Suspicious
Suspect

c0944c21cbb428214e4c8d0263e3b8dd

PE Executable
|
MD5: c0944c21cbb428214e4c8d0263e3b8dd
|
Size: 82.43 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Medium

Hash
Hash Value
MD5
c0944c21cbb428214e4c8d0263e3b8dd
Sha1
e1262ef7c38685424e4b351c2c78069c4eb4e8d4
Sha256
07f9efd37b4c05d3075ca73644493803f856b7fa32e32766334ffd4b92e438ba
Sha384
e641866680976fb6301038926e915c9b571d5a40a5e48e40a4a0927e4117dff026e91ed7bfdc7a81fc2f0353bf30d10d
Sha512
0d15a79be3833e096c68634657f0d227b0d2f6eb259e99c07ece083311c417f032858a4d666c797eaed59865f37018db59175fe695bb8a42bbb752e33ed2a84b
SSDeep
1536:Lddo4tkpIia8ERKPNwK0YTq+QKl+rmHtV+AV03+2/1Ole7:Ho4tkpIiHjwK5TqpKMMn5Fle7
TLSH
B983B70FB6CBC5B3C2889777C6E744008375E681F763D61A388E236A58437BEB94165B

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

Dokty.exe

Full Name

Dokty.exe

EntryPoint

System.Void Geerz.Transactions.AdjustableTransaction::TransactInterruptibleTransaction()

Scope Name

Dokty.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Dokty

Assembly Version

1.0.5392.26592

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.6

Total Strings

118

Main Method

System.Void Geerz.Transactions.AdjustableTransaction::TransactInterruptibleTransaction()

