dword [ebp - 4]", "mov edx, dword [eax]", "call dword [edx + 0x18]", "push 1", "call sub.user32.dll_GetClipboardData", "mov dword [ebp - 8], eax", "xor eax, eax", "push ebp"...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x4377c0
[ "Read clipboard data" ]
558bec515356578bfa8945fc8b45fc8b10ff521833d255686278430064ff326489226a00e85bf7fcff8bd86685db74458bd3a1107c4200e8a84bffff84c074250fb7c350e8a3f7fcff8bf06a09e89af7fcff508bce8bd38bc7e8964affffe895c3fcffeb440fb7c350e816f7fcff8bd86685db75bb8b0d54cc4f00b201a1407a4000e81951fdffe8c0c2fcff33c05a595964891068697843008b45fc8b10ff52...
[ "push ebp", "mov ebp, esp", "push ecx", "push ebx", "push esi", "push edi", "mov edi, edx", "mov dword [ebp - 4], eax", "mov eax, dword [ebp - 4]", "mov edx, dword [eax]", "call dword [edx + 0x18]", "xor edx, edx", "push ebp", "push 0x437862", "push dword fs:[edx]", "mov dword fs:[edx]...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x437870
[ "Read clipboard data" ]
558bec515356578bfa8945fc8b45fc8b10ff521833c05568c878430064ff306489206a02e813f7fcff8bd86a09e80af7fcff8bf0568bcb66ba02008bc78b18ff535c33c05a595964891068cf7843008b45fc8b10ff5214c3
[ "push ebp", "mov ebp, esp", "push ecx", "push ebx", "push esi", "push edi", "mov edi, edx", "mov dword [ebp - 4], eax", "mov eax, dword [ebp - 4]", "mov edx, dword [eax]", "call dword [edx + 0x18]", "xor eax, eax", "push ebp", "push 0x4378c8", "push dword fs:[eax]", "mov dword fs:[eax]...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x4378d8
[ "Read clipboard data" ]
558bec5153568bf28945fc8b45fc8b10ff521833d255682d79430064ff326489226a03e8acf6fcff8bd86a09e8a3f6fcff508bcb66ba03008bc68b18ff535c33c05a595964891068347943008b45fc8b10ff5214c3
[ "push ebp", "mov ebp, esp", "push ecx", "push ebx", "push esi", "mov esi, edx", "mov dword [ebp - 4], eax", "mov eax, dword [ebp - 4]", "mov edx, dword [eax]", "call dword [edx + 0x18]", "xor edx, edx", "push ebp", "push 0x43792d", "push dword fs:[edx]", "mov dword fs:[edx], esp", "pus...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x4379a4
[ "Write clipboard data" ]
558bec83c4f0538bda8945fc8b45fc8b10ff521833c05568197a430064ff306489208b45fce8aefcffff33c08945f08d45f0508d4df88d55f68bc3e89449ffff8b45f8500fb745f650e8aaf8fcff837df000740b8b45f0506a09e899f8fcff33c05a595964891068207a43008b45fc8b10ff5214c3
[ "push ebp", "mov ebp, esp", "add esp, 0xfffffff0", "push ebx", "mov ebx, edx", "mov dword [ebp - 4], eax", "mov eax, dword [ebp - 4]", "mov edx, dword [eax]", "call dword [edx + 0x18]", "xor eax, eax", "push ebp", "push 0x437a19", "push dword fs:[eax]", "mov dword fs:[eax], esp", "mov ea...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x437a28
[ "Write clipboard data" ]
558bec83c4f0538bda8945fc8b45fc8b10ff521833c055689d7a430064ff306489208b45fce82afcffff33c08945f08d45f0508d4df88d55f68bc38b18ff53608b45f8500fb745f650e826f8fcff837df000740b8b45f0506a09e815f8fcff33c05a595964891068a47a43008b45fc8b10ff5214c3
[ "push ebp", "mov ebp, esp", "add esp, 0xfffffff0", "push ebx", "mov ebx, edx", "mov dword [ebp - 4], eax", "mov eax, dword [ebp - 4]", "mov edx, dword [eax]", "call dword [edx + 0x18]", "xor eax, eax", "push ebp", "push 0x437a9d", "push dword fs:[eax]", "mov dword fs:[eax], esp", "mov ea...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x4522e0
[ "Enumerate gui resources" ]
c6400c00c6400d0033d289500450682c224500e85c4cfbffc3
[ "mov byte [eax + 0xc], 0", "mov byte [eax + 0xd], 0", "xor edx, edx", "mov dword [eax + 4], edx", "push eax", "push 0x45222c", "call sub.user32.dll_EnumWindows", "ret" ]
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x452400
[ "Check for time delay via gettickcount" ]
558bec6a0053568bf033c055687d24450064ff306489208bc6e842faffffe89145fbff8bd86a00e89046fbffe88345fbff2bc33de803000076eb8d4dfc33d28bc6e81af6ffff837dfc00741b6a006a098b45fce8f821fbff508b461c8b10ff520c50e83d4ffbff33c05a595964891068842445008d45fce8141dfbffc3
[ "push ebp", "mov ebp, esp", "push 0", "push ebx", "push esi", "mov esi, eax", "xor eax, eax", "push ebp", "push 0x45247d", "push dword fs:[eax]", "mov dword fs:[eax], esp", "mov eax, esi", "call fcn.00451e60", "call sub.kernel32.dll_GetTickCount", "mov ebx, eax", "push 0", "call sub....
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x455ac0
[ "Log keystrokes via polling" ]
558bec83c4d85356578bf08d7df7a5a58955f033c08945e8833d6ceb4f00000f842a0100006a11e81815fbff66a900800f95c08b15f8cf4f008b123282b40000000f8408010000a170eb4f008b10ff5208a16ceb4f008b58084b85db0f8cbc0000004333ff8bd7a16ceb4f00e8436cfcff8945ec8b45ec3b45f00f84960000008b45ec80b8a6010000000f84860000008b45ec8b10ff525084c0747a8b45ece8...
[ "push ebp", "mov ebp, esp", "add esp, 0xffffffd8", "push ebx", "push esi", "push edi", "mov esi, eax", "lea edi, [ebp - 9]", "movsd dword es:[edi], dword [esi]", "movsd dword es:[edi], dword [esi]", "mov dword [ebp - 0x10], edx", "xor eax, eax", "mov dword [ebp - 0x18], eax", "cmp dword [0...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x459224
[ "Log keystrokes via polling" ]
558bec81c4ecfeffff5356578bda8bf0f6461c1074368bc6e8bb5e01008945ec837dec0074268b45ec83b85002000000741a8bcb8b45ec8b80500200008bd68b38ff572484c00f853f0100008b033d0001000072373d0801000077308bc6e8755e01008945ec837dec000f84120100008bcb8bd68b45ec8b38ff97f000000084c00f8504010000e9f60000008b033d000200000f82d20000003d0a0200000f87...
