URL:

pdf.wondershare.net

Full analysis: https://app.any.run/tasks/5e984c39-a3b7-429b-bfc5-0b9e0fc34e49
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: July 16, 2024, 08:34:46
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
loader
Indicators:
MD5:

35627F6F16F2000EE866139D2841CBF2

SHA1:

9AC141BB3AE33DB2586697229B95915E06434D1C

SHA256:

DBFD67BE76DC3B5E0CE0FF92399763C2E72AE543A507A575CEEEDA9E6322BDFF

SSDEEP:

3:bVCQLL0:5CQLo

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • pdfelement-pro_setup_full5254.exe (PID: 8028)
      • pdfelement-pro_64bit_full5254.exe (PID: 7064)
      • PEOfficeAddIn4.exe (PID: 7260)
      • PEShellContextMenu4.exe (PID: 2416)
      • pdfelement-pro_64bit_full5254.tmp (PID: 7596)
      • WSPrtSetup.exe (PID: 8168)
    • Scans artifacts that could help determine the target

      • pdfelement-pro_setup_full5254.exe (PID: 8028)
    • Creates a writable file in the system directory

      • pdfelement-pro_64bit_full5254.tmp (PID: 7596)
      • WSPrtSetup.exe (PID: 8168)
    • Registers / Runs the DLL via REGSVR32.EXE

      • pdfelement-pro_64bit_full5254.tmp (PID: 7596)
    • Create files in the Startup directory

      • PEToolDeployment.exe (PID: 4052)
      • PEToolDeployment.exe (PID: 3828)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • pdfelement-pro_setup_full5254.exe (PID: 8028)
      • pdfelement-pro_64bit_full5254.tmp (PID: 7596)
      • RegAsm.exe (PID: 8116)
      • RegAsm.exe (PID: 7816)
      • PEToolDeployment.exe (PID: 4052)
      • PEToolDeployment.exe (PID: 3828)
      • PEToolDeployment.exe (PID: 7868)
      • PEToolDeployment.exe (PID: 2628)
      • RegAsm.exe (PID: 2072)
      • RegAsm.exe (PID: 5880)
      • PDFelement.exe (PID: 2120)
    • Reads Microsoft Outlook installation path

      • pdfelement-pro_setup_full5254.exe (PID: 8028)
    • Reads Internet Explorer settings

      • pdfelement-pro_setup_full5254.exe (PID: 8028)
      • PDFelement.exe (PID: 2120)
    • Potential Corporate Privacy Violation

      • pdfelement-pro_setup_full5254.exe (PID: 8028)
    • Checks Windows Trust Settings

      • pdfelement-pro_setup_full5254.exe (PID: 8028)
    • Connects to unusual port

      • pdfelement-pro_setup_full5254.exe (PID: 8028)
      • PDFelement.exe (PID: 2120)
      • PENotify.exe (PID: 6984)
    • Likely accesses (executes) a file from the Public directory

      • pdfelement-pro_64bit_full5254.exe (PID: 7064)
      • pdfelement-pro_64bit_full5254.tmp (PID: 7596)
    • Reads the date of Windows installation

      • pdfelement-pro_setup_full5254.exe (PID: 8028)
      • PEToolDeployment.exe (PID: 4052)
      • PEToolDeployment.exe (PID: 3828)
      • PEToolDeployment.exe (PID: 2628)
      • PEToolDeployment.exe (PID: 7868)
      • pdfelement-pro_64bit_full5254.tmp (PID: 7596)
      • PDFelement.exe (PID: 2120)
    • Process requests binary or script from the Internet

      • pdfelement-pro_setup_full5254.exe (PID: 8028)
    • Executable content was dropped or overwritten

      • pdfelement-pro_64bit_full5254.tmp (PID: 7596)
      • pdfelement-pro_64bit_full5254.exe (PID: 7064)
      • PEOfficeAddIn4.exe (PID: 7260)
      • PEShellContextMenu4.exe (PID: 2416)
      • WSPrtSetup.exe (PID: 8168)
    • Reads the Windows owner or organization settings

      • pdfelement-pro_64bit_full5254.tmp (PID: 7596)
    • Process drops legitimate windows executable

      • pdfelement-pro_64bit_full5254.tmp (PID: 7596)
      • WSPrtSetup.exe (PID: 8168)
    • The process drops C-runtime libraries

      • pdfelement-pro_64bit_full5254.tmp (PID: 7596)
    • Searches for installed software

      • pdfelement-pro_64bit_full5254.tmp (PID: 7596)
    • Drops 7-zip archiver for unpacking

