Suspicious
Suspect

708db27a089593014082d18e745d8e4d

PE Executable
|
MD5: 708db27a089593014082d18e745d8e4d
|
Size: 1.1 MB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Medium

Hash
Hash Value
MD5
708db27a089593014082d18e745d8e4d
Sha1
951e40e57f6e08637114883a3eafcf301104aad5
Sha256
dc868203fe63fc8e75865fcfe43849fc1a4fd6a845416dee9497834b158669eb
Sha384
4401dfd70f61ac5ce7cefc7098f26e5098797c21ecfad600f8a238e07c7221fae9ab61b6db97fecaffb7716819debec8
Sha512
426b7bc37e054d222a579597675f3d3791fbb93b888c95d642554a9442c16dc26cf410fb4c2b62c7cc189943d5402f31480e7391a12ae5ce03a24e68bc622b84
SSDeep
24576:h8FdGwQs+hYJQHu6z7lMNn4//u8U+vgSill1CJYKJ9zd0G:iGwQs+dHFlMN4//rrgSillSYKJ70
TLSH
BF35126EFE79AE52C66D0F73D413104842FAC2579637F29904DE19E10CAB794C88ED2B

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Module Name

OSYSS.exe

Full Name

OSYSS.exe

EntryPoint

System.Void BatteryTools.Program::Main()

Scope Name

OSYSS.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

OSYSS

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

2

Main Method

System.Void BatteryTools.Program::Main()

Main IL Instruction Count

27

Main IL

ldsfld System.Char[] BatteryTools.MesureConsommation::Ⴓ stloc.2 <null> ldc.i4.0 <null> stloc.1 <null> ldloc.1 <null> switch dnlib.DotNet.Emit.Instruction[] call System.Void BatteryTools.Properties.Resources::Ⴀ() ldc.i4 556 ldc.i4 529 call System.Void BatteryTools.Program::Ⴜ(System.Int32,System.Char) ldc.i4.0 <null> ldc.i4 832 ldc.i4 811 call System.Void BatteryTools.PointDonneesBatterie::Ⴄ(System.Boolean,System.Char,System.Int32) ldloc.2 <null> ldc.i4.s 120 ldelem.u2 <null> ldc.i4 33108 sub <null> stloc.1 <null> br.s IL_0008: ldloc.1 newobj System.Void BatteryTools.Form1::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null> ldtoken System.Void BatteryTools.Program::Main() pop <null> ret <null>

Module Name

OSYSS.exe

Full Name

OSYSS.exe

EntryPoint

System.Void BatteryTools.Program::Main()

Scope Name

OSYSS.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

OSYSS

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

2

Main Method

System.Void BatteryTools.Program::Main()

Main IL Instruction Count

27

Main IL

ldsfld System.Char[] BatteryTools.MesureConsommation::Ⴓ stloc.2 <null> ldc.i4.0 <null> stloc.1 <null> ldloc.1 <null> switch dnlib.DotNet.Emit.Instruction[] call System.Void BatteryTools.Properties.Resources::Ⴀ() ldc.i4 556 ldc.i4 529 call System.Void BatteryTools.Program::Ⴜ(System.Int32,System.Char) ldc.i4.0 <null> ldc.i4 832 ldc.i4 811 call System.Void BatteryTools.PointDonneesBatterie::Ⴄ(System.Boolean,System.Char,System.Int32) ldloc.2 <null> ldc.i4.s 120 ldelem.u2 <null> ldc.i4 33108 sub <null> stloc.1 <null> br.s IL_0008: ldloc.1 newobj System.Void BatteryTools.Form1::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null> ldtoken System.Void BatteryTools.Program::Main() pop <null> ret <null>

708db27a089593014082d18e745d8e4d (1.1 MB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Characteristics
No malware configuration were found at this point.
You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