Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
RobloxPlayerInstaller.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RobloxPlayerInstaller.exe
Resource
win10v2004-20241007-en
Target
RobloxPlayerInstaller.exe
Size
6.6MB
MD5
74515548bb70650c0176df71d7e108f4
SHA1
1892ea497636c4c2641427bc2fd466c531d0cd95
SHA256
6e0dea6726076158e4569745c0793202dfd6fbcc377117898c4c29f5be2a08fd
SHA512
0272691263875c882265709300b40f4d1dc62e13699ace6fa547457389c8a9f8a7a6e4902914f2c813669db80d980d8fc8bfccfbd1aff4158444cd2d238ef99b
SSDEEP
98304:ozv10T8Mzg6x2QdfIO36jg0bI9oWhZBRgY8qteGO/dDQ4oKCMLF8:M6wM06x2cBQIVPgYQlDoKfLS
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
C:\buildAgent\work\ci_deploy_ninja_boot-x86_git\build.ninja\common\vs2019\x86\release\Installer\Windows\RobloxPlayerInstaller.pdb
_TrackMouseEvent
InitCommonControlsEx
GdiplusShutdown
GdipCloneImage
GdiplusStartup
GdipCreateHBITMAPFromBitmap
GdipDisposeImage
GdipCreateBitmapFromStream
GdipAlloc
GdipFree
InternetReadFile
InternetQueryDataAvailable
InternetQueryOptionW
InternetSetStatusCallbackW
HttpOpenRequestW
HttpAddRequestHeadersW
HttpSendRequestW
HttpQueryInfoW
InternetConnectW
InternetCloseHandle
InternetOpenW
SHGetFolderPathAndSubDirW
ShellExecuteExW
SHGetKnownFolderPath
Shell_NotifyIconW
GetAdaptersAddresses
BCryptGenRandom
GetUserNameW
RegCreateKeyExW
RegCloseKey
IsValidSid
GetTokenInformation
GetLengthSid
FreeSid
EqualSid
CopySid
AllocateAndInitializeSid
OpenProcessToken
RegDeleteTreeW
RegQueryValueExW
RegQueryInfoKeyW
RegEnumKeyExW
SystemFunction036
DeregisterEventSource
RegisterEventSourceW
ReportEventW
CryptSetHashParam
CryptGetProvParam
CryptGetUserKey
CryptExportKey
CryptDecrypt
CryptSignHashW
CryptEnumProvidersW
CryptDestroyKey
RegQueryValueExA
RegOpenKeyExA
RegGetValueW
RegSetValueExW
RegOpenKeyExW
CryptDestroyHash
CryptAcquireContextW
CryptReleaseContext
CryptGetHashParam
CryptCreateHash
CryptHashData
RegDeleteValueW
recv
listen
getsockname
connect
freeaddrinfo
accept
select
__WSAFDIsSet
WSAIoctl
WSACleanup
WSAStartup
inet_pton
WSAGetLastError
WSASetLastError
closesocket
WSACreateEvent
WSACloseEvent
send
getsockopt
htons
htonl
inet_ntop
socket
ntohs
ntohl
getaddrinfo
ioctlsocket
getnameinfo
gethostname
setsockopt
bind
CertGetIntendedKeyUsage
CertOpenSystemStoreA
CertOpenStore
CertFindCertificateInStore
CertDuplicateCertificateContext
CertGetCertificateContextProperty
CertCloseStore
CertEnumCertificatesInStore
CertFreeCertificateContext
CertGetEnhancedKeyUsage
EncodePointer
InitOnceComplete
GetExitCodeThread
SleepConditionVariableSRW
SleepConditionVariableCS
WakeAllConditionVariable
WakeConditionVariable
InitializeConditionVariable
TryEnterCriticalSection
InitializeSRWLock
LCMapStringEx
GetCPInfo
GetLocaleInfoEx
GetStringTypeW
IsProcessorFeaturePresent
InitializeSListHead
UnhandledExceptionFilter
GetStartupInfoW
RtlUnwind
InterlockedPushEntrySList
GetCommandLineA
CreateThread
ExitThread
InitOnceBeginInitialize
FreeLibraryAndExitThread
GetConsoleOutputCP
SetStdHandle
GetDriveTypeW
PeekNamedPipe
IsDebuggerPresent
DebugBreak
OutputDebugStringW
CloseHandle
GetLastError
SetLastError
HeapAlloc
HeapFree
GetProcessHeap
ReleaseSemaphore
ReleaseMutex
WaitForSingleObject
WaitForSingleObjectEx
OpenSemaphoreW
CreateMutexExW
CreateSemaphoreExW
GetCurrentProcessId
GetCurrentThreadId
GetModuleFileNameA
GetModuleHandleW
GetModuleHandleExW
GetProcAddress
FormatMessageW
SetSearchPathMode
GetCommandLineW
VerSetConditionMask
GetDiskFreeSpaceExW
CreateFileMappingW
VerifyVersionInfoW
MulDiv
LocaleNameToLCID
GetUserDefaultLocaleName
SetWaitableTimer
CancelWaitableTimer
CreateWaitableTimerW
Sleep
FindClose
