URL:

https://download.wondershare.net/inst/pdfelement-pro_setup_full5261.exe

Full analysis: https://app.any.run/tasks/5b4d5592-3e37-4100-a9f5-03ca27c9e7cc
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: September 03, 2024, 12:54:40
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
loader
themida
Indicators:
MD5:

6A2EE03274E7D28F8099F844FBA86556

SHA1:

84000FB982122BBF59D200A0BB6B4F5665ECDB54

SHA256:

8233A93E4BE0E168BE7A215E2CA0C842B35AC9FF5D7E24893928C9490DAF02C1

SSDEEP:

3:N8SElIQLLzDM6nW+IIYJn:2SKIQLFW/Iyn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Scans artifacts that could help determine the target

      • pdfelement-pro_setup_full5261.exe (PID: 7088)
    • Registers / Runs the DLL via REGSVR32.EXE

      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
    • Create files in the Startup directory

      • PEToolDeployment.exe (PID: 6856)
      • PEToolDeployment.exe (PID: 6992)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • pdfelement-pro_setup_full5261.exe (PID: 7088)
      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
      • RegAsm.exe (PID: 4772)
      • RegAsm.exe (PID: 4284)
      • PEToolDeployment.exe (PID: 6856)
      • PEToolDeployment.exe (PID: 6992)
      • PEToolDeployment.exe (PID: 6644)
      • PEToolDeployment.exe (PID: 2328)
      • RegAsm.exe (PID: 6816)
      • RegAsm.exe (PID: 4576)
      • PDFelement.exe (PID: 6868)
    • Reads Microsoft Outlook installation path

      • pdfelement-pro_setup_full5261.exe (PID: 7088)
    • Reads Internet Explorer settings

      • pdfelement-pro_setup_full5261.exe (PID: 7088)
      • PDFelement.exe (PID: 6868)
    • Checks Windows Trust Settings

      • pdfelement-pro_setup_full5261.exe (PID: 7088)
    • Potential Corporate Privacy Violation

      • pdfelement-pro_setup_full5261.exe (PID: 7088)
    • Connects to unusual port

      • pdfelement-pro_setup_full5261.exe (PID: 7088)
      • PENotify.exe (PID: 5816)
      • PDFelement.exe (PID: 6868)
    • Process requests binary or script from the Internet

      • pdfelement-pro_setup_full5261.exe (PID: 7088)
      • PDFelement.exe (PID: 6868)
    • Reads the date of Windows installation

      • pdfelement-pro_setup_full5261.exe (PID: 7088)
      • PEToolDeployment.exe (PID: 6856)
      • PEToolDeployment.exe (PID: 6992)
      • PEToolDeployment.exe (PID: 6644)
      • PEToolDeployment.exe (PID: 2328)
      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
      • PDFelement.exe (PID: 6868)
    • Likely accesses (executes) a file from the Public directory

      • pdfelement-pro_64bit_full5261.exe (PID: 2904)
      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
    • Executable content was dropped or overwritten

      • pdfelement-pro_64bit_full5261.exe (PID: 2904)
      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
      • PEOfficeAddIn4.exe (PID: 4196)
      • WSPrtSetup.exe (PID: 2468)
      • PEShellContextMenu4.exe (PID: 6204)
    • Reads the Windows owner or organization settings

      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
    • Process drops legitimate windows executable

      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
      • WSPrtSetup.exe (PID: 2468)
    • The process drops C-runtime libraries

      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
    • Searches for installed software

      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
    • Drops 7-zip archiver for unpacking

      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
    • Creates/Modifies COM task schedule object

      • RegAsm.exe (PID: 4772)
      • RegAsm.exe (PID: 4284)
      • PEShellContextMenu4.exe (PID: 2636)
      • regsvr32.exe (PID: 2400)
      • RegAsm.exe (PID: 6816)
      • RegAsm.exe (PID: 4576)
    • Starts itself from another location

      • PEShellContextMenu4.exe (PID: 6204)
    • Starts SC.EXE for service management

      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
    • Explorer used for Indirect Command Execution

      • explorer.exe (PID: 4576)
      • explorer.exe (PID: 6892)
    • Reads the BIOS version

      • PDFelement.exe (PID: 6868)
  • INFO

    • Reads Microsoft Office registry keys

      • chrome.exe (PID: 5284)
      • PEOfficeAddIn4.exe (PID: 4196)
    • The process uses the downloaded file

