Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
AiRoboForm.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
AiRoboForm.exe
Resource
win10v2004-20220812-en
Target
AiRoboForm.exe
Size
2.1MB
MD5
1000ce6e3253dcb7f2c32cf72f762abb
SHA1
b78cc7f3ce3e0cffcc1b91b96c83aea096210da0
SHA256
d8e019052a98774d9acf6a51a7a82f776215b87ac2485ebdc97b00240060abb5
SHA512
15f9b07d23dd82d33a4ab71fe55d36f95d3c1dec2e89c0647c16b0a188b65223713524cbedf38ba870d7ea4ef2530e6851b18bb4d0351ee7e75d06a5aeef1dd7
SSDEEP
49152:veqkiyawem1xlYz5VzI+xaHETSwnIltR/8/PBmQ0lLt8x5aw:vhWR1xy5VRTjQRkHBmpLtI
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetWindowsDirectoryA
GetTempFileNameA
lstrcmpiA
lstrlenA
CreateDirectoryA
GetFileAttributesA
LocalFree
GetProcAddress
GetModuleHandleA
LocalAlloc
CreateFileA
WriteFile
SetFilePointer
GetLocalTime
CopyFileA
Sleep
GetModuleFileNameA
RemoveDirectoryA
GetTickCount
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
FormatMessageA
GetFileSize
SetEndOfFile
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetShortPathNameA
FindClose
lstrcmpA
lstrcpyA
FindFirstFileA
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
SetLastError
SetFileTime
GetSystemTimeAsFileTime
SetStdHandle
LoadLibraryA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
IsBadCodePtr
IsBadReadPtr
IsBadWritePtr
HeapReAlloc
SetUnhandledExceptionFilter
FlushFileBuffers
GetEnvironmentVariableA
GetFileType
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
TerminateProcess
GetOEMCP
GetACP
GetCPInfo
DeleteFileA
lstrcatA
GetTempPathA
DeleteCriticalSection
HeapDestroy
InitializeCriticalSection
HeapCreate
GetVersionExA
GetSystemInfo
HeapAlloc
CreateEventA
GetLastError
FindNextFileA
CloseHandle
VirtualAlloc
VirtualFree
GetStdHandle
MultiByteToWideChar
WideCharToMultiByte
RtlUnwind
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
RaiseException
HeapFree
ExitWindowsEx
GetWindowLongA
GetParent
GetWindow
GetWindowRect
SystemParametersInfoA
GetClientRect
MapWindowPoints
SetWindowPos
SetWindowLongA
CreateDialogParamA
TranslateMessage
DispatchMessageA
PostQuitMessage
SetWindowTextA
IsWindow
GetDlgItem
SendMessageA
ShowWindow
wsprintfA
DestroyWindow
CharNextA
MessageBoxA
PeekMessageA
InitCommonControlsEx
RegDeleteValueA
RegQueryValueExA
AllocateAndInitializeSid
OpenProcessToken
GetTokenInformation
EqualSid
FreeSid
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