[ "push ebp", "mov ebp, esp", "add esp, 0xfffffeec", "push ebx", "push esi", "push edi", "mov ebx, edx", "mov esi, eax", "test byte [esi + 0x1c], 0x10", "je 0x459270", "mov eax, esi", "call fcn.0046f0fc", "mov dword [ebp - 0x14], eax", "cmp dword [ebp - 0x14], 0", "je 0x459270", "mov eax...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x45c91c
[ "Capture screenshot" ]
558bec83c4945356578bf28bd880bbf8010000007406837e0400742df643550175198bc3e877ebffff85c0750e8bd68bc38b08ff51f0e91e0100008bd68bc3e8e0faffffe9100100006a00e858a6faff8bf88d55a48bc38b08ff51448b45b0508d55948bc38b08ff51448b459c5057e8bca1faff8945f8576a00e8b1a8faff6a00e8b2a1faff8945fc8b45f8508b45fc50e8baa3faff8945f433c055686eca45...
[ "push ebp", "mov ebp, esp", "add esp, 0xffffff94", "push ebx", "push esi", "push edi", "mov esi, edx", "mov ebx, eax", "cmp byte [ebx + 0x1f8], 0", "je 0x45c938", "cmp dword [esi + 4], 0", "je 0x45c965", "test byte [ebx + 0x55], 1", "jne 0x45c957", "mov eax, ebx", "call fcn.0045b4bc", ...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x4631a0
[ "Link many functions at runtime" ]
558bec5153a1d4d24f0080780c000f84590100006800800000e8ce38faff8945fc33c055680633460064ff30648920833d7ceb4f0000751c6814334600e89a37faff8bd8681c33460053e89537faffa37ceb4f00833d84af4f00000f85ee000000682c334600e83138faffa384af4f00833d84af4f00000f84d20000006838334600a184af4f0050e85737faffa380eb4f006848334600a184af4f0050e84237...
[ "push ebp", "mov ebp, esp", "push ecx", "push ebx", "mov eax, dword [0x4fd2d4]", "cmp byte [eax + 0xc], 0", "je 0x46330d", "push 0x8000", "call sub.kernel32.dll_SetErrorMode", "mov dword [ebp - 4], eax", "xor eax, eax", "push ebp", "push 0x463306", "push dword fs:[eax]", "mov dword fs:[e...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x467700
[ "Log keystrokes", "Log keystrokes via polling" ]
558bec81c4fcfeffff538bda668945fe8bc3e879caf9ff6a0033c08a45fe50e8a0faf9ffc1e01085c0742468000100008d95fefeffff5250e8bff8f9ff8bc38d95fefeffffb900010000e8b1ccf9ff5b8be55dc3
[ "push ebp", "mov ebp, esp", "add esp, 0xfffffefc", "push ebx", "mov ebx, edx", "mov word [ebp - 2], ax", "mov eax, ebx", "call fcn.00404190", "push 0", "xor eax, eax", "mov al, byte [ebp - 2]", "push eax", "call sub.user32.dll_MapVirtualKeyA", "shl eax, 0x10", "test eax, eax", "je 0x46...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x46ef90
[ "Log keystrokes via polling" ]
53568bf08a1de0ef460066f7c60400740380cb0166f7c60800740380cb0466f7c60100740380cb0866f7c60200740380cb1066f7c61000740380cb206a12e83180f9ff6685c07d0380cb028bc35e5bc3
[ "push ebx", "push esi", "mov esi, eax", "mov bl, byte [0x46efe0]", "test si, 4", "je 0x46efa4", "or bl, 1", "test si, 8", "je 0x46efae", "or bl, 4", "test si, 1", "je 0x46efb8", "or bl, 8", "test si, 2", "je 0x46efc2", "or bl, 0x10", "test si, 0x10", "je 0x46efcc", "or bl, 0x20",...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x46efe4
[ "Log keystrokes via polling" ]
53568bf08a1d1cf046006a10e80f80f9ff6685c07d0380cb016a11e80080f9ff6685c07d0380cb04f7c600000020740380cb028bc35e5bc3
[ "push ebx", "push esi", "mov esi, eax", "mov bl, byte [0x46f01c]", "push 0x10", "call sub.user32.dll_GetKeyState", "test ax, ax", "jge 0x46effd", "or bl, 1", "push 0x11", "call sub.user32.dll_GetKeyState", "test ax, ax", "jge 0x46f00c", "or bl, 4", "test esi, 0x20000000", "je 0x46f017"...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x46f06c
[ "Log keystrokes via polling" ]
5381c400ffffff54e8a37ff9ff8bc4e8a0ffffff8bd88bc381c4000100005bc3
[ "push ebx", "add esp, 0xffffff00", "push esp", "call sub.user32.dll_GetKeyboardState", "mov eax, esp", "call fcn.0046f020", "mov ebx, eax", "mov eax, ebx", "add esp, 0x100", "pop ebx", "ret" ]
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x4756e4
[ "Get keyboard layout" ]
558bec51535684d2740883c4f0e8aedff8ff8855ff8bd833d28bc3e88003fbffa18ccc4f00895804c700885a4700a1a0cc4f00895804c700945a47008bc3e8790300006a00e8de18f9ff89433cb201a1849c4100e8d3dbf8ff89434cb201a1849c4100e8c4dbf8ff894350b201a1849c4100e8b5dbf8ff894354b201a1849c4100e8a6dbf8ff894358b201a1849c4100e897dbf8ff89437c6a00e84118f9ff8b...
[ "push ebp", "mov ebp, esp", "push ecx", "push ebx", "push esi", "test dl, dl", "je 0x4756f6", "add esp, 0xfffffff0", "call fcn.004036a4", "mov byte [ebp - 1], dl", "mov ebx, eax", "xor edx, edx", "mov eax, ebx", "call fcn.00425a84", "mov eax, dword [0x4fcc8c]", "mov dword [eax + 4], eb...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x475bc8
[ "Get keyboard layout", "Query or enumerate registry value" ]
558bec81c4a0fdffff5333d28995a0fdffff8945fc33c05568735d470064ff306489208b45fc837834000f855c010000b201a194a44100e80cd7f8ff8b55fc8942348b45fc83c038e87be5f8ff8d85ecfeffff506a40e8f113f9ff4885c00f8c17010000408945f08d85ecfeffff8945ec8b45ec8b00e8bdd8feff84c00f84eb0000008d45f45068190002006a006a008b45ec8b008985a4fdffffc685a8fdff...
