Analysis Report AdobeARM.exe
Overview
General Information
Detection
Score: | 7 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 80% |
Signatures
Classification
|
Malware Configuration |
---|
No configs have been found |
---|
Yara Overview |
---|
No yara matches |
---|
Sigma Overview |
---|
No Sigma rule has matched |
---|
Signature Overview |
---|
- • Cryptography
- • Compliance
- • Spreading
- • Networking
- • System Summary
- • Data Obfuscation
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • Anti Debugging
- • HIPS / PFW / Operating System Protection Evasion
- • Language, Device and Operating System Detection
Click to jump to signature section
There are no malicious signatures, click here to show all signatures.
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Compliance: |
---|
Uses 32bit PE files |
Source: | Static PE information: |
PE / OLE file has a valid certificate |
Source: | Static PE information: |
Contains modern PE file flags such as dynamic base (ASLR) or NX |
Source: | Static PE information: |
Binary contains paths to debug symbols |
Source: | Binary string: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Code function: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Code function: |
Source: | Code function: |
Source: | File created: | Jump to behavior |
Source: | File deleted: | Jump to behavior |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Static PE information: |
Source: | Binary or memory string: |
Source: | Static PE information: |
Source: | Classification label: |
Source: | Code function: |
Source: | Code function: |
Source: | Code function: |
Source: | Code function: |
Source: | Code function: |
Source: | File created: | Jump to behavior |
Source: | File created: | Jump to behavior |
Source: | Static PE information: |
Source: | File read: | Jump to behavior |
Source: | Key opened: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Key value queried: |
Source: | File written: | Jump to behavior |
Source: | Static PE information: |
Source: | Static file information: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Static PE information: |
Source: | Binary string: |
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: | ||
Source: | Static PE information: |
Source: | Code function: |
Source: | Code function: |
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: | ||
Source: | Process information set: |
Source: | Thread sleep count: | ||
Source: | Thread sleep count: | ||
Source: | Thread sleep count: | ||
Source: | Thread sleep time: |
Source: | Last function: | ||
Source: | Last function: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Code function: |
Source: | Code function: |
Source: | Code function: |
Source: | Code function: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Code function: |
Source: | Code function: | ||
Source: | Code function: |
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: | ||
Source: | Binary or memory string: |
Source: | Code function: |
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: | ||
Source: | Code function: |
Source: | Queries volume information: |
Source: | Code function: |
Source: | Code function: |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts1 | Command and Scripting Interpreter2 | Valid Accounts1 | Valid Accounts1 | Masquerading11 | OS Credential Dumping | System Time Discovery2 | Remote Services | Archive Collected Data1 | Exfiltration Over Other Network Medium | Encrypted Channel2 | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | System Shutdown/Reboot1 |
Default Accounts | Native API1 | Boot or Logon Initialization Scripts | Access Token Manipulation11 | Valid Accounts1 | LSASS Memory | Security Software Discovery3 | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Ingress Tool Transfer1 | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Logon Script (Windows) | Process Injection1 | Virtualization/Sandbox Evasion1 | Security Account Manager | Virtualization/Sandbox Evasion1 | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Local Accounts | At (Windows) | Logon Script (Mac) | Logon Script (Mac) | Access Token Manipulation11 | NTDS | Process Discovery2 | Distributed Component Object Model | Input Capture | Scheduled Transfer | Protocol Impersonation | SIM Card Swap | Carrier Billing Fraud | |
Cloud Accounts | Cron | Network Logon Script | Network Logon Script | Process Injection1 | LSA Secrets | File and Directory Discovery3 | SSH | Keylogging | Data Transfer Size Limits | Fallback Channels | Manipulate Device Communication | Manipulate App Store Rankings or Ratings | |
Replication Through Removable Media | Launchd | Rc.common | Rc.common | Deobfuscate/Decode Files or Information1 | Cached Domain Credentials | System Information Discovery33 | VNC | GUI Input Capture | Exfiltration Over C2 Channel | Multiband Communication | Jamming or Denial of Service | Abuse Accessibility Features | |
External Remote Services | Scheduled Task | Startup Items | Startup Items | Obfuscated Files or Information2 | DCSync | Network Sniffing | Windows Remote Management | Web Portal Capture | Exfiltration Over Alternative Protocol | Commonly Used Port | Rogue Wi-Fi Access Points | Data Encrypted for Impact | |
Drive-by Compromise | Command and Scripting Interpreter | Scheduled Task/Job | Scheduled Task/Job | File Deletion1 | Proc Filesystem | Network Service Scanning | Shared Webroot | Credential API Hooking | Exfiltration Over Symmetric Encrypted Non-C2 Protocol | Application Layer Protocol | Downgrade to Insecure Protocols | Generate Fraudulent Advertising Revenue |
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.
