URL:

https://download.wondershare.jp/pdfelement-pro_full5272.exe?_gl=1*1fuwgfu*_gcl_au*MTU5NDMzMTkxMi4xNjk4Nzk4OTQw&_ga=2.93785949.1564695575.1698798940-747152758.1698798940

Full analysis: https://app.any.run/tasks/6a0939b0-c21f-4c01-a9da-30c014ae4d27
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: November 01, 2023, 00:38:16
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
SHA1:

DFE421B50A82B7EF1E211616B08E6A2ACBB80532

SHA256:

8FE97C3F87F9BA586FC2160E85B1925CB3C008944C10A31BFCFD9201BA17D56F

SSDEEP:

3:N8SElIQLPQ16nDcJCB/nYUs0z6RsnBQ0HD65W0RcLfcFSepdESsQJKsvdQ:2SKIQLi60CB/YTKysBQ0j65WBrFezPQ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • pdfelement-pro_setup_full5272.exe (PID: 1120)
      • pdfelement-pro_full5272.exe (PID: 3580)
      • PEAddInDeployment.exe (PID: 2620)
      • PEShellContextMenu4.exe (PID: 3708)
      • pdfelement-pro_full5272.tmp (PID: 2552)
      • WSPrtSetup.exe (PID: 3216)
    • Creates a writable file the system directory

      • pdfelement-pro_full5272.tmp (PID: 2552)
      • WSPrtSetup.exe (PID: 3216)
    • Registers / Runs the DLL via REGSVR32.EXE

      • pdfelement-pro_full5272.tmp (PID: 2552)
    • Create files in the Startup directory

      • PEToolDeployment.exe (PID: 3620)
      • PEToolDeployment.exe (PID: 3468)
  • SUSPICIOUS

    • Reads the Internet Settings

      • pdfelement-pro_setup_full5272.exe (PID: 1120)
      • pdfelement-pro_full5272.tmp (PID: 2552)
      • PEToolDeployment.exe (PID: 3620)
      • PEToolDeployment.exe (PID: 3468)
      • PEToolDeployment.exe (PID: 3424)
      • PEToolDeployment.exe (PID: 3808)
      • RegAsm.exe (PID: 328)
      • PENotify.exe (PID: 2908)
      • PDFelement.exe (PID: 3888)
    • Reads security settings of Internet Explorer

      • pdfelement-pro_setup_full5272.exe (PID: 1120)
    • Reads settings of System Certificates

      • pdfelement-pro_setup_full5272.exe (PID: 1120)
      • PENotify.exe (PID: 2908)
      • PDFelement.exe (PID: 3888)
    • Reads Microsoft Outlook installation path

      • pdfelement-pro_setup_full5272.exe (PID: 1120)
    • Connects to unusual port

      • pdfelement-pro_setup_full5272.exe (PID: 1120)
      • PENotify.exe (PID: 2908)
      • PDFelement.exe (PID: 3888)
    • Checks Windows Trust Settings

      • pdfelement-pro_setup_full5272.exe (PID: 1120)
    • Reads Internet Explorer settings

      • pdfelement-pro_setup_full5272.exe (PID: 1120)
      • PDFelement.exe (PID: 3888)
    • Process requests binary or script from the Internet

      • pdfelement-pro_setup_full5272.exe (PID: 1120)
    • Reads the Windows owner or organization settings

      • pdfelement-pro_full5272.tmp (PID: 2552)
    • The process drops C-runtime libraries

      • pdfelement-pro_full5272.tmp (PID: 2552)
    • Searches for installed software

      • pdfelement-pro_full5272.tmp (PID: 2552)
    • Drops 7-zip archiver for unpacking

      • pdfelement-pro_full5272.tmp (PID: 2552)
    • Process drops legitimate windows executable

      • pdfelement-pro_full5272.tmp (PID: 2552)
      • PEAddInDeployment.exe (PID: 2620)
      • WSPrtSetup.exe (PID: 3216)
    • Starts itself from another location