[ "push ebp", "mov ebp, esp", "add esp, 0xfffffda0", "push ebx", "xor edx, edx", "mov dword [ebp - 0x260], edx", "mov dword [ebp - 4], eax", "xor eax, eax", "push ebp", "push 0x475d73", "push dword fs:[eax]", "mov dword fs:[eax], esp", "mov eax, dword [ebp - 4]", "cmp dword [eax + 0x34], 0",...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x4766f0
[ "Create thread", "Set global application hook" ]
51a1c8eb4f0080b8a5000000007562833de0eb4f0000751ae81f02f9ff506a00b8ac664700506a03e8070cf9ffa3e0eb4f00833ddceb4f000075126a006a006a006a00e81c01f9ffa3dceb4f00833de4eb4f0000751b546a006a00685066470068e80300006a00e83001f9ffa3e4eb4f005ac3
[ "push ecx", "mov eax, dword [0x4febc8]", "cmp byte [eax + 0xa5], 0", "jne 0x476761", "cmp dword [0x4febe0], 0", "jne 0x476722", "call sub.kernel32.dll_GetCurrentThreadId_1", "push eax", "push 0", "mov eax, 0x4766ac", "push eax", "push 3", "call sub.user32.dll_SetWindowsHookExA", "mov dword...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x476858
[ "Inspect load icon resource" ]
558bec81c4fcfeffff535684d2740883c4f0e835cef8ff8855ff8bd833d28bc3e807f2faffa1f0ce4f006683780200750ea1f0ce4f00895804c700487f4700a140d04f006683780200750ea140d04f00895804c70040814700c6433400b201a1849c4100e84fcaf8ff898390000000b201a1849c4100e83dcaf8ff8983a800000033c089436033c0898384000000c7435c180000ffc74378f4010000c6437c01...
[ "push ebp", "mov ebp, esp", "add esp, 0xfffffefc", "push ebx", "push esi", "test dl, dl", "je 0x47686f", "add esp, 0xfffffff0", "call fcn.004036a4", "mov byte [ebp - 1], dl", "mov ebx, eax", "xor edx, edx", "mov eax, ebx", "call fcn.00425a84", "mov eax, dword [0x4fcef0]", "cmp word [ea...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x476de0
[ "Enumerate gui resources" ]
535683c4f88bd8a1c8eb4f00837830000f849400000083bb94000000000f85810000008b4330890424885424048bc45068706d4700e83a01f9ff8b839000000083780800745e6a038b44240450e8aa02f9ff8bf08934246aec56e8ad02f9ffa8087407c70424feffffff8b83900000008b70084e83fe007c2b68130200006a006a006a006a008b442414508bd68b8390000000e8fc58faff50e89604f9ff4e83...
[ "push ebx", "push esi", "add esp, 0xfffffff8", "mov ebx, eax", "mov eax, dword [0x4febc8]", "cmp dword [eax + 0x30], 0", "je 0x476e8a", "cmp dword [ebx + 0x94], 0", "jne 0x476e84", "mov eax, dword [ebx + 0x30]", "mov dword [esp], eax", "mov byte [esp + 4], dl", "mov eax, esp", "push eax", ...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x4779ec
[ "Get graphical window text" ]
535681c400ffffff8bf28bd880bba400000000742068000100008d442404508b433050e8f8f6f8ff8bc88bd48bc6e861c8f8ffeb0d8bc68b938c000000e8b6c7f8ff81c4000100005e5bc3
[ "push ebx", "push esi", "add esp, 0xffffff00", "mov esi, edx", "mov ebx, eax", "cmp byte [ebx + 0xa4], 0", "je 0x477a21", "push pe_nt_image_headers32", "lea eax, [esp + 4]", "push eax", "mov eax, dword [ebx + 0x30]", "push eax", "call sub.user32.dll_GetWindowTextA", "mov ecx, eax", "mov ...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x478a98
[ "Hide graphical window" ]
53568bd88bb38400000085f674338bc6e81b60feff84c074288b8384000000e8085dfeff50e8c2e6f8ff85c074136a008b8384000000e8f15cfeff50e873e8f8ff5e5bc3
[ "push ebx", "push esi", "mov ebx, eax", "mov esi, dword [ebx + 0x84]", "test esi, esi", "je 0x478ad9", "mov eax, esi", "call fcn.0045eac8", "test al, al", "je 0x478ad9", "mov eax, dword [ebx + 0x84]", "call fcn.0045e7c4", "push eax", "call sub.user32.dll_IsWindowVisible", "test eax, eax"...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x48aa50
[ "Check for software breakpoints" ]
538bd8817b14ca00000075228bc3e8a10a0000837b4000740ec74314cf000000b8010000005bc3c74314cb000000817b14cb00000075688b93b4010000837a1000744e837b080074078bc38b5008ff128bc38b90b4010000ff1285c0750433c05bc383f802742a837b080074d683f80374034875ce8b5308ff42048b4a048b43083b48087cbd8b9340010000015008ebb28b8b90000000898b98000000eb1e81...
[ "push ebx", "mov ebx, eax", "cmp dword [ebx + 0x14], 0xca", "jne 0x48aa7e", "mov eax, ebx", "call fcn.0048b504", "cmp dword [ebx + 0x40], 0", "je 0x48aa77", "mov dword [ebx + 0x14], 0xcf", "mov eax, 1", "pop ebx", "ret", "mov dword [ebx + 0x14], 0xcb", "cmp dword [ebx + 0x14], 0xcb", "jn...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x49be1c
[ "Query or enumerate registry value" ]
558bec83c4f45356578bf98955fc8bf08b5d088bc3e85a83f6ff8d45f4508bc6e80f88f6ff5057e8e4a9f6ff85c0757733c05568bcbe490064ff30648920c745f8000100008bc38b55f8e87189f6ff8d45f8508b03e8da87f6ff506a006a008b45fce8cd87f6ff508b45f450e8afa9f6ff85c0750d8b55f84a8bc3e84089f6ffeb078bc3e8eb82f6ff33c05a595964891068c3be49008b45f450e869a9f6ffc3...
[ "push ebp", "mov ebp, esp", "add esp, 0xfffffff4", "push ebx", "push esi", "push edi", "mov edi, ecx", "mov dword [ebp - 4], edx", "mov esi, eax", "mov ebx, dword [ebp + 8]", "mov eax, ebx", "call fcn.00404190", "lea eax, [ebp - 0xc]", "push eax", "mov eax, esi", "call fcn.00404650", ...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x49bf04
[ "Get hostname" ]
558bec83c4b853565733db895dbc895db88bf98bf28bd88d45f08b1590914100e85f8df6ff33c0556848c0490064ff30648920833decc04f000075178b0d10cb4f00b201a1407a4000e80e0af7ffe8b57bf6ff8d45e033c9ba10000000e8666df6ff8bc3e8938af6ff8945e45657be58c049008d7dd0a5a5a5a55f5e8d45d08945f08d45f4e8a69ef6ff33c08945f88bc3e8768af6ff85c07e51c745fc100000...