Source | Detection | Scanner | Label | Link |
---|---|---|---|---|
0% | Virustotal | Browse | ||
0% | Metadefender | Browse | ||
0% | ReversingLabs |
No Antivirus matches |
---|
No Antivirus matches |
---|
No Antivirus matches |
---|
No Antivirus matches |
---|
No contacted domains info |
---|
No contacted IP infos |
---|
General Information |
---|
Joe Sandbox Version: | 31.0.0 Emerald |
Analysis ID: | 352178 |
Start date: | 11.02.2021 |
Start time: | 21:49:40 |
Joe Sandbox Product: | CloudBasic |
Overall analysis duration: | 0h 6m 33s |
Hypervisor based Inspection enabled: | false |
Report type: | light |
Sample file name: | AdobeARM.exe |
Cookbook file name: | default.jbs |
Analysis system description: | Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211 |
Number of analysed new started processes analysed: | 23 |
Number of new started drivers analysed: | 0 |
Number of existing processes analysed: | 0 |
Number of existing drivers analysed: | 0 |
Number of injected processes analysed: | 0 |
Technologies: |
|
Analysis Mode: | default |
Analysis stop reason: | Timeout |
Detection: | CLEAN |
Classification: | clean7.winEXE@1/3@0/0 |
EGA Information: |
|
HDC Information: |
|
HCA Information: | Failed |
Cookbook Comments: |
|
Warnings: | Show All
|
No simulations |
---|
No context |
---|
No context |
---|
No context |
---|
No context |
---|
No context |
---|
Process: | C:\Users\user\Desktop\AdobeARM.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 298 |
Entropy (8bit): | 4.957021814808006 |
Encrypted: | false |
SSDEEP: | 6:o9UK6h3VPHp0AK6cK4tBKgXWGBBXRxYACgX2K6cK4tBsFAzTuyVRax:oY3Jp0rhXWWBXRDZl/fRO |
MD5: | 48E5C748E7E293DFD2C3FCD5A9C6CDEF |
SHA1: | EA8E06C1EE5A0236573FD6D2F1CD2FA75E8E2380 |
SHA-256: | 1912947BF9181A6BEC48FB3B79224FE69C3B03D598C44602D1A3401A657B4675 |
SHA-512: | FE4FD31A34A799A98F7C88D44C796171D1AA22677741B624EB77BBF17F919001C6CCD50D15DBF8B41E190D3ADAA52095474BB55D2FF6697F13197A171F50DD60 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Users\user\Desktop\AdobeARM.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 50 |
Entropy (8bit): | 3.106830344844092 |
Encrypted: | false |
SSDEEP: | 3:Q+slgN5+lly1gw1RalBmUyv:Q+slgN5+aVclFyv |
MD5: | 3D0C316599578927472E919DD6334C12 |
SHA1: | C74579C94A08DD10E5E415AA759D5506A9C768BC |
SHA-256: | 4F3CC7F90918FEEFF2DC4DEC8C0F0D60B42FBFFBB06D2ED84D394AAAB09818AF |
SHA-512: | C76C15A10CCDAA0FBE78ECE8C20E6E6031F4FE48EEE9EF1B877DF8292C57B541F8A78AD2AC8CD3663BCC573D569A6874F79B2DB6E4850CE2AD55ADE412377AB0 |
Malicious: | false |
Reputation: | low |
Preview: |
|
Process: | C:\Users\user\Desktop\AdobeARM.exe |
File Type: | |
Category: | dropped |
Size (bytes): | 257928 |
Entropy (8bit): | 4.254716042555522 |
Encrypted: | false |
SSDEEP: | 3072:wT4DJAvCXkQqSmSgojgTaDuK1+4xKtaU/QX5Pm9vR549QHmYPCjTMNro0Jnxu4Fn:xvUzH5 |
MD5: | 864C22FB9A1C0670EDF01C6ED3E4FBE4 |
SHA1: | BF636F8BAED998A1EB4531AF9E833E6D3D8DF129 |
SHA-256: | B4D4DCD9594D372D7C0C975D80EF5802C88502895ED4B8A26CA62E225F2F18B0 |
SHA-512: | FF23616EE67D51DAA2640AE638F59A8D331930A29B98C2D1BD3B236D2F651F243F9BAE38D58515714886CFBB13B9BE721D490AAD4F2D10CBBA74D7701AB34E09 |
Malicious: | false |
Reputation: | high, very likely benign file |
Preview: |
|
Static File Info |
---|
General | |
---|---|
File type: | |
Entropy (8bit): | 6.088829702783494 |
