Suspicious
Suspect

19ee7c1c75bfd372abf0aa5474812e22

PE Executable
|
MD5: 19ee7c1c75bfd372abf0aa5474812e22
|
Size: 1.1 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Medium

Hash
Hash Value
MD5
19ee7c1c75bfd372abf0aa5474812e22
Sha1
834b76a6210e1793b9717b59b120e5d538aefddc
Sha256
4eef5964d4be888f65a3410d0f60fd3559021aff06bf1448c919e294b7ecb72e
Sha384
7b8ffd6dd776a4d47dc273681c8810c10164a05af4d0b3a7a9107f1f82b24dc4b243f575dd868cda0ed2f3c9321304a5
Sha512
b58d1fb73460dec02e88cc72baee9e0b97a3fcf412b0cf0d298f7873d877f14b07fe0b9c76b48a48388177b69533a3fc790cb583467450224964bff47d9c168f
SSDeep
24576:xQTNuCfQGCkxhYPiuDv9PtSX9Ump0iu5gSj68oKgf4:aTQCf9sPi2h4X9Uqd6rjyKg
TLSH
1C35121FBB95B6A1CE090F73C643115881F0C426E661F7DA08DE58FA0D9AF90C84FA67

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

amtxh.exe

Full Name

amtxh.exe

EntryPoint

System.Void BatteryTools.Program::Main()

Scope Name

amtxh.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

amtxh

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

2

Main Method

System.Void BatteryTools.Program::Main()

Main IL Instruction Count

21

Main IL

ldc.i4.1 <null> stloc.1 <null> ldloc.1 <null> switch dnlib.DotNet.Emit.Instruction[] call System.Void BatteryTools.Properties.Resources::Ⴍ() ldc.i4 283 ldc.i4 256 call System.Void BatteryTools.Form4::Ⴃ(System.Int16,System.Char) ldc.i4.0 <null> ldc.i4 330 ldc.i4 362 call System.Void BatteryTools.Form3::Ⴀ(System.Boolean,System.Int16,System.Int16) ldc.i4.3 <null> stloc.1 <null> br.s IL_0002: ldloc.1 newobj System.Void BatteryTools.Form1::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null> ldtoken System.Void BatteryTools.Program::Main() pop <null> ret <null>

Module Name

amtxh.exe

Full Name

amtxh.exe

EntryPoint

System.Void BatteryTools.Program::Main()

Scope Name

amtxh.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

amtxh

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

2

Main Method

System.Void BatteryTools.Program::Main()

Main IL Instruction Count

21

Main IL

ldc.i4.1 <null> stloc.1 <null> ldloc.1 <null> switch dnlib.DotNet.Emit.Instruction[] call System.Void BatteryTools.Properties.Resources::Ⴍ() ldc.i4 283 ldc.i4 256 call System.Void BatteryTools.Form4::Ⴃ(System.Int16,System.Char) ldc.i4.0 <null> ldc.i4 330 ldc.i4 362 call System.Void BatteryTools.Form3::Ⴀ(System.Boolean,System.Int16,System.Int16) ldc.i4.3 <null> stloc.1 <null> br.s IL_0002: ldloc.1 newobj System.Void BatteryTools.Form1::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null> ldtoken System.Void BatteryTools.Program::Main() pop <null> ret <null>

19ee7c1c75bfd372abf0aa5474812e22 (1.1 MB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