8d4a77e1fc1ba4ed1bd544af53500551
PE Executable | MD5: 8d4a77e1fc1ba4ed1bd544af53500551 | Size: 3.4 MB | application/x-dosexec
Symbol Ofbuscation Score
|
Hash | Hash Value |
|---|---|
| MD5 | 8d4a77e1fc1ba4ed1bd544af53500551
|
| Sha1 | 1ed585628d516661001127ed698b0eb5e8000349
|
| Sha256 | 5b55a5d95f541d3d1c214926893f3187f0a90d4984e673c81c28edb23576c286
|
| Sha384 | 6afb43014013b700af7634f4d8f4543ff8bae01c45c1c8091184b7c7d00b0b6523b272d145dedf32feb17ac090cecead
|
| Sha512 | 888a22c8b270cc9e6c7c26d6985fa6fe5ba5cb3d9b1df9c7adf697e4d5c28cdbfff1e3e87a549aae1841b59c86197c0e6de6c81742e30f578998e24cdd604411
|
| SSDeep | 98304:FkFQ4LY7apc31fd81oCQkhyO+524hlkiOX5P:IxL4ccl2uCQZLh1O
|
| TLSH | 1DF533FC339260DFD05BC6328B661D3464822DAF1B19A25775277E9B763E1C24F214B2
|
PeID
|
Name0 | Value |
|---|---|
| Info | PE Detect: PeReader OK (file layout) |
| Module Name | server1.exe |
| Full Name | server1.exe |
| EntryPoint | System.Void server.Module2::main() |
| Scope Name | server1.exe |
| Scope Type | ModuleDef |
| Kind | Windows |
| Runtime Version | v4.0.30319 |
| Tables Header Version | 512 |
| WinMD Version | <null> |
| Assembly Name | server1 |
| Assembly Version | 5.3.8.8 |
| Assembly Culture | <null> |
| Has PublicKey | False |
| PublicKey Token | <null> |
| Target Framework | .NETFramework,Version=v4.8 |
| Total Strings | 43 |
| Main Method | System.Void server.Module2::main() |
| Main IL Instruction Count | 66 |
| Main IL | nop <null> ldc.i4 -522839975 ldc.i4 -1281661946 xor <null> dup <null> stloc.2 <null> ldc.i4.7 <null> rem.un <null> switch dnlib.DotNet.Emit.Instruction[] br IL_00EF: ret newobj System.Void server.pDmmQpvNxej::.ctor() stloc.0 <null> ldloc.2 <null> ldc.i4 -1866926952 mul <null> ldc.i4 -880010258 xor <null> br.s IL_0006: ldc.i4 -1281661946 ldloc.0 <null> ldsfld System.Byte[] server.Module2::Bytes call System.Diagnostics.Process server.Module2::() call System.Diagnostics.ProcessModule server.Module2::(System.Diagnostics.Process) call System.String server.Module2::(System.Diagnostics.ProcessModule) callvirt System.Boolean server.pDmmQpvNxej::HorzCxscmzh(System.Byte[],System.String) pop <null> ldloc.2 <null> ldc.i4 1595823126 mul <null> ldc.i4 -1097089977 xor <null> br.s IL_0006: ldc.i4 -1281661946 newobj System.Void server.TMcQbPAKQtg::.ctor() stloc.1 <null> ldloc.1 <null> ldsfld System.Byte[] server.Module2::Bytes call System.Diagnostics.Process server.Module2::() call System.Diagnostics.ProcessModule server.Module2::(System.Diagnostics.Process) call System.String server.Module2::(System.Diagnostics.ProcessModule) callvirt System.Boolean server.TMcQbPAKQtg::lxhdOXxZFPe(System.Byte[],System.String) pop <null> ldloc.2 <null> ldc.i4 1835419469 mul <null> ldc.i4 -1115663108 xor <null> br IL_0006: ldc.i4 -1281661946 ldsfld System.String server.Module2::Hex call System.Byte[] server.Module2::GxpkPVaSHj(System.String) stsfld System.Byte[] server.Module2::Bytes ldloc.2 <null> ldc.i4 1361487296 mul <null> ldc.i4 -1112625207 xor <null> br IL_0006: ldc.i4 -1281661946 call System.String server.My.Resources.Resources::get_encrypted() ldstr HRW<KNu|†~…‡cN\€LuJ@~v@vH;AWS call System.String server.Module2::AES_Decrypt(System.String,System.String) stsfld System.String server.Module2::Hex ldloc.2 <null> ldc.i4 656049699 mul <null> ldc.i4 -1595500401 xor <null> br IL_0006: ldc.i4 -1281661946 ret <null> |