TrID: |
|
File name: | AdobeARM.exe |
File size: | 1557200 |
MD5: | b8b96354dd88484208f17101f6704f7c |
SHA1: | 68815c39f47a0b8f766d9191e7ac55d3199d1c96 |
SHA256: | ad25d9f873a80f454ce2acbb75246463070e216c89b042ee87b9a6204dd146c0 |
SHA512: | 6ef740dea56bd0724e7f8a999ce46a2f2356aeb876bc47d127d96eb156d636c755a9f610fee7109ad4d044042c1e571bcfb88ca9402c6789edfde23073cdad32 |
SSDEEP: | 24576:o8K1tzizZMWgHWA1r+4tluCgG0XD8aMCFugvVDYb:tK19i7gHWA1r+6luCgtD8aPugvVDYb |
File Content Preview: | MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............}...}...}...|...}...|...}...|o..}...|...}y..|...}y..|...}y..|...}...|...}.k.}...}...}...}0..|...}0.)}...}..A}...}0..|... |
File Icon |
---|
Icon Hash: | cec2d252784cb46c |
General | |
---|---|
Entrypoint: | 0x468630 |
Entrypoint Section: | .text |
Digitally signed: | true |
Imagebase: | 0x400000 |
Subsystem: | windows gui |
Image File Characteristics: | 32BIT_MACHINE, EXECUTABLE_IMAGE |
DLL Characteristics: | GUARD_CF, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT |
Time Stamp: | 0x600FADC2 [Tue Jan 26 05:50:58 2021 UTC] |
TLS Callbacks: | |
CLR (.Net) Version: | |
OS Version Major: | 6 |
OS Version Minor: | 0 |
File Version Major: | 6 |
File Version Minor: | 0 |
Subsystem Version Major: | 6 |
Subsystem Version Minor: | 0 |
Import Hash: | 3764d71236dd3faa2a09f6dd43bff76f |
Signature Valid: | true |
Signature Issuer: | CN=DigiCert EV Code Signing CA (SHA2), OU=www.digicert.com, O=DigiCert Inc, C=US |
Signature Validation Error: | The operation completed successfully |
Error Number: | 0 |
Not Before, Not After |
|
Subject Chain |
|
Version: | 3 |
Thumbprint MD5: | 1ED822CC08BA08413C4A60023E0D590C |
Thumbprint SHA-1: | 5DA6AD39FC524D0D2BEC6741DFDBF67DF5AF3ECA |
Thumbprint SHA-256: | B184F0677143FFA39C7DABF083FB0B613015CEA696DFDEBA11D5CAFD4CF8B8D8 |
Serial: | 011F39A2261A993DD15176DA6FE4FBEA |
Instruction |
---|
call 00007F9BD8E096CAh |
jmp 00007F9BD8E0877Dh |
cmp ecx, dword ptr [0050E554h] |
jne 00007F9BD8E08905h |
ret |
jmp 00007F9BD8E090D3h |
int3 |
int3 |
int3 |
int3 |
int3 |
push ebp |
mov ebp, esp |
test byte ptr [ebp+08h], 00000001h |
push esi |
mov esi, ecx |
mov dword ptr [esi], 004BDDA0h |
je 00007F9BD8E0890Ch |
push 0000000Ch |
push esi |
call 00007F9BD8E0890Eh |
pop ecx |
pop ecx |
mov eax, esi |
pop esi |
pop ebp |
retn 0004h |
push ebp |
mov ebp, esp |
push dword ptr [ebp+08h] |
call 00007F9BD8DEE914h |
pop ecx |
pop ebp |
ret |
push ebp |
mov ebp, esp |
mov eax, dword ptr [ebp+08h] |
push esi |
mov ecx, dword ptr [eax+3Ch] |
add ecx, eax |
movzx eax, word ptr [ecx+14h] |
lea edx, dword ptr [ecx+18h] |
add edx, eax |
movzx eax, word ptr [ecx+06h] |
imul esi, eax, 28h |
add esi, edx |
cmp edx, esi |
je 00007F9BD8E0891Bh |
mov ecx, dword ptr [ebp+0Ch] |
cmp ecx, dword ptr [edx+0Ch] |
jc 00007F9BD8E0890Ch |
mov eax, dword ptr [edx+08h] |
add eax, dword ptr [edx+0Ch] |
cmp ecx, eax |
jc 00007F9BD8E0890Eh |
add edx, 28h |
cmp edx, esi |
jne 00007F9BD8E088ECh |
xor eax, eax |
pop esi |
pop ebp |
ret |
mov eax, edx |
jmp 00007F9BD8E088FBh |
push esi |
call 00007F9BD8E09B26h |
test eax, eax |
je 00007F9BD8E08922h |
mov eax, dword ptr fs:[00000018h] |
mov esi, 00512D2Ch |
mov edx, dword ptr [eax+04h] |
jmp 00007F9BD8E08906h |
cmp edx, eax |
je 00007F9BD8E08912h |
xor eax, eax |
mov ecx, edx |
