URL:

https://download.wondershare.net/inst/pdfelement-pro_setup_full5261.exe

Full analysis: https://app.any.run/tasks/5b4d5592-3e37-4100-a9f5-03ca27c9e7cc
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: September 03, 2024, 12:54:40
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
loader
themida
Indicators:
MD5:

6A2EE03274E7D28F8099F844FBA86556

SHA1:

84000FB982122BBF59D200A0BB6B4F5665ECDB54

SHA256:

8233A93E4BE0E168BE7A215E2CA0C842B35AC9FF5D7E24893928C9490DAF02C1

SSDEEP:

3:N8SElIQLLzDM6nW+IIYJn:2SKIQLFW/Iyn

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Scans artifacts that could help determine the target

      • pdfelement-pro_setup_full5261.exe (PID: 7088)
    • Registers / Runs the DLL via REGSVR32.EXE

      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
    • Create files in the Startup directory

      • PEToolDeployment.exe (PID: 6856)
      • PEToolDeployment.exe (PID: 6992)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • pdfelement-pro_setup_full5261.exe (PID: 7088)
      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
      • RegAsm.exe (PID: 4772)
      • RegAsm.exe (PID: 4284)
      • PEToolDeployment.exe (PID: 6856)
      • PEToolDeployment.exe (PID: 6992)
      • PEToolDeployment.exe (PID: 6644)
      • PEToolDeployment.exe (PID: 2328)
      • RegAsm.exe (PID: 6816)
      • RegAsm.exe (PID: 4576)
      • PDFelement.exe (PID: 6868)
    • Reads Microsoft Outlook installation path

      • pdfelement-pro_setup_full5261.exe (PID: 7088)
    • Potential Corporate Privacy Violation

      • pdfelement-pro_setup_full5261.exe (PID: 7088)
    • Reads Internet Explorer settings

      • pdfelement-pro_setup_full5261.exe (PID: 7088)
      • PDFelement.exe (PID: 6868)
    • Checks Windows Trust Settings

      • pdfelement-pro_setup_full5261.exe (PID: 7088)
    • Process requests binary or script from the Internet

      • pdfelement-pro_setup_full5261.exe (PID: 7088)
      • PDFelement.exe (PID: 6868)
    • Likely accesses (executes) a file from the Public directory

      • pdfelement-pro_64bit_full5261.exe (PID: 2904)
      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
    • Executable content was dropped or overwritten

      • pdfelement-pro_64bit_full5261.exe (PID: 2904)
      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
      • PEOfficeAddIn4.exe (PID: 4196)
      • PEShellContextMenu4.exe (PID: 6204)
      • WSPrtSetup.exe (PID: 2468)
    • Connects to unusual port

      • pdfelement-pro_setup_full5261.exe (PID: 7088)
      • PENotify.exe (PID: 5816)
      • PDFelement.exe (PID: 6868)
    • Reads the Windows owner or organization settings

      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
    • Reads the date of Windows installation

      • pdfelement-pro_setup_full5261.exe (PID: 7088)
      • PEToolDeployment.exe (PID: 6856)
      • PEToolDeployment.exe (PID: 6992)
      • PEToolDeployment.exe (PID: 6644)
      • PEToolDeployment.exe (PID: 2328)
      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
      • PDFelement.exe (PID: 6868)
    • Process drops legitimate windows executable

      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
      • WSPrtSetup.exe (PID: 2468)
    • Drops 7-zip archiver for unpacking

      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
    • The process drops C-runtime libraries

      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
    • Searches for installed software

      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
    • Starts itself from another location

      • PEShellContextMenu4.exe (PID: 6204)
    • Creates/Modifies COM task schedule object

      • PEShellContextMenu4.exe (PID: 2636)
      • regsvr32.exe (PID: 2400)
      • RegAsm.exe (PID: 4772)
      • RegAsm.exe (PID: 4284)
      • RegAsm.exe (PID: 6816)
      • RegAsm.exe (PID: 4576)
    • Starts SC.EXE for service management

      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
    • Explorer used for Indirect Command Execution

      • explorer.exe (PID: 4576)
      • explorer.exe (PID: 6892)
    • Reads the BIOS version

