Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
roblox.exe
Resource
win7-20230220-en
Target
roblox.exe.bin
Size
2.0MB
MD5
0d27f9cb1e48cb0dd24a3c7563bb56f9
SHA1
f174179176a400842251a38009ea194c1cf5751b
SHA256
0dd0117aa603ef82d810ec10ca4ee6cf1fcbf8b7d9e9c0bb9562d8ad5954fb56
SHA512
3e81fc5790f8244a0065f06b88772a9ea51c03698ed210dae987e3e8e475277cc121055fae771807d62bc37aa80899b216e0262459ad59bb5a84ea591d7f9aa9
SSDEEP
49152:Zbc5jQt9dZ3YPw3pNO9TLxaCzaCfTjVM5PMQ3dSuUTNb6du03q:ZbJ9dZoPw3pNsZbcuz
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
SERIALNUMBER=3780902,CN=Roblox Corporation,O=Roblox Corporation,L=San Mateo,ST=California,C=US,2.5.4.15=#131450726976617465204f7267616e697a6174696f6e,1.3.6.1.4.1.311.60.2.1.2=#130844656c6177617265,1.3.6.1.4.1.311.60.2.1.3=#13025553
CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1,O=DigiCert\, Inc.,C=US
CN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=US
SERIALNUMBER=3780902,CN=Roblox Corporation,O=Roblox Corporation,L=San Mateo,ST=California,C=US,2.5.4.15=#131450726976617465204f7267616e697a6174696f6e,1.3.6.1.4.1.311.60.2.1.2=#130844656c6177617265,1.3.6.1.4.1.311.60.2.1.3=#13025553
CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1,O=DigiCert\, Inc.,C=US
CN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=US
CN=DigiCert Assured ID Root CA,OU=www.digicert.com,O=DigiCert Inc,C=US
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
inet_ntop
freeaddrinfo
getaddrinfo
ShellExecuteExW
Shell_NotifyIconA
ord165
CommandLineToArgvW
SHGetFolderPathAndSubDirW
ShellExecuteW
CallNtPowerInformation
WinHttpOpen
WinHttpSendRequest
WinHttpCloseHandle
WinHttpConnect
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpAddRequestHeaders
WinHttpSetTimeouts
WinHttpSetOption
WinHttpWriteData
WinHttpReadData
WinHttpCrackUrl
WinHttpOpenRequest
InitializeCriticalSectionEx
LocalAlloc
LocalFree
FormatMessageW
CopyFileW
MoveFileW
VerifyVersionInfoW
GetSystemTimeAsFileTime
FindClose
FindFirstFileW
FindNextFileW
GetDiskFreeSpaceExW
RemoveDirectoryW
SetFileAttributesW
DebugBreak
Sleep
GetCurrentProcess
TerminateProcess
GetExitCodeProcess
GetCurrentThreadId
CreateProcessW
OpenProcess
GetSystemTime
GetLocalTime
GetTickCount
GetVersionExW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
FreeLibrary
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleExW
LoadLibraryW
lstrlenW
SystemTimeToFileTime
GetGeoInfoW
GetUserGeoID
GetUserDefaultLCID
CreateEventA
K32EnumProcesses
K32GetProcessImageFileNameW
GetCommandLineW
IsDebuggerPresent
OutputDebugStringW
GetShortPathNameW
IsWow64Process
GlobalAlloc
GlobalUnlock
GlobalLock
GlobalFree
FlushFileBuffers
SetFileTime
WriteFile
lstrcpyW
LoadLibraryA
ReleaseSemaphore
CreateSemaphoreW
GetFileTime
CreateFileA
WaitForSingleObjectEx
CreateMutexA
GetModuleHandleA
GetProcessTimes
GlobalMemoryStatusEx
GetSystemInfo
GetVersionExA
OutputDebugStringA
GetCurrentProcessId
QueryPerformanceCounter
QueryPerformanceFrequency
OpenSemaphoreW
CreateMutexExW
CreateSemaphoreExW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetTempPathW
GetNativeSystemInfo
LoadLibraryExW
ResetEvent
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
FormatMessageA
WaitForMultipleObjectsEx
SetWaitableTimer
GetFileSize
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateWaitableTimerA
GetCurrentDirectoryW
GetFileAttributesExW
GetFileInformationByHandle
GetFullPathNameW
SetEndOfFile
GetProcAddress
AreFileApisANSI
GetStdHandle
GetFileType
SetUnhandledExceptionFilter
SleepEx
CreateThread
GetExitCodeThread
GetVersion
SetProcessShutdownParameters
SetConsoleCtrlHandler
LockFileEx
UnlockFileEx
SuspendThread
GetProcessId
GetThreadContext
IsProcessorFeaturePresent
GetTimeZoneInformation
GetThreadLocale
GetSystemDefaultLCID
DuplicateHandle
VirtualQueryEx
ReadProcessMemory
SetNamedPipeHandleState
