Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
2024-05-30_d13af843c4500fa4d2da5a4a16612b28_floxif_magniber.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-05-30_d13af843c4500fa4d2da5a4a16612b28_floxif_magniber.exe
Resource
win10v2004-20240226-en
Target
2024-05-30_d13af843c4500fa4d2da5a4a16612b28_floxif_magniber
Size
5.3MB
MD5
d13af843c4500fa4d2da5a4a16612b28
SHA1
1dec7f76965fcd9a2210ba2b8e45344a4a16795f
SHA256
9196135e1ba4629d12391971e742232698e10ae622038ae60ca91ebb14a115d3
SHA512
6a3b10de2d30a058a99e97ca3a81cfe1f5375602e9aabae12cc285f367a0d1c86bc77952d996f55c6ebb2db4985555972cbf4157ee1a745322ae9a2f4ff474a2
SSDEEP
98304:FlvB6kscWU+MeTMv6dGg/hffXo1CCJc2m+Fysu39:Hgk7+F0gZgCCW2dQsc9
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
C:\buildAgent\work\ci_deploy_ninja_boot-x86_git\build.ninja\common\vs2019\x86\release\Installer\Windows\RobloxPlayerInstaller.pdb
_TrackMouseEvent
InitCommonControlsEx
GdipFree
GdiplusStartup
GdiplusShutdown
GdipCloneImage
GdipDisposeImage
GdipCreateBitmapFromStream
GdipAlloc
GdipCreateHBITMAPFromBitmap
InternetReadFile
InternetQueryDataAvailable
InternetQueryOptionW
InternetCloseHandle
HttpOpenRequestW
HttpAddRequestHeadersW
HttpSendRequestW
HttpQueryInfoW
InternetOpenW
InternetConnectW
BCryptGenRandom
EqualSid
SystemFunction036
CryptEnumProvidersW
CopySid
RegDeleteTreeW
RegQueryValueExW
RegQueryInfoKeyW
RegEnumKeyExW
IsValidSid
GetTokenInformation
GetLengthSid
DeregisterEventSource
RegisterEventSourceW
ReportEventW
CryptSetHashParam
CryptGetProvParam
CryptGetUserKey
CryptExportKey
CryptDecrypt
CryptSignHashW
GetUserNameW
CryptAcquireContextW
CryptReleaseContext
CryptGetHashParam
CryptCreateHash
CryptHashData
CryptDestroyHash
RegCloseKey
RegCreateKeyExW
RegDeleteValueW
RegOpenKeyExW
RegSetValueExW
RegGetValueW
AllocateAndInitializeSid
RegOpenKeyExA
RegQueryValueExA
CryptDestroyKey
OpenProcessToken
FreeSid
SHGetFolderPathAndSubDirW
Shell_NotifyIconW
SHGetKnownFolderPath
ShellExecuteExW
gethostname
getnameinfo
ioctlsocket
freeaddrinfo
getaddrinfo
connect
__WSAFDIsSet
WSAIoctl
inet_pton
WSAGetLastError
WSACreateEvent
WSACloseEvent
getsockopt
htonl
WSASetLastError
WSACleanup
WSAStartup
setsockopt
send
select
recv
listen
htons
getsockname
closesocket
bind
accept
inet_ntop
socket
ntohs
ntohl
CertCloseStore
CertEnumCertificatesInStore
CertFreeCertificateContext
CertGetEnhancedKeyUsage
CertGetIntendedKeyUsage
CertOpenSystemStoreA
CertOpenStore
CertFindCertificateInStore
CertDuplicateCertificateContext
CertGetCertificateContextProperty
GetAdaptersAddresses
GetStringTypeW
GetLocaleInfoEx
GetCPInfo
IsProcessorFeaturePresent
GetStartupInfoW
RtlUnwind
InterlockedPushEntrySList
GetCommandLineA
CreateThread
ExitThread
FreeLibraryAndExitThread
GetConsoleOutputCP
SetStdHandle
HeapSize
GetDriveTypeW
PeekNamedPipe
InitializeSListHead
LCMapStringEx
EncodePointer
InitOnceComplete
InitOnceBeginInitialize
SleepConditionVariableSRW
SleepConditionVariableCS
WakeAllConditionVariable
WakeConditionVariable
InitializeConditionVariable
TryEnterCriticalSection
InitializeSRWLock
GetExitCodeThread
SystemTimeToTzSpecificLocalTime
SetConsoleCtrlHandler
IsDebuggerPresent
DebugBreak
OutputDebugStringW
CloseHandle
GetLastError
SetLastError
HeapAlloc
HeapFree
GetProcessHeap
ReleaseSemaphore
ReleaseMutex
WaitForSingleObject
WaitForSingleObjectEx
OpenSemaphoreW
CreateMutexExW
CreateSemaphoreExW
GetCurrentProcessId
GetCurrentThreadId
GetModuleFileNameA
GetModuleHandleW
