Extended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
Static task
static1
Behavioral task
behavioral1
Sample
AcroRd32.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
AcroRd32.exe
Resource
win10v2004-20220812-en
Target
AcroRd32.exe
Size
3.1MB
MD5
fb083acd60fe5c3156dc25442be815e3
SHA1
61df59b8f3ebd8b3d29ca3aedc4995e23cacf6d8
SHA256
f130b3789962d5c8b59aa250d6f26ad5945928f3905b32bf65aa7bd30348a794
SHA512
7147337d2c1006bb15cfa967c9eea6826b63c8d343f866e7454d7368d25019f39e52cf179500810834244c3ca9644d6c0df0b2c3128a9051e9ee6b428fa926f6
SSDEEP
49152:0bXsPNIULkmp1/j6AeXZG7wmpvGF1IP9z5WuHC4O8b8ITDnl27PLhp:0bXsPN5kiQaZ56
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageCodeSigning
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
SERIALNUMBER=2748129,CN=Adobe Inc.,OU=Acrobat DC,O=Adobe Inc.,L=San Jose,ST=ca,C=US,2.5.4.15=#131450726976617465204f7267616e697a6174696f6e,1.3.6.1.4.1.311.60.2.1.2=#130844656c6177617265,1.3.6.1.4.1.311.60.2.1.3=#13025553
CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1,O=DigiCert\, Inc.,C=US
CN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=US
SERIALNUMBER=2748129,CN=Adobe Inc.,OU=Acrobat DC,O=Adobe Inc.,L=San Jose,ST=ca,C=US,2.5.4.15=#131450726976617465204f7267616e697a6174696f6e,1.3.6.1.4.1.311.60.2.1.2=#130844656c6177617265,1.3.6.1.4.1.311.60.2.1.3=#13025553
CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1,O=DigiCert\, Inc.,C=US
CN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=US
CN=DigiCert Assured ID Root CA,OU=www.digicert.com,O=DigiCert Inc,C=US
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
GetFinalPathNameByHandleW
SetFilePointer
GetSystemInfo
VirtualQueryEx
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
LoadLibraryExA
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
WideCharToMultiByte
FindResourceExW
LockResource
SetErrorMode
QueryPerformanceCounter
HeapSetInformation
ReleaseSemaphore
WaitForMultipleObjects
CreateSemaphoreW
CreateProcessW
GetSystemTime
GetSystemTimeAsFileTime
AddAtomW
SystemTimeToFileTime
GlobalAlloc
GlobalUnlock
GlobalLock
GlobalFree
MulDiv
IsProcessorFeaturePresent
GetVersionExW
UpdateProcThreadAttribute
GetFileAttributesA
InitializeProcThreadAttributeList
FindNextFileA
FindFirstFileA
CreateFileA
GetSystemPowerStatus
GetModuleFileNameA
TerminateThread
SetThreadPriority
GetCurrentThread
CreateEventA
OpenProcess
lstrcmpW
lstrcmpA
GetSystemDirectoryW
OutputDebugStringW
QueryDosDeviceW
GetFileAttributesW
FindNextFileW
FindFirstFileW
FindClose
GetCurrentDirectoryW
MultiByteToWideChar
SetDllDirectoryW
LoadLibraryW
LoadLibraryA
FindResourceW
SizeofResource
LoadResource
LoadLibraryExW
GetModuleHandleA
GetModuleFileNameW
FreeLibrary
GetExitCodeProcess
InitializeCriticalSectionEx
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
RaiseException
DecodePointer
OutputDebugStringA
GetLongPathNameW
SetCurrentDirectoryW
GetCommandLineW
GetTickCount
Sleep
OpenMutexW
WriteConsoleW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
GetTimeZoneInformation
ReadConsoleW
EnumSystemLocalesW
IsValidLocale
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetStdHandle
ExitProcess
SetStdHandle
GetConsoleMode
GetConsoleCP
FreeLibraryAndExitThread
RtlUnwind
VirtualAlloc
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
GetLocaleInfoEx
GetCPInfo
CompareStringEx
GetVolumeInformationW
GetModuleHandleW
CreateThread
CreateEventW
CreateMutexW
WaitForSingleObject
ResetEvent
SetEvent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
WaitNamedPipeW
CreateNamedPipeW
TransactNamedPipe
SetNamedPipeHandleState
DisconnectNamedPipe
ConnectNamedPipe
