File name:

AdobeGCClient.pima

Full analysis: https://app.any.run/tasks/313262d9-c827-4129-ac21-8caf785f3ab2
Verdict: Malicious activity
Analysis date: July 14, 2025, 08:43:58
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

B370D860A5F839D6A5598560433F4A39

SHA1:

47C882D34EDD3E6B0A2DE037D180FDA41189F9BE

SHA256:

AD8C3E619214DED7EF364C01F0EFBEC5617A9D343BD8A29F1E91F04D0E2BC847

SSDEEP:

98304:TZhtiO16ec/Dz+pnMgVFZQe983mh4oFbDq5NavCyFXpBNy/r9sxUQukeLo0LlTJH:QjRE7yCVUERBOn1x

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • gccustomhook.exe (PID: 3736)
      • agshelper.exe (PID: 1984)
      • agshelper.exe (PID: 1036)
      • AGSService.exe (PID: 6260)
      • Adobe Genuine Launcher.exe (PID: 7160)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 1332)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 1332)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 1332)
    • Checks supported languages

      • gccustomhook.exe (PID: 3736)
      • agshelper.exe (PID: 1984)
      • agshelper.exe (PID: 1036)
      • AGSService.exe (PID: 6260)
      • Adobe Genuine Launcher.exe (PID: 7160)
    • Create files in a temporary directory

      • gccustomhook.exe (PID: 3736)
    • Reads the computer name

      • gccustomhook.exe (PID: 3736)
      • agshelper.exe (PID: 1984)
      • agshelper.exe (PID: 1036)
      • AGSService.exe (PID: 6260)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2017:08:23 11:51:36
ZipCRC: 0xdd3c7a8b
ZipCompressedSize: 157839
ZipUncompressedSize: 311416
ZipFileName: Adobe Genuine Launcher.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
146
Monitored processes
10
Malicious processes
1
Suspicious processes
5

Behavior graph

Click at the process to see the details
start winrar.exe gccustomhook.exe no specs agshelper.exe no specs conhost.exe no specs agshelper.exe no specs conhost.exe no specs agsservice.exe no specs conhost.exe no specs adobe genuine launcher.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
724\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeAGSService.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1036"C:\Users\admin\AppData\Local\Temp\Rar$EXa1332.47718\agshelper.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa1332.47718\agshelper.exeWinRAR.exe
User:
admin
Company:
Adobe Systems, Incorporated
Integrity Level:
MEDIUM
Description:
AGS Helper
Exit code:
0
Version:
4.4.0.652
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa1332.47718\agshelper.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\rpcrt4.dll
c:\windows\syswow64\shell32.dll
1180\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeagshelper.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1332"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\AdobeGCClient.pima.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
1984"C:\Users\admin\AppData\Local\Temp\Rar$EXa1332.47538\agshelper.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa1332.47538\agshelper.exeWinRAR.exe
User:
admin
Company:
Adobe Systems, Incorporated
Integrity Level:
MEDIUM
Description:
AGS Helper
Exit code:
0
Version:
4.4.0.652
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa1332.47538\agshelper.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\rpcrt4.dll
c:\windows\syswow64\shell32.dll
3704\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeagshelper.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3736"C:\Users\admin\AppData\Local\Temp\Rar$EXa1332.46625\customhook\gccustomhook.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa1332.46625\customhook\gccustomhook.exeWinRAR.exe
User:
admin
Company:
Adobe Systems, Incorporated
Integrity Level:
MEDIUM
Description:
Adobe GC Custom Hook
Exit code:
0
Version:
4.4.0.652
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa1332.46625\customhook\gccustomhook.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\rpcrt4.dll
c:\windows\syswow64\shell32.dll
4444\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeAdobe Genuine Launcher.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6260"C:\Users\admin\AppData\Local\Temp\Rar$EXa1332.47854\AGSService.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa1332.47854\AGSService.exeWinRAR.exe
User:
admin
Company:
Adobe Systems, Incorporated
Integrity Level:
MEDIUM
Description:
Adobe Genuine Software Integrity Service
Exit code:
0
Version:
4.4.0.652
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa1332.47854\agsservice.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\ws2_32.dll
c:\windows\syswow64\rpcrt4.dll
7160"C:\Users\admin\AppData\Local\Temp\Rar$EXa1332.48175\Adobe Genuine Launcher.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa1332.48175\Adobe Genuine Launcher.exeWinRAR.exe
User:
admin
Company:
Adobe Systems, Incorporated
Integrity Level:
MEDIUM
Description:
Adobe Genuine Launch Utility
Exit code:
0
Version:
4.4.0.652
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa1332.48175\adobe genuine launcher.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
Total events
3 558
Read events
3 549
Write events
9
Delete events
0