lock cmpxchg dword ptr [esi], ecx |
test eax, eax |
jne 00007F9BD8E088F2h |
xor al, al |
pop esi |
ret |
mov al, 01h |
pop esi |
ret |
Programming Language: |
|
Name | Virtual Address | Virtual Size | Is in Section |
---|---|---|---|
IMAGE_DIRECTORY_ENTRY_EXPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IMPORT | 0x10aee8 | 0x1b8 | .rdata |
IMAGE_DIRECTORY_ENTRY_RESOURCE | 0x117000 | 0x5f1e0 | .rsrc |
IMAGE_DIRECTORY_ENTRY_EXCEPTION | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_SECURITY | 0x17a600 | 0x1cd0 | .reloc |
IMAGE_DIRECTORY_ENTRY_BASERELOC | 0x177000 | 0xc01c | .reloc |
IMAGE_DIRECTORY_ENTRY_DEBUG | 0xfa130 | 0x70 | .rdata |
IMAGE_DIRECTORY_ENTRY_COPYRIGHT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_GLOBALPTR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_TLS | 0xfa244 | 0x18 | .rdata |
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG | 0xfa1a0 | 0x40 | .rdata |
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_IAT | 0xb6000 | 0x7e4 | .rdata |
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR | 0x0 | 0x0 | |
IMAGE_DIRECTORY_ENTRY_RESERVED | 0x0 | 0x0 |
Name | Virtual Address | Virtual Size | Raw Size | Xored PE | ZLIB Complexity | File Type | Entropy | Characteristics |
---|---|---|---|---|---|---|---|---|
.text | 0x1000 | 0xb45ba | 0xb4600 | False | 0.52699454262 | data | 6.61990899628 | IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ |
.rdata | 0xb6000 | 0x579a4 | 0x57a00 | False | 0.250275833631 | data | 3.85077153908 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.data | 0x10e000 | 0x8500 | 0x2e00 | False | 0.207710597826 | data | 4.17471211638 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ |
.rsrc | 0x117000 | 0x5f1e0 | 0x5f200 | False | 0.261379968791 | data | 5.21496935275 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ |
.reloc | 0x177000 | 0xc01c | 0xc200 | False | 0.608106475515 | data | 6.63446459506 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ |
Name | RVA | Size | Type | Language | Country |
---|---|---|---|---|---|
AFX_DIALOG_LAYOUT | 0x172bc8 | 0x2 | data | English | United States |
AFX_DIALOG_LAYOUT | 0x172bb8 | 0x2 | data | English | United States |
AFX_DIALOG_LAYOUT | 0x172bc0 | 0x2 | data | English | United States |
ARM_UI_INI | 0x125e78 | 0x3ef88 | Little-endian UTF-16 Unicode text, with CRLF line terminators | English | United States |
RT_CURSOR | 0x172bd0 | 0x134 | data | English | United States |
RT_CURSOR | 0x172d08 | 0xb4 | data | English | United States |
RT_CURSOR | 0x172de8 | 0x134 | AmigaOS bitmap font | English | United States |
RT_CURSOR | 0x172f38 | 0x134 | data | English | United States |
RT_CURSOR | 0x173088 | 0x134 | data | English | United States |
RT_CURSOR | 0x1731d8 | 0x134 | data | English | United States |
RT_CURSOR | 0x173328 | 0x134 | data | English | United States |
RT_CURSOR | 0x173478 | 0x134 | data | English | United States |
RT_CURSOR | 0x1735c8 | 0x134 | data | English | United States |
RT_CURSOR | 0x173718 | 0x134 | data | English | United States |
RT_CURSOR | 0x173868 | 0x134 | data | English | United States |
RT_CURSOR | 0x1739b8 | 0x134 | data | English | United States |
RT_CURSOR | 0x173b08 | 0x134 | AmigaOS bitmap font | English | United States |
RT_CURSOR | 0x173c58 | 0x134 | data | English | United States |