SetLastError
WriteFile
ReadFile
GetFileType
CreateFileW
GetStartupInfoW
lstrlenW
GetCurrentProcessId
GetCurrentProcess
GetTempPathW
CreateDirectoryW
FreeEnvironmentStringsW
GetEnvironmentStringsW
VerifyVersionInfoW
lstrcmpiW
LocalFree
LocalAlloc
GetCurrentThreadId
GetLastError
CloseHandle
VerSetConditionMask
GetProcAddress
DeleteProcThreadAttributeList
LCMapStringEx
EncodePointer
CloseThreadpoolWork
SubmitThreadpoolWork
CreateThreadpoolWork
FreeLibraryWhenCallbackReturns
InitOnceComplete
InitOnceBeginInitialize
GetStringTypeW
SleepConditionVariableSRW
SleepConditionVariableCS
WakeAllConditionVariable
WakeConditionVariable
InitializeConditionVariable
TryEnterCriticalSection
InitializeSRWLock
QueryFullProcessImageNameW
GlobalHandle
WaitForSingleObjectEx
GlobalSize
CreateDirectoryExW
GetComputerNameExW
OpenEventW
VirtualProtect
VirtualQuery
DeleteFileW
GetFileSizeEx
GetLocalTime
GetProcessId
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
DuplicateHandle
GetProcessTimes
TerminateProcess
ExpandEnvironmentStringsW
ProcessIdToSessionId
GetNativeSystemInfo
GetProductInfo
IsWow64Process
GetCPInfoExW
ReleaseSRWLockExclusive
GetThreadPriority
GetThreadId
QueryPerformanceFrequency
QueryThreadCycleTime
UnregisterWaitEx
RegisterWaitForSingleObject
GetUserDefaultLangID
AcquireSRWLockExclusive
TlsGetValue
GetFileAttributesExW
MoveFileExW
TlsAlloc
TlsSetValue
TlsFree
FlushFileBuffers
GetFileInformationByHandle
SetEndOfFile
SetFilePointerEx
FindFirstFileExW
GetWindowsDirectoryW
lstrcmpiA
GetEnvironmentVariableW
SetEnvironmentVariableW
GetLocaleInfoW
GetDriveTypeW
GetFileSize
GetVolumeInformationByHandleW
GetVolumeNameForVolumeMountPointW
GetVolumePathNamesForVolumeNameW
DeviceIoControl
VirtualAllocEx
VirtualProtectEx
ReadProcessMemory
WriteProcessMemory
VirtualFreeEx
GetProfileStringW
CreateIoCompletionPort
GetQueuedCompletionStatus
PostQueuedCompletionStatus
TerminateJobObject
SetInformationJobObject
UnregisterWait
ResumeThread
IsProcessInJob
QueryInformationJobObject
DebugBreak
GetUserDefaultLCID
GetUserDefaultLocaleName
SetProcessDEPPolicy
AssignProcessToJobObject
SetHandleInformation
SignalObjectAndWait
CreateJobObjectW
CreateRemoteThread
VirtualFree
ExitThread
SearchPathW
GetModuleHandleExA
GetTempFileNameW
CompareFileTime
GetFileTime
GetFullPathNameW
GetExitCodeThread
GetModuleHandleExW
CreateWindowStationW
CreateDesktopW
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
GetClassNameW
GetParent
SetProcessWindowStation
RemovePropW
GetPropW
SetPropW
GetActiveWindow
GetDlgItem
SendMessageW
GetPropA
MessageBoxW
GetProcessWindowStation
ReleaseDC
GetDC
MsgWaitForMultipleObjects
RegisterClipboardFormatW
PeekMessageW
DispatchMessageW
DdeDisconnect
DdeConnect
DdeAddData
DdeCreateDataHandle
DdeGetData
EnumThreadWindows
IsWindowVisible
DdeFreeStringHandle
DdeCreateStringHandleW
DdeNameService
DdeUninitialize
DdeInitializeW
SetWindowLongW
ShowWindow
SendNotifyMessageW
RegisterWindowMessageA
CloseDesktop
SetThreadDesktop
OpenInputDesktop
CreateWindowExW
RegisterClassExW
DefWindowProcW
PostMessageW
RegisterWindowMessageW
LoadIconA
LoadCursorA
GetThreadDesktop
PostThreadMessageW
IsWindowEnabled
AllowSetForegroundWindow
CloseWindowStation
GetFocus
RegisterClassW
SetDlgItemTextW
GetAsyncKeyState
EnableWindow
SetActiveWindow
GetWindowTextLengthW
EnumChildWindows
FindWindowExW
CreateIconFromResourceEx
MonitorFromWindow
GetMonitorInfoW
GetWindowInfo
GetAncestor
GetRawInputDeviceInfoW
GetRawInputDeviceList
DdeClientTransaction
SendDlgItemMessageW
LoadIconW
LoadCursorW
OpenClipboard
CloseClipboard
GetClipboardSequenceNumber
GetClipboardOwner