      • pdfelement-pro_64bit_full5254.tmp (PID: 7596)
    • Creates/Modifies COM task schedule object

      • RegAsm.exe (PID: 7816)
      • RegAsm.exe (PID: 8116)
      • PEShellContextMenu4.exe (PID: 7192)
      • regsvr32.exe (PID: 7124)
      • RegAsm.exe (PID: 2072)
      • RegAsm.exe (PID: 5880)
    • Starts itself from another location

      • PEShellContextMenu4.exe (PID: 2416)
    • Starts SC.EXE for service management

      • pdfelement-pro_64bit_full5254.tmp (PID: 7596)
    • Explorer used for Indirect Command Execution

      • explorer.exe (PID: 7404)
      • explorer.exe (PID: 6512)
    • Reads the BIOS version

      • PDFelement.exe (PID: 2120)
  • INFO

    • Checks supported languages

      • identity_helper.exe (PID: 2476)
      • pdfelement-pro_setup_full5254.exe (PID: 8028)
      • PEToolDeployment.exe (PID: 6852)
      • PEPreviewDeployment.exe (PID: 3676)
      • pdfelement-pro_64bit_full5254.exe (PID: 7064)
      • pdfelement-pro_64bit_full5254.tmp (PID: 7596)
      • _setup64.tmp (PID: 2100)
      • zip.exe (PID: 7144)
      • zip.exe (PID: 3748)
      • PEOfficeAddIn4.exe (PID: 7260)
      • RegAsm.exe (PID: 7816)
      • RegAsm.exe (PID: 8116)
      • PEShellContextMenu4.exe (PID: 2416)
      • FileAssociation.exe (PID: 7860)
      • PEShellContextMenu4.exe (PID: 7192)
      • WSPrtSetup.exe (PID: 8168)
      • PEToolDeployment.exe (PID: 4052)
      • PEToolDeployment.exe (PID: 3828)
      • PEToolDeploymentExtend.exe (PID: 5632)
      • PEToolDeployment.exe (PID: 7868)
      • PEToolDeployment.exe (PID: 2628)
      • PENotify.exe (PID: 6984)
      • PENotify.exe (PID: 8104)
      • PEPreviewDeployment.exe (PID: 7548)
      • RegAsm.exe (PID: 2072)
      • RegAsm.exe (PID: 5880)
      • PEPreviewDeployment.exe (PID: 692)
      • fontlistsave.exe (PID: 6960)
      • PDFelement.exe (PID: 2120)
      • zip.exe (PID: 3940)
    • Reads Microsoft Office registry keys

      • msedge.exe (PID: 4264)
      • PEOfficeAddIn4.exe (PID: 7260)
      • chrome.exe (PID: 6192)
    • Reads the computer name

      • identity_helper.exe (PID: 2476)
      • pdfelement-pro_setup_full5254.exe (PID: 8028)
      • PEToolDeployment.exe (PID: 6852)
      • pdfelement-pro_64bit_full5254.tmp (PID: 7596)
      • PEPreviewDeployment.exe (PID: 3676)
      • PEOfficeAddIn4.exe (PID: 7260)
      • RegAsm.exe (PID: 7816)
      • RegAsm.exe (PID: 8116)
      • PEShellContextMenu4.exe (PID: 2416)
      • PEShellContextMenu4.exe (PID: 7192)
      • FileAssociation.exe (PID: 7860)
      • WSPrtSetup.exe (PID: 8168)
      • PEToolDeployment.exe (PID: 4052)
      • PEToolDeployment.exe (PID: 3828)
      • PEToolDeploymentExtend.exe (PID: 5632)
      • PEToolDeployment.exe (PID: 7868)
      • PENotify.exe (PID: 6984)
      • PEToolDeployment.exe (PID: 2628)
      • PENotify.exe (PID: 8104)
      • PEPreviewDeployment.exe (PID: 7548)
      • RegAsm.exe (PID: 2072)
      • RegAsm.exe (PID: 5880)
      • PEPreviewDeployment.exe (PID: 692)
      • PDFelement.exe (PID: 2120)
    • Executable content was dropped or overwritten

      • msedge.exe (PID: 6292)
      • msedge.exe (PID: 4264)
    • Drops the executable file immediately after the start

      • msedge.exe (PID: 4264)
      • msedge.exe (PID: 6292)
      • msedge.exe (PID: 4048)
    • The process uses the downloaded file

