Suspicious
Suspect

f96f1129a973039fe38bc9db44c325d0

PE Executable
|
MD5: f96f1129a973039fe38bc9db44c325d0
|
Size: 764.42 KB
|
application/x-dosexec

Summary by MalvaGPT
Characteristics

Symbol Ofbuscation Score

Very low

Hash
Hash Value
MD5
f96f1129a973039fe38bc9db44c325d0
Sha1
a9b4513884eabaee1e63621abea6e374106da2e8
Sha256
c893d4d4e7bc91f14c350b66f6ee3727ce54605da71211870999a3dafd6218f9
Sha384
bc45c8d5419ab4d3c75815fdff1771fd8b3ac4862d71bb4d41f1ef68bc8565db2c6d4f605817aed18cc90aa1e07f2b7a
Sha512
7d10b89773d03e8aa4b8e35423eebc50ea076b7ea5fd8b410e27286f5f004b7e982cdddfecbcc93da59749615b5591a60eac40ecfb9b13c9d42d71d41c26b280
SSDeep
12288:Q8HfLPHe/vqifAdzaTx6jcRZ2sdNhcy3Y3c8M+WSyNrU091r3ePOLRcJCGQviP6:QCfjHe/vFAdzaTlz20FIsd+WSbuqbPYT
TLSH
B4F41265610AE832D4D56BB565A1E3B0136A0F8DFD13E3416CCCFDDB3AB77A22419382

PeID

Microsoft Visual C++ v6.0 DLL
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0002
ID:0
ID:0003
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
Game15.Game15.resources
$this.Icon
[NBF]root.IconData
menuStrip1.TrayLocation
sa
[NBF]root.Data
DemoSaver.Properties.Resources.resources
jvxo
[NBF]root.Data
[NBF]root.Data-preview.png
Informations
Name
Value
Module Name

jRFT.exe

Full Name

jRFT.exe

EntryPoint

System.Void DemoSaver.Program::Main(System.String[])

Scope Name

jRFT.exe

Scope Type

ModuleDef

Kind

Windows

Runtime Version

v4.0.30319

Tables Header Version

512

WinMD Version

<null>

Assembly Name

jRFT

Assembly Version

1.0.0.0

Assembly Culture

<null>

Has PublicKey

False

PublicKey Token

<null>

Target Framework

.NETFramework,Version=v4.5

Total Strings

111

Main Method

System.Void DemoSaver.Program::Main(System.String[])

Main IL Instruction Count

45

Main IL

call System.Void System.Windows.Forms.Application::EnableVisualStyles() ldc.i4.0 <null> call System.Void System.Windows.Forms.Application::SetCompatibleTextRenderingDefault(System.Boolean) newobj System.Void Game15.Game15::.ctor() call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ldarg.0 <null> call DemoSaver.Program/ScreenSaverArgs DemoSaver.Program::ParseSaverArgs(System.String[]) stloc.0 <null> newobj System.Void DemoSaver.ScreenSaverVisualizer::.ctor() stloc.1 <null> ldloc.1 <null> newobj System.Void DemoSaver.ScreenSaverWindow::.ctor(DemoSaver.IScreenSaverVisualizer) stloc.2 <null> ldc.i4.0 <null> stloc.3 <null> ldloc.0 <null> ldfld DemoSaver.Program/ScreenSaverStates DemoSaver.Program/ScreenSaverArgs::SaverMode stloc.s V_4 ldloc.s V_4 switch dnlib.DotNet.Emit.Instruction[] br.s IL_0082: ldloc.3 ldc.i4.1 <null> stloc.3 <null> br.s IL_0082: ldloc.3 ldc.i4.1 <null> stloc.3 <null> ldloc.0 <null> ldfld System.IntPtr DemoSaver.Program/ScreenSaverArgs::TargetHandle ldsfld System.IntPtr System.IntPtr::Zero call System.Boolean System.IntPtr::op_Inequality(System.IntPtr,System.IntPtr) brfalse.s IL_0082: ldloc.3 ldloc.2 <null> ldloc.0 <null> ldfld System.IntPtr DemoSaver.Program/ScreenSaverArgs::TargetHandle callvirt System.Void DemoSaver.ScreenSaverWindow::SetSaverPreviewMode(System.IntPtr) br.s IL_0082: ldloc.3 ldstr No configuration available. ldstr Test Saver call System.Windows.Forms.DialogResult System.Windows.Forms.MessageBox::Show(System.String,System.String) pop <null> ldloc.3 <null> brfalse.s IL_008B: ret ldloc.2 <null> call System.Void System.Windows.Forms.Application::Run(System.Windows.Forms.Form) ret <null>

Artefacts
Name
Value
PDB Path

jRFT.pdb

f96f1129a973039fe38bc9db44c325d0 (764.42 KB)
File Structure
Structure
DosHeader
PE Header
Optional Header (x86)
Section Headers
.text
.rsrc
.reloc
Resources
RT_ICON
ID:0001
ID:0
ID:0002
ID:0
ID:0003
ID:0
RT_GROUP_CURSOR4
ID:7F00
ID:0
RT_VERSION
ID:0001
ID:0
RT_MANIFEST
ID:0001
ID:0
.Net Resources
Game15.Game15.resources
$this.Icon
[NBF]root.IconData
menuStrip1.TrayLocation
sa
[NBF]root.Data
DemoSaver.Properties.Resources.resources
jvxo
[NBF]root.Data
[NBF]root.Data-preview.png
Characteristics
No malware configuration were found at this point.
Artefacts
Name
Value Location
PDB Path

jRFT.pdb

f96f1129a973039fe38bc9db44c325d0

You must be signed in to post a comment.
An error has occurred. This application may no longer respond until reloaded. Reload 🗙