Extended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
AiRoboForm_US.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
AiRoboForm_US.exe
Resource
win10v2004-20220812-en
Target
AiRoboForm_US.exe
Size
2.1MB
MD5
b95c736ff01420f00d4c9a576214cf0e
SHA1
52ced0620affbcf4c1119d943d39d0977ca79a59
SHA256
dfe74504d8c0d55876a14e32e597e19eaebf53de7e5cabeb38257b5ad8c869d7
SHA512
36b212584849e71e5930429a4e09842bd394a2219275114a2dc2653f2815eaf9bc07c5d37b3800364b97a77af12704df0b4667d4aaf373a812dfc4f3780c6291
SSDEEP
49152:vPX9THs1daX1mdZDI0XYxaiWMlijTzP0nDQ:vv9I1daYdZDI0IxnWdrd
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
ExtKeyUsageMicrosoftCommercialCodeSigning
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageContentCommitment
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
GetWindowsDirectoryA
GetTempFileNameA
lstrcmpiA
lstrlenA
CreateDirectoryA
GetFileAttributesA
LocalFree
GetProcAddress
GetModuleHandleA
LocalAlloc
CreateFileA
WriteFile
SetFilePointer
GetLocalTime
CopyFileA
Sleep
GetModuleFileNameA
RemoveDirectoryA
GetTickCount
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
FormatMessageA
GetFileSize
SetEndOfFile
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetShortPathNameA
FindClose
lstrcmpA
lstrcpyA
FindFirstFileA
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
SetLastError
SetFileTime
GetSystemTimeAsFileTime
SetStdHandle
LoadLibraryA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
IsBadCodePtr
IsBadReadPtr
IsBadWritePtr
HeapReAlloc
SetUnhandledExceptionFilter
FlushFileBuffers
GetEnvironmentVariableA
GetFileType
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
TerminateProcess
GetOEMCP
GetACP
GetCPInfo
DeleteFileA
lstrcatA
GetTempPathA
DeleteCriticalSection
HeapDestroy
InitializeCriticalSection
HeapCreate
GetVersionExA
GetSystemInfo
HeapAlloc
CreateEventA
GetLastError
FindNextFileA
CloseHandle
VirtualAlloc
VirtualFree
GetStdHandle
MultiByteToWideChar
WideCharToMultiByte
RtlUnwind
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
RaiseException
HeapFree
ExitWindowsEx
GetWindowLongA
GetParent
GetWindow
GetWindowRect
SystemParametersInfoA
GetClientRect
MapWindowPoints
SetWindowPos
SetWindowLongA
CreateDialogParamA
TranslateMessage
DispatchMessageA
PostQuitMessage
SetWindowTextA
IsWindow
GetDlgItem
SendMessageA
ShowWindow
wsprintfA
DestroyWindow
CharNextA
MessageBoxA
PeekMessageA
InitCommonControlsEx
RegDeleteValueA
RegQueryValueExA
AllocateAndInitializeSid
OpenProcessToken
GetTokenInformation
EqualSid
FreeSid
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