[ "push ebp", "mov ebp, esp", "add esp, 0xffffffb8", "push ebx", "push esi", "push edi", "xor ebx, ebx", "mov dword [ebp - 0x44], ebx", "mov dword [ebp - 0x48], ebx", "mov edi, ecx", "mov esi, edx", "mov ebx, eax", "lea eax, [ebp - 0x10]", "mov edx, dword [0x419190]", "call fcn.00404c88", ...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x49dd84
[ "Check os version" ]
81c46cffffffc704249400000054e8358cf6ff837c2404057712837c2404057507837c240801730433c0eb02b001a278ee4f0081c494000000c3
[ "add esp, 0xffffff6c", "mov dword [esp], 0x94", "push esp", "call sub.kernel32.dll_GetVersionExA", "cmp dword [esp + 4], 5", "ja 0x49ddb0", "cmp dword [esp + 4], 5", "jne 0x49ddac", "cmp dword [esp + 8], 1", "jae 0x49ddb0", "xor eax, eax", "jmp 0x49ddb2", "mov al, 1", "mov byte [0x4fee78],...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x49ddc0
[ "Link many functions at runtime" ]
5356bb1cc14f00be7cee4f0068d8e049008b0350e8ab8bf6ff890668e8e049008b0350e89c8bf6ff89460468fce049008b0350e88c8bf6ff894608680ce149008b0350e87c8bf6ff89460c681ce149008b0350e86c8bf6ff8946106838e149008b0350e85c8bf6ff8946146848e149008b0350e84c8bf6ff8946186864e149008b0350e83c8bf6ff89461c6878e149008b0350e82c8bf6ff8946206890e14900...
[ "push ebx", "push esi", "mov ebx, 0x4fc11c", "mov esi, 0x4fee7c", "push 0x49e0d8", "mov eax, dword [ebx]", "push eax", "call sub.kernel32.dll_GetProcAddress_1", "mov dword [esi], eax", "push 0x49e0e8", "mov eax, dword [ebx]", "push eax", "call sub.kernel32.dll_GetProcAddress_1", "mov dword...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x4b4708
[ "Log keystrokes via polling" ]
5381c400ffffff54e80729f5ff8bc4e804a9fbff8bd88bc381c4000100005bc3
[ "push ebx", "add esp, 0xffffff00", "push esp", "call sub.user32.dll_GetKeyboardState", "mov eax, esp", "call fcn.0046f020", "mov ebx, eax", "mov eax, ebx", "add esp, 0x100", "pop ebx", "ret" ]
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x4c5430
[ "Access peb ldr_data", "Get process heap flags", "Get process heap force flags" ]
558becb9140000006a006a004975f953bbacf24f0033c055685c574c0064ff306489208d55f8a1c0d14f00e8b40ef4ff8b45f88d55fce80986fdff8b55fc8bc3e86fedf3ff8d55f0a160d04f00e8920ef4ff8b45f08d55f4e8e785fdff8b55f48d4304e84cedf3ff8d55e8a154d04f00e86f0ef4ff8b45e88d55ece8c485fdff8b55ec8d4308e829edf3ff8d55e0a10ccc4f00e84c0ef4ff8b45e08d55e4e8a1...
[ "push ebp", "mov ebp, esp", "mov ecx, 0x14", "push 0", "push 0", "dec ecx", "jne 0x4c5438", "push ebx", "mov ebx, 0x4ff2ac", "xor eax, eax", "push ebp", "push 0x4c575c", "push dword fs:[eax]", "mov dword fs:[eax], esp", "lea edx, [ebp - 8]", "mov eax, dword [0x4fd1c0]", "call fcn.004...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x4c6c78
[ "Check os version" ]
81c46cffffffc704249400000054e841fdf3ff837c2410017507837c2408007512837c2410027507837c240405740433c0eb02b001a22cc84f0081c494000000c3
[ "add esp, 0xffffff6c", "mov dword [esp], 0x94", "push esp", "call sub.kernel32.dll_GetVersionExA", "cmp dword [esp + 0x10], 1", "jne 0x4c6c99", "cmp dword [esp + 8], 0", "jne 0x4c6cab", "cmp dword [esp + 0x10], 2", "jne 0x4c6ca7", "cmp dword [esp + 4], 5", "je 0x4c6cab", "xor eax, eax", "j...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x4d4c08
[ "Get file system object information" ]
81c4a0feffff833de8c84f00ff7527681040000068600100008d442408506880000000684c4c4d00e8e3f4f5ff8b442404a3e8c84f00a1e8c84f0081c460010000c3
[ "add esp, 0xfffffea0", "cmp dword [0x4fc8e8], 0xffffffff", "jne 0x4d4c3e", "push 0x4010", "push 0x160", "lea eax, [esp + 8]", "push eax", "push 0x80", "push 0x4d4c4c", "call sub.shell32.dll_SHGetFileInfoA", "mov eax, dword [esp + 4]", "mov dword [0x4fc8e8], eax", "mov eax, dword [0x4fc8e8]",...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x4d4c60
[ "Get file system object information" ]
81c4a0feffff833decc84f00ff7524681040000068600100008d442408506a1068a04c4d00e88ef4f5ff8b442404a3ecc84f00a1ecc84f0081c460010000c3
[ "add esp, 0xfffffea0", "cmp dword [0x4fc8ec], 0xffffffff", "jne 0x4d4c93", "push 0x4010", "push 0x160", "lea eax, [esp + 8]", "push eax", "push 0x10", "push 0x4d4ca0", "call sub.shell32.dll_SHGetFileInfoA", "mov eax, dword [esp + 4]", "mov dword [0x4fc8ec], eax", "mov eax, dword [0x4fc8ec]",...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x4d4cb4
[ "Get file system object information" ]
81c4a0feffff833df0c84f00ff7524681240000068600100008d442408506a1068f44c4d00e83af4f5ff8b442404a3f0c84f00a1f0c84f0081c460010000c3
[ "add esp, 0xfffffea0", "cmp dword [0x4fc8f0], 0xffffffff", "jne 0x4d4ce7", "push 0x4012", "push 0x160", "lea eax, [esp + 8]", "push eax", "push 0x10", "push 0x4d4cf4", "call sub.shell32.dll_SHGetFileInfoA", "mov eax, dword [esp + 4]", "mov dword [0x4fc8f0], eax", "mov eax, dword [0x4fc8f0]",...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x4d6918
[ "Create thread" ]
53518bd86a006a006aff6a00e82bfff2ff8943086a006a006aff6a00e81bfff2ff8943206a006a006aff6a00e80bfff2ff894324546a0053681c544d006a006a00e82efff2ff89430c5a5bc3
[ "push ebx", "push ecx", "mov ebx, eax", "push 0", "push 0", "push 0xffffffffffffffff", "push 0", "call sub.kernel32.dll_CreateEventA", "mov dword [ebx + 8], eax", "push 0", "push 0", "push 0xffffffffffffffff", "push 0", "call sub.kernel32.dll_CreateEventA", "mov dword [ebx + 0x20], eax",...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x4d6d60
[ "Get file system object information" ]
558bec81c484feffff535633db899d84feffff8bd98955f88945fc8b45f8e825f1f2ff33c05568cd704d0064ff306489208b45fc807834000f850e0300008b45fc807835000f85010300008b45fcc640350133d25568a5704d0064ff326489228b45fc837830007514b98d090000bae4704d00b858714d00e80fd3f2ff8b45fc8b403085c0750ae8cccdf2ffe9bb0200008bd08bc3e886e1ffff8945f033c055...