      • PEShellContextMenu4.exe (PID: 3708)
    • Starts SC.EXE for service management

      • pdfelement-pro_full5272.tmp (PID: 2552)
    • Explorer used for Indirect Command Execution

      • explorer.exe (PID: 888)
      • explorer.exe (PID: 3928)
      • explorer.exe (PID: 3268)
    • Reads the BIOS version

      • PDFelement.exe (PID: 3888)
  • INFO

    • Application launched itself

      • iexplore.exe (PID: 1688)
      • chrome.exe (PID: 2920)
    • Checks supported languages

      • pdfelement-pro_setup_full5272.exe (PID: 1120)
      • pdfelement-pro_full5272.exe (PID: 3580)
      • pdfelement-pro_full5272.tmp (PID: 2552)
      • PEPreviewDeployment.exe (PID: 2096)
      • zip.exe (PID: 2600)
      • zip.exe (PID: 3504)
      • PEAddInDeployment.exe (PID: 2620)
      • PEShellContextMenu4.exe (PID: 3708)
      • PEShellContextMenu4.exe (PID: 3080)
      • FileAssociation.exe (PID: 292)
      • WSPrtSetup.exe (PID: 3216)
      • PEToolDeployment.exe (PID: 3620)
      • PEToolDeployment.exe (PID: 3468)
      • PEToolDeployment.exe (PID: 3424)
      • PENotify.exe (PID: 2908)
      • PEToolDeployment.exe (PID: 3808)
      • PEPreviewDeployment.exe (PID: 3856)
      • PENotify.exe (PID: 1576)
      • RegAsm.exe (PID: 328)
      • PEPreviewDeployment.exe (PID: 3740)
      • fontlistsave.exe (PID: 1372)
      • PDFelement.exe (PID: 3888)
      • zip.exe (PID: 940)
    • Reads the computer name

      • pdfelement-pro_setup_full5272.exe (PID: 1120)
      • PEPreviewDeployment.exe (PID: 2096)
      • pdfelement-pro_full5272.tmp (PID: 2552)
      • PEAddInDeployment.exe (PID: 2620)
      • PEShellContextMenu4.exe (PID: 3708)
      • PEShellContextMenu4.exe (PID: 3080)
      • FileAssociation.exe (PID: 292)
      • WSPrtSetup.exe (PID: 3216)
      • PEToolDeployment.exe (PID: 3620)
      • PEToolDeployment.exe (PID: 3468)
      • PEToolDeployment.exe (PID: 3424)
      • PENotify.exe (PID: 2908)
      • PEToolDeployment.exe (PID: 3808)
      • PENotify.exe (PID: 1576)
      • PEPreviewDeployment.exe (PID: 3856)
      • RegAsm.exe (PID: 328)
      • PEPreviewDeployment.exe (PID: 3740)
      • PDFelement.exe (PID: 3888)
    • Reads the machine GUID from the registry

      • pdfelement-pro_setup_full5272.exe (PID: 1120)
      • PEPreviewDeployment.exe (PID: 2096)
      • PEAddInDeployment.exe (PID: 2620)
      • PEShellContextMenu4.exe (PID: 3708)
      • PEShellContextMenu4.exe (PID: 3080)
      • FileAssociation.exe (PID: 292)
      • PEToolDeployment.exe (PID: 3620)
      • PEToolDeployment.exe (PID: 3468)
      • PEToolDeployment.exe (PID: 3424)
      • PENotify.exe (PID: 2908)
      • PEToolDeployment.exe (PID: 3808)
      • PENotify.exe (PID: 1576)
      • PEPreviewDeployment.exe (PID: 3856)
      • RegAsm.exe (PID: 328)
      • PEPreviewDeployment.exe (PID: 3740)
      • PDFelement.exe (PID: 3888)
    • The process uses the downloaded file