Main IL Instruction Count

151

Main IL

ldc.i4 8 stloc V_0 br IL_000E: ldloc V_0 ldloc V_0 switch dnlib.DotNet.Emit.Instruction[] br IL_0223: ldloc.s V_2 ldnull <null> ldloc.s V_8 newobj System.Void Geerz.Parsing.TokenizerInterpreter::.ctor(System.String,System.Version) stloc.s V_1 ldc.i4 3 ldsfld <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c} <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c}::m_1ea6303e037e4da68f148c7f2a05451d ldfld System.Int32 <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c}::m_45c8f80083324dab9b9d602afd59e00d brtrue IL_0012: switch(IL_0223,IL_024F,IL_00AB,IL_0069,IL_0260,IL_00AA,IL_0040,IL_008F,IL_0286) pop <null> ldc.i4 3 br IL_0012: switch(IL_0223,IL_024F,IL_00AB,IL_0069,IL_0260,IL_00AA,IL_0040,IL_008F,IL_0286) newobj System.Void Dokty.Profiling.ProfileState::.ctor() stloc.s V_2 ldc.i4 1 ldsfld <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c} <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c}::m_1ea6303e037e4da68f148c7f2a05451d ldfld System.Int32 <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c}::m_788f54c2aac54344bd48de6715c10d59 brfalse IL_0012: switch(IL_0223,IL_024F,IL_00AB,IL_0069,IL_0260,IL_00AA,IL_0040,IL_008F,IL_0286) pop <null> ldc.i4 1 br IL_0012: switch(IL_0223,IL_024F,IL_00AB,IL_0069,IL_0260,IL_00AA,IL_0040,IL_008F,IL_0286) nop <null> ldstr 1.4.1 newobj System.Void System.Version::.ctor(System.String) stloc.s V_8 ldc.i4 6 stloc V_0 br IL_000E: ldloc V_0 ret <null> nop <null> nop <null> ldloc.s V_1 ldloc.s V_6 ldftn System.Void Dokty.Matching.JoinedMatcher::RestartMatcher(System.Object,Geerz.Parsing.TokenizerRecommender) newobj System.Void System.EventHandler`1<Geerz.Parsing.TokenizerRecommender>::.ctor(System.Object,System.IntPtr) callvirt System.Void Geerz.Parsing.TokenizerInterpreter::AnalyzeActiveTokenizer(System.EventHandler`1<Geerz.Parsing.TokenizerRecommender>) ldc.i4 4 br IL_00CF: switch(IL_017C,IL_019B,IL_0121,IL_00ED,IL_0148) ldloc V_3 switch dnlib.DotNet.Emit.Instruction[] br IL_017C: nop nop <null> ldloc.s V_4 ldloc.s V_6 ldftn System.Void Dokty.Matching.JoinedMatcher::MatchRemoteMatcher(System.Object,Geerz.Annotations.AnnotationInspector) newobj System.Void System.EventHandler`1<Geerz.Annotations.AnnotationInspector>::.ctor(System.Object,System.IntPtr) callvirt System.Void Dokty.Processing.ProcessorParameter::FlushProcessor(System.EventHandler`1<Geerz.Annotations.AnnotationInspector>) ldc.i4 2 ldsfld <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c} <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c}::m_1ea6303e037e4da68f148c7f2a05451d ldfld System.Int32 <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c}::m_5239dfbb9d574751bfe140673a59c1fd brtrue IL_00CF: switch(IL_017C,IL_019B,IL_0121,IL_00ED,IL_0148) pop <null> ldc.i4 2 br IL_00CF: switch(IL_017C,IL_019B,IL_0121,IL_00ED,IL_0148) nop <null> ldloc.s V_1 callvirt System.Void Geerz.Parsing.TokenizerInterpreter::AnalyzeConvertibleTokenizer() ldc.i4 1 ldsfld <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c} <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c}::m_1ea6303e037e4da68f148c7f2a05451d ldfld System.Int32 <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c}::m_e76a77a2c4e044d3b2ff859b8e4dda10 brfalse IL_00CF: switch(IL_017C,IL_019B,IL_0121,IL_00ED,IL_0148) pop <null> ldc.i4 1 br IL_00CF: switch(IL_017C,IL_019B,IL_0121,IL_00ED,IL_0148) nop <null> ldloc.s V_2 ldloc.s V_6 ldftn System.Void Dokty.Matching.JoinedMatcher::GetMatcher(System.Object,Geerz.ErrorHandling.SeparatedError) newobj System.Void System.EventHandler`1<Geerz.ErrorHandling.SeparatedError>::.ctor(System.Object,System.IntPtr) callvirt System.Void Dokty.Profiling.ProfileState::MonitorBasicProfile(System.EventHandler`1<Geerz.ErrorHandling.SeparatedError>) ldc.i4 