      • PDFelement.exe (PID: 6868)
  • INFO

    • The process uses the downloaded file

      • chrome.exe (PID: 3352)
      • chrome.exe (PID: 5284)
      • pdfelement-pro_setup_full5261.exe (PID: 7088)
      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
      • RegAsm.exe (PID: 4772)
      • RegAsm.exe (PID: 4284)
      • PEToolDeployment.exe (PID: 6856)
      • explorer.exe (PID: 5740)
      • PEToolDeployment.exe (PID: 6992)
      • explorer.exe (PID: 1060)
      • PEToolDeployment.exe (PID: 6644)
      • PEToolDeployment.exe (PID: 2328)
      • RegAsm.exe (PID: 6816)
      • RegAsm.exe (PID: 4576)
      • explorer.exe (PID: 400)
      • PDFelement.exe (PID: 6868)
    • Checks supported languages

      • pdfelement-pro_setup_full5261.exe (PID: 7088)
      • pdfelement-pro_64bit_full5261.exe (PID: 2904)
      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
      • PEPreviewDeployment.exe (PID: 5816)
      • PEToolDeployment.exe (PID: 6576)
      • _setup64.tmp (PID: 4016)
      • zip.exe (PID: 6412)
      • zip.exe (PID: 4316)
      • RegAsm.exe (PID: 4772)
      • PEShellContextMenu4.exe (PID: 6204)
      • RegAsm.exe (PID: 4284)
      • PEShellContextMenu4.exe (PID: 2636)
      • FileAssociation.exe (PID: 3648)
      • WSPrtSetup.exe (PID: 2468)
      • PEOfficeAddIn4.exe (PID: 4196)
      • PEToolDeployment.exe (PID: 6856)
      • PEToolDeployment.exe (PID: 6992)
      • PEToolDeploymentExtend.exe (PID: 6364)
      • PEToolDeployment.exe (PID: 6644)
      • PEToolDeployment.exe (PID: 2328)
      • PENotify.exe (PID: 3376)
      • PENotify.exe (PID: 5816)
      • PEPreviewDeployment.exe (PID: 6336)
      • RegAsm.exe (PID: 6816)
      • RegAsm.exe (PID: 4576)
      • fontlistsave.exe (PID: 7072)
      • PEPreviewDeployment.exe (PID: 6104)
      • PDFelement.exe (PID: 6868)
      • zip.exe (PID: 1432)
    • Executable content was dropped or overwritten

      • chrome.exe (PID: 5284)
    • Application launched itself

      • chrome.exe (PID: 5284)
      • chrome.exe (PID: 6628)
    • Checks proxy server information

      • pdfelement-pro_setup_full5261.exe (PID: 7088)
      • slui.exe (PID: 6192)
      • PEToolDeploymentExtend.exe (PID: 6364)
      • PENotify.exe (PID: 5816)
      • PDFelement.exe (PID: 6868)
    • Process checks Internet Explorer phishing filters

      • pdfelement-pro_setup_full5261.exe (PID: 7088)
    • Creates files or folders in the user directory

      • pdfelement-pro_setup_full5261.exe (PID: 7088)
      • PEToolDeployment.exe (PID: 6576)
      • PEPreviewDeployment.exe (PID: 5816)
      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
      • PEShellContextMenu4.exe (PID: 6204)
      • WSPrtSetup.exe (PID: 2468)
      • regsvr32.exe (PID: 2400)
      • PEToolDeployment.exe (PID: 6856)
      • PEToolDeployment.exe (PID: 6992)
      • PEToolDeploymentExtend.exe (PID: 6364)
      • PEToolDeployment.exe (PID: 2328)
      • PEToolDeployment.exe (PID: 6644)
      • PENotify.exe (PID: 5816)
      • PEPreviewDeployment.exe (PID: 6336)
      • PEPreviewDeployment.exe (PID: 6104)
      • fontlistsave.exe (PID: 7072)
      • PDFelement.exe (PID: 6868)
    • Creates files in the program directory

      • pdfelement-pro_setup_full5261.exe (PID: 7088)
      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
      • zip.exe (PID: 4316)
      • zip.exe (PID: 6412)
      • PEOfficeAddIn4.exe (PID: 4196)
      • PEShellContextMenu4.exe (PID: 6204)
      • PEToolDeployment.exe (PID: 6992)
      • PEToolDeployment.exe (PID: 6856)
      • PDFelement.exe (PID: 6868)
    • Create files in a temporary directory

      • pdfelement-pro_setup_full5261.exe (PID: 7088)
      • pdfelement-pro_64bit_full5261.exe (PID: 2904)
      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
      • PEToolDeployment.exe (PID: 6856)
      • PEToolDeployment.exe (PID: 6992)
      • PDFelement.exe (PID: 6868)
      • zip.exe (PID: 1432)
    • Reads the machine GUID from the registry

