File name:

PDE.exe

Full analysis: https://app.any.run/tasks/01e3d1ba-190d-4a72-8431-db3c1a10a267
Verdict: Malicious activity
Analysis date: April 25, 2025, 04:35:23
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
delphi
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 7 sections
MD5:

9A81ED4E8525A329145E7628F1258D86

SHA1:

93E3DE965986DA0463FAE596CB6AE7042BD18E71

SHA256:

6243D4D73E8D43DD2D4DD7DC3EF761D7C23581EE7F3D047699D894B01BC022D6

SSDEEP:

98304:+ZtTZ5K57ILxbAYL+hCitfEDZi0huZjAVmLns9xa8igv/cp2IHp8urL8Sg31fJpB:iiueN4Qt2

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads the BIOS version

      • PDE.exe (PID: 6972)
    • Read disk information to detect sandboxing environments

      • PDE.exe (PID: 6972)
    • There is functionality for taking screenshot (YARA)

      • PDE.exe (PID: 6972)
    • Reads security settings of Internet Explorer

      • PDE.exe (PID: 6972)
  • INFO

    • The sample compiled with english language support

      • PDE.exe (PID: 6972)
    • Reads the computer name

      • PDE.exe (PID: 6972)
    • Reads product name

      • PDE.exe (PID: 6972)
    • Reads Environment values

      • PDE.exe (PID: 6972)
    • Checks supported languages

      • PDE.exe (PID: 6972)
    • Compiled with Borland Delphi (YARA)

      • PDE.exe (PID: 6972)
    • Creates files or folders in the user directory

      • PDE.exe (PID: 6972)
    • Reads the machine GUID from the registry

      • PDE.exe (PID: 6972)
    • Reads the software policy settings

      • PDE.exe (PID: 6972)
    • Checks proxy server information

      • PDE.exe (PID: 6972)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | DOS Executable Generic (100)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:08:09 08:57:05+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 2.25
CodeSize: 5132800
InitializedDataSize: 1017344
UninitializedDataSize: -
EntryPoint: 0x588000
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 3.7.0.0
ProductVersionNumber: 3.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: MiTeC
FileVersion: 3.7.0.0
LegalCopyright: Copyright (c) 2001-2023, Michal Mutl
LegalTrademarks: All rights reserved
ProductVersion: 3.0.0.0
FileDescription: Paradox Data Editor
ProductName: Paradox Data Editor
OriginalFileName: PDE.exe
BuildTimestamp: 2023-08-09 10:57:06
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
131
Monitored processes
3
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start pde.exe sppextcomobj.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
4180"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6516C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
6972"C:\Users\admin\AppData\Local\Temp\PDE.exe" C:\Users\admin\AppData\Local\Temp\PDE.exe
explorer.exe
User:
admin
Company:
MiTeC
Integrity Level:
MEDIUM
Description:
Paradox Data Editor
Version:
3.7.0.0
Modules
Images
c:\users\admin\appdata\local\temp\pde.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
Total events
1 235
Read events
1 232
Write events
3
Delete events
0

Modification events

(PID) Process:(6972) PDE.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6972) PDE.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6972) PDE.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
Executable files
0
Suspicious files
4
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
6972PDE.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8B43A6A2AB31D8F6B89DCFD4FD9686D5_A6D3E6111E119F3E0C64EEB33F6DCBD5binary
MD5:745622066EC05BA621D4ED973E72A9D7
SHA256:1CEB25107EDE86D66D46C55040B9891E2B9C105344D6650DE70C05FD3B2BCAEE
6972PDE.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\RR3E01RZ\webupdate[1].htmhtml
MD5:15C7069ADFA912B62A179FAF56645842
SHA256:2F78E61B3CEF67584460E3ED7EAFF0468270F806F635E770F772AE2EE5135020
6972PDE.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\463A0CFFD55C1008D765CD90A5CA8812_7C1271CB87219CD8B2631DAEC0E1D46Abinary
MD5:2CEB4B3CEFB0C63DF6DB4DD5D566701E
SHA256:4F1A0DA456C58858573250A7C5B872011547EEA9D7558AB823936624875A8D81
6972PDE.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\463A0CFFD55C1008D765CD90A5CA8812_7C1271CB87219CD8B2631DAEC0E1D46Abinary
MD5:006C059582F658D8D36E4B8F63023ED4
SHA256:8300A63261104C8F04AD315352FD82BDAE1AE702D3CB002A6E9ECEF83E28D045
6972PDE.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8B43A6A2AB31D8F6B89DCFD4FD9686D5_A6D3E6111E119F3E0C64EEB33F6DCBD5binary
MD5:5590FCB54796CE8D8310CA006602030B
SHA256:49C129627F099AD77625EEBF4FD71621E55FEB5F765E7320838F335F3A23EF80
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
7
TCP/UDP connections
22
DNS requests
16
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.216.77.25:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
2088
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
2088
SIHClient.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6972
PDE.exe
GET
200
109.70.240.130:80
http://ocsp05.actalis.it/VA/AUTH-ROOT/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSw4x5v4bTlizjNRmTdkYSy7q0R9gQUUtiIOsifeGbtifN7OHCUyQICNtACEBJzd5ejFYht%2FrdsfmpaA1Q%3D
unknown
whitelisted
6972
PDE.exe
GET
200
109.70.240.114:80
http://ocsp06.actalis.it/VA/AUTHDV-G3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBROJtlvaAzyepGCxfu9qEfsEKGHVgQUQoNtgHwJhGf9gFer8Sb1d8gignECEH2WQqjosa7Cki748XeG2X4%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
2104
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
23.216.77.25:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
2112
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
20.190.159.2:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
184.30.131.245:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 23.216.77.25
  • 23.216.77.6
  • 23.216.77.36
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 23.219.150.101
whitelisted
google.com
  • 142.250.185.142
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.159.2
  • 40.126.31.0
  • 40.126.31.130
  • 20.190.159.130
  • 20.190.159.23
  • 40.126.31.69
  • 20.190.159.68
  • 20.190.159.71
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted
www.mitec.cz
  • 81.2.194.241
unknown

Threats

No threats detected
No debug info