Modification events

(PID) Process:(1332) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(1332) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(1332) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(1332) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\AdobeGCClient.pima.zip
(PID) Process:(1332) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(1332) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(1332) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(1332) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(1332) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Viewer
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF3400000034000000F40300001D020000
Executable files
56
Suspicious files
0
Text files
11
Unknown types
0

Dropped files

PID
Process
Filename
Type
1332WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1332.47538\AdobeGCUpdater.dllexecutable
MD5:743175119AD7D1BD8D2E644AF5E035E3
SHA256:B46B21B542626A9EC5790294306CCFEF8BD804408EAE1B16DE587CDD2BB115BF
1332WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1332.46625\AdobeGCUpdater.dllexecutable
MD5:743175119AD7D1BD8D2E644AF5E035E3
SHA256:B46B21B542626A9EC5790294306CCFEF8BD804408EAE1B16DE587CDD2BB115BF
1332WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1332.47538\Adobe Genuine Launcher.exeexecutable
MD5:8B99569B72F1828C8EEE062442C88A79
SHA256:3FC4C11A1764875514F325C5C160D92E93CEBD9FBF7DE260ABE226AF6F71C333
1332WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1332.47538\adobe_caps.dllexecutable
MD5:A7F6D47426E55F4695809261D02C4958
SHA256:B1B91F6BCE976B2D93F1656FF9BB0F127BD7D66FE957C653ABB2DB04FDF00696
1332WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1332.47538\agshelper.exeexecutable
MD5:FD17012F293F21092982E66E68952E70
SHA256:80E85013FA2441849DA9FECD8819084C8DD790AF2674871E95A06FC51125BCA3
1332WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1332.46625\customhook\gccustomhook.exeexecutable
MD5:BA2131BDEA4A87FF190E568BC921AACD
SHA256:21E873CAEF2CE46A1B847EDCBB65CE35A1CABBD9D3D4E6FB8F61DEEE850A8A85
1332WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1332.46625\agshelper.exeexecutable
MD5:FD17012F293F21092982E66E68952E70
SHA256:80E85013FA2441849DA9FECD8819084C8DD790AF2674871E95A06FC51125BCA3
1332WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1332.46625\dispatchtable.xmlxml
MD5:B7ABE6BC7E8052FB65FE589109759875
SHA256:39CEACFE40CA59FA66A03B1821A845D0D1602BA8FE441BDCEAC6F8258465D6AF
1332WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1332.46625\AGSService.exeexecutable
MD5:0677F5ECD4F801403C428BBAE1286379
SHA256:55E5C62253CA4E788815E3076CEE6FA55EDFED576DAC0210F5F58D84EAD4FA35
1332WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa1332.46625\AdobeGCClient.exeexecutable
MD5:59DCB58C424EDD2011592FB7A0BB4877
SHA256:A38A7A683C5355F867B2AA239D5947C22F1BA4916B68A7EA712B062840935DF6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
21
DNS requests
15
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1268
svchost.exe
GET
200
2.16.168.124:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4320
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1268
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2512
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2512
SIHClient.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5104
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
1268
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1268
svchost.exe
2.16.168.124:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
1268
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4320
svchost.exe
40.126.31.0:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4320
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.124.78.146
  • 51.104.136.2
whitelisted
google.com
  • 142.250.186.142
whitelisted
crl.microsoft.com
  • 2.16.168.124
  • 2.16.168.114
whitelisted
www.microsoft.com
  • 95.101.149.131
  • 2.23.246.101
whitelisted
login.live.com
  • 40.126.31.0
  • 40.126.31.130
  • 40.126.31.71
  • 40.126.31.1
  • 40.126.31.67
  • 20.190.159.23
  • 20.190.159.73
  • 40.126.31.129
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
nexusrules.officeapps.live.com
  • 52.111.227.14
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted

Threats

No threats detected
No debug info