      • pdfelement-pro_setup_full5261.exe (PID: 7088)
      • PEToolDeployment.exe (PID: 6576)
      • PEPreviewDeployment.exe (PID: 5816)
      • RegAsm.exe (PID: 4772)
      • RegAsm.exe (PID: 4284)
      • PEShellContextMenu4.exe (PID: 6204)
      • PEShellContextMenu4.exe (PID: 2636)
      • FileAssociation.exe (PID: 3648)
      • PEOfficeAddIn4.exe (PID: 4196)
      • PEToolDeployment.exe (PID: 6992)
      • PEToolDeployment.exe (PID: 6856)
      • PEToolDeploymentExtend.exe (PID: 6364)
      • PEToolDeployment.exe (PID: 6644)
      • PEToolDeployment.exe (PID: 2328)
      • PENotify.exe (PID: 5816)
      • PENotify.exe (PID: 3376)
      • PEPreviewDeployment.exe (PID: 6336)
      • RegAsm.exe (PID: 6816)
      • RegAsm.exe (PID: 4576)
      • PEPreviewDeployment.exe (PID: 6104)
      • PDFelement.exe (PID: 6868)
    • Reads the computer name

      • pdfelement-pro_setup_full5261.exe (PID: 7088)
      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
      • PEPreviewDeployment.exe (PID: 5816)
      • PEToolDeployment.exe (PID: 6576)
      • PEOfficeAddIn4.exe (PID: 4196)
      • RegAsm.exe (PID: 4772)
      • PEShellContextMenu4.exe (PID: 6204)
      • PEShellContextMenu4.exe (PID: 2636)
      • FileAssociation.exe (PID: 3648)
      • WSPrtSetup.exe (PID: 2468)
      • RegAsm.exe (PID: 4284)
      • PEToolDeployment.exe (PID: 6856)
      • PEToolDeployment.exe (PID: 6992)
      • PEToolDeploymentExtend.exe (PID: 6364)
      • PEToolDeployment.exe (PID: 6644)
      • PEToolDeployment.exe (PID: 2328)
      • PENotify.exe (PID: 3376)
      • PENotify.exe (PID: 5816)
      • PEPreviewDeployment.exe (PID: 6336)
      • RegAsm.exe (PID: 6816)
      • RegAsm.exe (PID: 4576)
      • PEPreviewDeployment.exe (PID: 6104)
      • PDFelement.exe (PID: 6868)
    • Reads the software policy settings

      • pdfelement-pro_setup_full5261.exe (PID: 7088)
      • slui.exe (PID: 6208)
      • slui.exe (PID: 6192)
      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
      • PENotify.exe (PID: 5816)
      • PDFelement.exe (PID: 6868)
    • Process checks computer location settings

      • pdfelement-pro_setup_full5261.exe (PID: 7088)
      • PEToolDeployment.exe (PID: 6992)
      • PEToolDeployment.exe (PID: 6644)
      • PEToolDeployment.exe (PID: 2328)
      • PEToolDeployment.exe (PID: 6856)
      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
      • PDFelement.exe (PID: 6868)
    • Reads Microsoft Office registry keys

      • chrome.exe (PID: 5284)
      • PEOfficeAddIn4.exe (PID: 4196)
    • Creates a software uninstall entry

      • pdfelement-pro_64bit_full5261.tmp (PID: 6996)
    • Reads security settings of Internet Explorer

      • explorer.exe (PID: 5740)
      • explorer.exe (PID: 1060)
      • explorer.exe (PID: 400)
    • Reads Environment values

      • PEToolDeploymentExtend.exe (PID: 6364)
      • PENotify.exe (PID: 5816)
      • PDFelement.exe (PID: 6868)
    • Disables trace logs

      • PEToolDeploymentExtend.exe (PID: 6364)
      • PENotify.exe (PID: 5816)
      • PDFelement.exe (PID: 6868)
    • Reads the time zone

      • PENotify.exe (PID: 5816)
      • PDFelement.exe (PID: 6868)
    • Connects to unusual port

      • chrome.exe (PID: 5708)
    • Themida protector has been detected

      • PDFelement.exe (PID: 6868)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
227
Monitored processes
89
Malicious processes
9
Suspicious processes
7

