File name:

CuteWriter.exe

Full analysis: https://app.any.run/tasks/e712b40c-9970-4616-8e08-908ba5c3c9dd
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: July 24, 2024, 15:45:43
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

9AC6B4909BE51B70BC7BA0AF49C34ABD

SHA1:

2FD543FDC492335515CC8D67DCD90D8990074768

SHA256:

A93CBFD46ECB1AD41F56E5E4B81D21FD5879A5C0FA4E13982168F84DDD06DAFD

SSDEEP:

98304:+4akESMTHQ4GKXPjHyJUmP07yTurVp8onUq96IgnSZxd6iX886l2qFCiNCFCp4ji:5/thyN5nGl7b

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • CuteWriter.exe (PID: 3584)
      • CuteWriter.exe (PID: 3088)
      • CuteWriter.tmp (PID: 3084)
      • Setup.exe (PID: 2504)
      • converter.exe (PID: 4068)
      • Setup.exe (PID: 1468)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • CuteWriter.exe (PID: 3584)
      • CuteWriter.exe (PID: 3088)
      • CuteWriter.tmp (PID: 3084)
      • converter.exe (PID: 4068)
      • Setup.exe (PID: 2504)
      • Setup.exe (PID: 1468)
    • Reads the Windows owner or organization settings

      • CuteWriter.tmp (PID: 3084)
    • Process drops legitimate windows executable

      • CuteWriter.tmp (PID: 3084)
      • Setup.exe (PID: 2504)
    • Reads the Internet Settings

      • Setup.exe (PID: 2504)
      • CuteWriter.tmp (PID: 3084)
      • CutePDFWriter.exe (PID: 3992)
    • Potential Corporate Privacy Violation

      • Setup.exe (PID: 2504)
    • Reads security settings of Internet Explorer

      • Setup.exe (PID: 2504)
    • Process requests binary or script from the Internet

      • Setup.exe (PID: 2504)
    • Creates file in the systems drive root

      • AcroRd32.exe (PID: 2740)
  • INFO

    • Checks supported languages

      • CuteWriter.exe (PID: 3584)
      • CuteWriter.tmp (PID: 3688)
      • CuteWriter.exe (PID: 3088)
      • CuteWriter.tmp (PID: 3084)
      • Setup.exe (PID: 2504)
      • converter.exe (PID: 4068)
      • Setup.exe (PID: 1468)
      • CPWSave.exe (PID: 2136)
      • gswin32c.exe (PID: 3068)
      • CutePDFWriter.exe (PID: 3992)
    • Create files in a temporary directory

      • CuteWriter.exe (PID: 3584)
      • CuteWriter.exe (PID: 3088)
      • CuteWriter.tmp (PID: 3084)
      • converter.exe (PID: 4068)
      • Setup.exe (PID: 2504)
      • gswin32c.exe (PID: 3068)
    • Reads the computer name

      • CuteWriter.tmp (PID: 3688)
      • CuteWriter.tmp (PID: 3084)
      • Setup.exe (PID: 2504)
      • CutePDFWriter.exe (PID: 3992)
    • Creates files in the program directory

      • CuteWriter.tmp (PID: 3084)
      • Setup.exe (PID: 2504)
      • Setup.exe (PID: 1468)
    • Reads the machine GUID from the registry

      • Setup.exe (PID: 2504)
      • CutePDFWriter.exe (PID: 3992)
    • Creates files or folders in the user directory

      • Setup.exe (PID: 2504)
    • Creates a software uninstall entry

      • Setup.exe (PID: 2504)
    • Application launched itself

      • msedge.exe (PID: 1180)
      • msedge.exe (PID: 2276)
      • AcroRd32.exe (PID: 2756)
      • RdrCEF.exe (PID: 1156)
    • Manual execution by a user

      • msedge.exe (PID: 2276)
      • WINWORD.EXE (PID: 3348)
      • AcroRd32.exe (PID: 2756)
    • Checks proxy server information

      • Setup.exe (PID: 2504)
    • Reads Microsoft Office registry keys

      • AcroRd32.exe (PID: 2740)
    • Drops the executable file immediately after the start

      • RdrCEF.exe (PID: 1156)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (77.7)
.exe | Win32 Executable Delphi generic (10)
.dll | Win32 Dynamic Link Library (generic) (4.6)
.exe | Win32 Executable (generic) (3.1)
.exe | Win16/32 Executable Delphi generic (1.4)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1992:06:19 22:22:17+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 40448
InitializedDataSize: 17920
UninitializedDataSize: -
EntryPoint: 0xa5f8
OSVersion: 1
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 4.0.1.3
ProductVersionNumber: 4.0.1.3
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName: Acro Software Inc.
FileDescription: CutePDF Writer Setup
FileVersion: 4.0.1.3
LegalCopyright: Copyright © 2003-2024 Acro Software Inc.
ProductName: CutePDF Writer
ProductVersion: 4.0.1.3
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
86
Monitored processes
37
Malicious processes
6
Suspicious processes
1