      • msedge.exe (PID: 4264)
      • msedge.exe (PID: 7824)
      • msedge.exe (PID: 4072)
    • Reads the machine GUID from the registry

      • pdfelement-pro_setup_full5254.exe (PID: 8028)
      • PEToolDeployment.exe (PID: 6852)
      • PEPreviewDeployment.exe (PID: 3676)
      • PEOfficeAddIn4.exe (PID: 7260)
      • RegAsm.exe (PID: 7816)
      • RegAsm.exe (PID: 8116)
      • PEShellContextMenu4.exe (PID: 2416)
      • PEShellContextMenu4.exe (PID: 7192)
      • FileAssociation.exe (PID: 7860)
      • PEToolDeployment.exe (PID: 4052)
      • PEToolDeployment.exe (PID: 3828)
      • PEToolDeployment.exe (PID: 7868)
      • PEToolDeploymentExtend.exe (PID: 5632)
      • PENotify.exe (PID: 6984)
      • PEToolDeployment.exe (PID: 2628)
      • PENotify.exe (PID: 8104)
      • PEPreviewDeployment.exe (PID: 7548)
      • RegAsm.exe (PID: 2072)
      • RegAsm.exe (PID: 5880)
      • PEPreviewDeployment.exe (PID: 692)
      • PDFelement.exe (PID: 2120)
    • Checks proxy server information

      • pdfelement-pro_setup_full5254.exe (PID: 8028)
      • slui.exe (PID: 7708)
      • PEToolDeploymentExtend.exe (PID: 5632)
      • PENotify.exe (PID: 6984)
      • PDFelement.exe (PID: 2120)
    • Create files in a temporary directory

      • pdfelement-pro_setup_full5254.exe (PID: 8028)
      • pdfelement-pro_64bit_full5254.tmp (PID: 7596)
      • pdfelement-pro_64bit_full5254.exe (PID: 7064)
      • PEToolDeployment.exe (PID: 4052)
      • PEToolDeployment.exe (PID: 3828)
      • PDFelement.exe (PID: 2120)
      • zip.exe (PID: 3940)
    • Process checks Internet Explorer phishing filters

      • pdfelement-pro_setup_full5254.exe (PID: 8028)
    • Reads the software policy settings

      • pdfelement-pro_setup_full5254.exe (PID: 8028)
      • slui.exe (PID: 7504)
      • slui.exe (PID: 7708)
      • pdfelement-pro_64bit_full5254.tmp (PID: 7596)
      • PENotify.exe (PID: 6984)
      • PDFelement.exe (PID: 2120)
    • Creates files or folders in the user directory

      • pdfelement-pro_setup_full5254.exe (PID: 8028)
      • PEToolDeployment.exe (PID: 6852)
      • PEPreviewDeployment.exe (PID: 3676)
      • pdfelement-pro_64bit_full5254.tmp (PID: 7596)
      • PEShellContextMenu4.exe (PID: 2416)
      • WSPrtSetup.exe (PID: 8168)
      • regsvr32.exe (PID: 7124)
      • PEToolDeployment.exe (PID: 4052)
      • PEToolDeployment.exe (PID: 3828)
      • PEToolDeployment.exe (PID: 7868)
      • PEToolDeploymentExtend.exe (PID: 5632)
      • PENotify.exe (PID: 6984)
      • PEToolDeployment.exe (PID: 2628)
      • PEPreviewDeployment.exe (PID: 7548)
      • PEPreviewDeployment.exe (PID: 692)
      • fontlistsave.exe (PID: 6960)
      • PDFelement.exe (PID: 2120)
    • Process checks computer location settings

      • pdfelement-pro_setup_full5254.exe (PID: 8028)
      • PEToolDeployment.exe (PID: 4052)
      • PEToolDeployment.exe (PID: 3828)
      • PEToolDeployment.exe (PID: 7868)
      • PEToolDeployment.exe (PID: 2628)
      • pdfelement-pro_64bit_full5254.tmp (PID: 7596)
      • PDFelement.exe (PID: 2120)
    • Creates files in the program directory

      • pdfelement-pro_setup_full5254.exe (PID: 8028)
      • pdfelement-pro_64bit_full5254.tmp (PID: 7596)
      • zip.exe (PID: 7144)
      • zip.exe (PID: 3748)
      • PEOfficeAddIn4.exe (PID: 7260)
      • PEShellContextMenu4.exe (PID: 2416)
      • PEToolDeployment.exe (PID: 4052)
      • PEToolDeployment.exe (PID: 3828)
      • PDFelement.exe (PID: 2120)
    • Application launched itself