[ "push ebp", "mov ebp, esp", "add esp, 0xfffffe84", "push ebx", "push esi", "xor ebx, ebx", "mov dword [ebp - 0x17c], ebx", "mov ebx, ecx", "mov dword [ebp - 8], edx", "mov dword [ebp - 4], eax", "mov eax, dword [ebp - 8]", "call fcn.00405ea8", "xor eax, eax", "push ebp", "push 0x4d70cd",...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x4d7ed4
[ "Link many functions at runtime" ]
53bbfcc84f006a00e8db15f4ff68547f4d00e851ebf2ff890368607f4d008b0350e88aeaf2ffa32cf34f006a028b0350e87beaf2ffa320f34f006a048b0350e86ceaf2ffa324f34f0068747f4d008b0350e85aeaf2ffa3f4c84f00688c7f4d008b0350e848eaf2ffa3f8c84f006a006aff6a00e820e9f2ffa334f34f005bc3
[ "push ebx", "mov ebx, 0x4fc8fc", "push 0", "call sub.ole32.dll_OleInitialize", "push 0x4d7f54", "call sub.kernel32.dll_LoadLibraryA", "mov dword [ebx], eax", "push 0x4d7f60", "mov eax, dword [ebx]", "push eax", "call sub.kernel32.dll_GetProcAddress_1", "mov dword [0x4ff32c], eax", "push 2", ...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x4d8f60
[ "Get file system object information" ]
558bec81c49cfeffff535684d2740883c4f0e82da7f2ff8855ff8bd833d28bc3e8bfd6f6ff8bcbb201a1dc3f4d00e8a5d6ffff8983ac0300006a008bcbb201a158814d00e85fc8ffff8bf089b3bc030000895e34c74630b0a24d00b201a1f4404d00e859eeffff8983900300008bcbb201a140824d00e8c1fcffff8983b80300008bcbb201a1b4804d00e809cdffff8983a8030000680140000068600100008d...
[ "push ebp", "mov ebp, esp", "add esp, 0xfffffe9c", "push ebx", "push esi", "test dl, dl", "je 0x4d8f77", "add esp, 0xfffffff0", "call fcn.004036a4", "mov byte [ebp - 1], dl", "mov ebx, eax", "xor edx, edx", "mov eax, ebx", "call fcn.00446644", "mov ecx, ebx", "mov dl, 1", "mov eax, d...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x4d9e20
[ "Access peb ldr_data" ]
558bec83c4e053565733db895de48bf28d7df4a5a58bd98945fc33c05568c79f4d0064ff306489208d4de88d55f48b45fce85edcf7ff8b4dec8b55e88b45fce830f6f6ff8945f0837df00075768b45fc83b8980300000075148b45fc83b88c030000007408c60300e9240100008b45fce897040000c603018d45e4e894bff2ff5068d89f4d008b45fce81649f8ff508b45fc8b80a80300008b4018508b00ff50...
[ "push ebp", "mov ebp, esp", "add esp, 0xffffffe0", "push ebx", "push esi", "push edi", "xor ebx, ebx", "mov dword [ebp - 0x1c], ebx", "mov esi, edx", "lea edi, [ebp - 0xc]", "movsd dword es:[edi], dword [esi]", "movsd dword es:[edi], dword [esi]", "mov ebx, ecx", "mov dword [ebp - 4], eax"...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x4da438
[ "Get file system object information" ]
558bec81c4a0feffffc785a8feffff00000020680808020068600100008d95a0feffff526a0050e8b49cf5fff685abfeffff200f95c08be55dc3
[ "push ebp", "mov ebp, esp", "add esp, 0xfffffea0", "mov dword [ebp - 0x158], 0x20000000", "push 0x20808", "push 0x160", "lea edx, [ebp - 0x160]", "push edx", "push 0", "push eax", "call sub.shell32.dll_SHGetFileInfoA", "test byte [ebp - 0x155], 0x20", "setne al", "mov esp, ebp", "pop ebp...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x4daad8
[ "Get file system object information" ]
558bec81c49cfeffff535684d2740883c4f0e8b58bf2ff8855ff8bd833d28bc3e8736ef6ff8bcbb201a1dc3f4d00e82dbbffff8983580300006a008bcbb201a184864d00e8e7acffff8bf089b36c030000895e34c74630b0c44d00b201a1f4404d00e8e1d2ffff8bf089b344030000895e0c8b038b80040100008946088bcbb201a1d4874d00e8b5ccffff8bf089b364030000895e1cc7461840c54d00b201a1...
[ "push ebp", "mov ebp, esp", "add esp, 0xfffffe9c", "push ebx", "push esi", "test dl, dl", "je 0x4daaef", "add esp, 0xfffffff0", "call fcn.004036a4", "mov byte [ebp - 1], dl", "mov ebx, eax", "xor edx, edx", "mov eax, ebx", "call fcn.00441970", "mov ecx, ebx", "mov dl, 1", "mov eax, d...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x4daf18
[ "Access peb ldr_data" ]
558bec83c4ec5333d28955f48955f08bd833c05568d4b04d0064ff306489208bc3e89277f6ffe86156f6ff85c00f846b0100008bc3e87e77f6ffe84d56f6ff8b400c8945fc8b45fce81fafffff33c05568afb04d0064ff306489208bc3e85677f6ffe8ad58f6ff8b55fc8b520c8b52084a3bc27e0ae8268cf2ffe91f0100008bc3e83277f6ffe88958f6ff8bd08b45fc8b400ce8c417f4ff8b4030e8f4a1ffff...
[ "push ebp", "mov ebp, esp", "add esp, 0xffffffec", "push ebx", "xor edx, edx", "mov dword [ebp - 0xc], edx", "mov dword [ebp - 0x10], edx", "mov ebx, eax", "xor eax, eax", "push ebp", "push 0x4db0d4", "push dword fs:[eax]", "mov dword fs:[eax], esp", "mov eax, ebx", "call fcn.004426d0", ...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x4db9bc
[ "Access peb ldr_data" ]
558bec83c4dc53565733db895de4895ddc8bf18d7df4a5a58bda8945fc33c05568c9bb4d0064ff306489208d4de88d55f48b45fce8bfc0f7ff8b4dec8b55e88b45fce8d16af6ff8945f0837df000750d8b45fce8c8080000e9920100008b45fc8b80680300003b45f075148b45fc83b840030000007408c60300e9700100008b45fce899080000c603018b45f0e8564bf6ff85c075468b45f08b580c837b1800...
