Suspicious
Suspect

e49346735116f8fbc5033091612364db

PE Executable
|
MD5: e49346735116f8fbc5033091612364db
|
Size: 1.06 MB
|
application/x-dosexec


Print
Summary by MalvaGPT
Characteristics

Symbol Obfuscation Score

Medium

Hash
Hash Value
MD5
e49346735116f8fbc5033091612364db
Sha1
831406c99c7f0fc1f6f7521a35df90e2e8a4f435
Sha256
a393af04b058f4fead2a0b08394407510445808c02ed8ae7f80c25b756137d78
Sha384
e4fdedacd8e7a4c3b49dec6f27c91371b5d0d0af9bac9ee307143f8bc25b5c76066274554afcdb1e41366f6e36dbe8ce
Sha512
e4e4e1cc5a12442e092665afcea6e41c9497d34f6f81d18c62304b45ce8e44fafa3b35d2b8048452e0824fa0cae5c5fd8ef6f0a12db16aad80116c9202616b2f
SSDeep
24576:qstarDPVyMrJZtN3mN9okCtvTiwZD14t9Up7ajmPdKi:0rTBrJZtN3AMOw3f
TLSH
F835126DFE016E16CA7D0F77D013151843B08523AA72FAE9AACD44E10EFAB98CD4D653

PeID

.NET executable
Microsoft Visual C# / Basic .NET
Microsoft Visual C# / Basic.NET / MS Visual Basic 2005 - ASL
Microsoft Visual C# v7.0 / Basic .NET
Microsoft Visual Studio .NET
File Structure
[Authenticode]_a32ace3a.p7b
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
Informations
Name
Value
Info

PE Detect: PeReader OK (file layout)

Info

Authenticode present at 0xFFE00 size 13832 bytes

Module Name

xWpzq.exe

Full Name

xWpzq.exe

EntryPoint

System.Void BatteryTools.Program::Main()

Scope Name

xWpzq.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

xWpzq

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

2

Main Method

System.Void BatteryTools.Program::Main()

Main IL Instruction Count

21

Main IL

ldc.i4.4 <null> stloc.1 <null> ldloc.1 <null> switch dnlib.DotNet.Emit.Instruction[] call System.Void BatteryTools.MesureConsommation::Ⴗ() ldc.i4 976 ldc.i4 1002 call System.Void BatteryTools.Form1::Ⴄ(System.Int16,System.Int16) ldc.i4.0 <null> ldc.i4 407 ldc.i4 401 call System.Void BatteryTools.Form2::Ⴈ(System.Boolean,System.Int16,System.Int16) ldc.i4.0 <null> stloc.1 <null> br.s IL_0002: ldloc.1 newobj System.Void BatteryTools.Form1::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null> ldtoken System.Void BatteryTools.Program::Main() pop <null> ret <null>

Module Name

xWpzq.exe

Full Name

xWpzq.exe

EntryPoint

System.Void BatteryTools.Program::Main()

Scope Name

xWpzq.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

xWpzq

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.0

Total Strings

2

Main Method

System.Void BatteryTools.Program::Main()

Main IL Instruction Count

21

Main IL

ldc.i4.4 <null> stloc.1 <null> ldloc.1 <null> switch dnlib.DotNet.Emit.Instruction[] call System.Void BatteryTools.MesureConsommation::Ⴗ() ldc.i4 976 ldc.i4 1002 call System.Void BatteryTools.Form1::Ⴄ(System.Int16,System.Int16) ldc.i4.0 <null> ldc.i4 407 ldc.i4 401 call System.Void BatteryTools.Form2::Ⴈ(System.Boolean,System.Int16,System.Int16) ldc.i4.0 <null> stloc.1 <null> br.s IL_0002: ldloc.1 newobj System.Void BatteryTools.Form1::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null> ldtoken System.Void BatteryTools.Program::Main() pop <null> ret <null>

e49346735116f8fbc5033091612364db (1.06 MB)
An error has occurred. This application may no longer respond until reloaded. Reload 🗙