      • msedge.exe (PID: 4264)
      • chrome.exe (PID: 6192)
    • Creates a software uninstall entry

      • pdfelement-pro_64bit_full5254.tmp (PID: 7596)
    • Reads security settings of Internet Explorer

      • explorer.exe (PID: 2052)
      • explorer.exe (PID: 7836)
      • explorer.exe (PID: 7860)
    • Disables trace logs

      • PEToolDeploymentExtend.exe (PID: 5632)
      • PENotify.exe (PID: 6984)
      • PDFelement.exe (PID: 2120)
    • Reads Environment values

      • PEToolDeploymentExtend.exe (PID: 5632)
      • PENotify.exe (PID: 6984)
      • PDFelement.exe (PID: 2120)
    • Reads the time zone

      • PENotify.exe (PID: 6984)
      • PDFelement.exe (PID: 2120)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
282
Monitored processes
134
Malicious processes
11
Suspicious processes
7

Behavior graph

Click at the process to see the details
start msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs sppextcomobj.exe no specs slui.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs pdfelement-pro_setup_full5254.exe no specs pdfelement-pro_setup_full5254.exe msedge.exe no specs slui.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs pdfelement-pro_64bit_full5254.exe pdfelement-pro_64bit_full5254.tmp petooldeployment.exe pepreviewdeployment.exe conhost.exe no specs _setup64.tmp no specs conhost.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs zip.exe no specs conhost.exe no specs zip.exe no specs conhost.exe no specs peofficeaddin4.exe conhost.exe no specs regasm.exe no specs conhost.exe no specs regasm.exe no specs conhost.exe no specs peshellcontextmenu4.exe conhost.exe no specs peshellcontextmenu4.exe no specs conhost.exe no specs fileassociation.exe no specs conhost.exe no specs wsprtsetup.exe sc.exe no specs conhost.exe no specs regsvr32.exe no specs petooldeployment.exe explorer.exe no specs petooldeployment.exe explorer.exe no specs petooldeploymentextend.exe explorer.exe no specs petooldeployment.exe explorer.exe no specs penotify.exe petooldeployment.exe penotify.exe pepreviewdeployment.exe conhost.exe no specs regasm.exe conhost.exe no specs regasm.exe conhost.exe no specs pepreviewdeployment.exe conhost.exe no specs fontlistsave.exe no specs conhost.exe no specs explorer.exe no specs chrome.exe explorer.exe no specs chrome.exe no specs pdfelement.exe chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs zip.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
444"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=2136 --field-trial-handle=2040,i,7172390148180201002,15848746241378240267,262144 --variations-seed-version /prefetch:3C:\Program Files\Google\Chrome\Application\chrome.exe
chrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Chrome
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
692"C:\Users\admin\AppData\Local\Temp\is-HHLNT.tmp\PEPreviewDeployment.exe" /Uninstall /Clsid:{815BAF99-0C5D-4FA8-8CCD-1129EE6D25B9} /OnlyOldVersion /Is64BitSystemC:\Users\admin\AppData\Local\Temp\is-HHLNT.tmp\PEPreviewDeployment.exe
pdfelement-pro_64bit_full5254.tmp
User:
admin
Company:
Wondershare
Integrity Level:
HIGH
Description:
Wondershare PDFelement
Exit code:
0
Version:
10.4.6.2776
Modules
Images
c:\users\admin\appdata\local\temp\is-hhlnt.tmp\pepreviewdeployment.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
736\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exezip.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1120\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeRegAsm.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1120"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=4344 --field-trial-handle=2040,i,7172390148180201002,15848746241378240267,262144 --variations-seed-version /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1768"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=6436 --field-trial-handle=2052,i,5478861041683396548,17975079880605678298,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1796"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_search_indexer.mojom.SearchIndexerInterfaceBroker --lang=en-US --service-sandbox-type=search_indexer --message-loop-type-ui --no-appcompat-clear --mojo-platform-channel-handle=6648 --field-trial-handle=2052,i,5478861041683396548,17975079880605678298,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1828"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=7272 --field-trial-handle=2052,i,5478861041683396548,17975079880605678298,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1888"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=122.0.6261.70 --initial-client-data=0x210,0x214,0x218,0x1f0,0x21c,0x7ffd9a8bdc40,0x7ffd9a8bdc4c,0x7ffd9a8bdc58C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
HIGH
Description:
Google Chrome
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1972"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=916 --field-trial-handle=2052,i,5478861041683396548,17975079880605678298,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
51 974
Read events
51 161
Write events
790
Delete events
23

Modification events

(PID) Process:(4264) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(4264) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(4264) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(4264) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(4264) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(4264) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
Operation:writeName:dr
Value:
1
(PID) Process:(4264) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(4264) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge
Operation:writeName:UsageStatsInSample
Value:
1
(PID) Process:(4264) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
Operation:writeName:usagestats
Value:
0
(PID) Process:(4264) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
Operation:writeName:urlstats
Value:
0
Executable files
296
Suspicious files
1 455
Text files
529
Unknown types
55

Dropped files

PID
Process
Filename
Type
4264msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF1ce9fa.TMP
MD5:
SHA256:
4264msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old
MD5:
SHA256:
4264msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF1ce9fa.TMP
MD5:
SHA256:
4264msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old~RF1ce9fa.TMP
MD5:
SHA256:
4264msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
4264msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
4264msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old~RF1cea09.TMP
MD5:
SHA256:
4264msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
4264msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old~RF1cea38.TMP
MD5:
SHA256:
4264msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
127
TCP/UDP connections
387
DNS requests
400
Threats
30

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2808
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4392
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4392
MoUsoCoreWorker.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4656
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6824
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
6868
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
6292
msedge.exe
GET
304
184.24.77.69:80
http://apps.identrust.com/roots/dstrootcax3.p7c
unknown
malicious
6292
msedge.exe
GET
304
69.192.161.44:80
http://x1.i.lencr.org/
unknown
whitelisted
6292
msedge.exe
GET
304
69.192.161.44:80
http://r3.i.lencr.org/
unknown
whitelisted
780
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2088
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4032
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:137
whitelisted
2196
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4656
SearchApp.exe
104.126.37.145:443
www.bing.com
Akamai International B.V.
DE
unknown
4656
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
4392
MoUsoCoreWorker.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
unknown
4392
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
unknown
4
System
192.168.100.255:138
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
www.bing.com
  • 104.126.37.145
  • 104.126.37.128
  • 104.126.37.147
  • 104.126.37.152
  • 104.126.37.130
  • 104.126.37.131
  • 104.126.37.146
  • 104.126.37.137
  • 104.126.37.144
  • 104.126.37.161
  • 104.126.37.155
  • 104.126.37.163
  • 104.126.37.160
  • 104.126.37.153
  • 104.126.37.184
  • 104.126.37.177
  • 104.126.37.171
  • 104.126.37.185
  • 104.126.37.162
  • 104.126.37.178
  • 104.126.37.139
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
google.com
  • 142.250.184.206
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
pdf.wondershare.net
  • 23.48.23.151
  • 23.48.23.191
unknown
edge.microsoft.com
  • 13.107.21.239
  • 204.79.197.239
whitelisted
business.bing.com
  • 13.107.6.158
whitelisted

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET DNS Query for .cc TLD
Potentially Bad Traffic
ET DNS Query for .cc TLD
Potentially Bad Traffic
ET DNS Query for .cc TLD
Potentially Bad Traffic
ET DNS Query for .cc TLD
Potentially Bad Traffic
ET DNS Query for .cc TLD
Potentially Bad Traffic
ET DNS Query for .cc TLD
Potentially Bad Traffic
ET DNS Query for .cc TLD
Potentially Bad Traffic
ET DNS Query for .cc TLD
Potentially Bad Traffic
ET DNS Query for .cc TLD
Potentially Bad Traffic
ET DNS Query for .cc TLD
7 ETPRO signatures available at the full report
Process
Message
PEToolDeployment.exe
InitLogTime: 2024-07-16 08:37:42:145
PEToolDeployment.exe
InitLogTimeSpan: 0.094051s
PEToolDeployment.exe
Args: "C:\Users\admin\AppData\Local\Temp\is-HHLNT.tmp\PEToolDeployment.exe" /lastinstallversion /productanothername /loggernameend .Install
PEToolDeployment.exe
ProductName: PDFelement
PEToolDeployment.exe
ProductVersion: 10.4.6.2776
PEToolDeployment.exe
PreviewVersion: 1.0.0.73
PEToolDeployment.exe
EnvironmentVersion: 4.0.30319.42000
PEToolDeployment.exe
EnvironmentBit: 64
PEToolDeployment.exe
ExitCode: 0
PEPreviewDeployment.exe
Args: "/NeedInstall" "/Clsid:{815BAF99-0C5D-4FA8-8CCD-1129EE6D25B9}" "/NewVersion:1.0.0.73" "/Is64BitSystem"