[ "push ebp", "mov ebp, esp", "add esp, 0xffffffdc", "push ebx", "push esi", "push edi", "xor ebx, ebx", "mov dword [ebp - 0x1c], ebx", "mov dword [ebp - 0x24], ebx", "mov esi, ecx", "lea edi, [ebp - 0xc]", "movsd dword es:[edi], dword [esi]", "movsd dword es:[edi], dword [esi]", "mov ebx, e...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x4dd31c
[ "Get file system object information" ]
558bec81c490feffff5333db899d90feffff894dfc8955f48945f88b45f4e8698bf2ff33c055680dd44d0064ff306489208b45f88b550c89501c680842000068600100008d8594feffff506a008b45fc50e8a66df5ff55e800ffffff5984c075228d9590feffff8d85a0feffffe80ac3f2ff8b9590feffff8b45f88b401ce8ad2af6ff8b9598feffff8b450ce8d32cf6ff680a40000068600100008d8594feff...
[ "push ebp", "mov ebp, esp", "add esp, 0xfffffe90", "push ebx", "xor ebx, ebx", "mov dword [ebp - 0x170], ebx", "mov dword [ebp - 4], ecx", "mov dword [ebp - 0xc], edx", "mov dword [ebp - 8], eax", "mov eax, dword [ebp - 0xc]", "call fcn.00405ea8", "xor eax, eax", "push ebp", "push 0x4dd40d...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x4de350
[ "Get common file path" ]
558bec33c95151515151515153565733c055688ae44d0064ff306489208d45fce87b63ffff33ffbe54f34f008bde8d430450576a00e85e5ff5ff85c0742633c0890333c08943048d4308e8f15df2ff8d430ce8e95df2ff8d4310e8e15df2ffe99e0000008d4df433d28b4304e827fbffff8b55f48d4308e8185ef2ff8d55f08b4308e899a4f2ff8b55f08d4310e8025ef2ff8d55e48b4304e8536cffff8b55e4...
[ "push ebp", "mov ebp, esp", "xor ecx, ecx", "push ecx", "push ecx", "push ecx", "push ecx", "push ecx", "push ecx", "push ecx", "push ebx", "push esi", "push edi", "xor eax, eax", "push ebp", "push 0x4de48a", "push dword fs:[eax]", "mov dword fs:[eax], esp", "lea eax, [ebp - 4]",...
973ac28db7c7900c6961b14aa1d493b52b5bcc98a260de7b018112f4a54cb9d2
0x4f8294
[ "Get common file path" ]
558bec6a006a0053568bf033c0556818834f0064ff30648920e89228f1ff83c4f8dd1c249b8d55fcb830834f00e8ca34f1ffb8ff000000e8f4a4f0ff8bd868ff00000053e8f7e6f0ff8d55f88bc3e8b113f1ff8b55f88bc6b944834f00e8a6c1f0ff8bc3e8e7a4f0ff33c05a5959648910681f834f008d45f8ba02000000e89dbef0ffc3
[ "push ebp", "mov ebp, esp", "push 0", "push 0", "push ebx", "push esi", "mov esi, eax", "xor eax, eax", "push ebp", "push 0x4f8318", "push dword fs:[eax]", "mov dword fs:[eax], esp", "call fcn.0040ab44", "add esp, 0xfffffff8", "fstp qword [esp]", "wait", "lea edx, [ebp - 4]", "mov ...
97405f4e365f32ff090711a1825c329f3338516069eb7486d01fd01e35be6411
0x401434
[ "Copy file", "Create directory", "Create process on windows", "Create shortcut via ishelllink", "Delete file", "Delete registry value", "Enumerate files on windows", "Get file attributes", "Get file version info", "Move file", "Query environment variable", "Query or enumerate registry key", ...
558bec81eca4010000a1a83e420053568b7508576a07598d7dd88945cc33dbf3a58b45dc8b55e08bf08bfac1e60ab900404200895dfcc1e70a03f103f98d4ddc890d9c9340008b4dd883c1fe83f9410f87f4130000ff248d8f2840005350e84a390000e9640d0000ff056c364200395dcc0f84550d000053ff15f8714000e9490d000050e8b0feffff485350e8c4feffffe9be1300005350e810390000e9a713...
[ "push ebp", "mov ebp, esp", "sub esp, 0x1a4", "mov eax, dword [0x423ea8]", "push ebx", "push esi", "mov esi, dword [ebp + 8]", "push edi", "push 7", "pop ecx", "lea edi, [ebp - 0x28]", "mov dword [ebp - 0x34], eax", "xor ebx, ebx", "rep movsd dword es:[edi], dword [esi]", "mov eax, dword...
97405f4e365f32ff090711a1825c329f3338516069eb7486d01fd01e35be6411
0x402a28
[ "Delete registry key", "Query or enumerate registry key" ]
558bec81ec0c01000053568d45fc5750a1503f42000c0833db5053ff750cff7508ff15107040003bc375698b3508704000bf05010000eb19395d10754b8d85f4feffff5350ff75fce8b3ffffff85c075128d85f4feffff575053ff75fcffd685c074d5ff75fcff151c7040006a02e8c63200003bc3742453ff35503f4200ff750cff7508ffd0eb0cff75fcff151c70400033c0405f5e5bc9c20c00391d503f42...
[ "push ebp", "mov ebp, esp", "sub esp, 0x10c", "push ebx", "push esi", "lea eax, [ebp - 4]", "push edi", "push eax", "mov eax, dword [0x423f50]", "or al, 8", "xor ebx, ebx", "push eax", "push ebx", "push dword [ebp + 0xc]", "push dword [ebp + 8]", "call dword [sym.imp.ADVAPI32.dll_RegOp...
97405f4e365f32ff090711a1825c329f3338516069eb7486d01fd01e35be6411
0x402c5b
[ "Get file size" ]
558bec81ec28010000535633db57895dfc895df8ff158c704000be00ac4200680004000005e80300005653a3ac3e4200ff15987040006a03680000008056e87c2a00008bf883ffff893d10904000750ab86c914000e94502000056be009c420056e8822d000056e8b6280000506800b04200e8712d00005357ff15947040003bc3a348f041008bf00f8eea000000a1b43e42008bfef7d81bc025007e00000500...
[ "push ebp", "mov ebp, esp", "sub esp, 0x128", "push ebx", "push esi", "xor ebx, ebx", "push edi", "mov dword [ebp - 4], ebx", "mov dword [ebp - 8], ebx", "call dword [sym.imp.KERNEL32.dll_GetTickCount]", "mov esi, 0x42ac00", "push 0x400", "add eax, 0x3e8", "push esi", "push ebx", "mov ...
97405f4e365f32ff090711a1825c329f3338516069eb7486d01fd01e35be6411
0x402f01
[ "Read file on windows", "Write file on windows" ]
558bec51518b450853565733ff3bc77c1c8b0df83e42005703c15750a33c704100ff3514904000ff15347140006a045e56e8f50000003bc70f8ce60000008d45fc8b1d2c71400057508d45085650ff3514904000ffd385c00f84c30000003975fc0f85ba000000ff750801353c704100e8b60000003bc78945f80f8ca4000000397d10756b397d080f8e8e000000be38304100bf00400000397d087d038b7d08...
