# Detect It Easy (DiE)

*Detect It Easy (DiE)* is a versatile, free utility primarily designed for **identifying the file type and analyzing the structure of executable files**, with a strong focus on Portable Executable (PE) files commonly found on Windows (`.exe`, `.dll`, `.sys`, etc.), but also supporting other formats like ELF (Linux) and Mach-O (macOS). It helps analysts understand how a file was compiled, what packer or protector might have been used, and what resources or dependencies it contains.

Key features relevant to screensharing include:

* **Packer/Protector/Compiler Detection:** DiE incorporates a large database of signatures to identify common software packers (UPX, Themida, VMProtect, Aspack, etc.), protectors (Safeguard, Enigma), compilers (MS Visual C++, Delphi, GCC), and linkers used to create the executable. Identifying the use of a packer, especially a strong commercial one like Themida or VMProtect, on an unknown executable is highly suspicious as these are frequently used to obfuscate malware and cheats.
* **PE Structure Analysis:** Allows detailed examination of the PE file's headers (DOS header, NT headers, Optional header), sections (`.text`, `.data`, `.rsrc`, etc.), import table (listing DLLs and functions the file uses from external libraries), export table (functions the file provides, relevant for DLLs), and embedded resources. Anomalies in the structure (e.g., unusual section names, non-standard entry points) can be indicators of modification or packing.
* **String Extraction:** Can extract embedded ASCII and Unicode strings from the file. Searching these strings can reveal clues like internal function names, developer comments, error messages, configuration keys, URLs, or keywords related to cheating (`aimbot`, `esp`, `hwid`) or anti-analysis (`VirtualBox`, `Debugger`).
* **Entropy Calculation:** Calculates and often visually displays the entropy for the entire file and for individual sections, aiding in the identification of packed or encrypted sections (as discussed above).
* **Dependency Viewer:** Analyzing the import table shows which system DLLs (like `kernel32.dll`, `user32.dll`) and potentially non-standard DLLs the executable relies on. Importing suspicious functions related to memory manipulation (`WriteProcessMemory`), hooking (`SetWindowsHookEx`), or debugging detection (`IsDebuggerPresent`) can raise flags.
* **Troubleshooting Non-Executing Files:** As highlighted in the hypothetical scenarios, if a suspicious executable file fails to run during a screenshare or closes immediately (perhaps due to detecting AnyDesk or other tools), DiE provides a safe way to analyze its structure, strings, imports, and packer information *without executing it*, potentially revealing its purpose or confirming its malicious nature based on these static characteristics.

DiE serves as a valuable static analysis tool, helping ScreenSharers dissect executables to identify obfuscation, suspicious dependencies, embedded strings, and other structural indicators that hint at malicious intent or cheating capabilities.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://itzicehere.gitbook.io/redlotusguide/screensharing-general-knowledge/ninth-section-more-artifact-analysis-for-screensharing/detect-it-easy.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