      • iexplore.exe (PID: 1688)
      • chrome.exe (PID: 3932)
      • chrome.exe (PID: 3376)
      • chrome.exe (PID: 2744)
    • Drops the executable file immediately after the start

      • iexplore.exe (PID: 1688)
      • iexplore.exe (PID: 4016)
    • Checks proxy server information

      • pdfelement-pro_setup_full5272.exe (PID: 1120)
    • Creates files in the program directory

      • pdfelement-pro_setup_full5272.exe (PID: 1120)
      • pdfelement-pro_full5272.tmp (PID: 2552)
      • zip.exe (PID: 2600)
      • zip.exe (PID: 3504)
      • PEAddInDeployment.exe (PID: 2620)
      • PEShellContextMenu4.exe (PID: 3708)
      • PEToolDeployment.exe (PID: 3620)
      • PEToolDeployment.exe (PID: 3468)
      • PDFelement.exe (PID: 3888)
      • chrome.exe (PID: 2920)
    • Create files in a temporary directory

      • pdfelement-pro_setup_full5272.exe (PID: 1120)
      • pdfelement-pro_full5272.exe (PID: 3580)
      • pdfelement-pro_full5272.tmp (PID: 2552)
      • PEToolDeployment.exe (PID: 3620)
      • PEToolDeployment.exe (PID: 3468)
      • PDFelement.exe (PID: 3888)
    • Creates files or folders in the user directory

      • pdfelement-pro_setup_full5272.exe (PID: 1120)
      • PEPreviewDeployment.exe (PID: 2096)
      • pdfelement-pro_full5272.tmp (PID: 2552)
      • PEShellContextMenu4.exe (PID: 3708)
      • WSPrtSetup.exe (PID: 3216)
      • regsvr32.exe (PID: 3784)
      • PEToolDeployment.exe (PID: 3620)
      • PEToolDeployment.exe (PID: 3468)
      • PEToolDeployment.exe (PID: 3424)
      • PEToolDeployment.exe (PID: 3808)
      • PEPreviewDeployment.exe (PID: 3856)
      • PENotify.exe (PID: 2908)
      • PEPreviewDeployment.exe (PID: 3740)
      • fontlistsave.exe (PID: 1372)
      • PDFelement.exe (PID: 3888)
      • zip.exe (PID: 940)
    • Creates a software uninstall entry

      • pdfelement-pro_full5272.tmp (PID: 2552)
    • Reads the Internet Settings

      • explorer.exe (PID: 1176)
      • explorer.exe (PID: 2776)
      • explorer.exe (PID: 1304)
    • Reads the time zone

      • PENotify.exe (PID: 2908)
      • PDFelement.exe (PID: 3888)
    • Reads Environment values

      • PENotify.exe (PID: 2908)
      • PDFelement.exe (PID: 3888)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
111
Monitored processes
54
Malicious processes
10
Suspicious processes
3

