C:\Users\lukam\Documents\GitHub\Roblox-Exploit-API\src\Hovac_API\obj\Debug\Hovac_API.pdb
Static task
static1
General
-
Target
Hovac_API.dll
-
Size
302KB
-
MD5
fd6d62736b57c4cdc6239100d26c7004
-
SHA1
8f8b33152d5681b49891c340bc80ab677041890c
-
SHA256
debb42b3017c947881e28ca87ad33dbd47c87d5752daa85975187f99f761c29d
-
SHA512
4384eba9312667b4aa385dd709b8a4dd5732ae426d1984d8ba6909e998854b1957f8dc42c52bbe16eaf69bd49109f8ba17af54879dc174b43759f8476aaf5522
-
SSDEEP
6144:pxxiw0qvLJXnlUGujCtjno6itQl+REw6FMG/UHQS8PUHIRA8yVYtFm6axHU+:BkqjVnl36ud0zR/6CtQ9PUHIG8Dn+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Hovac_API.dll
Files
-
Hovac_API.dll.dll windows:4 windows x86 arch:x86
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
mscoree
_CorDllMain
Sections
.text Size: 300KB - Virtual size: 299KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 888B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