[ "push ebp", "mov ebp, esp", "push ecx", "push ecx", "mov eax, dword [ebp + 8]", "push ebx", "push esi", "push edi", "xor edi, edi", "cmp eax, edi", "jl 0x402f2e", "mov ecx, dword [0x423ef8]", "push edi", "add eax, ecx", "push edi", "push eax", "mov dword [0x41703c], eax", "push dwo...
97405f4e365f32ff090711a1825c329f3338516069eb7486d01fd01e35be6411
0x40302c
[ "Write file on windows" ]
515355568b353c7041002b35a8af40005703742418ff158c70400033db05f40100003bf3a3ac3e42000f8e3b010000ff354cf04100e8740100005353ff35a8af4000ff3514904000ff1534714000893548f04100891d38704100bd38b04000a140704100bf004000002b054cf041003bc77f028bf8be383041005756e8fb00000085c00f84d3000000013d4cf041008935c8af4000893dccaf4000391db03e42...
[ "push ecx", "push ebx", "push ebp", "push esi", "mov esi, dword [0x41703c]", "sub esi, dword [0x40afa8]", "push edi", "add esi, dword [esp + 0x18]", "call dword [sym.imp.KERNEL32.dll_GetTickCount]", "xor ebx, ebx", "add eax, 0x1f4", "cmp esi, ebx", "mov dword [0x423eac], eax", "jle 0x40319...
97405f4e365f32ff090711a1825c329f3338516069eb7486d01fd01e35be6411
0x403225
[ "Accept command line arguments", "Copy file", "Create directory", "Delete file", "Get common file path", "Get file system object information", "Set current directory", "Shutdown system", "Terminate process" ]
81ec8001000053555633db57895c2418c74424102891400033f6c644241420ff15307040006801800000ff15b470400053ff157c7240006a08a3583f4200e8f92a0000a3a43e4200538d442434686001000050536850f44100ff155871400068b091400068a0364200e8b0270000ff15b0704000bf009042005057e89e27000053ff150c714000803d0090420022a3a03e42008bc7750ac644241422b8019042...
[ "sub esp, 0x180", "push ebx", "push ebp", "push esi", "xor ebx, ebx", "push edi", "mov dword [esp + 0x18], ebx", "mov dword [esp + 0x10], str.Error_writing_temporary_file._Make_sure_your_temp_folder_is_valid.", "xor esi, esi", "mov byte [esp + 0x14], 0x20", "call dword [sym.imp.COMCTL32.dll_Init...
97405f4e365f32ff090711a1825c329f3338516069eb7486d01fd01e35be6411
0x4035e3
[ "Check if file exists", "Get file attributes" ]
83ec145355568b35b03e4200576a06e86a27000033db3bc37412ffd00fb7c0506800a04200e894230000eb4abf9804420053575368e47240006801000080c70500a0420030780000e8fa220000381d9804420075165357680273400068bc7240006803000080e8dc220000576800a04200e806240000e839020000a1b83e4200bd0094420083e02055a3203f4200e8a11f000085c00f85810000008b4e483bcb...
[ "sub esp, 0x14", "push ebx", "push ebp", "push esi", "mov esi, dword [0x423eb0]", "push edi", "push 6", "call fcn.00405d61", "xor ebx, ebx", "cmp eax, ebx", "je 0x40360f", "call eax", "movzx eax, ax", "push eax", "push 0x42a000", "call fcn.004059a1", "jmp 0x403659", "mov edi, 0x420...
97405f4e365f32ff090711a1825c329f3338516069eb7486d01fd01e35be6411
0x4052a3
[ "Create process on windows" ]
558bec83ec108d45f0c705a0244200440000005033c068a0244200505050505050ff750850ff15d070400085c0740cff75f4ff15ec7040008b45f0c9c20400
[ "push ebp", "mov ebp, esp", "sub esp, 0x10", "lea eax, [ebp - 0x10]", "mov dword [0x4224a0], 0x44", "push eax", "xor eax, eax", "push 0x4224a0", "push eax", "push eax", "push eax", "push eax", "push eax", "push eax", "push dword [ebp + 8]", "push eax", "call dword [sym.imp.KERNEL32.d...
97405f4e365f32ff090711a1825c329f3338516069eb7486d01fd01e35be6411
0x405368
[ "Delete directory", "Delete file", "Enumerate files on windows", "Enumerate files recursively" ]
558bec81ec4801000056578b7d0857e89b020000f6450c088945f8741757ff1544714000f7d81bc0400105283f4200e994010000538b5d0c83e301895dfc741285c00f842b010000f6450c020f8421010000bea01442005756e87d06000085db740d684093400056e88a060000eb0657e8a0010000803f007509803da01442005c750b680c90400057e86906000057e85d0600008bd88d85b8feffff505603df...
[ "push ebp", "mov ebp, esp", "sub esp, 0x148", "push esi", "push edi", "mov edi, dword [ebp + 8]", "push edi", "call fcn.00405617", "test byte [ebp + 0xc], 8", "mov dword [ebp - 8], eax", "je 0x40539c", "push edi", "call dword [sym.imp.KERNEL32.dll_DeleteFileA]", "neg eax", "sbb eax, eax"...
97405f4e365f32ff090711a1825c329f3338516069eb7486d01fd01e35be6411
0x405617
[ "Check if file exists", "Get file attributes" ]
5657ff74240cbea018420056e81b04000056e89cffffff8bf885ff750433c0eb5257e863060000f605b83e420080740a8a0784c074e73c5c74e32bfeeb14e8e006000085c07405f6001074d156e814ffffff56e8ea0300003bc7567fe1e8bdfeffff56ff157870400033c983f8ff0f95c18bc15f5ec20400
[ "push esi", "push edi", "push dword [esp + 0xc]", "mov esi, 0x4218a0", "push esi", "call fcn.00405a43", "push esi", "call fcn.004055ca", "mov edi, eax", "test edi, edi", "jne 0x405638", "xor eax, eax", "jmp 0x40568a", "push edi", "call fcn.00405ca1", "test byte [0x423eb8], 0x80", "je...
97405f4e365f32ff090711a1825c329f3338516069eb7486d01fd01e35be6411
0x4056fb
[ "Check if file exists", "Get file attributes", "Set file attributes" ]
ff742404ff157870400083f8ff740d24fe50ff742408ff1584704000c20400
[ "push dword [esp + 4]", "call dword [sym.imp.KERNEL32.dll_GetFileAttributesA]", "cmp eax, 0xffffffff", "je 0x405717", "and al, 0xfe", "push eax", "push dword [esp + 8]", "call dword [sym.imp.KERNEL32.dll_SetFileAttributesA]", "ret 4" ]
97405f4e365f32ff090711a1825c329f3338516069eb7486d01fd01e35be6411
0x40571a
[ "Get file attributes" ]
ff742404ff15787040008bc86a0041f7d91bc923c851ff7424146a006a01ff74241cff74241cff1590704000c20c00
[ "push dword [esp + 4]", "call dword [sym.imp.KERNEL32.dll_GetFileAttributesA]", "mov ecx, eax", "push 0", "inc ecx", "neg ecx", "sbb ecx, ecx", "and ecx, eax", "push ecx", "push dword [esp + 0x14]", "push 0", "push 1", "push dword [esp + 0x1c]", "push dword [esp + 0x1c]", "call dword [sy...