0 ldsfld <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c} <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c}::m_1ea6303e037e4da68f148c7f2a05451d ldfld System.Int32 <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c}::m_1db49bb9a66248b8af212ff4c2817bf4 brfalse IL_00CF: switch(IL_017C,IL_019B,IL_0121,IL_00ED,IL_0148) pop <null> ldc.i4 0 br IL_00CF: switch(IL_017C,IL_019B,IL_0121,IL_00ED,IL_0148) nop <null> ldloc.s V_7 ldloc.s V_6 ldftn System.Void Dokty.Matching.JoinedMatcher::EvaluateMatcher(System.Object,Geerz.Tracking.TrackerArgument) newobj System.Void System.EventHandler`1<Geerz.Tracking.TrackerArgument>::.ctor(System.Object,System.IntPtr) callvirt System.Void Dokty.Extraction.SeparatedExtractor::ExtractControllableExtractor(System.EventHandler`1<Geerz.Tracking.TrackerArgument>) ldc.i4 3 br IL_00CF: switch(IL_017C,IL_019B,IL_0121,IL_00ED,IL_0148) nop <null> nop <null> leave IL_00AA: ret ldloc.s V_6 brtrue IL_01E2: ldloc.s V_6 ldc.i4 1 ldsfld <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c} <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c}::m_1ea6303e037e4da68f148c7f2a05451d ldfld System.Int32 <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c}::m_57cc486bc32e4ad4976ed1fed72762a2 brfalse IL_01CC: switch(IL_0217,IL_0208,IL_01E2) pop <null> ldc.i4 1 br IL_01CC: switch(IL_0217,IL_0208,IL_01E2) ldloc V_5 switch dnlib.DotNet.Emit.Instruction[] br IL_0217: nop ldloc.s V_6 callvirt System.Void System.IDisposable::Dispose() ldc.i4 0 ldsfld <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c} <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c}::m_1ea6303e037e4da68f148c7f2a05451d ldfld System.Int32 <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c}::m_45c8f80083324dab9b9d602afd59e00d brtrue IL_01CC: switch(IL_0217,IL_0208,IL_01E2) pop <null> ldc.i4 0 br IL_01CC: switch(IL_0217,IL_0208,IL_01E2) br IL_0218: endfinally ldc.i4 2 br IL_01CC: switch(IL_0217,IL_0208,IL_01E2) nop <null> endfinally <null> ldc.i4 5 br IL_0012: switch(IL_0223,IL_024F,IL_00AB,IL_0069,IL_0260,IL_00AA,IL_0040,IL_008F,IL_0286) ldloc.s V_2 ldloc.s V_7 ldloc.s V_4 newobj System.Void Dokty.Matching.JoinedMatcher::.ctor(Dokty.Profiling.ProfileState,Dokty.Extraction.SeparatedExtractor,Dokty.Processing.ProcessorParameter) stloc.s V_6 ldc.i4 2 ldsfld <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c} <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c}::m_1ea6303e037e4da68f148c7f2a05451d ldfld System.Int32 <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c}::m_553d9262fe8a4d0596ace3cb0cfd143d brfalse IL_0012: switch(IL_0223,IL_024F,IL_00AB,IL_0069,IL_0260,IL_00AA,IL_0040,IL_008F,IL_0286) pop <null> ldc.i4 0 br IL_0012: switch(IL_0223,IL_024F,IL_00AB,IL_0069,IL_0260,IL_00AA,IL_0040,IL_008F,IL_0286) newobj System.Void Dokty.Extraction.SeparatedExtractor::.ctor() stloc.s V_7 ldc.i4 4 br IL_0012: switch(IL_0223,IL_024F,IL_00AB,IL_0069,IL_0260,IL_00AA,IL_0040,IL_008F,IL_0286) newobj System.Void Dokty.Processing.ProcessorParameter::.ctor() stloc.s V_4 ldc.i4 0 ldsfld <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c} <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c}::m_1ea6303e037e4da68f148c7f2a05451d ldfld System.Int32 <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c}::m_8ac9bad4e6b5422eabe067ffdb88e500 brfalse IL_0012: switch(IL_0223,IL_024F,IL_00AB,IL_0069,IL_0260,IL_00AA,IL_0040,IL_008F,IL_0286) pop <null> ldc.i4 0 br IL_0012: switch(IL_0223,IL_024F,IL_00AB,IL_0069,IL_0260,IL_00AA,IL_0040,IL_008F,IL_0286) nop <null> ldc.i4 4032 call System.Void System.Net.ServicePointManager::set_SecurityProtocol(System.Net.SecurityProtocolType) ldc.i4 7 br IL_0012: switch(IL_0223,IL_024F,IL_00AB,IL_0069,IL_0260,IL_00AA,IL_0040,IL_008F,IL_0286)