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe pdfelement-pro_setup_full5272.exe no specs pdfelement-pro_setup_full5272.exe pdfelement-pro_full5272.exe no specs pdfelement-pro_full5272.tmp pepreviewdeployment.exe zip.exe no specs zip.exe no specs peaddindeployment.exe no specs peshellcontextmenu4.exe no specs peshellcontextmenu4.exe no specs fileassociation.exe no specs wsprtsetup.exe no specs sc.exe no specs regsvr32.exe no specs petooldeployment.exe explorer.exe no specs petooldeployment.exe explorer.exe no specs petooldeployment.exe explorer.exe no specs explorer.exe no specs penotify.exe petooldeployment.exe penotify.exe pepreviewdeployment.exe regasm.exe pepreviewdeployment.exe fontlistsave.exe no specs chrome.exe explorer.exe no specs explorer.exe no specs chrome.exe no specs pdfelement.exe chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs zip.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
292"C:\Program Files\Wondershare\PDFelement10\FileAssociation.exe" /a .fdf;.pdf "C:\Program Files\Wondershare\PDFelement10\PDFelement.exe" "C:\Program Files\Wondershare\PDFelement10\projectfile.ico" /FriendlyAppName "Wondershare PDFelement"C:\Program Files\Wondershare\PDFelement10\FileAssociation.exepdfelement-pro_full5272.tmp
User:
admin
Company:
Wondershare
Integrity Level:
HIGH
Description:
Fix PDF file association
Exit code:
0
Version:
10.1.4.2521
Modules
Images
c:\program files\wondershare\pdfelement10\fileassociation.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
328"C:\Windows\Microsoft.Net\Framework\v4.0.30319\regasm.exe" /codebase "C:\Program Files\Common Files\Wondershare\PDFelement10\Preview\1.0.0.69\PEPreview4.dll"C:\Windows\Microsoft.Net\Framework\v4.0.30319\RegAsm.exe
PEPreviewDeployment.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft .NET Assembly Registration Utility
Exit code:
0
Version:
4.0.30319.34209 built by: FX452RTMGDR
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\regasm.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\acgenral.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
884"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1396 --field-trial-handle=1100,i,4324410265948040387,13257234207075288121,131072 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
888"C:\Windows\explorer.exe" C:\Program Files\Wondershare\PDFelement10\PEToolDeployment.exeC:\Windows\explorer.exePEToolDeployment.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
940"C:\Program Files\Wondershare\PDFelement10\zip.exe" x -y -o"C:\Users\admin\AppData\Roaming\Wondershare\PDFelement10\Temp\WhatsNew\Pictures" "C:\Users\admin\AppData\Roaming\Wondershare\PDFelement10\Temp\WhatsNew\UpdateWindowsPicture.7z"C:\Program Files\Wondershare\PDFelement10\zip.exePDFelement.exe
User:
admin
Company:
Igor Pavlov
Integrity Level:
MEDIUM
Description:
7-Zip 独立命令行
Exit code:
0
Version:
9.20
Modules
Images
c:\program files\wondershare\pdfelement10\zip.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
1120"C:\Users\admin\Downloads\pdfelement-pro_setup_full5272.exe" C:\Users\admin\Downloads\pdfelement-pro_setup_full5272.exe
iexplore.exe
User:
admin
Integrity Level:
HIGH
Description:
pdfelement10_setup_full5272.exe
Exit code:
0
Version:
4.0.4.12
Modules
Images
c:\users\admin\downloads\pdfelement-pro_setup_full5272.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1144"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=852 --field-trial-handle=1100,i,4324410265948040387,13257234207075288121,131072 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1176C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -EmbeddingC:\Windows\explorer.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1304C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -EmbeddingC:\Windows\explorer.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1372"C:\Program Files\Wondershare\PDFelement10\fontlistsave.exe" C:\Users\admin\AppData\Roaming\Wondershare\PDFelement10\Config\SystemFontList.cfgC:\Program Files\Wondershare\PDFelement10\fontlistsave.exepdfelement-pro_full5272.tmp
User:
admin
Company:
Wondershare
Integrity Level:
HIGH
Description:
PDF Core Console
Exit code:
0
Version:
8.4.5.4327
Modules
Images
c:\program files\wondershare\pdfelement10\fontlistsave.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\wondershare\pdfelement10\libpdfcore.dll
c:\windows\system32\winmm.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
Total events
30 700
Read events
30 389
Write events
304
Delete events
7

Modification events

(PID) Process:(1688) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
0
(PID) Process:(1688) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30847387
(PID) Process:(1688) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30847437
(PID) Process:(1688) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(1688) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(1688) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(1688) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1688) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(1688) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(1688) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
324
Suspicious files
603
Text files
328
Unknown types
0