RT_CURSOR | 0x173da8 | 0x134 | data | English | United States |
RT_CURSOR | 0x173ef8 | 0x134 | data | English | United States |
RT_BITMAP | 0x164e00 | 0xdd68 | data | English | United States |
RT_BITMAP | 0x174168 | 0xb8 | data | English | United States |
RT_BITMAP | 0x174220 | 0x144 | data | English | United States |
RT_ICON | 0x117ec0 | 0x24ba | PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced | English | United States |
RT_ICON | 0x11a380 | 0x4228 | dBase IV DBT of \200.DBF, blocks size 0, block length 16384, next free block index 40, next free block 16777215, next used block 16777215 | English | United States |
RT_ICON | 0x11e5a8 | 0x25a8 | dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 16777215, next used block 16777215 | English | United States |
RT_ICON | 0x120b50 | 0x10a8 | dBase IV DBT of @.DBF, block length 4096, next free block index 40, next free block 16777215, next used block 16777215 | English | United States |
RT_ICON | 0x121bf8 | 0x988 | data | English | United States |
RT_ICON | 0x122580 | 0x468 | GLS_BINARY_LSB_FIRST | English | United States |
RT_ICON | 0x122a48 | 0x25a8 | dBase IV DBT of `.DBF, block length 9216, next free block index 40, next free block 16777215, next used block 16777215 | English | United States |
RT_MENU | 0x172b68 | 0x4c | data | English | United States |
RT_DIALOG | 0x125008 | 0x11e | data | English | United States |
RT_DIALOG | 0x125128 | 0x304 | data | English | United States |
RT_DIALOG | 0x125430 | 0x264 | data | English | United States |
RT_DIALOG | 0x125698 | 0x21a | data | English | United States |
RT_DIALOG | 0x1258b8 | 0x258 | data | English | United States |
RT_DIALOG | 0x174048 | 0xe8 | data | English | United States |
RT_DIALOG | 0x174130 | 0x34 | data | English | United States |
RT_STRING | 0x174368 | 0x7e | data | English | United States |
RT_STRING | 0x1743e8 | 0x82 | data | English | United States |
RT_STRING | 0x174470 | 0x2a | data | English | United States |
RT_STRING | 0x1744a0 | 0x184 | data | English | United States |
RT_STRING | 0x174628 | 0x4ee | data | English | United States |
RT_STRING | 0x174ea8 | 0x264 | data | English | United States |
RT_STRING | 0x174bc8 | 0x2da | data | English | United States |
RT_STRING | 0x1758f0 | 0x8a | data | English | United States |
RT_STRING | 0x174b18 | 0xac | data | English | United States |
RT_STRING | 0x1757e0 | 0xde | data | English | United States |
RT_STRING | 0x175110 | 0x4a8 | data | English | United States |
RT_STRING | 0x1755b8 | 0x228 | data | English | United States |
RT_STRING | 0x1758c0 | 0x2c | data | English | United States |
RT_STRING | 0x175980 | 0x53e | data | English | United States |
RT_GROUP_CURSOR | 0x172dc0 | 0x22 | Lotus unknown worksheet or configuration, revision 0x2 | English | United States |
RT_GROUP_CURSOR | 0x1735b0 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States |
RT_GROUP_CURSOR | 0x172f20 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States |
RT_GROUP_CURSOR | 0x173460 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States |
RT_GROUP_CURSOR | 0x173310 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States |
RT_GROUP_CURSOR | 0x173c40 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States |
RT_GROUP_CURSOR | 0x1731c0 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States |
RT_GROUP_CURSOR | 0x173850 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States |
RT_GROUP_CURSOR | 0x173070 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States |
RT_GROUP_CURSOR | 0x173700 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States |
RT_GROUP_CURSOR | 0x1739a0 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States |
RT_GROUP_CURSOR | 0x173af0 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States |
RT_GROUP_CURSOR | 0x173d90 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States |
RT_GROUP_CURSOR | 0x173ee0 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States |
RT_GROUP_CURSOR | 0x174030 | 0x14 | Lotus unknown worksheet or configuration, revision 0x1 | English | United States |
RT_GROUP_ICON | 0x1229e8 | 0x5a | data | English | United States |
RT_GROUP_ICON | 0x124ff0 | 0x14 | data | English | United States |
RT_VERSION | 0x125b10 | 0x368 | data | English | United States |
RT_MANIFEST | 0x175ec0 | 0x31c | XML 1.0 document, UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators | English | United States |
DLL | Import |
---|---|
msi.dll | |
PSAPI.DLL | GetModuleBaseNameW, EnumProcessModules, EnumProcesses, GetModuleFileNameExW |
VERSION.dll | VerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW |
WININET.dll | DeleteUrlCacheEntryW, HttpQueryInfoW, InternetReadFile, InternetCrackUrlW, InternetOpenW, InternetConnectW, HttpOpenRequestW, HttpSendRequestW, InternetErrorDlg, InternetSetOptionW, InternetCloseHandle |
SensApi.dll | IsNetworkAlive |
Secur32.dll | LsaGetLogonSessionData, LsaFreeReturnBuffer |
KERNEL32.dll | GetModuleFileNameW, GetModuleHandleA, GlobalAlloc, GlobalLock, GlobalUnlock, GlobalFree, MulDiv, FlushFileBuffers, GetFullPathNameW, LockFile, UnlockFile, DuplicateHandle, LoadLibraryExW, LoadLibraryA, GetCurrentThreadId, GetVersionExW, GlobalDeleteAtom, FileTimeToLocalFileTime, FindNextFileW, SystemTimeToTzSpecificLocalTime, FileTimeToSystemTime, SetThreadPriority, LeaveCriticalSection, ResumeThread, GetPrivateProfileIntW, GlobalAddAtomW, EncodePointer, GetSystemDirectoryW, GlobalFindAtomW, CompareStringW, GetFileAttributesExW, GetFileSizeEx, GetFileTime, InitializeCriticalSection, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GlobalReAlloc, GlobalHandle, LocalReAlloc, SetErrorMode, GetLocaleInfoW, GetSystemDefaultUILanguage, EnterCriticalSection, GlobalFlags, GetUserDefaultLCID, ResetEvent, WaitForSingleObjectEx, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, OutputDebugStringA, GetCurrentProcessId, ProcessIdToSessionId, GlobalMemoryStatusEx, GetEnvironmentVariableW, GetSystemInfo, DeleteCriticalSection, DecodePointer, RaiseException, InitializeCriticalSectionEx, OpenEventW, Module32NextW, Module32FirstW, GetNativeSystemInfo, Process32NextW, GetLongPathNameW, Process32FirstW, CreateToolhelp32Snapshot, FindResourceExW, GetProcessHeap, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, HeapDestroy, lstrcmpA, lstrcmpW, LocalAlloc, GetExitCodeProcess, CreateProcessW, GetFileInformationByHandle, OpenMutexW, CreateMutexW, WideCharToMultiByte, SetCurrentDirectoryW, GetCurrentDirectoryW, FreeLibrary, SystemTimeToFileTime, SetEndOfFile, RemoveDirectoryW, GetFileSize, SetFilePointer, GetThreadLocale, GetPrivateProfileSectionNamesW, MoveFileW, WaitNamedPipeW, CreateNamedPipeW, ConnectNamedPipe, SetNamedPipeHandleState, DisconnectNamedPipe, ReadFile, LocalFree, GetUserDefaultLangID, UnmapViewOfFile, OpenFileMappingW, MapViewOfFile, FormatMessageW, GetLocalTime, GetModuleHandleW, GetVolumeInformationW, GetPrivateProfileStringW, WritePrivateProfileStringW, MoveFileExW, CreateFileW, GetCurrentThread, GetCurrentProcess, GetTempPathW, OpenProcess, CopyFileW, GetProcAddress, GetACP, LoadLibraryW, WaitForSingleObject, SetEvent, GetTickCount64, CloseHandle, CreateEventW, SetLastError, Sleep, GetThreadPriority, MultiByteToWideChar, FindClose, FindFirstFileW, DeleteFileW, lstrlenW, SetFileAttributesW, SetFileTime, WriteFile, GetLastError, InitializeCriticalSectionAndSpinCount, CreateDirectoryW, GetFileAttributesW, FindResourceW, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetStringTypeW, LCMapStringW, GetCPInfo, RtlUnwind, GetDriveTypeW, SetEnvironmentVariableW, CreateThread, ExitThread, FreeLibraryAndExitThread, GetModuleHandleExW, GetCommandLineA, GetCommandLineW, SetStdHandle, GetFileType, HeapQueryInformation, GetStdHandle, ExitProcess, GetDateFormatW, GetTimeFormatW, IsValidLocale, EnumSystemLocalesW, GetTimeZoneInformation, GetConsoleCP, GetConsoleMode, ReadConsoleW, SetFilePointerEx, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, SuspendThread, GetUserDefaultUILanguage |
USER32.dll | DestroyMenu, GetMonitorInfoW, MonitorFromWindow, WinHelpW, UnhookWindowsHookEx, GetTopWindow, GetClassNameW, GetClassLongW, PtInRect, MapWindowPoints, AdjustWindowRectEx, RemovePropW, GetPropW, SetPropW, ShowScrollBar, GetScrollPos, RedrawWindow, TrackPopupMenu, SetMenu, GetMenu, GetCapture, EndDeferWindowPos, DeferWindowPos, BeginDeferWindowPos, IsChild, IsMenu, CreateWindowExW, GetClassInfoExW, GetClassInfoW, RegisterClassW, CallWindowProcW, DefWindowProcW, GetMessageTime, GetMessagePos, CopyRect, GetSysColor, ScreenToClient, EndPaint, BeginPaint, ReleaseDC, GetDC, TabbedTextOutW, GrayStringW, DrawTextExW, DrawTextW, GetDesktopWindow, GetNextDlgTabItem, EndDialog, CreateDialogIndirectParamW, DestroyWindow, SetWindowLongW, GetWindowTextLengthW, SetFocus, GetDlgCtrlID, SetDlgItemTextW, GetSysColorBrush, ShowWindow, GetLastActivePopup, GetWindowLongW, IsWindowEnabled, CallNextHookEx, SetWindowsHookExW, ValidateRect, GetKeyState, DispatchMessageW, TranslateMessage, GetMessageW, LoadBitmapW, SetMenuItemInfoW, GetMenuCheckMarkDimensions, SetMenuItemBitmaps, EnableMenuItem, CheckMenuItem, PostQuitMessage, CharUpperW, GetMenuStringW, OffsetRect, SendDlgItemMessageA, UnregisterClassW, GetWindow, FindWindowW, ExitWindowsEx, RegisterWindowMessageW, EnumWindows, RealChildWindowFromPoint, InvalidateRect, GetWindowTextW, IsWindowVisible, GetWindowThreadProcessId, FindWindowExW, SystemParametersInfoW, SetActiveWindow, DrawAnimatedRects, SetForegroundWindow, SetMenuDefaultItem, ModifyMenuW, GetMenuItemID, GetMenuItemCount, GetSubMenu, ClientToScreen, GetCursorPos, LoadMenuW, SetCursor, DrawFocusRect, InflateRect, SetRectEmpty, GetParent, SetWindowTextW, LoadCursorW, GetActiveWindow, KillTimer, DrawIcon, GetClientRect, GetSystemMetrics, IsIconic, PeekMessageW, UpdateWindow, GetFocus, IsWindow, SetTimer, GetWindowRect, SendMessageW, LoadIconW, EnableWindow, PostMessageW, SetWindowPos, GetForegroundWindow, MessageBoxW, GetDlgItem, IsDialogMessageW |
