9904dbdc298e014b7958d33253da9b4adc5889139c45728eff51b07d8c162c62

Summary

Architecture IMAGE_FILE_MACHINE_AMD64
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date 2025-Jan-09 00:28:20
Detected languages English - United States
Debug artifacts C:\Users\Administrator\source\repos\HyperionDisabler\x64\Release\RobloxPlayerBeta.pdb

Plugin Output

Info Matching compiler(s): Microsoft Visual C++ 8.0
MASM/TASM - sig1(h)
Suspicious No VirusTotal score. This file has never been scanned on VirusTotal.

Hashes

MD5 bb08813ce474b72ca45c53658492035e
SHA1 b1b0aa86627f6c26f9994c615440177a9c976410
SHA256 9904dbdc298e014b7958d33253da9b4adc5889139c45728eff51b07d8c162c62
SHA3 9b479a2be014d1d1301bfba5ec026e08d1eb4f6cf5338c2a144763aa030660fa
SSDeep 96:Yylr15KbO5WeDkn+b/WxJertk0OIP4NSn4QBI/s+s2CSVQxycXC1k:15K6AlnU7ObN9QavnQxycs
Imports Hash b0cb85ebf685b355ea9f7a09f3eca42c

DOS Header

e_magic MZ
e_cblp 0x90
e_cp 0x3
e_crlc 0
e_cparhdr 0x4
e_minalloc 0
e_maxalloc 0xffff
e_ss 0
e_sp 0xb8
e_csum 0
e_ip 0
e_cs 0
e_ovno 0
e_oemid 0
e_oeminfo 0
e_lfanew 0x100

PE Header

Signature PE
Machine IMAGE_FILE_MACHINE_AMD64
NumberofSections 6
TimeDateStamp 2025-Jan-09 00:28:20
PointerToSymbolTable 0
NumberOfSymbols 0
SizeOfOptionalHeader 0xf0
Characteristics IMAGE_FILE_DLL
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE

Image Optional Header

Magic PE32+
LinkerVersion 14.0
SizeOfCode 0x1000
SizeOfInitializedData 0x1c00
SizeOfUninitializedData 0
AddressOfEntryPoint 0x0000000000001360 (Section: .text)
BaseOfCode 0x1000
ImageBase 0x180000000
SectionAlignment 0x1000
FileAlignment 0x200
OperatingSystemVersion 6.0
ImageVersion 0.0
SubsystemVersion 6.0
Win32VersionValue 0
SizeOfImage 0x7000
SizeOfHeaders 0x400
Checksum 0
Subsystem IMAGE_SUBSYSTEM_WINDOWS_GUI
DllCharacteristics IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
SizeofStackReserve 0x100000
SizeofStackCommit 0x1000
SizeofHeapReserve 0x100000
SizeofHeapCommit 0x1000
LoaderFlags 0
NumberOfRvaAndSizes 16

.text

MD5 25891e5f73886bcd27687557f4d233cf
SHA1 a0cb3f5abfe9b6ecaa25355c19cee64ed8663af7
SHA256 0efa67a91b40b8bc7ca1d878e0700c894dba61b4cdc5a4187b29f355b81ddc7b
SHA3 265cbd65066e4e2d6241291479083dc048f6c526880e1995b0db757e7a329253
VirtualSize 0xf08
VirtualAddress 0x1000
SizeOfRawData 0x1000
PointerToRawData 0x400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Entropy 5.92285

.rdata

MD5 02840c44ee4da66a2638ed19617eaf79
SHA1 6090e44d0b2469befb9b986579ba605a9fedc961
SHA256 a0188eed2adc432a7758e5d653ee8415d93e71d1fd4b8af639e0b137cb20c2f0
SHA3 477ad93f2495327c5bae62c85979476dfc1c2d5f545788ce47d47c69399a58c0
VirtualSize 0xc7e
VirtualAddress 0x2000
SizeOfRawData 0xe00
PointerToRawData 0x1400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 3.84976

.data

MD5 48a354b3236c6ccad2f66a93edebce32
SHA1 aa1c261cdca769a5f5e471dceddbe89b020e1396
SHA256 bb3b36cfed04653810abd799b29aaeff6045ab2995b21b6e0d3dd5388423b783
SHA3 da796986eaa89f07acb16b86ad0f66b12449049495d9906973bf55c08f578939
VirtualSize 0x680
VirtualAddress 0x3000
SizeOfRawData 0x200
PointerToRawData 0x2200
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Entropy 0.517653

.pdata

MD5 64b19e291a559382b5fc00cdc62b1fc8
SHA1 313425853aad645d70e6f51a8447c78867384ee8
SHA256 7263cf8b059405f38e0231c538a70150ff8bf2ac53a9607a74afb0b4fad682f8
SHA3 f106b1d21b8dd67769756f60ff1ee4b365593f842dc6c7571ac97f5eda448b41
VirtualSize 0x1a4
VirtualAddress 0x4000
SizeOfRawData 0x200
PointerToRawData 0x2400
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 3.17214