Module Name

Dokty.exe

Full Name

Dokty.exe

EntryPoint

System.Void Geerz.Transactions.AdjustableTransaction::TransactInterruptibleTransaction()

Scope Name

Dokty.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

Dokty

Assembly Version

1.0.5392.26592

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.6

Total Strings

118

Main Method

System.Void Geerz.Transactions.AdjustableTransaction::TransactInterruptibleTransaction()

Main IL Instruction Count

151

Main IL

ldc.i4 8 stloc V_0 br IL_000E: ldloc V_0 ldloc V_0 switch dnlib.DotNet.Emit.Instruction[] br IL_0223: ldloc.s V_2 ldnull <null> ldloc.s V_8 newobj System.Void Geerz.Parsing.TokenizerInterpreter::.ctor(System.String,System.Version) stloc.s V_1 ldc.i4 3 ldsfld <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c} <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c}::m_1ea6303e037e4da68f148c7f2a05451d ldfld System.Int32 <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c}::m_45c8f80083324dab9b9d602afd59e00d brtrue IL_0012: switch(IL_0223,IL_024F,IL_00AB,IL_0069,IL_0260,IL_00AA,IL_0040,IL_008F,IL_0286) pop <null> ldc.i4 3 br IL_0012: switch(IL_0223,IL_024F,IL_00AB,IL_0069,IL_0260,IL_00AA,IL_0040,IL_008F,IL_0286) newobj System.Void Dokty.Profiling.ProfileState::.ctor() stloc.s V_2 ldc.i4 1 ldsfld <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c} <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c}::m_1ea6303e037e4da68f148c7f2a05451d ldfld System.Int32 <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c}::m_788f54c2aac54344bd48de6715c10d59 brfalse IL_0012: switch(IL_0223,IL_024F,IL_00AB,IL_0069,IL_0260,IL_00AA,IL_0040,IL_008F,IL_0286) pop <null> ldc.i4 1 br IL_0012: switch(IL_0223,IL_024F,IL_00AB,IL_0069,IL_0260,IL_00AA,IL_0040,IL_008F,IL_0286) nop <null> ldstr 1.4.1 newobj System.Void System.Version::.ctor(System.String) stloc.s V_8 ldc.i4 6 stloc V_0 br IL_000E: ldloc V_0 ret <null> nop <null> nop <null> ldloc.s V_1 ldloc.s V_6 ldftn System.Void Dokty.Matching.JoinedMatcher::RestartMatcher(System.Object,Geerz.Parsing.TokenizerRecommender) newobj System.Void System.EventHandler`1<Geerz.Parsing.TokenizerRecommender>::.ctor(System.Object,System.IntPtr) callvirt System.Void Geerz.Parsing.TokenizerInterpreter::AnalyzeActiveTokenizer(System.EventHandler`1<Geerz.Parsing.TokenizerRecommender>) ldc.i4 4 br IL_00CF: switch(IL_017C,IL_019B,IL_0121,IL_00ED,IL_0148) ldloc V_3 switch dnlib.DotNet.Emit.Instruction[] br IL_017C: nop nop <null> ldloc.s V_4 ldloc.s V_6 ldftn System.Void Dokty.Matching.JoinedMatcher::MatchRemoteMatcher(System.Object,Geerz.Annotations.AnnotationInspector) newobj System.Void System.EventHandler`1<Geerz.Annotations.AnnotationInspector>::.ctor(System.Object,System.IntPtr) callvirt System.Void Dokty.Processing.ProcessorParameter::FlushProcessor(System.EventHandler`1<Geerz.Annotations.AnnotationInspector>) ldc.i4 2 ldsfld <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c} <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c}::m_1ea6303e037e4da68f148c7f2a05451d ldfld System.Int32 <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c}::m_5239dfbb9d574751bfe140673a59c1fd brtrue IL_00CF: switch(IL_017C,IL_019B,IL_0121,IL_00ED,IL_0148) pop <null> ldc.i4 2 br IL_00CF: switch(IL_017C,IL_019B,IL_0121,IL_00ED,IL_0148) nop <null> ldloc.s V_1 callvirt System.Void Geerz.Parsing.TokenizerInterpreter::AnalyzeConvertibleTokenizer() ldc.i4 1 ldsfld <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c} <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c}::m_1ea6303e037e4da68f148c7f2a05451d ldfld System.Int32 <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c}::m_e76a77a2c4e044d3b2ff859b8e4dda10 brfalse IL_00CF: switch(IL_017C,IL_019B,IL_0121,IL_00ED,IL_0148) pop <null> ldc.i4 1 br IL_00CF: switch(IL_017C,IL_019B,IL_0121,IL_00ED,IL_0148) nop <null> ldloc.s V_2 ldloc.s V_6 ldftn System.Void Dokty.Matching.JoinedMatcher::GetMatcher(System.Object,Geerz.ErrorHandling.SeparatedError) newobj System.Void