TransactNamedPipe
CreateNamedPipeW
WaitNamedPipeW
ConnectNamedPipe
DisconnectNamedPipe
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
UnregisterWaitEx
RegisterWaitForSingleObject
GetFileSizeEx
FindFirstFileExW
TryEnterCriticalSection
InitOnceExecuteOnce
GetEnvironmentVariableW
InitOnceComplete
GetFileInformationByHandleEx
GetModuleHandleW
OpenEventW
CreateEventW
CreateMutexW
ReadFile
WaitForSingleObject
SetEvent
CloseHandle
DeleteFileW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
GetLastError
RaiseException
DecodePointer
ExitThread
FreeLibraryAndExitThread
GetCommandLineA
GetConsoleMode
ReadConsoleW
GetConsoleOutputCP
SetStdHandle
GetDriveTypeW
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
VerSetConditionMask
FindResourceW
SizeofResource
LockResource
SetLastError
GetFileAttributesW
CreateFileW
CreateDirectoryW
LoadResource
FindResourceExW
MulDiv
WideCharToMultiByte
MultiByteToWideChar
ResumeThread
RtlUnwind
GetCPInfo
GetStringTypeW
LCMapStringEx
EncodePointer
ExitProcess
CompareStringW
LCMapStringW
InitOnceBeginInitialize
SleepConditionVariableSRW
SleepConditionVariableCS
WakeAllConditionVariable
WakeConditionVariable
InitializeConditionVariable
InitializeSRWLock
InitializeSListHead
GetStartupInfoW
GetLocaleInfoW
IsValidLocale
EnumSystemLocalesW
IsValidCodePage
GetACP
GetOEMCP
lstrcmpW
SetFilePointerEx
ReleaseMutex
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
FileTimeToSystemTime
WriteConsoleW
UnhandledExceptionFilter
GetDlgItem
GetDlgCtrlID
SetTimer
KillTimer
EnableWindow
GetSystemMetrics
DrawTextW
ReleaseDC
DestroyWindow
EndPaint
RegisterClassW
MessageBoxA
FillRect
EnumWindows
SetWindowTextW
TranslateAcceleratorW
LoadAcceleratorsW
BeginPaint
PostQuitMessage
PostThreadMessageW
DispatchMessageW
TranslateMessage
GetMessageW
GetParent
SetWindowLongW
GetWindowLongW
MessageBoxW
GetWindowRect
InvalidateRect
GetDC
ShowWindow
CreateWindowExW
CallWindowProcW
DefWindowProcW
SendMessageW
MessageBoxExW
AllowSetForegroundWindow
CharNextW
CharUpperW
UnregisterClassW
EnumDisplayDevicesA
LoadIconW
LoadBitmapW
PostMessageW
IsWindowVisible
SetForegroundWindow
GetWindowTextW
GetWindowThreadProcessId
SetTextColor
SetBkMode
SetDCPenColor
SetDCBrushColor
SelectObject
RoundRect
Rectangle
GetStockObject
CreatePen
GetDeviceCaps
DeleteObject
CreateSolidBrush
CreateFontW
CoTaskMemFree
CoCreateInstance
CoCreateGuid
CoUninitialize
StringFromGUID2
CoInitialize
CreateStreamOnHGlobal
CoTaskMemAlloc
RegQueryInfoKeyW
RegFlushKey
RegEnumValueW
RegEnumKeyExW
RegDeleteKeyExW
RegDeleteKeyW
GetUserNameW
OpenProcessToken
RegCreateKeyExW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegDeleteValueW
RegCloseKey
RegQueryValueExA
RegGetValueW
GetTokenInformation
CryptAcquireContextW
CryptReleaseContext
CryptGetHashParam
CryptCreateHash
CryptHashData
CryptDestroyHash
RegDeleteTreeW
RegCreateKeyExA
RegSetValueExA
SystemFunction036
BuildSecurityDescriptorW
BuildExplicitAccessWithNameW
ConvertStringSecurityDescriptorToSecurityDescriptorW
ImpersonateNamedPipeClient
RevertToSelf
RegOpenKeyExA
PathRemoveFileSpecW
PathAppendW
SHCopyKeyW
StrCmpW
StrStrW
StrCmpNW
SHDeleteKeyW
PathFileExistsW
PathAddBackslashW
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
IsNetworkAlive
_TrackMouseEvent
InitCommonControlsEx
ord345
GdipCloneImage
GdipCreateHBITMAPFromBitmap
GdipDisposeImage
GdiplusShutdown
GdipFree
GdipAlloc
GdipCreateBitmapFromStream
GdiplusStartup
HttpQueryInfoW
InternetReadFile
InternetWriteFile
InternetQueryDataAvailable
InternetQueryOptionW
InternetSetOptionW
HttpOpenRequestW
HttpAddRequestHeadersA
HttpAddRequestHeadersW
InternetCloseHandle
HttpSendRequestW
HttpSendRequestExW
HttpEndRequestW
HttpQueryInfoA
InternetOpenW
InternetConnectW
timeGetDevCaps
timeBeginPeriod
timeSetEvent
timeGetTime
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