      • chrome.exe (PID: 3352)
      • chrome.exe (PID: 5284)
      • pdfelement-pro_setup_full5261.exe (PID: 7088)
      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
      • RegAsm.exe (PID: 4772)
      • RegAsm.exe (PID: 4284)
      • PEToolDeployment.exe (PID: 6856)
      • PEToolDeployment.exe (PID: 6992)
      • explorer.exe (PID: 5740)
      • explorer.exe (PID: 1060)
      • PEToolDeployment.exe (PID: 6644)
      • PEToolDeployment.exe (PID: 2328)
      • RegAsm.exe (PID: 6816)
      • RegAsm.exe (PID: 4576)
      • explorer.exe (PID: 400)
      • PDFelement.exe (PID: 6868)
    • Checks supported languages

      • pdfelement-pro_setup_full5261.exe (PID: 7088)
      • PEPreviewDeployment.exe (PID: 5816)
      • pdfelement-pro_64bit_full5261.exe (PID: 2904)
      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
      • PEToolDeployment.exe (PID: 6576)
      • _setup64.tmp (PID: 4016)
      • RegAsm.exe (PID: 4772)
      • zip.exe (PID: 4316)
      • zip.exe (PID: 6412)
      • PEOfficeAddIn4.exe (PID: 4196)
      • PEShellContextMenu4.exe (PID: 6204)
      • RegAsm.exe (PID: 4284)
      • PEShellContextMenu4.exe (PID: 2636)
      • FileAssociation.exe (PID: 3648)
      • WSPrtSetup.exe (PID: 2468)
      • PEToolDeployment.exe (PID: 6856)
      • PEToolDeployment.exe (PID: 6992)
      • PEToolDeploymentExtend.exe (PID: 6364)
      • PEToolDeployment.exe (PID: 6644)
      • PEToolDeployment.exe (PID: 2328)
      • PENotify.exe (PID: 3376)
      • PENotify.exe (PID: 5816)
      • PEPreviewDeployment.exe (PID: 6336)
      • RegAsm.exe (PID: 6816)
      • RegAsm.exe (PID: 4576)
      • fontlistsave.exe (PID: 7072)
      • PDFelement.exe (PID: 6868)
      • PEPreviewDeployment.exe (PID: 6104)
      • zip.exe (PID: 1432)
    • Executable content was dropped or overwritten

      • chrome.exe (PID: 5284)
    • Reads the machine GUID from the registry

      • pdfelement-pro_setup_full5261.exe (PID: 7088)
      • PEPreviewDeployment.exe (PID: 5816)
      • PEToolDeployment.exe (PID: 6576)
      • RegAsm.exe (PID: 4772)
      • PEOfficeAddIn4.exe (PID: 4196)
      • PEShellContextMenu4.exe (PID: 6204)
      • RegAsm.exe (PID: 4284)
      • PEShellContextMenu4.exe (PID: 2636)
      • FileAssociation.exe (PID: 3648)
      • PEToolDeployment.exe (PID: 6856)
      • PEToolDeployment.exe (PID: 6992)
      • PEToolDeploymentExtend.exe (PID: 6364)
      • PEToolDeployment.exe (PID: 6644)
      • PEToolDeployment.exe (PID: 2328)
      • PENotify.exe (PID: 5816)
      • PENotify.exe (PID: 3376)
      • PEPreviewDeployment.exe (PID: 6336)
      • RegAsm.exe (PID: 4576)
      • RegAsm.exe (PID: 6816)
      • PEPreviewDeployment.exe (PID: 6104)
      • PDFelement.exe (PID: 6868)
    • Create files in a temporary directory

      • pdfelement-pro_setup_full5261.exe (PID: 7088)
      • pdfelement-pro_64bit_full5261.exe (PID: 2904)
      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
      • PEToolDeployment.exe (PID: 6856)
      • PEToolDeployment.exe (PID: 6992)
      • PDFelement.exe (PID: 6868)
      • zip.exe (PID: 1432)
    • Reads the computer name