.rsrc

MD5 363d86a144062b41d123c32b4b5cf515
SHA1 cae43f9ae0ca54fb022052758e2feac290c5c2d3
SHA256 6b93915497ce9c9603e6b9df20770ea8a86b27f10706b1dc9a5f2d594d14d59e
SHA3 a5dff8d702488f0532f372b3cd657f0980cb0688e4d998b9e9cc79116c77d8f8
VirtualSize 0xf8
VirtualAddress 0x5000
SizeOfRawData 0x200
PointerToRawData 0x2600
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Entropy 2.51196

.reloc

MD5 31bf98190b6a1499f05f518addd50f23
SHA1 e899a4063e96da2e7829584e284514d445e47145
SHA256 11d39d4ebc678a97b6842301930d8c69e89dd6db91a3c7af578f10c4c5c28c1e
SHA3 f31c1b47e8b9aca0ce26de2bfba82a3619c1ee9d70ef73736518cdeffdd93c97
VirtualSize 0x2c
VirtualAddress 0x6000
SizeOfRawData 0x200
PointerToRawData 0x2800
PointerToRelocations 0
PointerToLineNumbers 0
NumberOfLineNumbers 0
NumberOfRelocations 0
Characteristics IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Entropy 0.595939

Imports

VCRUNTIME140.dll memcpy
__std_type_info_destroy_list
__C_specific_handler
memset
api-ms-win-crt-runtime-l1-1-0.dll _cexit
_execute_onexit_table
_initialize_onexit_table
_initialize_narrow_environment
_configure_narrow_argv
_seh_filter_dll
_initterm_e
_initterm
KERNEL32.dll GetCurrentThreadId
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
SetUnhandledExceptionFilter
GetCurrentProcess
IsDebuggerPresent
InitializeSListHead
GetSystemTimeAsFileTime
UnhandledExceptionFilter
GetCurrentProcessId
QueryPerformanceCounter
IsProcessorFeaturePresent
TerminateProcess

Delayed Imports

?run@@YAXXZ

Ordinal 1
Address 0x1000

2

Type RT_MANIFEST
Language English - United States
Codepage UNKNOWN
Size 0x91
TimeDateStamp 1980-Jan-01 00:00:00
Entropy 4.8858
MD5 f7ad1eab748bc07570a57ec87787cf90
SHA1 0b1608da9fef218386e825db575c65616826d9f4
SHA256 d2952e57023848a37fb0f21f0dfb38c9000f610ac2b00c2f128511dfd68bde04
SHA3 6c9541b36948c19ae507d74223621875b3af4064f7cd8200bdb97e15a047e96a

Version Info

IMAGE_DEBUG_TYPE_CODEVIEW

Characteristics 0
TimeDateStamp 2025-Jan-09 00:28:20
Version 0.0
SizeofData 110
AddressOfRawData 0x23e4
PointerToRawData 0x17e4
Referenced File C:\Users\Administrator\source\repos\HyperionDisabler\x64\Release\RobloxPlayerBeta.pdb

IMAGE_DEBUG_TYPE_VC_FEATURE

Characteristics 0
TimeDateStamp 2025-Jan-09 00:28:20
Version 0.0
SizeofData 20
AddressOfRawData 0x2454
PointerToRawData 0x1854

IMAGE_DEBUG_TYPE_POGO

Characteristics 0
TimeDateStamp 2025-Jan-09 00:28:20
Version 0.0
SizeofData 600
AddressOfRawData 0x2468
PointerToRawData 0x1868

IMAGE_DEBUG_TYPE_ILTCG

Characteristics 0
TimeDateStamp 2025-Jan-09 00:28:20
Version 0.0
SizeofData 0
AddressOfRawData 0
PointerToRawData 0

TLS Callbacks

Load Configuration

Size 0x140
TimeDateStamp 1970-Jan-01 00:00:00
Version 0.0
GlobalFlagsClear (EMPTY)
GlobalFlagsSet (EMPTY)
CriticalSectionDefaultTimeout 0
DeCommitFreeBlockThreshold 0
DeCommitTotalFreeThreshold 0
LockPrefixTable 0
MaximumAllocationSize 0
VirtualMemoryThreshold 0
ProcessAffinityMask 0
ProcessHeapFlags (EMPTY)
CSDVersion 0
Reserved1 0
EditList 0
SecurityCookie 0x180003000

RICH Header

XOR Key 0xc398eca4
Unmarked objects 0
Imports (VS2008 SP1 build 30729) 2
Imports (34321) 3
ASM objects (34321) 3
C objects (34321) 8
C++ objects (34321) 10
Imports (30795) 2
Total imports 34
C++ objects (LTCG) (34435) 2
Exports (34435) 1
Resource objects (34435) 1
Linker (34435) 1

Errors

Leave a comment

No comments yet.