Dropped files

PID
Process
Filename
Type
4016iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:65236A8757D7BE5A19C508C400EEC55F
SHA256:D1C545AA5FDE6F4B8C35AFCE6B377F677E6AB383762B93FB8B48D89CBE336922
4016iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\14561BF7422BB6F70A9CB14F5AA8A7DA_260D06ABAE8CB938B7DFA6C4B7C430BAbinary
MD5:6121BC9CCDE828CDC2B9529C611BBAA1
SHA256:C064C009DE0C79C808BF343C4E6D15598D84D7A2F67D93250E2B5AF500F07B8E
4016iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157compressed
MD5:1BFE591A4FE3D91B03CDF26EAACD8F89
SHA256:9CF94355051BF0F4A45724CA20D1CC02F76371B963AB7D1E38BD8997737B13D8
1120pdfelement-pro_setup_full5272.exeC:\Users\Public\Documents\Wondershare\pdfelement-pro_full5272.exe.~P2S
MD5:
SHA256:
4016iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04binary
MD5:BB8CC24DCB8144A99BDA63898D92166E
SHA256:C9A600A9671DD4AF65C2DFDC3E9336FCA9205EAB379C0DD8EE0CFEA8FDDF7687
4016iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_23FFFDCAABB8E63694AD1202ED02BF57binary
MD5:7DB9D57F968ADFFFA56A91B39E9F8B30
SHA256:778D777F3D733DAA9326A8BE7AA2712B75B4E82FAC9417398E5A283A4872BC51
4016iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04binary
MD5:F55C55A77005DAADDF76012EEA702608
SHA256:1F334562DA85539EE53D4DD9CE998DBFF2DB9C04B4BF6B77CB666A7FF70815B4
4016iexplore.exeC:\Users\admin\Downloads\pdfelement-pro_setup_full5272.exe.vbtvttj.partialexecutable
MD5:B2B5D4C2EB1CDE586135A9C0C44C6C85
SHA256:AED40EFA31B5E5BC780B2FD899EC2B60FD5DC762BAE356959CDAC7A8F7C0088E
4016iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\14561BF7422BB6F70A9CB14F5AA8A7DA_260D06ABAE8CB938B7DFA6C4B7C430BAbinary
MD5:DA482E07BC4E310A3BAA7109751C43F2
SHA256:E91F19C42ED4D8E3276C20357FDBBDD9665DC70638BD86BA047DE5E2C50700D7
4016iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\pdfelement-pro_setup_full5272[1].exeexecutable
MD5:89A3452C317648367ADB8906F1BA96A4
SHA256:E1BF10AA904B68E3C6FEED5DF0B297137ABFB01BC84951811982B24FEF1AC105
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
44
TCP/UDP connections
235
DNS requests
212
Threats
16

