Suspicious
Suspect

ac8972c56a02da3efe371b562b19de01

PE Executable
|
MD5: ac8972c56a02da3efe371b562b19de01
|
Size: 944.64 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very low

Hash
Hash Value
MD5
ac8972c56a02da3efe371b562b19de01
Sha1
54abd0440be289d69ee2ce608e36d71a9cf2ddda
Sha256
c6cd12aefb61eadf7e46c05de445a63dd5ab74d46b28495f3136c64c93513e0c
Sha384
55b3ce5531ca00aad48fe03133321b7819b370f01e9abc577cee0eb5c9c6bca48d7122b84f1fefb973442d62a353722b
Sha512
1e6007434ea837bfeb08192b227aeb99e00cd0479d67f451836afc75093abb6b632e65cb8c4424eaa190051555cb03efe174137ba4ab28cdec81b944b0fb5aae
SSDeep
24576:XmfjHe/lA1dws/Gal0hSDaR0d8fGp670uDMKCI7W+EkK:W7HedAws/vO1Ci2Y0StEkK
TLSH
E51512447204DC23E9905FB16161D7B602744E8DBD23E3529EEAFDC3737BB9231A61A2
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0002
ID:0
ID:0003
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
Game15.Game15.resources
$this.Icon
[NBF]root.IconData
menuStrip1.TrayLocation
sa
[NBF]root.Data
DemoSaver.Properties.Resources.resources
JosL
[NBF]root.Data
[NBF]root.Data-preview.png
Informations
Name
Value
Module Name

EAuD.exe

Full Name

EAuD.exe

EntryPoint

System.Void DemoSaver.Program::Main(System.String[])

Scope Name

EAuD.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

EAuD

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

111

Main Method

System.Void DemoSaver.Program::Main(System.String[])

Main IL Instruction Count

45

Main IL

call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) newobj System.Void Game15.Game15::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ldarg.0 <null> call DemoSaver.Program/ScreenSaverArgs DemoSaver.Program::ParseSaverArgs(System.String[]) stloc.0 <null> newobj System.Void DemoSaver.ScreenSaverVisualizer::.ctor() stloc.1 <null> ldloc.1 <null> newobj System.Void DemoSaver.ScreenSaverWindow::.ctor(DemoSaver.IScreenSaverVisualizer) stloc.2 <null> ldc.i4.0 <null> stloc.3 <null> ldloc.0 <null> ldfld DemoSaver.Program/ScreenSaverStates DemoSaver.Program/ScreenSaverArgs::SaverMode stloc.s V_4 ldloc.s V_4 switch dnlib.DotNet.Emit.Instruction[] br.s IL_0082: ldloc.3 ldc.i4.1 <null> stloc.3 <null> br.s IL_0082: ldloc.3 ldc.i4.1 <null> stloc.3 <null> ldloc.0 <null> ldfld System.IntPtr DemoSaver.Program/ScreenSaverArgs::TargetHandle ldsfld System.IntPtr System.IntPtr::Zero call System.Boolean System.IntPtr::op_Inequality(System.IntPtr,System.IntPtr) brfalse.s IL_0082: ldloc.3 ldloc.2 <null> ldloc.0 <null> ldfld System.IntPtr DemoSaver.Program/ScreenSaverArgs::TargetHandle callvirt System.Void DemoSaver.ScreenSaverWindow::SetSaverPreviewMode(System.IntPtr) br.s IL_0082: ldloc.3 ldstr No configuration available. ldstr Test Saver call System.Windows.Forms.DialogResult System.Windows.Forms.MessageBox::Show(System.String,System.String) pop <null> ldloc.3 <null> brfalse.s IL_008B: ret ldloc.2 <null> call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null>

Artefacts
Name
Value
PDB Path

EAuD.pdb

ac8972c56a02da3efe371b562b19de01 (944.64 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0002
ID:0
ID:0003
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
Game15.Game15.resources
$this.Icon
[NBF]root.IconData
menuStrip1.TrayLocation
sa
[NBF]root.Data
DemoSaver.Properties.Resources.resources
JosL
[NBF]root.Data
[NBF]root.Data-preview.png
Characteristics
No malware configuration were found at this point.
Artefacts
Name
Value Location
PDB Path

EAuD.pdb

ac8972c56a02da3efe371b562b19de01

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