97405f4e365f32ff090711a1825c329f3338516069eb7486d01fd01e35be6411
0x405749
[ "Get common file path" ]
558bec568b7508576a645f4fc745086e736100ff158c7040006a1a33d259f7f1568d45086a0050ff750c00550aff15d870400085c0750d85ff75d08026005f5e5dc208008bc6ebf6
[ "push ebp", "mov ebp, esp", "push esi", "mov esi, dword [ebp + 8]", "push edi", "push 0x64", "pop edi", "dec edi", "mov dword [ebp + 8], 0x61736e", "call dword [sym.imp.KERNEL32.dll_GetTickCount]", "push 0x1a", "xor edx, edx", "pop ecx", "div ecx", "push esi", "lea eax, [ebp + 8]", "...
97405f4e365f32ff090711a1825c329f3338516069eb7486d01fd01e35be6411
0x405791
[ "Get file size", "Read file on windows", "Write file on windows" ]
535556576a01e8c505000085c08b74241874116a0556ff74241cffd085c00f85390100008b1d68704000c705282642004e554c0085f6bf00040000bd2826420074266a016a0056e83dffffff50ff15ec704000575556ffd385c00f84030100003bc70f8ffb000000bea02042005756ff74241cffd385c00f84e60000003bc70f8fde0000005655684c93400068a01c4200ff15007240008bd8a1b03e420083c4...
[ "push ebx", "push ebp", "push esi", "push edi", "push 1", "call fcn.00405d61", "test eax, eax", "mov esi, dword [esp + 0x18]", "je 0x4057b5", "push 5", "push esi", "push dword [esp + 0x1c]", "call eax", "test eax, eax", "jne 0x4058ee", "mov ebx, dword [sym.imp.KERNEL32.dll_GetShortPath...
97405f4e365f32ff090711a1825c329f3338516069eb7486d01fd01e35be6411
0x40592a
[ "Query or enumerate registry value" ]
558bec538d451856508b451833dbf7d81bc08b751425000100000d19000200881e5053ff750cff7508ff151070400085c0753e8d450cc7450c00040000508d4514565053ff7510ff7518ff150070400085c0750c837d14017408837d14027402881eff7518889eff030000ff151c7040005e5b5dc21400
[ "push ebp", "mov ebp, esp", "push ebx", "lea eax, [ebp + 0x18]", "push esi", "push eax", "mov eax, dword [ebp + 0x18]", "xor ebx, ebx", "neg eax", "sbb eax, eax", "mov esi, dword [ebp + 0x14]", "and eax, 0x100", "or eax, 0x20019", "mov byte [esi], bl", "push eax", "push ebx", "push d...
97405f4e365f32ff090711a1825c329f3338516069eb7486d01fd01e35be6411
0x405a65
[ "Get common file path" ]
558bec83ec188b450c85c07d118b0d7c3642008d0485040000002bc88b018b0dd83e42008b550803c8b8402e4200532bd0565781fa000800008bf80f83d80100008b7d0883650800e9cc0100008bf72bf081fe000400000f8dc60100004180fafc894d0c0f86a20100000fbe41010fbe098bf083450c0283e67f8bd9c1e60783e37f8945f00bf38bd980cd8080cc8080fafe895de8894dec8945f40f85150100...
[ "push ebp", "mov ebp, esp", "sub esp, 0x18", "mov eax, dword [ebp + 0xc]", "test eax, eax", "jge 0x405a83", "mov ecx, dword [0x42367c]", "lea eax, [eax*4 + 4]", "sub ecx, eax", "mov eax, dword [ecx]", "mov ecx, dword [0x423ed8]", "mov edx, dword [ebp + 8]", "add ecx, eax", "mov eax, 0x422e...
97405f4e365f32ff090711a1825c329f3338516069eb7486d01fd01e35be6411
0x405dcd
[ "Encode data using xor", "Hash data with crc32" ]
833d2c2a42000056752d33c96a088bc15e8bd080e201f6da1bd281e22083b8edd1e833c24e75ea89048d282a42004181f9000100007cd58b5424108b44240885d2f7d076238b4c240c570fb6398bf081e6ff00000033f7c1e8088b34b5282a420033c6414a75e35ff7d05ec20c00
[ "cmp dword [0x422a2c], 0", "push esi", "jne 0x405e04", "xor ecx, ecx", "push 8", "mov eax, ecx", "pop esi", "mov edx, eax", "and dl, 1", "neg dl", "sbb edx, edx", "and edx, 0xedb88320", "shr eax, 1", "xor eax, edx", "dec esi", "jne 0x405dde", "mov dword [ecx*4 + 0x422a28], eax", "i...
974819705b68ff75ca54365b190ad1fd237d1712269d8dfe120200b35a882cac
0x410180
[ "Check http status code" ]
558bec83ec1868e625400064a1000000005064892500000000b8e0040000e83d24ffff5356578965e8c745eca81d4000c745f000000000c745f400000000c745fc010000008b55088d8d7cfdffffff15981140006a0368a06840008d45b850ff15ec104000c745fc020000006affff1594104000c745fc030000006a006a0fe84c4bffff89856cfdffffff15681040008b8d6cfdffff894dd8c745fc04000000...
[ "push ebp", "mov ebp, esp", "sub esp, 0x18", "push 0x4025e6", "mov eax, dword fs:[0]", "push eax", "mov dword fs:[0], esp", "mov eax, 0x4e0", "call sub.MSVBVM60.DLL___vbaChkstk", "push ebx", "push esi", "push edi", "mov dword [ebp - 0x18], esp", "mov dword [ebp - 0x14], 0x401da8", "mov d...
974819705b68ff75ca54365b190ad1fd237d1712269d8dfe120200b35a882cac
0x410c70
[ "Acquire debug privileges" ]
558bec83ec1868e625400064a1000000005064892500000000b870000000e84d19ffff5356578965e8c745ec201f4000c745f000000000c745f400000000c745fc01000000c745fc020000006affff1594104000c745fc03000000e80843ffff894594ff15681040008d459c506a288b4d9451e85043ffff894590ff156810400033d2837d90000f95c2f7da0fbfc285c00f841e010000c745fc0400000033c9...
[ "push ebp", "mov ebp, esp", "sub esp, 0x18", "push 0x4025e6", "mov eax, dword fs:[0]", "push eax", "mov dword fs:[0], esp", "mov eax, 0x70", "call sub.MSVBVM60.DLL___vbaChkstk", "push ebx", "push esi", "push edi", "mov dword [ebp - 0x18], esp", "mov dword [ebp - 0x14], 0x401f20", "mov dw...