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1120
pdfelement-pro_setup_full5272.exe
GET
88.221.110.67:80
http://download.wondershare.jp/cbs_down/pdfelement-pro_full5272.exe
unknown
unknown
1120
pdfelement-pro_setup_full5272.exe
GET
88.221.110.67:80
http://download.wondershare.jp/cbs_down/pdfelement-pro_full5272.exe
unknown
unknown
1120
pdfelement-pro_setup_full5272.exe
GET
88.221.110.67:80
http://download.wondershare.jp/cbs_down/pdfelement-pro_full5272.exe
unknown
unknown
1120
pdfelement-pro_setup_full5272.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQlOydjtpho0%2Bholo77zGjGxETUEQQU8JyF%2FaKffY%2FJaLvV1IlNHb7TkP8CEA55FRzCAC31guRNu%2FMLaAM%3D
unknown
binary
727 b
unknown
4016
iexplore.exe
GET
200
67.27.234.126:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?5495137de89cafc2
unknown
compressed
4.66 Kb
unknown
1120
pdfelement-pro_setup_full5272.exe
GET
206
2.16.100.179:80
http://download.wondershare.jp/cbs_down/pdfelement-pro_full5272.exe
unknown
text
2 b
unknown
4016
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAoFmyX1Sz2HlMxmMUd1OKM%3D
unknown
binary
471 b
unknown
1120
pdfelement-pro_setup_full5272.exe
GET
200
142.250.185.67:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFNZazTHGPUBUGY%3D
unknown
binary
724 b
unknown
1120
pdfelement-pro_setup_full5272.exe
GET
206
2.16.100.179:80
http://download.wondershare.jp/cbs_down/pdfelement-pro_full5272.exe
unknown
binary
26.6 Mb
unknown
1120
pdfelement-pro_setup_full5272.exe
GET
206
2.16.100.179:80
http://download.wondershare.jp/cbs_down/pdfelement-pro_full5272.exe
unknown
binary
26.6 Mb
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4016
iexplore.exe
2.16.100.179:443
download.wondershare.jp
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:137
whitelisted
4016
iexplore.exe
67.27.234.126:80
ctldl.windowsupdate.com
LEVEL3
US
unknown
4016
iexplore.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
2656
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
4016
iexplore.exe
8.209.73.211:443
cbs.wondershare.jp
Alibaba US Technology Co., Ltd.
DE
unknown
1088
svchost.exe
224.0.0.252:5355
unknown
1120
pdfelement-pro_setup_full5272.exe
8.209.72.213:443
pc-api.wondershare.cc
Alibaba US Technology Co., Ltd.
DE
unknown
1120
pdfelement-pro_setup_full5272.exe
8.209.73.211:80
cbs.wondershare.jp
Alibaba US Technology Co., Ltd.
DE
unknown

DNS requests

Domain
IP
Reputation
ctldl.windowsupdate.com
  • 67.27.234.126
  • 67.27.233.126
  • 8.238.191.254
  • 67.27.235.254
  • 8.253.95.121
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
cbs.wondershare.jp
  • 8.209.73.211
malicious
pc-api.wondershare.cc
  • 8.209.72.213
unknown
platform.wondershare.com
  • 8.209.73.211
unknown
prod-web.wondershare.cc
  • 47.91.89.51
unknown
download.wondershare.jp
  • 104.124.11.34
  • 104.124.11.26
  • 88.221.110.67
  • 2.16.100.179
whitelisted
analytics.wondershare.cc
  • 47.254.80.199
unknown
wae.wondershare.cc
  • 163.181.56.210
  • 163.181.56.211
  • 163.181.56.213
  • 163.181.56.216
  • 163.181.56.212
  • 163.181.56.215
  • 163.181.56.214
  • 163.181.56.209
unknown
analytics.300624.com
  • 47.251.49.246
unknown

Threats

PID
Process
Class
Message
1088
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
1088
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
1088
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
1088
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
1120
pdfelement-pro_setup_full5272.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
1120
pdfelement-pro_setup_full5272.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
1088
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
1088
svchost.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
884
chrome.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
884
chrome.exe
Potentially Bad Traffic
ET DNS Query for .cc TLD
3 ETPRO signatures available at the full report
Process
Message
PEPreviewDeployment.exe
StartExeTime: 2023-11-01 00:40:14:696
PEPreviewDeployment.exe
ProductName: PDFelement
PEPreviewDeployment.exe
Args: "/NeedInstall" "/Clsid:{815BAF99-0C5D-4FA8-8CCD-1129EE6D25B9}" "/NewVersion:1.0.0.69"
PEPreviewDeployment.exe
EnvironmentBit: 32
PEPreviewDeployment.exe
ProductVersion: 10.1.4.2521
PEPreviewDeployment.exe
EnvironmentVersion: 4.0.30319.34209
PEPreviewDeployment.exe
PreviewVersion: 1.0.0.69
PEPreviewDeployment.exe
ExitCode: 0
PEToolDeployment.exe
EnvironmentVersion: 4.0.30319.34209
PEToolDeployment.exe
Startup folder: C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup