Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
Static task
static1
Behavioral task
behavioral1
Sample
RobloxPlayerInstaller.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RobloxPlayerInstaller.exe
Resource
win10v2004-20241007-en
Target
RobloxPlayerInstaller.exe
Size
6.7MB
MD5
da5705f4ae30d837139cb7380d941e1b
SHA1
08ae6cb9b2703df17b2bf554586a36f4b73502a6
SHA256
9f205a55a45a2a45d2ebb98afb21499b191a4b2e26f4311568d0337b32faa1ca
SHA512
f3042947d05222aff5facc14ac6123380d502435e98608dc6d053848997cdd0fb22b121a381e67df893c15ae14ed836a58fca5898540ea5dfb0a0da32ed8dbef
SSDEEP
98304:e0vhWhkxBW2oqIht3aMQPfb6Fw04X1xEg+CNlPSHtzQLy9rFI:tKkxBW/qgkvFX1xEyP8zQG9r2
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
C:\buildAgent\work\ci_deploy_ninja_boot-x86_git\build.ninja\common\vs2019\x86\release\Installer\Windows\RobloxPlayerInstaller.pdb
_TrackMouseEvent
InitCommonControlsEx
GdiplusShutdown
GdipCloneImage
GdiplusStartup
GdipCreateHBITMAPFromBitmap
GdipDisposeImage
GdipCreateBitmapFromStream
GdipAlloc
GdipFree
InternetOpenW
HttpOpenRequestW
InternetConnectW
InternetReadFile
InternetQueryDataAvailable
InternetQueryOptionW
InternetSetStatusCallbackW
InternetCloseHandle
HttpAddRequestHeadersW
HttpSendRequestW
HttpQueryInfoW
ShellExecuteExW
SHGetKnownFolderPath
Shell_NotifyIconW
SHGetFolderPathAndSubDirW
GetAdaptersAddresses
freeaddrinfo
getaddrinfo
recv
listen
ioctlsocket
connect
bind
accept
select
__WSAFDIsSet
WSAIoctl
setsockopt
WSACleanup
WSAStartup
inet_pton
WSAGetLastError
WSASetLastError
closesocket
WSACreateEvent
WSACloseEvent
send
getsockopt
htons
htonl
inet_ntop
socket
ntohs
ntohl
gethostname
getnameinfo
getsockname
BCryptGenRandom
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextW
GetUserNameW
CryptDestroyHash
RegCloseKey
RegCreateKeyExW
RegDeleteValueW
RegOpenKeyExW
RegSetValueExW
RegGetValueW
RegOpenKeyExA
RegQueryValueExA
CryptDestroyKey
SystemFunction036
DeregisterEventSource
RegisterEventSourceW
ReportEventW
CryptSetHashParam
CryptGetProvParam
CryptGetUserKey
CryptExportKey
CryptDecrypt
CryptSignHashW
CryptEnumProvidersW
RegEnumKeyExW
RegQueryInfoKeyW
RegQueryValueExW
RegDeleteTreeW
OpenProcessToken
AllocateAndInitializeSid
CopySid
EqualSid
FreeSid
GetLengthSid
GetTokenInformation
IsValidSid
CertCloseStore
CertEnumCertificatesInStore
CertGetEnhancedKeyUsage
CertGetIntendedKeyUsage
CertOpenSystemStoreA
CertGetCertificateContextProperty
CertDuplicateCertificateContext
CertFindCertificateInStore
CertOpenStore
CertFreeCertificateContext
WakeAllConditionVariable
SleepConditionVariableCS
SleepConditionVariableSRW
GetExitCodeThread
InitOnceBeginInitialize
InitOnceComplete
InitializeConditionVariable
EncodePointer
LCMapStringEx
GetCPInfo
GetLocaleInfoEx
GetStringTypeW
IsProcessorFeaturePresent
InitializeSListHead
UnhandledExceptionFilter
GetStartupInfoW
InitializeSRWLock
RtlUnwind
InterlockedPushEntrySList
GetCommandLineA
CreateThread
WakeConditionVariable
IsDebuggerPresent
DebugBreak
OutputDebugStringW
CloseHandle
GetLastError
SetLastError
HeapAlloc
HeapFree
GetProcessHeap
ReleaseSemaphore
ReleaseMutex
WaitForSingleObject
WaitForSingleObjectEx
OpenSemaphoreW
CreateMutexExW
CreateSemaphoreExW
GetCurrentProcessId
GetCurrentThreadId
GetModuleFileNameA
GetModuleHandleW
GetModuleHandleExW
GetProcAddress
FormatMessageW
SetSearchPathMode
GetCommandLineW
VerSetConditionMask
GetDiskFreeSpaceExW
CreateMutexW
TerminateProcess
OpenProcess
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
VerifyVersionInfoW
MulDiv
LocaleNameToLCID
GetUserDefaultLocaleName
SetWaitableTimer
CancelWaitableTimer
CreateWaitableTimerW
Sleep
FindClose
FindFirstFileW
FindNextFileW
SetUnhandledExceptionFilter