FindFirstFileW
FindNextFileW
SetUnhandledExceptionFilter
SetEvent
CreateEventW
SystemTimeToTzSpecificLocalTime
CreateProcessW
GetSystemTime
CreateFileW
GetFileSize
MapViewOfFile
UnmapViewOfFile
DeleteFileW
TerminateProcess
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
OpenProcess
GetModuleFileNameW
SystemTimeToFileTime
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
K32GetModuleFileNameExW
GetCurrentProcess
GetCurrentProcessorNumber
GlobalMemoryStatusEx
GetSystemInfo
GetSystemTimeAsFileTime
GetVersionExA
IsWow64Process
LoadLibraryA
K32GetProcessMemoryInfo
ResetEvent
CreateEventA
CreateSemaphoreA
DuplicateHandle
GetModuleHandleA
GetTickCount
OutputDebugStringA
QueryPerformanceCounter
QueryPerformanceFrequency
SwitchToThread
MultiByteToWideChar
WideCharToMultiByte
GetNativeSystemInfo
LoadLibraryExW
FileTimeToSystemTime
DecodePointer
RaiseException
InitializeCriticalSectionEx
DeleteCriticalSection
VirtualQuery
GetCurrentThread
LoadLibraryW
WaitForMultipleObjectsEx
GetExitCodeProcess
LocalAlloc
LocalFree
FindResourceExW
LoadResource
LockResource
SizeofResource
FindResourceW
CreateDirectoryW
GetFileAttributesW
GetFileSizeEx
ReadFile
RemoveDirectoryW
SetFileAttributesW
WriteFile
CopyFileW
GlobalAlloc
GlobalFree
GlobalUnlock
GlobalLock
CompareStringEx
FreeLibrary
GetEnvironmentVariableW
VirtualAlloc
VirtualProtect
VirtualFree
ReleaseSRWLockExclusive
ReleaseSRWLockShared
AcquireSRWLockExclusive
AcquireSRWLockShared
FlushFileBuffers
FormatMessageA
LockFileEx
CreateFileMappingA
UnlockFile
HeapDestroy
HeapCompact
HeapReAlloc
DeleteFileA
CreateFileA
FlushViewOfFile
GetFileAttributesExW
GetFileAttributesA
GetDiskFreeSpaceA
GetTempPathA
HeapSize
HeapValidate
GetVersionExW
CreateMutexW
GetTempPathW
UnlockFileEx
SetEndOfFile
GetFullPathNameA
SetFilePointer
LockFile
GetDiskFreeSpaceW
GetFullPathNameW
HeapCreate
AreFileApisANSI
EnterCriticalSection
LeaveCriticalSection
GetSystemDirectoryA
MoveFileExA
CompareFileTime
GetEnvironmentVariableA
SleepEx
ResumeThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateWaitableTimerA
GetCurrentDirectoryW
GetFileInformationByHandle
GetFileTime
SetFilePointerEx
SetFileTime
DeviceIoControl
MoveFileExW
InitializeCriticalSection
GetStdHandle
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
InitializeCriticalSectionAndSpinCount
SwitchToFiber
DeleteFiber
CreateFiber
GetFileType
ConvertFiberToThread
ConvertThreadToFiber
SetConsoleCtrlHandler
ExitProcess
GetTimeZoneInformation
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
WriteConsoleW
GetFinalPathNameByHandleW
OpenEventW
GetUserObjectInformationW
MapWindowPoints
GetWindowRect
InvalidateRect
EndPaint
BeginPaint
GetDC
DrawTextW
GetSystemMetrics
EnableWindow
KillTimer
TranslateMessage
GetDlgCtrlID
GetDlgItem
GetProcessWindowStation
DestroyWindow
CreateWindowExW
RegisterClassW
CallWindowProcW
PostQuitMessage
LoadBitmapW
EnumDisplayDevicesA
GetWindowThreadProcessId
GetMessageW
MessageBoxW
SendMessageW
DefWindowProcW
DestroyIcon
LoadIconW
GetParent
SetWindowLongW
GetWindowLongW
GetShellWindow
TranslateAcceleratorW
LoadAcceleratorsW
ShowWindow
DispatchMessageW
SetTimer
RoundRect
SetDCBrushColor
GetDeviceCaps
DeleteObject
DeleteDC
CreateSolidBrush
CreatePatternBrush
CreateFontW
CreateCompatibleDC
CreateCompatibleBitmap
SetDCPenColor
SetBkMode
SetTextColor
BitBlt
SelectObject
GetStockObject
CoInitializeEx
CoTaskMemAlloc
CoUninitialize
CoInitialize
CoCreateInstance
CoCreateGuid
CoTaskMemFree
StringFromGUID2
ord12
PathFindExtensionW
PathFindFileNameW
CallNtPowerInformation
timeBeginPeriod
timeSetEvent
timeGetDevCaps
timeGetTime
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