Behavior graph

Click at the process to see the details
start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs pdfelement-pro_setup_full5261.exe no specs pdfelement-pro_setup_full5261.exe svchost.exe sppextcomobj.exe no specs slui.exe chrome.exe no specs slui.exe chrome.exe no specs pdfelement-pro_64bit_full5261.exe pdfelement-pro_64bit_full5261.tmp petooldeployment.exe pepreviewdeployment.exe conhost.exe no specs _setup64.tmp no specs conhost.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs zip.exe no specs conhost.exe no specs zip.exe no specs conhost.exe no specs peofficeaddin4.exe conhost.exe no specs regasm.exe no specs conhost.exe no specs regasm.exe no specs conhost.exe no specs peshellcontextmenu4.exe conhost.exe no specs peshellcontextmenu4.exe no specs conhost.exe no specs fileassociation.exe no specs conhost.exe no specs wsprtsetup.exe sc.exe no specs conhost.exe no specs regsvr32.exe no specs petooldeployment.exe explorer.exe no specs petooldeployment.exe explorer.exe no specs explorer.exe no specs petooldeploymentextend.exe explorer.exe no specs petooldeployment.exe petooldeployment.exe penotify.exe penotify.exe pepreviewdeployment.exe conhost.exe no specs regasm.exe conhost.exe no specs regasm.exe conhost.exe no specs pepreviewdeployment.exe conhost.exe no specs fontlistsave.exe no specs conhost.exe no specs chrome.exe no specs chrome.exe no specs explorer.exe no specs chrome.exe no specs chrome.exe no specs explorer.exe no specs chrome.exe no specs chrome.exe no specs THREAT pdfelement.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs zip.exe no specs conhost.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
236\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeFileAssociation.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
400C:\WINDOWS\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -EmbeddingC:\Windows\explorer.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\shcore.dll
608"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=21 --mojo-platform-channel-handle=3148 --field-trial-handle=1924,i,14297258177860011425,9629259037999690907,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
644"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=5148 --field-trial-handle=1924,i,14297258177860011425,9629259037999690907,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1020"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=5348 --field-trial-handle=1924,i,14297258177860011425,9629259037999690907,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1060C:\WINDOWS\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -EmbeddingC:\Windows\explorer.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\shcore.dll
1084\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exePEPreviewDeployment.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1432"C:\Program Files\Wondershare\PDFelement11\zip.exe" x -y -o"C:\Users\admin\AppData\Local\Temp\60e8281d-1098-4129-8440-ec4f07139555" "C:\Users\admin\AppData\Roaming\Wondershare\PDFelement11\Temp\WhatsNew\eng\Pictures\UpdatePicture.7z"C:\Program Files\Wondershare\PDFelement11\zip.exePDFelement.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
MEDIUM
Description:
7-Zip 独立命令行
Exit code:
0
Version:
9.20
Modules
Images
c:\program files\wondershare\pdfelement11\zip.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
1948"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=video_capture.mojom.VideoCaptureService --lang=en-US --service-sandbox-type=none --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=5584 --field-trial-handle=1924,i,14297258177860011425,9629259037999690907,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
2208"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=122.0.6261.70 --initial-client-data=0x210,0x214,0x218,0x1ec,0x21c,0x7fffd300dc40,0x7fffd300dc4c,0x7fffd300dc58C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
Total events
48 788
Read events
48 222
Write events
549
Delete events
17

Modification events

(PID) Process:(5284) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(5284) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(5284) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(5284) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(5284) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(5284) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(5284) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(5284) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(5284) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(5284) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:metricsid
Value:
Executable files
266
Suspicious files
583
Text files
341
Unknown types
290

Dropped files

PID
Process
Filename
Type
5284chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
5284chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
5284chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
5284chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RF12af72.TMP
MD5:
SHA256:
5284chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
5284chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\chrome_cart_db\LOG.old
MD5:
SHA256:
5284chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old~RF12af82.TMP
MD5:
SHA256:
5284chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old
MD5:
SHA256:
5284chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.old~RF12af62.TMPtext
MD5:139F545948FC1F10256A27E3C2CEF062
SHA256:9399CC6F9C335015E086DB37208B1816A7831221A005B04AC83C4F86CC04230D
5284chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad\settings.datbinary
MD5:FC81892AC822DCBB09441D3B58B47125
SHA256:FB077C966296D02D50CCBF7F761D2A3311A206A784A7496F331C2B0D6AD205C8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
83
TCP/UDP connections
248
DNS requests
213
Threats
22