GetClipboardViewer
SetClipboardData
GetClipboardData
CountClipboardFormats
EnumClipboardFormats
GetClipboardFormatNameA
GetClipboardFormatNameW
EmptyClipboard
IsClipboardFormatAvailable
GetPriorityClipboardFormat
GetOpenClipboardWindow
CloseWindow
GetMessageW
GetWindowDC
BeginPaint
EndPaint
SystemParametersInfoW
SetFocus
CallWindowProcW
GetClassInfoExW
IsChild
MoveWindow
CreateDialogIndirectParamW
SetCapture
ReleaseCapture
CreateAcceleratorTableW
DestroyAcceleratorTable
InvalidateRect
InvalidateRgn
RedrawWindow
GetClientRect
SetWindowContextHelpId
SetCursor
ClientToScreen
ScreenToClient
MapWindowPoints
GetSysColor
FillRect
LoadBitmapW
IsDialogMessageW
MapDialogRect
UpdateWindow
SetRect
IsRectEmpty
FindWindowA
KillTimer
SetTimer
DestroyWindow
CreateWindowExA
RegisterClassExA
UnregisterClassA
PostQuitMessage
DefWindowProcA
DispatchMessageA
TranslateMessage
GetMessageA
UserHandleGrantAccess
GetWindow
EnumWindows
SetParent
GetWindowLongW
GetWindowTextW
IsWindow
FindWindowW
GetDesktopWindow
GetWindowRect
SetForegroundWindow
GetSystemMetrics
BringWindowToTop
SetWindowPos
SendMessageTimeoutW
EnumDesktopWindows
GetGUIThreadInfo
GetWindowThreadProcessId
SetWindowTextW
GetForegroundWindow
CharNextW
EndDialog
DialogBoxParamW
UnregisterClassW
GetUserObjectInformationW
CryptGenKey
RegGetValueW
RegOpenKeyExA
RegQueryValueA
RegQueryValueExA
RegOpenKeyA
EqualSid
AllocateAndInitializeSid
RegSetValueExW
RegQueryInfoKeyW
RegEnumKeyExW
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyExW
RegCreateKeyW
ReportEventW
RegisterEventSourceW
CloseEventLog
ConvertSidToStringSidW
LookupPrivilegeValueW
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertStringSidToSidW
SetSecurityInfo
GetSecurityInfo
SetEntriesInAclW
SetTokenInformation
GetSecurityDescriptorSacl
GetLengthSid
FreeSid
DuplicateTokenEx
CreateWellKnownSid
CopySid
GetTokenInformation
GetSidSubAuthorityCount
GetSidSubAuthority
OpenProcessToken
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegDeleteKeyExW
RegEnumValueW
RegNotifyChangeKeyValue
SystemFunction036
OpenThreadToken
AccessCheck
InitializeAcl
InitializeSecurityDescriptor
MapGenericMask
SetSecurityDescriptorDacl
GetNamedSecurityInfoW
GetAce
GetKernelObjectSecurity
SetKernelObjectSecurity
InitializeSid
AddAce
GetAclInformation
RevertToSelf
RegDisablePredefinedCache
CreateRestrictedToken
DuplicateToken
CreateProcessAsUserW
SetThreadToken
CheckTokenMembership
RegDeleteTreeW
SaferiIsExecutableFileType
CryptAcquireContextA
CryptAcquireContextW
CryptReleaseContext
CryptDestroyKey
CryptSetKeyParam
CryptSetHashParam
CryptGetHashParam
CryptSetProvParam
CryptGetProvParam
CryptGenRandom
CryptGetUserKey
CryptImportKey
CryptDecrypt
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptSignHashA
CryptSignHashW
CryptContextAddRef
ImpersonateAnonymousToken
GetUserNameW
UrlIsW
PathCanonicalizeW
PathRemoveBackslashW
PathAppendW
PathFileExistsW
PathRemoveFileSpecW
PathFindExtensionA
PathCombineW
PathFindExtensionW
PathIsRelativeW
PathIsDirectoryW
UrlGetPartW
AssocQueryStringW
PathAddBackslashW
PathFindFileNameW
PathIsUNCW
UrlUnescapeW
ord219
PathIsUNCServerShareW
UrlCanonicalizeW
PathCreateFromUrlW
PathIsURLW
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
WinHttpSetStatusCallback
WinHttpOpen
WinHttpCloseHandle
WinHttpConnect
WinHttpReadData
WinHttpQueryDataAvailable
WinHttpSetTimeouts
WinHttpOpenRequest
WinHttpAddRequestHeaders
WinHttpSendRequest
WinHttpSetCredentials
WinHttpReceiveResponse
WinHttpQueryHeaders
AcroRd32IsBrokerProcess
GetHandleVerifier
GetWinstaDesktopInfo
IsSandboxedProcess
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