SetEvent
CreateEventW
OpenEventW
ExitThread
CreateProcessW
GetSystemTime
CreateFileW
GetFileSize
DeleteFileW
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
GetModuleFileNameW
SystemTimeToFileTime
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
K32GetModuleFileNameExW
GetCurrentProcess
GetCurrentProcessorNumber
GlobalMemoryStatusEx
GetSystemInfo
GetSystemTimeAsFileTime
GetVersionExA
IsWow64Process
LoadLibraryA
K32GetProcessMemoryInfo
ResetEvent
CreateEventA
CreateSemaphoreA
DuplicateHandle
GetModuleHandleA
GetTickCount
OutputDebugStringA
QueryPerformanceCounter
QueryPerformanceFrequency
SwitchToThread
MultiByteToWideChar
WideCharToMultiByte
GetNativeSystemInfo
LoadLibraryExW
FileTimeToSystemTime
DecodePointer
RaiseException
InitializeCriticalSectionEx
DeleteCriticalSection
VirtualQuery
GetCurrentThread
LoadLibraryW
WaitForMultipleObjectsEx
LocalAlloc
LocalFree
FindResourceExW
LoadResource
LockResource
SizeofResource
FindResourceW
CreateDirectoryW
GetFileAttributesW
GetFileSizeEx
ReadFile
RemoveDirectoryW
SetFileAttributesW
WriteFile
CopyFileW
GlobalAlloc
GlobalFree
GlobalUnlock
GlobalLock
CompareStringEx
FreeLibrary
GetEnvironmentVariableW
FlushFileBuffers
FormatMessageA
LockFileEx
CreateFileMappingA
UnlockFile
HeapDestroy
HeapCompact
HeapReAlloc
DeleteFileA
CreateFileA
FlushViewOfFile
GetFileAttributesExW
GetFileAttributesA
GetDiskFreeSpaceA
GetTempPathA
HeapSize
HeapValidate
GetVersionExW
GetTempPathW
UnlockFileEx
SetEndOfFile
GetFullPathNameA
SetFilePointer
LockFile
GetDiskFreeSpaceW
GetFullPathNameW
HeapCreate
AreFileApisANSI
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EnterCriticalSection
LeaveCriticalSection
GetSystemDirectoryA
MoveFileExA
CompareFileTime
GetEnvironmentVariableA
SleepEx
VirtualAlloc
VirtualProtect
VirtualFree
ReleaseSRWLockShared
AcquireSRWLockShared
ResumeThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateWaitableTimerA
GetCurrentDirectoryW
GetFileInformationByHandle
GetFileTime
SetFilePointerEx
SetFileTime
DeviceIoControl
MoveFileExW
InitializeCriticalSection
WriteConsoleW
GetStdHandle
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
InitializeCriticalSectionAndSpinCount
SwitchToFiber
DeleteFiber
CreateFiber
GetFileType
ConvertFiberToThread
ConvertThreadToFiber
FreeLibraryAndExitThread
GetConsoleOutputCP
SetStdHandle
GetDriveTypeW
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
SetConsoleCtrlHandler
ExitProcess
GetTimeZoneInformation
TryEnterCriticalSection
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetFinalPathNameByHandleW
GetExitCodeProcess
MapWindowPoints
GetWindowRect
InvalidateRect
EndPaint
BeginPaint
GetDC
DrawTextW
GetSystemMetrics
EnableWindow
EnumDisplayDevicesA
SetTimer
GetWindowLongW
GetDlgItem
ShowWindow
SetWindowLongW
GetParent
LoadIconW
DestroyIcon
GetWindowThreadProcessId
MessageBoxW
SendMessageW
DefWindowProcW
GetShellWindow
TranslateAcceleratorW
LoadAcceleratorsW
DispatchMessageW
TranslateMessage
GetUserObjectInformationW
GetProcessWindowStation
LoadBitmapW
GetDlgCtrlID
PostQuitMessage
CallWindowProcW
RegisterClassW
CreateWindowExW
GetMessageW
KillTimer
DestroyWindow
SetBkMode
SetDCPenColor
BitBlt
SelectObject
RoundRect
GetStockObject
GetDeviceCaps
DeleteObject
DeleteDC
CreateSolidBrush
CreatePatternBrush
CreateFontW
CreateCompatibleDC
CreateCompatibleBitmap
SetTextColor
SetDCBrushColor
CoInitializeEx
CoTaskMemAlloc
CoUninitialize
CoInitialize
CoTaskMemFree
CoCreateGuid
CoCreateInstance
StringFromGUID2
PathFindFileNameW
PathFindExtensionW
ord12
CallNtPowerInformation
timeGetDevCaps
timeSetEvent
timeBeginPeriod
timeGetTime
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