Behavior graph

Click at the process to see the details
start cutewriter.exe cutewriter.tmp no specs cutewriter.exe cutewriter.tmp setup.exe converter.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs setup.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs winword.exe no specs msedge.exe no specs msedge.exe no specs cpwsave.exe no specs gswin32c.exe no specs cutepdfwriter.exe no specs acrord32.exe no specs acrord32.exe no specs rdrcef.exe no specs rdrcef.exe no specs rdrcef.exe no specs rdrcef.exe no specs rdrcef.exe no specs msedge.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
724"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1496 --field-trial-handle=1304,i,3130702581943262746,14240527084549249837,131072 /prefetch:2C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1156"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16514043C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeAcroRd32.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe RdrCEF
Version:
20.13.20064.405839
Modules
Images
c:\program files\adobe\acrobat reader dc\reader\acrocef\rdrcef.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1180"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --single-argument https://www.cutepdf-editor.com/support/writer.aspC:\Program Files\Microsoft\Edge\Application\msedge.exeCuteWriter.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1420"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1492 --field-trial-handle=1352,i,7390624036382594140,17180260811496561929,131072 /prefetch:3C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1468Setup.exeC:\Users\admin\AppData\Local\Temp\WZSE0.TMP\Setup.exe
converter.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\wzse0.tmp\setup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winspool.drv
1588"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3556 --field-trial-handle=1304,i,3130702581943262746,14240527084549249837,131072 /prefetch:8C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1804"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=1616 --field-trial-handle=1304,i,3130702581943262746,14240527084549249837,131072 /prefetch:8C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1816"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --mojo-platform-channel-handle=3692 --field-trial-handle=1304,i,3130702581943262746,14240527084549249837,131072 /prefetch:8C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
1912"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1368 --field-trial-handle=1304,i,3130702581943262746,14240527084549249837,131072 /prefetch:2C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2020"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=renderer --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=14 --mojo-platform-channel-handle=3456 --field-trial-handle=1304,i,3130702581943262746,14240527084549249837,131072 /prefetch:1C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
29 557
Read events
28 168
Write events
967
Delete events
422

Modification events

(PID) Process:(3084) CuteWriter.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:writeName:Owner
Value:
0C0C0000C8047B90E0DDDA01
(PID) Process:(3084) CuteWriter.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:writeName:SessionHash
Value:
735A1758E6CE8BCDC0322E77A91ADB28889CA52F9633C1D14CBAD3A788E44162
(PID) Process:(3084) CuteWriter.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:writeName:Sequence
Value:
1
(PID) Process:(3084) CuteWriter.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:writeName:RegFiles0000
Value:
C:\Users\admin\AppData\Local\Temp\is-G8MN2.tmp\cpwmon32_v40.dll
(PID) Process:(3084) CuteWriter.tmpKey:HKEY_CURRENT_USER\Software\Microsoft\RestartManager\Session0000
Operation:writeName:RegFilesHash
Value:
B630501653A14C09F09017F3ACE4C0DAD841D6F25CB6F7DE6B37359DDDCA2DD7
(PID) Process:(2504) Setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Acro Software Inc\CutePDF Writer
Operation:writeName:Port Name
Value:
CPW4:
(PID) Process:(2504) Setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Acro Software Inc\CutePDF Writer
Operation:writeName:Printer Name
Value:
CutePDF Writer
(PID) Process:(2504) Setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Acro Software Inc\CutePDF Writer
Operation:writeName:Destination Folder
Value:
C:\Program Files\CutePDF Writer
(PID) Process:(2504) Setup.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Acro Software Inc\CutePDF Writer
Operation:writeName:Programmatic Access
Value:
0
(PID) Process:(2504) Setup.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
Executable files
49
Suspicious files
185
Text files
509
Unknown types
89