| Module Name | server1.exe |
| Full Name | server1.exe |
| EntryPoint | System.Void server.Module2::main() |
| Scope Name | server1.exe |
| Scope Type | ModuleDef |
| Kind | Windows |
| Runtime Version | v4.0.30319 |
| Tables Header Version | 512 |
| WinMD Version | <null> |
| Assembly Name | server1 |
| Assembly Version | 5.3.8.8 |
| Assembly Culture | <null> |
| Has PublicKey | False |
| PublicKey Token | <null> |
| Target Framework | .NETFramework,Version=v4.8 |
| Total Strings | 43 |
| Main Method | System.Void server.Module2::main() |
| Main IL Instruction Count | 66 |
| Main IL | nop <null> ldc.i4 -522839975 ldc.i4 -1281661946 xor <null> dup <null> stloc.2 <null> ldc.i4.7 <null> rem.un <null> switch dnlib.DotNet.Emit.Instruction[] br IL_00EF: ret newobj System.Void server.pDmmQpvNxej::.ctor() stloc.0 <null> ldloc.2 <null> ldc.i4 -1866926952 mul <null> ldc.i4 -880010258 xor <null> br.s IL_0006: ldc.i4 -1281661946 ldloc.0 <null> ldsfld System.Byte[] server.Module2::Bytes call System.Diagnostics.Process server.Module2::() call System.Diagnostics.ProcessModule server.Module2::(System.Diagnostics.Process) call System.String server.Module2::(System.Diagnostics.ProcessModule) callvirt System.Boolean server.pDmmQpvNxej::HorzCxscmzh(System.Byte[],System.String) pop <null> ldloc.2 <null> ldc.i4 1595823126 mul <null> ldc.i4 -1097089977 xor <null> br.s IL_0006: ldc.i4 -1281661946 newobj System.Void server.TMcQbPAKQtg::.ctor() stloc.1 <null> ldloc.1 <null> ldsfld System.Byte[] server.Module2::Bytes call System.Diagnostics.Process server.Module2::() call System.Diagnostics.ProcessModule server.Module2::(System.Diagnostics.Process) call System.String server.Module2::(System.Diagnostics.ProcessModule) callvirt System.Boolean server.TMcQbPAKQtg::lxhdOXxZFPe(System.Byte[],System.String) pop <null> ldloc.2 <null> ldc.i4 1835419469 mul <null> ldc.i4 -1115663108 xor <null> br IL_0006: ldc.i4 -1281661946 ldsfld System.String server.Module2::Hex call System.Byte[] server.Module2::GxpkPVaSHj(System.String) stsfld System.Byte[] server.Module2::Bytes ldloc.2 <null> ldc.i4 1361487296 mul <null> ldc.i4 -1112625207 xor <null> br IL_0006: ldc.i4 -1281661946 call System.String server.My.Resources.Resources::get_encrypted() ldstr HRW<KNu|†~…‡cN\€LuJ@~v@vH;AWS call System.String server.Module2::AES_Decrypt(System.String,System.String) stsfld System.String server.Module2::Hex ldloc.2 <null> ldc.i4 656049699 mul <null> ldc.i4 -1595500401 xor <null> br IL_0006: ldc.i4 -1281661946 ret <null> |