System.EventHandler`1<Geerz.ErrorHandling.SeparatedError>::.ctor(System.Object,System.IntPtr) callvirt System.Void Dokty.Profiling.ProfileState::MonitorBasicProfile(System.EventHandler`1<Geerz.ErrorHandling.SeparatedError>) ldc.i4 0 ldsfld <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c} <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c}::m_1ea6303e037e4da68f148c7f2a05451d ldfld System.Int32 <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c}::m_1db49bb9a66248b8af212ff4c2817bf4 brfalse IL_00CF: switch(IL_017C,IL_019B,IL_0121,IL_00ED,IL_0148) pop <null> ldc.i4 0 br IL_00CF: switch(IL_017C,IL_019B,IL_0121,IL_00ED,IL_0148) nop <null> ldloc.s V_7 ldloc.s V_6 ldftn System.Void Dokty.Matching.JoinedMatcher::EvaluateMatcher(System.Object,Geerz.Tracking.TrackerArgument) newobj System.Void System.EventHandler`1<Geerz.Tracking.TrackerArgument>::.ctor(System.Object,System.IntPtr) callvirt System.Void Dokty.Extraction.SeparatedExtractor::ExtractControllableExtractor(System.EventHandler`1<Geerz.Tracking.TrackerArgument>) ldc.i4 3 br IL_00CF: switch(IL_017C,IL_019B,IL_0121,IL_00ED,IL_0148) nop <null> nop <null> leave IL_00AA: ret ldloc.s V_6 brtrue IL_01E2: ldloc.s V_6 ldc.i4 1 ldsfld <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c} <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c}::m_1ea6303e037e4da68f148c7f2a05451d ldfld System.Int32 <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c}::m_57cc486bc32e4ad4976ed1fed72762a2 brfalse IL_01CC: switch(IL_0217,IL_0208,IL_01E2) pop <null> ldc.i4 1 br IL_01CC: switch(IL_0217,IL_0208,IL_01E2) ldloc V_5 switch dnlib.DotNet.Emit.Instruction[] br IL_0217: nop ldloc.s V_6 callvirt System.Void System.IDisposable::Dispose() ldc.i4 0 ldsfld <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c} <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c}::m_1ea6303e037e4da68f148c7f2a05451d ldfld System.Int32 <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c}::m_45c8f80083324dab9b9d602afd59e00d brtrue IL_01CC: switch(IL_0217,IL_0208,IL_01E2) pop <null> ldc.i4 0 br IL_01CC: switch(IL_0217,IL_0208,IL_01E2) br IL_0218: endfinally ldc.i4 2 br IL_01CC: switch(IL_0217,IL_0208,IL_01E2) nop <null> endfinally <null> ldc.i4 5 br IL_0012: switch(IL_0223,IL_024F,IL_00AB,IL_0069,IL_0260,IL_00AA,IL_0040,IL_008F,IL_0286) ldloc.s V_2 ldloc.s V_7 ldloc.s V_4 newobj System.Void Dokty.Matching.JoinedMatcher::.ctor(Dokty.Profiling.ProfileState,Dokty.Extraction.SeparatedExtractor,Dokty.Processing.ProcessorParameter) stloc.s V_6 ldc.i4 2 ldsfld <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c} <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c}::m_1ea6303e037e4da68f148c7f2a05451d ldfld System.Int32 <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c}::m_553d9262fe8a4d0596ace3cb0cfd143d brfalse IL_0012: switch(IL_0223,IL_024F,IL_00AB,IL_0069,IL_0260,IL_00AA,IL_0040,IL_008F,IL_0286) pop <null> ldc.i4 0 br IL_0012: switch(IL_0223,IL_024F,IL_00AB,IL_0069,IL_0260,IL_00AA,IL_0040,IL_008F,IL_0286) newobj System.Void Dokty.Extraction.SeparatedExtractor::.ctor() stloc.s V_7 ldc.i4 4 br IL_0012: switch(IL_0223,IL_024F,IL_00AB,IL_0069,IL_0260,IL_00AA,IL_0040,IL_008F,IL_0286) newobj System.Void Dokty.Processing.ProcessorParameter::.ctor() stloc.s V_4 ldc.i4 0 ldsfld <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c} <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c}::m_1ea6303e037e4da68f148c7f2a05451d ldfld System.Int32 <Module>{1b6410f4-b433-45f8-9236-79a2e7fe9d9c}::m_8ac9bad4e6b5422eabe067ffdb88e500 brfalse IL_0012: switch(IL_0223,IL_024F,IL_00AB,IL_0069,IL_0260,IL_00AA,IL_0040,IL_008F,IL_0286) pop <null> ldc.i4 0 br IL_0012: switch(IL_0223,IL_024F,IL_00AB,IL_0069,IL_0260,IL_00AA,IL_0040,IL_008F,IL_0286) nop <null> ldc.i4 4032 call System.Void System.Net.ServicePointManager::set_SecurityProtocol(System.Net.SecurityProtocolType) ldc.i4 7 br IL_0012: switch(IL_0223,IL_024F,IL_00AB,IL_0069,IL_0260,IL_00AA,IL_0040,IL_008F,IL_0286)

c0944c21cbb428214e4c8d0263e3b8dd (82.43 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