GDI32.dll | SetMapMode, CreateBitmap, ScaleWindowExtEx, ScaleViewportExtEx, OffsetViewportOrgEx, GetDeviceCaps, DeleteDC, GetTextExtentPoint32W, SetWindowExtEx, SetViewportOrgEx, SetViewportExtEx, ExtTextOutW, TextOutW, SetTextColor, CreateFontIndirectW, GetObjectW, SetBkMode, SetBkColor, SelectObject, SaveDC, RestoreDC, RectVisible, PtVisible, GetStockObject, GetClipBox, Escape, DeleteObject |
WINSPOOL.DRV | DocumentPropertiesW, ClosePrinter, OpenPrinterW |
ADVAPI32.dll | RegEnumKeyExW, RegOpenKeyExW, RegQueryInfoKeyW, RegEnumValueW, RegCloseKey, CopySid, GetLengthSid, IsValidSid, GetSidSubAuthority, InitializeSid, GetSidLengthRequired, OpenProcessToken, RegQueryValueW, RegEnumKeyW, RegDeleteKeyW, RegFlushKey, ConvertSidToStringSidW, LookupAccountNameW, ControlService, QueryServiceStatusEx, CloseServiceHandle, OpenServiceW, OpenSCManagerW, CreateWellKnownSid, RegCreateKeyW, RegDeleteKeyExW, LookupAccountSidW, GetTokenInformation, DuplicateTokenEx, CreateProcessAsUserW, AdjustTokenPrivileges, LookupPrivilegeValueW, GetUserNameW, RegCreateKeyExW, RegQueryValueExW, RegSetValueExW, RegDeleteValueW, ConvertStringSecurityDescriptorToSecurityDescriptorW, CheckTokenMembership, DuplicateToken, OpenThreadToken |
SHELL32.dll | SHGetFolderPathW, SHCreateDirectoryExW, ShellExecuteExW, SHFileOperationW, Shell_NotifyIconW, SHAppBarMessage, ShellExecuteW |
COMCTL32.dll | _TrackMouseEvent, InitCommonControlsEx |
SHLWAPI.dll | PathIsUNCW, PathStripToRootW, PathFindExtensionW, PathFindFileNameW, SHDeleteKeyW |
ole32.dll | CoInitialize, CoUninitialize, CoTaskMemFree, CoInitializeEx, CoInitializeSecurity, CoCreateInstance, OleRun, CoCreateGuid |
OLEAUT32.dll | SysAllocString, SysFreeString, VariantClear, SysAllocStringByteLen, SysStringByteLen, VariantInit, VariantCopy, VariantChangeType, GetErrorInfo |
urlmon.dll | URLDownloadToFileW |
USERENV.dll | CreateEnvironmentBlock, UnloadUserProfile, DestroyEnvironmentBlock |
CRYPT32.dll | CryptProtectData, CryptDecodeObject, CryptMsgClose, CertCloseStore, CertFreeCertificateContext, CertGetNameStringW, CertFindCertificateInStore, CryptQueryObject, CryptUnprotectData, CryptMsgGetParam |
WINTRUST.dll | WinVerifyTrust |
OLEACC.dll | CreateStdAccessibleObject, LresultFromObject |
Description | Data |
---|---|
LegalCopyright | Copyright 2020 Adobe Inc. All rights reserved. |
InternalName | AdobeARM.exe |
FileVersion | 1.824.42.0176 |
CompanyName | Adobe Inc. |
ProductName | Adobe Reader and Acrobat Manager |
ProductVersion | 1.824.42.0176 |
FileDescription | Adobe Reader and Acrobat Manager |
OriginalFilename | AdobeARM.exe |
Translation | 0x0409 0x04e4 |
Language of compilation system | Country where language is spoken | Map |
---|---|---|
English | United States |
Network Behavior |
---|
No network behavior found |
---|
Code Manipulations |
---|
Statistics |
---|
System Behavior |
---|
Start time: | 21:50:30 |
Start date: | 11/02/2021 |
Path: | C:\Users\user\Desktop\AdobeARM.exe |
Wow64 process (32bit): | true |
Commandline: | |
Imagebase: | 0x1060000 |
File size: | 1557200 bytes |
MD5 hash: | B8B96354DD88484208F17101F6704F7C |
Has elevated privileges: | true |
Has administrator privileges: | true |
Programmed in: | C, C++ or other language |
Reputation: | low |
File Activities
Disassembly |
---|
Code Analysis |
---|