      • pdfelement-pro_setup_full5261.exe (PID: 7088)
      • PEPreviewDeployment.exe (PID: 5816)
      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
      • PEToolDeployment.exe (PID: 6576)
      • PEOfficeAddIn4.exe (PID: 4196)
      • RegAsm.exe (PID: 4772)
      • PEShellContextMenu4.exe (PID: 6204)
      • RegAsm.exe (PID: 4284)
      • PEShellContextMenu4.exe (PID: 2636)
      • FileAssociation.exe (PID: 3648)
      • WSPrtSetup.exe (PID: 2468)
      • PEToolDeployment.exe (PID: 6856)
      • PEToolDeployment.exe (PID: 6992)
      • PEToolDeploymentExtend.exe (PID: 6364)
      • PEToolDeployment.exe (PID: 6644)
      • PEToolDeployment.exe (PID: 2328)
      • PENotify.exe (PID: 3376)
      • PENotify.exe (PID: 5816)
      • RegAsm.exe (PID: 6816)
      • RegAsm.exe (PID: 4576)
      • PEPreviewDeployment.exe (PID: 6336)
      • PEPreviewDeployment.exe (PID: 6104)
      • PDFelement.exe (PID: 6868)
    • Checks proxy server information

      • pdfelement-pro_setup_full5261.exe (PID: 7088)
      • slui.exe (PID: 6192)
      • PEToolDeploymentExtend.exe (PID: 6364)
      • PENotify.exe (PID: 5816)
      • PDFelement.exe (PID: 6868)
    • Process checks Internet Explorer phishing filters

      • pdfelement-pro_setup_full5261.exe (PID: 7088)
    • Creates files in the program directory

      • pdfelement-pro_setup_full5261.exe (PID: 7088)
      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
      • PEOfficeAddIn4.exe (PID: 4196)
      • zip.exe (PID: 4316)
      • zip.exe (PID: 6412)
      • PEShellContextMenu4.exe (PID: 6204)
      • PEToolDeployment.exe (PID: 6856)
      • PEToolDeployment.exe (PID: 6992)
      • PDFelement.exe (PID: 6868)
    • Reads the software policy settings

      • pdfelement-pro_setup_full5261.exe (PID: 7088)
      • slui.exe (PID: 6208)
      • slui.exe (PID: 6192)
      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
      • PENotify.exe (PID: 5816)
      • PDFelement.exe (PID: 6868)
    • Creates files or folders in the user directory

      • pdfelement-pro_setup_full5261.exe (PID: 7088)
      • PEToolDeployment.exe (PID: 6576)
      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
      • PEPreviewDeployment.exe (PID: 5816)
      • WSPrtSetup.exe (PID: 2468)
      • PEShellContextMenu4.exe (PID: 6204)
      • regsvr32.exe (PID: 2400)
      • PEToolDeployment.exe (PID: 6856)
      • PEToolDeployment.exe (PID: 6992)
      • PEToolDeploymentExtend.exe (PID: 6364)
      • PEToolDeployment.exe (PID: 2328)
      • PENotify.exe (PID: 5816)
      • PEToolDeployment.exe (PID: 6644)
      • PEPreviewDeployment.exe (PID: 6336)
      • PEPreviewDeployment.exe (PID: 6104)
      • fontlistsave.exe (PID: 7072)
      • PDFelement.exe (PID: 6868)
    • Application launched itself

      • chrome.exe (PID: 5284)
      • chrome.exe (PID: 6628)
    • Process checks computer location settings

      • pdfelement-pro_setup_full5261.exe (PID: 7088)
      • PEToolDeployment.exe (PID: 6856)
      • PEToolDeployment.exe (PID: 6992)
      • PEToolDeployment.exe (PID: 6644)
      • PEToolDeployment.exe (PID: 2328)
      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
      • PDFelement.exe (PID: 6868)
    • Creates a software uninstall entry

      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
    • Reads security settings of Internet Explorer

      • explorer.exe (PID: 5740)
      • explorer.exe (PID: 1060)
      • explorer.exe (PID: 400)
    • Reads Environment values

      • PEToolDeploymentExtend.exe (PID: 6364)
      • PENotify.exe (PID: 5816)
      • PDFelement.exe (PID: 6868)
    • Disables trace logs

      • PEToolDeploymentExtend.exe (PID: 6364)
      • PENotify.exe (PID: 5816)
      • PDFelement.exe (PID: 6868)
    • Reads the time zone

      • PENotify.exe (PID: 5816)
      • PDFelement.exe (PID: 6868)
    • Connects to unusual port

      • chrome.exe (PID: 5708)
    • Themida protector has been detected

      • PDFelement.exe (PID: 6868)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
227
Monitored processes
89
Malicious processes
9
Suspicious processes
7

Behavior graph

Click at the process to see the details
start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs pdfelement-pro_setup_full5261.exe no specs pdfelement-pro_setup_full5261.exe svchost.exe sppextcomobj.exe no specs slui.exe chrome.exe no specs slui.exe chrome.exe no specs pdfelement-pro_64bit_full5261.exe pdfelement-pro_64bit_full5261.tmp petooldeployment.exe pepreviewdeployment.exe conhost.exe no specs _setup64.tmp no specs conhost.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs zip.exe no specs conhost.exe no specs zip.exe no specs conhost.exe no specs peofficeaddin4.exe conhost.exe no specs regasm.exe no specs conhost.exe no specs regasm.exe no specs conhost.exe no specs peshellcontextmenu4.exe conhost.exe no specs peshellcontextmenu4.exe no specs conhost.exe no specs fileassociation.exe no specs conhost.exe no specs wsprtsetup.exe sc.exe no specs conhost.exe no specs regsvr32.exe no specs petooldeployment.exe explorer.exe no specs petooldeployment.exe explorer.exe no specs explorer.exe no specs petooldeploymentextend.exe explorer.exe no specs petooldeployment.exe petooldeployment.exe penotify.exe penotify.exe pepreviewdeployment.exe conhost.exe no specs regasm.exe conhost.exe no specs regasm.exe conhost.exe no specs pepreviewdeployment.exe conhost.exe no specs fontlistsave.exe no specs conhost.exe no specs chrome.exe no specs chrome.exe no specs explorer.exe no specs chrome.exe no specs chrome.exe no specs explorer.exe no specs chrome.exe no specs chrome.exe no specs THREAT pdfelement.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs zip.exe no specs conhost.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
236\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeFileAssociation.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
400C:\WINDOWS\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -EmbeddingC:\Windows\explorer.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\shcore.dll
608"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=3148 --field-trial-handle=1924,i,14297258177860011425,9629259037999690907,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
644"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=5148 --field-trial-handle=1924,i,14297258177860011425,9629259037999690907,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1020"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=5348 --field-trial-handle=1924,i,14297258177860011425,9629259037999690907,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1060C:\WINDOWS\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -EmbeddingC:\Windows\explorer.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\shcore.dll
1084\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exePEPreviewDeployment.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1432"C:\Program Files\Wondershare\PDFelement11\zip.exe" x -y -o"C:\Users\admin\AppData\Local\Temp\60e8281d-1098-4129-8440-ec4f07139555" "C:\Users\admin\AppData\Roaming\Wondershare\PDFelement11\Temp\WhatsNew\eng\Pictures\UpdatePicture.7z"C:\Program Files\Wondershare\PDFelement11\zip.exePDFelement.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
MEDIUM
Description:
7-Zip 独立命令行
Exit code:
0
Version:
9.20
Modules
Images
c:\program files\wondershare\pdfelement11\zip.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
1948"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=5584 --field-trial-handle=1924,i,14297258177860011425,9629259037999690907,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
2208"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=122.0.6261.70 --initial-client-data=0x210,0x214,0x218,0x1ec,0x21c,0x7fffd300dc40,0x7fffd300dc4c,0x7fffd300dc58C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
Total events
48 788
Read events
48 222
Write events
549
Delete events
17

Modification events

(PID) Process:(5284) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(5284) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(5284) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(5284) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(5284) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(5284) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(5284) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(5284) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(5284) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(5284) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:metricsid
Value:
Executable files
266
Suspicious files
583
Text files
341
Unknown types
290

Dropped files

PID
Process
Filename
Type
5284chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
5284chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
5284chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
5284chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RF12af72.TMP
MD5:
SHA256:
5284chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
5284chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\chrome_cart_db\LOG.old
MD5:
SHA256:
5284chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old~RF12af82.TMP
MD5:
SHA256:
5284chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old
MD5:
SHA256:
5284chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.datbinary
MD5:FC81892AC822DCBB09441D3B58B47125
SHA256:FB077C966296D02D50CCBF7F761D2A3311A206A784A7496F331C2B0D6AD205C8
5284chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\metadata\LOG.old~RF12b07c.TMPtext
MD5:602C51DB8380F8CD0A961D9A46AF1186
SHA256:84F716E38017F52138A76222524A3152DB8D3A7FBE30E94067458568B14DC36D
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
83
TCP/UDP connections
248
DNS requests
213
Threats
22