Dropped files

PID
Process
Filename
Type
3084CuteWriter.tmpC:\Users\admin\AppData\Local\Temp\is-G8MN2.tmp\_isetup\_shfoldr.dllexecutable
MD5:92DC6EF532FBB4A5C3201469A5B5EB63
SHA256:9884E9D1B4F8A873CCBD81F8AD0AE257776D2348D027D811A56475E028360D87
3584CuteWriter.exeC:\Users\admin\AppData\Local\Temp\is-V4TAK.tmp\CuteWriter.tmpexecutable
MD5:FFCF263A020AA7794015AF0EDEE5DF0B
SHA256:1D07CFB7104B85FC0DFFD761F6848AD176117E146BBB4079FE993EFA06B94C64
3084CuteWriter.tmpC:\Users\admin\AppData\Local\Temp\is-G8MN2.tmp\is-SDVVP.tmpexecutable
MD5:E51710187732025BA13E1AB2B093CF50
SHA256:4694DC1D06A72BBA2DB202B86A18A74F9293520A9125229202671B09B3DB9497
3084CuteWriter.tmpC:\Users\admin\AppData\Local\Temp\is-G8MN2.tmp\is-SD7IP.tmpexecutable
MD5:4B2A60DAA4907AEF53792C3267A5A661
SHA256:94B9DDDA3B6425968DE362E0FADFBA721495C29C2291786090176632F2DD8CA2
3084CuteWriter.tmpC:\Users\admin\AppData\Local\Temp\is-G8MN2.tmp\is-G3FG5.tmpexecutable
MD5:F61F21FEECD660939F51765F31AC7A68
SHA256:BA0102BB46557BB6DDB58482F7F12811DF772110CF9B2482F945F407106A1AC7
3084CuteWriter.tmpC:\Users\admin\AppData\Local\Temp\is-G8MN2.tmp\CuteEdit.icoimage
MD5:A68EF3A5FC089796C7275B46A3D5AA68
SHA256:B24E29CDC992531DB2213E85F200E2E659EB78B0C91BFF9C657269DF7992B907
3084CuteWriter.tmpC:\Users\admin\AppData\Local\Temp\is-G8MN2.tmp\is-IGC51.tmpexecutable
MD5:493173739B3B0D330A3FEC50F5EE10E0
SHA256:8A6DA523F1E171EEEE2AD1ACA62D70C5ED29459DA8219B5A357CBE112F28C3A7
3084CuteWriter.tmpC:\Users\admin\AppData\Local\Temp\is-G8MN2.tmp\CutePDFWriter.exeexecutable
MD5:493173739B3B0D330A3FEC50F5EE10E0
SHA256:8A6DA523F1E171EEEE2AD1ACA62D70C5ED29459DA8219B5A357CBE112F28C3A7
3084CuteWriter.tmpC:\Users\admin\AppData\Local\Temp\is-G8MN2.tmp\CPWriter2.exeexecutable
MD5:CB9A520B70BF242E8B41AD4F70D2BF46
SHA256:AE7C73975E6C4DA06DC378D595CC0E71C482705242845FAB0FE3AF34E0DD875E
3084CuteWriter.tmpC:\Users\admin\AppData\Local\Temp\is-G8MN2.tmp\CPWSave.exe.manifestxml
MD5:D8385D9758B759942365B1ACC0E414FE
SHA256:278BCF994BFBD8C625E1FCC67610280200908BA984DC6C99DF5EBAF379754491
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
49
DNS requests
49
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1372
svchost.exe
GET
304
46.228.146.128:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?33775f6043c93e33
unknown
whitelisted
2504
Setup.exe
GET
200
64.34.201.145:80
http://download.cutepdf.com/download/gplgs.exe
unknown
whitelisted
1060
svchost.exe
GET
304
46.228.146.128:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?fbe613066ac7852b
unknown
whitelisted
2504
Setup.exe
GET
302
64.34.201.145:80
http://download.cutepdf.com/download/converter2.asp
unknown
whitelisted
1372
svchost.exe
GET
200
2.16.241.14:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1372
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
224.0.0.252:5355
whitelisted
1372
svchost.exe
4.231.128.59:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1060
svchost.exe
224.0.0.252:5355
whitelisted
2504
Setup.exe
64.34.201.145:80
download.cutepdf.com
COGECO-PEER1
US
unknown
1372
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1372
svchost.exe
46.228.146.128:80
ctldl.windowsupdate.com
LLNW
US
unknown
1372
svchost.exe
2.16.241.14:80
crl.microsoft.com
Akamai International B.V.
DE
unknown
1372
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
unknown

DNS requests

Domain
IP
Reputation
google.com
  • 216.58.206.78
whitelisted
download.cutepdf.com
  • 64.34.201.145
whitelisted
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
ctldl.windowsupdate.com
  • 46.228.146.128
  • 46.228.146.0
whitelisted
crl.microsoft.com
  • 2.16.241.14
  • 2.16.241.19
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
www.cutepdf-editor.com
  • 64.34.201.144
unknown
config.edge.skype.com
  • 13.107.42.16
whitelisted
edge.microsoft.com
  • 13.107.21.239
  • 204.79.197.239
whitelisted
www.googletagmanager.com
  • 172.217.16.136
whitelisted

Threats

PID
Process
Class
Message
2504
Setup.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
No debug info