C:\buildAgent\work\ci_ninja_client-x64_git\build.ninja\client\vs2019\x64\release\CrashReport\RobloxCrashHandler.pdb
Static task
static1
Behavioral task
behavioral1
Sample
d3e0383ce0f8c048cec32ff2d96d9818d3469447c26e10e8bff31997d0c73c66N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3e0383ce0f8c048cec32ff2d96d9818d3469447c26e10e8bff31997d0c73c66N.exe
Resource
win10v2004-20240802-en
General
-
Target
d3e0383ce0f8c048cec32ff2d96d9818d3469447c26e10e8bff31997d0c73c66N
-
Size
7.0MB
-
MD5
b2cbc463595b73ab7b8117f27c366920
-
SHA1
4f82bb83ead34b25e69526a9f74a2311deead14e
-
SHA256
d3e0383ce0f8c048cec32ff2d96d9818d3469447c26e10e8bff31997d0c73c66
-
SHA512
0804e618d10c35a68d12810ad4357db5c7d85164b7fcf3dd80d57e4d6421c603a42312b143a9f3afcd531cfa0bf5af436f5c18ead7514d77597fc77c90702f89
-
SSDEEP
98304:U7+b0ng+dH99MuyTGq6xPzyMgMuYnNpPcuviif/WD527BWG:+G0g+p99PsGq6ZeMQYNpPxWVQBWG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d3e0383ce0f8c048cec32ff2d96d9818d3469447c26e10e8bff31997d0c73c66N
Files
-
d3e0383ce0f8c048cec32ff2d96d9818d3469447c26e10e8bff31997d0c73c66N.exe windows:6 windows x64 arch:x64
687add0abde1294f87b9f14cd3c71b75
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
iphlpapi
GetAdaptersAddresses
winhttp
WinHttpSendRequest
WinHttpConnect
WinHttpCloseHandle
WinHttpOpenRequest
WinHttpOpen
WinHttpQueryHeaders
WinHttpReceiveResponse
WinHttpAddRequestHeaders
WinHttpCrackUrl
WinHttpSetOption
WinHttpWriteData
WinHttpReadData
WinHttpSetTimeouts
shell32
SHGetFolderPathAndSubDirW
ws2_32
ioctlsocket
WSASetLastError
connect
__WSAFDIsSet
WSAGetLastError
WSAIoctl
inet_pton
WSACloseEvent
WSACreateEvent
getsockopt
getaddrinfo
gethostname
freeaddrinfo
getnameinfo
htonl
ntohl
inet_ntop
accept
recv
select
closesocket
listen
ntohs
getsockname
bind
setsockopt
socket
htons
WSACleanup
WSAStartup
send
bcrypt
BCryptGenRandom
advapi32
RegQueryValueExW
ImpersonateNamedPipeClient
RevertToSelf
BuildSecurityDescriptorW
BuildExplicitAccessWithNameW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegOpenKeyExW
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
CryptReleaseContext
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptAcquireContextW
CryptDestroyKey
CryptEnumProvidersW
CryptSignHashW
CryptDecrypt
CryptExportKey
CryptGetUserKey
CryptGetProvParam
CryptSetHashParam
ReportEventW
RegisterEventSourceW
DeregisterEventSource
SystemFunction036
crypt32
CertOpenSystemStoreA
CertGetIntendedKeyUsage
CertGetEnhancedKeyUsage
CertFreeCertificateContext
CertEnumCertificatesInStore
CertOpenStore
CertFindCertificateInStore
CertDuplicateCertificateContext
CertGetCertificateContextProperty
CertCloseStore
powrprof
CallNtPowerInformation
kernel32
CompareStringEx
GetCPInfo
GetLocaleInfoEx
GetStringTypeW
InitializeSListHead
RtlCaptureContext
RtlLookupFunctionEntry
UnhandledExceptionFilter
GetStartupInfoW
RtlUnwindEx
InterlockedPushEntrySList
GetCommandLineA
GetCommandLineW
ExitThread
FreeLibraryAndExitThread
SetStdHandle
HeapSize
GetDriveTypeW
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
ExitProcess
GetConsoleOutputCP
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
EnumSystemLocalesW
HeapReAlloc
FlushFileBuffers
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
WriteConsoleW
AddVectoredExceptionHandler
CreateEventA
CreateSemaphoreA
GetCurrentProcess
DuplicateHandle
ReleaseSemaphore
CloseHandle
WaitForSingleObjectEx
SetEvent
GetModuleFileNameA
Sleep
GetTickCount
GetProcAddress
GetModuleHandleA
GetSystemTimeAsFileTime
HeapAlloc
GetProcessHeap
HeapFree
WaitForMultipleObjectsEx
GetModuleHandleExW
GetCurrentThreadId
FormatMessageW
GetLastError
K32GetProcessMemoryInfo
LoadLibraryA
GetVersionExA
GetSystemInfo
GetCurrentProcessorNumber
VerSetConditionMask
GlobalMemoryStatusEx
GetModuleHandleW