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7088
pdfelement-pro_setup_full5261.exe
GET
8.209.73.211:80
http://platform.wondershare.cc/rest/v2/downloader/runtime/?client_sign={59081676-831e-4e36-80d4-e20912d08e9dG}&product_id=5261&wae=4.0.4&platform=win_x64
unknown
whitelisted
7088
pdfelement-pro_setup_full5261.exe
HEAD
200
23.32.238.107:80
http://download.wondershare.net/cbs_down/pdfelement-pro_64bit_full5261.exe
unknown
whitelisted
7088
pdfelement-pro_setup_full5261.exe
HEAD
200
2.19.198.58:80
http://download.wondershare.net/cbs_down/pdfelement-pro_64bit_full5261.exe
unknown
whitelisted
7088
pdfelement-pro_setup_full5261.exe
HEAD
200
23.32.238.107:80
http://download.wondershare.net/cbs_down/pdfelement-pro_64bit_full5261.exe
unknown
whitelisted
7088
pdfelement-pro_setup_full5261.exe
GET
2.19.198.58:80
http://download.wondershare.net/cbs_down/pdfelement-pro_64bit_full5261.exe
unknown
whitelisted
7088
pdfelement-pro_setup_full5261.exe
GET
206
23.32.238.107:80
http://download.wondershare.net/cbs_down/pdfelement-pro_64bit_full5261.exe
unknown
whitelisted
7088
pdfelement-pro_setup_full5261.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAoFmyX1Sz2HlMxmMUd1OKM%3D
unknown
whitelisted
7088
pdfelement-pro_setup_full5261.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQlOydjtpho0%2Bholo77zGjGxETUEQQU8JyF%2FaKffY%2FJaLvV1IlNHb7TkP8CEA3EQd5SLWy5mr7JXcu5TKw%3D
unknown
whitelisted
7088
pdfelement-pro_setup_full5261.exe
GET
23.32.238.107:80
http://download.wondershare.net/cbs_down/pdfelement-pro_64bit_full5261.exe
unknown
whitelisted
7088
pdfelement-pro_setup_full5261.exe
GET
206
2.19.198.58:80
http://download.wondershare.net/cbs_down/pdfelement-pro_64bit_full5261.exe
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6552
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6420
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2120
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5284
chrome.exe
239.255.255.250:1900
whitelisted
5708
chrome.exe
23.32.238.107:443
download.wondershare.net
Akamai International B.V.
DE
whitelisted
5708
chrome.exe
108.177.127.84:443
accounts.google.com
GOOGLE
US
whitelisted
5708
chrome.exe
172.217.18.14:443
sb-ssl.google.com
GOOGLE
US
whitelisted
5284
chrome.exe
224.0.0.251:5353
unknown
6552
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 20.73.194.208
  • 51.124.78.146
whitelisted
google.com
  • 142.250.184.238
whitelisted
download.wondershare.net
  • 23.32.238.107
  • 2.19.198.58
whitelisted
accounts.google.com
  • 108.177.127.84
whitelisted
sb-ssl.google.com
  • 172.217.18.14
whitelisted
www.google.com
  • 142.250.186.164
  • 172.217.23.100
whitelisted
pc-api.wondershare.cc
  • 8.209.72.213
malicious
platform.wondershare.cc
  • 8.209.73.211
malicious
prod-web.wondershare.cc
  • 47.91.89.51
malicious
analytics.wondershare.cc
  • 47.91.90.244
malicious

Threats

PID
Process
Class
Message
2256
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
2256
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
2256
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
2256
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
2256
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
7088
pdfelement-pro_setup_full5261.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
7088
pdfelement-pro_setup_full5261.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2256
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
5708
chrome.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
5708
chrome.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
6 ETPRO signatures available at the full report
Process
Message
PEToolDeployment.exe
InitLogTimeSpan: 0.0464922s
PEToolDeployment.exe
Args: "C:\Users\admin\AppData\Local\Temp\is-6MP0B.tmp\PEToolDeployment.exe" /lastinstallversion /productanothername /loggernameend .Install
PEToolDeployment.exe
ProductName: PDFelement
PEToolDeployment.exe
ProductVersion: 11.0.4.3086
PEToolDeployment.exe
PreviewVersion: 1.0.0.76
PEToolDeployment.exe
EnvironmentVersion: 4.0.30319.42000
PEToolDeployment.exe
EnvironmentBit: 64
PEToolDeployment.exe
InitLogTime: 2024-09-03 12:56:39:662
PEToolDeployment.exe
ExitCode: 0
PEPreviewDeployment.exe
StartExeTime: 2024-09-03 12:56:40:694