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
7088
pdfelement-pro_setup_full5261.exe
HEAD
200
23.32.238.107:80
http://download.wondershare.net/cbs_down/pdfelement-pro_64bit_full5261.exe
DE
whitelisted
7088
pdfelement-pro_setup_full5261.exe
HEAD
200
2.19.198.58:80
http://download.wondershare.net/cbs_down/pdfelement-pro_64bit_full5261.exe
DE
whitelisted
7088
pdfelement-pro_setup_full5261.exe
GET
206
2.19.198.58:80
http://download.wondershare.net/cbs_down/pdfelement-pro_64bit_full5261.exe
DE
executable
28.2 Mb
whitelisted
7088
pdfelement-pro_setup_full5261.exe
GET
206
2.19.198.58:80
http://download.wondershare.net/cbs_down/pdfelement-pro_64bit_full5261.exe
DE
binary
28.2 Mb
whitelisted
7088
pdfelement-pro_setup_full5261.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQlOydjtpho0%2Bholo77zGjGxETUEQQU8JyF%2FaKffY%2FJaLvV1IlNHb7TkP8CEA3EQd5SLWy5mr7JXcu5TKw%3D
US
binary
727 b
whitelisted
7088
pdfelement-pro_setup_full5261.exe
HEAD
200
23.32.238.107:80
http://download.wondershare.net/cbs_down/pdfelement-pro_64bit_full5261.exe
DE
whitelisted
7088
pdfelement-pro_setup_full5261.exe
GET
200
142.250.74.195:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
US
binary
1.41 Kb
whitelisted
7088
pdfelement-pro_setup_full5261.exe
GET
206
23.32.238.107:80
http://download.wondershare.net/cbs_down/pdfelement-pro_64bit_full5261.exe
DE
text
2 b
whitelisted
7088
pdfelement-pro_setup_full5261.exe
GET
206
23.32.238.107:80
http://download.wondershare.net/cbs_down/pdfelement-pro_64bit_full5261.exe
DE
binary
28.2 Mb
whitelisted
7088
pdfelement-pro_setup_full5261.exe
GET
23.32.238.107:80
http://download.wondershare.net/cbs_down/pdfelement-pro_64bit_full5261.exe
DE
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6552
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6420
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2120
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5284
chrome.exe
239.255.255.250:1900
whitelisted
5708
chrome.exe
23.32.238.107:443
download.wondershare.net
Akamai International B.V.
DE
whitelisted
5708
chrome.exe
108.177.127.84:443
accounts.google.com
GOOGLE
US
whitelisted
5708
chrome.exe
172.217.18.14:443
sb-ssl.google.com
GOOGLE
US
whitelisted
5284
chrome.exe
224.0.0.251:5353
unknown
6552
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 20.73.194.208
  • 51.124.78.146
whitelisted
google.com
  • 142.250.184.238
whitelisted
download.wondershare.net
  • 23.32.238.107
  • 2.19.198.58
whitelisted
accounts.google.com
  • 108.177.127.84
whitelisted
sb-ssl.google.com
  • 172.217.18.14
whitelisted
www.google.com
  • 142.250.186.164
  • 172.217.23.100
whitelisted
pc-api.wondershare.cc
  • 8.209.72.213
malicious
platform.wondershare.cc
  • 8.209.73.211
malicious
prod-web.wondershare.cc
  • 47.91.89.51
malicious
analytics.wondershare.cc
  • 47.91.90.244
malicious

Threats

PID
Process
Class
Message
2256
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
2256
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
2256
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
2256
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
2256
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
7088
pdfelement-pro_setup_full5261.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
7088
pdfelement-pro_setup_full5261.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
2256
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
5708
chrome.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
5708
chrome.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
6 ETPRO signatures available at the full report
Process
Message
PEToolDeployment.exe
InitLogTimeSpan: 0.0464922s
PEToolDeployment.exe
Args: "C:\Users\admin\AppData\Local\Temp\is-6MP0B.tmp\PEToolDeployment.exe" /lastinstallversion /productanothername /loggernameend .Install
PEToolDeployment.exe
ProductName: PDFelement
PEToolDeployment.exe
ProductVersion: 11.0.4.3086
PEToolDeployment.exe
PreviewVersion: 1.0.0.76
PEToolDeployment.exe
EnvironmentVersion: 4.0.30319.42000
PEToolDeployment.exe
EnvironmentBit: 64
PEToolDeployment.exe
InitLogTime: 2024-09-03 12:56:39:662
PEToolDeployment.exe
ExitCode: 0
PEPreviewDeployment.exe
StartExeTime: 2024-09-03 12:56:40:694