GetModuleHandleExW
GetProcAddress
FormatMessageW
SetSearchPathMode
GetCommandLineW
VerSetConditionMask
GetDiskFreeSpaceExW
CreateFileMappingW
VerifyVersionInfoW
ExitProcess
LocaleNameToLCID
GetUserDefaultLocaleName
Sleep
FindClose
FindFirstFileW
FindNextFileW
SetUnhandledExceptionFilter
SetEvent
CreateEventW
OpenEventW
CreateProcessW
GetSystemTime
CreateFileW
GetFileSize
MapViewOfFile
UnmapViewOfFile
DeleteFileW
TerminateProcess
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
OpenProcess
GetModuleFileNameW
SystemTimeToFileTime
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
K32GetModuleFileNameExW
WideCharToMultiByte
GetCurrentProcess
GetCurrentProcessorNumber
GlobalMemoryStatusEx
GetSystemInfo
GetSystemTimeAsFileTime
GetVersionExA
IsWow64Process
LoadLibraryA
K32GetProcessMemoryInfo
DecodePointer
RaiseException
InitializeCriticalSectionEx
DeleteCriticalSection
GetModuleHandleA
OutputDebugStringA
QueryPerformanceCounter
QueryPerformanceFrequency
CreateEventA
SwitchToThread
MultiByteToWideChar
GetNativeSystemInfo
LoadLibraryExW
FileTimeToSystemTime
VirtualQuery
CreateSemaphoreA
DuplicateHandle
GetTickCount
WaitForMultipleObjectsEx
GetExitCodeProcess
LocalAlloc
LocalFree
FindResourceExW
LoadResource
LockResource
SizeofResource
FindResourceW
LoadLibraryW
GlobalAlloc
GlobalFree
GlobalUnlock
GlobalLock
CreateDirectoryW
GetFileAttributesW
GetFileSizeEx
ReadFile
RemoveDirectoryW
SetFileAttributesW
WriteFile
CopyFileW
CompareStringEx
FreeLibrary
GetEnvironmentVariableW
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EnterCriticalSection
LeaveCriticalSection
GetSystemDirectoryA
MoveFileExA
CompareFileTime
GetEnvironmentVariableA
SleepEx
VirtualAlloc
ReleaseSRWLockShared
AcquireSRWLockShared
GetStdHandle
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SwitchToFiber
DeleteFiber
CreateFiber
GetFileType
ConvertFiberToThread
ConvertThreadToFiber
InitializeCriticalSection
FormatMessageA
GetCurrentDirectoryW
GetFileAttributesExW
GetFileInformationByHandle
GetFileTime
GetFullPathNameW
SetEndOfFile
SetFilePointerEx
SetFileTime
GetTempPathW
DeviceIoControl
MoveFileExW
ResetEvent
SetWaitableTimer
ResumeThread
CreateWaitableTimerA
AreFileApisANSI
GetTimeZoneInformation
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
UnhandledExceptionFilter
EnumSystemLocalesW
FlushFileBuffers
HeapReAlloc
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
WriteConsoleW
GetFinalPathNameByHandleW
MulDiv
GetWindowRect
InvalidateRect
EndPaint
BeginPaint
GetDC
DrawTextW
GetSystemMetrics
EnableWindow
KillTimer
GetShellWindow
GetDlgCtrlID
FillRect
ShowWindow
GetWindowLongW
GetWindowThreadProcessId
GetUserObjectInformationW
GetProcessWindowStation
SetWindowLongW
TranslateAcceleratorW
MessageBoxW
SendMessageW
DefWindowProcW
LoadAcceleratorsW
DispatchMessageW
TranslateMessage
GetMessageW
DestroyIcon
LoadBitmapW
EnumDisplayDevicesA
GetDlgItem
PostQuitMessage
CallWindowProcW
RegisterClassW
CreateWindowExW
LoadIconW
SetTimer
DestroyWindow
CreateFontW
CreatePen
CreateSolidBrush
DeleteDC
DeleteObject
GetDeviceCaps
GetStockObject
Rectangle
RoundRect
SelectObject
SetDCBrushColor
SetDCPenColor
SetBkMode
SetTextColor
CoCreateGuid
StringFromGUID2
CoCreateInstance
CoUninitialize
CoInitialize
CoTaskMemFree
CoInitializeEx
CoTaskMemAlloc
PathFindExtensionW
PathFindFileNameW
ord12
CallNtPowerInformation
timeSetEvent
timeGetDevCaps
timeBeginPeriod
timeGetTime
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