VerifyVersionInfoW
DebugBreak
GetProcessTimes
QueryPerformanceFrequency
QueryPerformanceCounter
GetCurrentProcessId
GetModuleFileNameW
CreateFileW
CreateSemaphoreExW
SetLastError
TerminateProcess
WaitForSingleObject
ReleaseMutex
OpenProcess
OutputDebugStringW
OpenSemaphoreW
CreateProcessW
IsDebuggerPresent
SwitchToThread
VirtualProtect
VirtualFree
VirtualAlloc
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
ReleaseSRWLockShared
AcquireSRWLockShared
FreeLibrary
LocalFree
FileTimeToSystemTime
SystemTimeToFileTime
GetSystemTime
WideCharToMultiByte
GetNativeSystemInfo
LoadLibraryExW
InitializeCriticalSectionEx
RaiseException
DecodePointer
DeleteCriticalSection
MultiByteToWideChar
GetCurrentThread
LoadLibraryW
VirtualQuery
CreateFileMappingW
MapViewOfFile
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
FormatMessageA
SetWaitableTimer
ResetEvent
TlsSetValue
ResumeThread
TlsAlloc
CreateWaitableTimerA
TlsGetValue
TlsFree
CreateDirectoryW
FindFirstFileW
GetFullPathNameW
FindNextFileW
DeviceIoControl
RemoveDirectoryW
SetFileTime
SetEndOfFile
GetTempPathW
FindClose
GetFileAttributesW
GetFileInformationByHandle
GetFileAttributesExW
DeleteFileW
GetCurrentDirectoryW
SetFilePointerEx
MoveFileExW
GetFileTime
AreFileApisANSI
GetSystemDirectoryA
GetEnvironmentVariableA
CompareFileTime
MoveFileExA
SleepEx
GetStdHandle
GetEnvironmentVariableW
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
InitializeCriticalSectionAndSpinCount
SwitchToFiber
DeleteFiber
CreateFiber
GetFileType
WriteFile
RtlVirtualUnwind
ConvertFiberToThread
ConvertThreadToFiber
GetLocalTime
SetUnhandledExceptionFilter
SetProcessShutdownParameters
SetConsoleCtrlHandler
IsWow64Process
SuspendThread
GetProcessId
GetThreadContext
Wow64GetThreadContext
IsProcessorFeaturePresent
GetTimeZoneInformation
GetThreadLocale
GetSystemDefaultLCID
GetUserDefaultLCID
ConnectNamedPipe
DisconnectNamedPipe
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
CreateEventW
CreateThread
UnregisterWaitEx
RegisterWaitForSingleObject
GetFileInformationByHandleEx
VirtualQueryEx
ReadProcessMemory
RemoveVectoredExceptionHandler
SetNamedPipeHandleState
TransactNamedPipe
CreateNamedPipeW
WaitNamedPipeW
GetVersion
CreateSemaphoreW
GetFileSizeEx
LockFileEx
ReadFile
UnlockFileEx
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
LCMapStringEx
EncodePointer
GetFinalPathNameByHandleW
GetDiskFreeSpaceExW
FindFirstFileExW
SleepConditionVariableSRW
SleepConditionVariableCS
WakeAllConditionVariable
WakeConditionVariable
InitializeConditionVariable
InitOnceBeginInitialize
InitOnceComplete
TryEnterCriticalSection
InitializeSRWLock
RtlPcToFileHeader
CreateMutexExW
RtlUnwind
user32
EnumDisplayDevicesA
GetProcessWindowStation
GetUserObjectInformationW
MessageBoxW
GetMessageW
TranslateMessage
DispatchMessageW
PostMessageW
DefWindowProcW
RegisterClassW
UnregisterClassW
CreateWindowExW
DestroyWindow
GetWindowLongPtrW
SetWindowLongPtrW
ole32
CoTaskMemFree
CoUninitialize
StringFromGUID2
CoCreateGuid
CoInitializeEx
CoCreateInstance
winmm
timeBeginPeriod
timeSetEvent
timeGetTime
timeGetDevCaps
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
Exports
Exports
?generic_category@system@boost@@YAAEBVerror_category@12@XZ
?system_category@system@boost@@YAAEBVerror_category@12@XZ
Sections
.text Size: 4.2MB - Virtual size: 4.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 790KB - Virtual size: 8.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 184KB - Virtual size: 184KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
CPADinfo Size: 512B - Virtual size: 56B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 828B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 604KB - Virtual size: 608KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE