e:\Development\Desktop\Github\winforms-modernui\MetroFramework.Design\obj\Release\MetroFramework.Design.pdb
Static task
static1
Behavioral task
behavioral1
Sample
Roblox Pet Simulator Hack.zip
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
Roblox Pet Simulator Hack.exe
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
RobloxPlayerInstaller (4).exe
Resource
win11-20241023-en
General
-
Target
Roblox Pet Simulator Hack.zip
-
Size
4.4MB
-
MD5
1e9ca9ed34c9ff223d4534b1c06de4d6
-
SHA1
4ed03415b85163a2ef9d102f1a2e6eaef26f1409
-
SHA256
f79d8eb31e6282622058e508345d3e3f85e4e722f6492b4f57aa504879b098f1
-
SHA512
67621f27e30c1b0af37fee9a144416cbd9ab8b83676c1d033bc4edfeb98193c53df6e250ff722b22551df39cbc6c3f9429579cbc89297686b63e7b43738d60f0
-
SSDEEP
98304:OqMScxw1h/3hRYy18VXV9QZw42d/yJppjBmj9kh+U/5Mhtc9u:Oq3IY8JwZw42Z6pEOIw9u
Malware Config
Signatures
-
Unsigned PE 6 IoCs
Checks for missing Authenticode signature.
resource unpack001/MetroFramework.Design.dll unpack001/MetroFramework.Fonts.dll unpack001/MetroFramework.dll unpack001/Microsoft.Management.Infrastructure.dll unpack001/Roblox Pet Simulator Hack.exe unpack001/System.Management.Automation.dll
Files
-
Roblox Pet Simulator Hack.zip.zip
Password: 123
-
Aviator Founder.exe.config
-
Aviator Founder.pdb
-
MetroFramework.Design.dll.dll windows:4 windows x86 arch:x86
Password: 123
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
mscoree
_CorDllMain
Sections
.text Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
MetroFramework.Fonts.dll.dll windows:4 windows x86 arch:x86
Password: 123
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
e:\Development\Desktop\Github\winforms-modernui\MetroFramework.Fonts\obj\Release\MetroFramework.Fonts.pdb
Imports
mscoree
_CorDllMain
Sections
.text Size: 654KB - Virtual size: 653KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
MetroFramework.dll.dll windows:4 windows x86 arch:x86
Password: 123
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
mscoree
_CorDllMain
Sections
.text Size: 342KB - Virtual size: 342KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Microsoft.Management.Infrastructure.dll.dll windows:4 windows x86 arch:x86
Password: 123
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
mscoree
_CorDllMain
Sections
.text Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
Roblox Pet Simulator Hack.exe.exe windows:4 windows x86 arch:x86
Password: 123
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
C:\Users\merta\source\repos\Aviator Founder\Aviator Founder\obj\Release\Aviator Founder.pdb
Imports
mscoree
_CorExeMain
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
RobloxPlayerInstaller (4).exe.exe windows:6 windows x86 arch:x86
Password: 123
0ca235b67273458745ed66ab543cc297
Code Sign
0d:af:ec:46:d2:b7:34:a6:7f:4e:ad:75:7c:0b:c9:6bCertificate
IssuerCN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1,O=DigiCert\, Inc.,C=USNot Before13/02/2024, 00:00Not After12/02/2025, 23:59SubjectSERIALNUMBER=3780902,CN=Roblox Corporation,O=Roblox Corporation,L=San Mateo,ST=California,C=US,2.5.4.15=#131450726976617465204f7267616e697a6174696f6e,1.3.6.1.4.1.311.60.2.1.2=#130844656c6177617265,1.3.6.1.4.1.311.60.2.1.3=#13025553Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
08:ad:40:b2:60:d2:9c:4c:9f:5e:cd:a9:bd:93:ae:d9Certificate
IssuerCN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before29/04/2021, 00:00Not After28/04/2036, 23:59SubjectCN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1,O=DigiCert\, Inc.,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
0b:ae:66:bc:5a:ba:7f:95:87:c6:f9:e9:04:e3:33:04Certificate
IssuerCN=DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA,O=DigiCert\, Inc.,C=USNot Before26/09/2024, 00:00Not After25/11/2035, 23:59SubjectCN=DigiCert Timestamp 2024,O=DigiCert,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
07:36:37:b7:24:54:7c:d8:47:ac:fd:28:66:2a:5e:5bCertificate
IssuerCN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before23/03/2022, 00:00Not After22/03/2037, 23:59SubjectCN=DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA,O=DigiCert\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
0e:9b:18:8e:f9:d0:2d:e7:ef:db:50:e2:08:40:18:5aCertificate
IssuerCN=DigiCert Assured ID Root CA,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before01/08/2022, 00:00Not After09/11/2031, 23:59SubjectCN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
26:a0:a4:f3:f9:83:57:8e:93:97:73:e6:9d:48:79:e9:ca:0a:af:9b:d4:f8:fd:e5:bd:2e:19:ce:08:98:7a:afSigner
Actual PE Digest26:a0:a4:f3:f9:83:57:8e:93:97:73:e6:9d:48:79:e9:ca:0a:af:9b:d4:f8:fd:e5:bd:2e:19:ce:08:98:7a:afDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\buildAgent\work\ci_deploy_ninja_boot-x86_git\build.ninja\common\vs2019\x86\release\Installer\Windows\RobloxPlayerInstaller.pdb
Imports
comctl32
_TrackMouseEvent
InitCommonControlsEx
gdiplus
GdiplusShutdown
GdipCloneImage
GdiplusStartup
GdipCreateHBITMAPFromBitmap
GdipDisposeImage
GdipCreateBitmapFromStream
GdipAlloc
GdipFree
wininet
InternetOpenW
HttpOpenRequestW
InternetConnectW
InternetReadFile
InternetQueryDataAvailable
InternetQueryOptionW
InternetSetStatusCallbackW
InternetCloseHandle
HttpAddRequestHeadersW
HttpSendRequestW
HttpQueryInfoW
shell32
ShellExecuteExW
SHGetKnownFolderPath
Shell_NotifyIconW
SHGetFolderPathAndSubDirW
iphlpapi
GetAdaptersAddresses
ws2_32
freeaddrinfo
getaddrinfo
recv
listen
ioctlsocket
connect
bind
accept
select
__WSAFDIsSet
WSAIoctl
setsockopt
WSACleanup
WSAStartup
inet_pton
WSAGetLastError
WSASetLastError
closesocket
WSACreateEvent
WSACloseEvent
send
getsockopt
htons
htonl
inet_ntop
socket
ntohs
ntohl
gethostname
getnameinfo
getsockname
bcrypt
BCryptGenRandom
advapi32
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextW
GetUserNameW
CryptDestroyHash
RegCloseKey
RegCreateKeyExW
RegDeleteValueW
RegOpenKeyExW
RegSetValueExW
RegGetValueW
RegOpenKeyExA
RegQueryValueExA
CryptDestroyKey
SystemFunction036
DeregisterEventSource
RegisterEventSourceW
ReportEventW
CryptSetHashParam
CryptGetProvParam
CryptGetUserKey
CryptExportKey
CryptDecrypt
CryptSignHashW
CryptEnumProvidersW
RegEnumKeyExW
RegQueryInfoKeyW
RegQueryValueExW
RegDeleteTreeW
OpenProcessToken
AllocateAndInitializeSid
CopySid
EqualSid
FreeSid
GetLengthSid
GetTokenInformation
IsValidSid
crypt32
CertCloseStore
CertEnumCertificatesInStore
CertGetEnhancedKeyUsage
CertGetIntendedKeyUsage
CertOpenSystemStoreA
CertGetCertificateContextProperty
CertDuplicateCertificateContext
CertFindCertificateInStore
CertOpenStore
CertFreeCertificateContext
kernel32
WakeAllConditionVariable
SleepConditionVariableCS
SleepConditionVariableSRW
GetExitCodeThread
InitOnceBeginInitialize
InitOnceComplete
GetStringTypeW
InitializeConditionVariable
EncodePointer
LCMapStringEx
GetCPInfo
GetLocaleInfoEx
IsProcessorFeaturePresent
InitializeSListHead
UnhandledExceptionFilter
GetStartupInfoW
InitializeSRWLock
RtlUnwind
InterlockedPushEntrySList
GetCommandLineA
CreateThread
WakeConditionVariable
IsDebuggerPresent
DebugBreak
OutputDebugStringW
CloseHandle
GetLastError
SetLastError
HeapAlloc
HeapFree
GetProcessHeap
ReleaseSemaphore
ReleaseMutex
WaitForSingleObject
WaitForSingleObjectEx
OpenSemaphoreW
CreateMutexExW
CreateSemaphoreExW
GetCurrentProcessId
GetCurrentThreadId
GetModuleFileNameA
GetModuleHandleW
GetModuleHandleExW
GetProcAddress
FormatMessageW
SetSearchPathMode
GetCommandLineW
VerSetConditionMask
GetDiskFreeSpaceExW
CreateMutexW
TerminateProcess
OpenProcess
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
VerifyVersionInfoW
MulDiv
LocaleNameToLCID
GetUserDefaultLocaleName
SetWaitableTimer
CancelWaitableTimer
CreateWaitableTimerW
Sleep
FindClose
FindFirstFileW
FindNextFileW
SetUnhandledExceptionFilter
SetEvent
CreateEventW
OpenEventW
ExitThread
CreateProcessW
GetSystemTime
CreateFileW
GetFileSize
DeleteFileW
InitializeProcThreadAttributeList
UpdateProcThreadAttribute
GetModuleFileNameW
SystemTimeToFileTime
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
K32GetModuleFileNameExW
GetCurrentProcess
GetCurrentProcessorNumber
GlobalMemoryStatusEx
GetSystemInfo
GetSystemTimeAsFileTime
GetVersionExA
IsWow64Process
LoadLibraryA
K32GetProcessMemoryInfo
ResetEvent
CreateEventA
CreateSemaphoreA
DuplicateHandle
GetModuleHandleA
GetTickCount
OutputDebugStringA
QueryPerformanceCounter
QueryPerformanceFrequency
SwitchToThread
MultiByteToWideChar
WideCharToMultiByte
GetNativeSystemInfo
LoadLibraryExW
FileTimeToSystemTime
DecodePointer
RaiseException
InitializeCriticalSectionEx
DeleteCriticalSection
VirtualQuery
GetCurrentThread
LoadLibraryW
WaitForMultipleObjectsEx
LocalAlloc
LocalFree
FindResourceExW
LoadResource
LockResource
SizeofResource
FindResourceW
CreateDirectoryW
GetFileAttributesW
GetFileSizeEx
ReadFile
RemoveDirectoryW
SetFileAttributesW
WriteFile
CopyFileW
MoveFileW
GlobalAlloc
GlobalFree
GlobalUnlock
GlobalLock
CompareStringEx
FreeLibrary
GetEnvironmentVariableW
FlushFileBuffers
FormatMessageA
LockFileEx
CreateFileMappingA
UnlockFile
HeapDestroy
HeapCompact
HeapReAlloc
DeleteFileA
CreateFileA
FlushViewOfFile
GetFileAttributesExW
GetFileAttributesA
GetDiskFreeSpaceA
GetTempPathA
HeapSize
HeapValidate
GetVersionExW
GetTempPathW
UnlockFileEx
SetEndOfFile
GetFullPathNameA
SetFilePointer
LockFile
GetDiskFreeSpaceW
GetFullPathNameW
HeapCreate
AreFileApisANSI
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
EnterCriticalSection
LeaveCriticalSection
GetSystemDirectoryA
MoveFileExA
CompareFileTime
GetEnvironmentVariableA
SleepEx
VirtualAlloc
VirtualProtect
VirtualFree
ReleaseSRWLockShared
AcquireSRWLockShared
ResumeThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateWaitableTimerA
GetCurrentDirectoryW
GetFileInformationByHandle
GetFileTime
SetFilePointerEx
SetFileTime
DeviceIoControl
MoveFileExW
InitializeCriticalSection
WriteConsoleW
GetStdHandle
GetConsoleMode
SetConsoleMode
ReadConsoleA
ReadConsoleW
InitializeCriticalSectionAndSpinCount
SwitchToFiber
DeleteFiber
CreateFiber
GetFileType
ConvertFiberToThread
ConvertThreadToFiber
FreeLibraryAndExitThread
GetConsoleOutputCP
SetStdHandle
GetDriveTypeW
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
SetConsoleCtrlHandler
ExitProcess
GetTimeZoneInformation
TryEnterCriticalSection
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FindFirstFileExW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetFinalPathNameByHandleW
GetExitCodeProcess
user32
MapWindowPoints
GetWindowRect
InvalidateRect
EndPaint
BeginPaint
GetDC
DrawTextW
GetSystemMetrics
EnableWindow
EnumDisplayDevicesA
SetTimer
GetWindowLongW
GetDlgItem
ShowWindow
SetWindowLongW
GetParent
LoadIconW
DestroyIcon
GetWindowThreadProcessId
MessageBoxW
SendMessageW
DefWindowProcW
GetShellWindow
TranslateAcceleratorW
LoadAcceleratorsW
DispatchMessageW
TranslateMessage
GetUserObjectInformationW
GetProcessWindowStation
LoadBitmapW
GetDlgCtrlID
PostQuitMessage
CallWindowProcW
RegisterClassW
CreateWindowExW
GetMessageW
KillTimer
DestroyWindow
gdi32
SetBkMode
SetDCPenColor
BitBlt
SelectObject
RoundRect
GetStockObject
GetDeviceCaps
DeleteObject
DeleteDC
CreateSolidBrush
CreatePatternBrush
CreateFontW
CreateCompatibleDC
CreateCompatibleBitmap
SetTextColor
SetDCBrushColor
ole32
CoInitializeEx
CoTaskMemAlloc
CoUninitialize
CoInitialize
CoTaskMemFree
CoCreateGuid
CoCreateInstance
StringFromGUID2
shlwapi
PathFindFileNameW
PathFindExtensionW
ord12
powrprof
CallNtPowerInformation
winmm
timeGetDevCaps
timeSetEvent
timeBeginPeriod
timeGetTime
Sections
.text Size: 4.4MB - Virtual size: 4.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.0MB - Virtual size: 1.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 796KB - Virtual size: 8.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 453KB - Virtual size: 452KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 194KB - Virtual size: 193KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
System.Management.Automation.dll.dll windows:4 windows x86 arch:x86
Password: 123
dae02f32a21e03ce65412f6e56942daa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
mscoree
_CorDllMain
Sections
.text Size: 344KB - Virtual size: 343KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
System.Management.Automation.xml.xml