Scan Result:
x64_Acrobat.exe
Sample Information
| SHA256 | |
| Sample Name | |
| File Size |
6.1 MB 6408068 Bytes |
| First Seen |
2026-01-30 03:35 UTC+0000 6 hours, 16 minutes ago. |
General
| MIME Type | |
| MD5 Hash | |
| Architecture | x86-64 (PE32+) |
| Compile Time |
2026-01-19 09:22 1 week, 3 days ago. |
| Image Base |
0x7ff70ab00000
|
| Entry Point |
0x277100
|
PEID Signature
Microsoft_Visual_Cpp_80_DLL
File Meta Data
| Company Name | |
| File Description | |
| File Version | |
| Legal Copyright | |
| Product Name | |
| Product Version | |
| Original Filename |
Important Imports
- CreateRemoteThread
- VirtualAllocEx
- WriteProcessMemory
- UnhookWindowsHookEx
- CallNextHookEx
- OpenProcessToken
- IsDebuggerPresent
- VirtualAlloc
- CreateProcessW
- ResumeThread
- OpenProcess
- CreateToolhelp32Snapshot
- GetDesktopWindow
- GetClipboardFormatNameW
- GetClipboardData
- RegSetValueExW
- RegEnumKeyExW
- AdjustTokenPrivileges
- RegOpenKeyExW
- RegQueryInfoKeyW
- RegQueryValueExW
- RegEnumValueW
- RegCreateKeyExW
- ReadProcessMemory
- HeapAlloc
- FindResourceW
- UnhandledExceptionFilter
- VirtualQuery
- VirtualQueryEx
- GetTickCount
- GetProcAddress
- CreateNamedPipeW
- ConnectNamedPipe
Matching Rules
Matching Techniques
| Technique Name | Technique ID's | Snippet(s) | Rules(s) | OS |
|---|---|---|---|---|
| Detecting Virtual Environment Artefacts | U1332 | |||
| Kill Process | U0403 | |||
| Cryptography | U0703 E1027.m04 | |||
| Wiping or Encrypting | U0301 | |||
| OutputDebugString | U0117 B0001.016 | |||
| Parent Process Detection | U0404 | |||
| XOR Operation | U0701 E1027.m02 | |||
| Base64 | U0706 E1027.m02 | |||
| Retrieve HDD Information | U1343 |