File name:

edimakor.hitpaw.com hitpaw-edimakor-full.exe

Full analysis: https://app.any.run/tasks/77b6d3c2-65d5-4f18-97f3-c3c3d545a4a0
Verdict: Malicious activity
Analysis date: December 30, 2024, 04:27:30
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
evasion
upx
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed, 3 sections
MD5:

11C21DE37E98A41BFC615520C3B8093E

SHA1:

A8FBFC56D74AB77924B87BF2D0225BA29C245929

SHA256:

B1FA18F25ED6F8137E8ADECF59F3052B9AB63A4E22E190D0611F9A5F1705B174

SSDEEP:

98304:bm2JbZKs1PyDsUPO0RHYxuyfpCd5iIQto65E0KqLvyInJl1Fg2tJ6X5TCyliloYY:hVFu

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Checks Windows Trust Settings

      • edimakor.hitpaw.com hitpaw-edimakor-full.exe (PID: 6836)
    • Potential Corporate Privacy Violation

      • edimakor.hitpaw.com hitpaw-edimakor-full.exe (PID: 6836)
    • Checks for external IP

      • edimakor.hitpaw.com hitpaw-edimakor-full.exe (PID: 6836)
      • svchost.exe (PID: 2192)
    • Reads security settings of Internet Explorer

      • edimakor.hitpaw.com hitpaw-edimakor-full.exe (PID: 6836)
      • hitpawedimakor_hitpawem_3.4.1.tmp (PID: 2164)
    • Executable content was dropped or overwritten

      • hitpawedimakor_hitpawem_3.4.1.exe (PID: 5128)
      • hitpawedimakor_hitpawem_3.4.1.tmp (PID: 2164)
    • Reads the Windows owner or organization settings

      • hitpawedimakor_hitpawem_3.4.1.tmp (PID: 2164)
    • Get information on the list of running processes

      • hitpawedimakor_hitpawem_3.4.1.tmp (PID: 2164)
      • cmd.exe (PID: 4320)
      • cmd.exe (PID: 4300)
    • Starts CMD.EXE for commands execution

      • hitpawedimakor_hitpawem_3.4.1.tmp (PID: 2164)
    • Uses TASKKILL.EXE to kill process

      • hitpawedimakor_hitpawem_3.4.1.tmp (PID: 2164)
    • Process drops legitimate windows executable

      • hitpawedimakor_hitpawem_3.4.1.tmp (PID: 2164)
    • Drops 7-zip archiver for unpacking

      • hitpawedimakor_hitpawem_3.4.1.tmp (PID: 2164)
    • The process drops C-runtime libraries

      • hitpawedimakor_hitpawem_3.4.1.tmp (PID: 2164)
    • Creates/Modifies COM task schedule object

      • dxdiag.exe (PID: 1576)
  • INFO

    • The sample compiled with english language support

      • edimakor.hitpaw.com hitpaw-edimakor-full.exe (PID: 6836)
      • hitpawedimakor_hitpawem_3.4.1.tmp (PID: 2164)
    • Creates files or folders in the user directory

      • edimakor.hitpaw.com hitpaw-edimakor-full.exe (PID: 6836)
      • dxdiag.exe (PID: 1576)
    • Checks supported languages

      • edimakor.hitpaw.com hitpaw-edimakor-full.exe (PID: 6836)
      • hitpawedimakor_hitpawem_3.4.1.tmp (PID: 2164)
      • hitpawedimakor_hitpawem_3.4.1.exe (PID: 5128)
    • Reads the machine GUID from the registry

      • edimakor.hitpaw.com hitpaw-edimakor-full.exe (PID: 6836)
    • Reads the software policy settings

      • edimakor.hitpaw.com hitpaw-edimakor-full.exe (PID: 6836)
      • dxdiag.exe (PID: 1576)
    • Reads the computer name

      • edimakor.hitpaw.com hitpaw-edimakor-full.exe (PID: 6836)
      • hitpawedimakor_hitpawem_3.4.1.tmp (PID: 2164)
    • Creates files in the program directory

      • edimakor.hitpaw.com hitpaw-edimakor-full.exe (PID: 6836)
      • hitpawedimakor_hitpawem_3.4.1.tmp (PID: 2164)
    • Checks proxy server information

      • edimakor.hitpaw.com hitpaw-edimakor-full.exe (PID: 6836)
    • Create files in a temporary directory

      • edimakor.hitpaw.com hitpaw-edimakor-full.exe (PID: 6836)
      • hitpawedimakor_hitpawem_3.4.1.exe (PID: 5128)
      • hitpawedimakor_hitpawem_3.4.1.tmp (PID: 2164)
    • The process uses the downloaded file

      • hitpawedimakor_hitpawem_3.4.1.tmp (PID: 2164)
    • Process checks computer location settings

      • hitpawedimakor_hitpawem_3.4.1.tmp (PID: 2164)
    • Reads security settings of Internet Explorer

      • dxdiag.exe (PID: 1576)
    • The sample compiled with chinese language support

      • hitpawedimakor_hitpawem_3.4.1.tmp (PID: 2164)
    • UPX packer has been detected

      • edimakor.hitpaw.com hitpaw-edimakor-full.exe (PID: 6836)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (64.2)
.dll | Win32 Dynamic Link Library (generic) (15.6)
.exe | Win32 Executable (generic) (10.6)
.exe | Generic Win/DOS Executable (4.7)
.exe | DOS Executable Generic (4.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:11:07 08:01:58+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14
CodeSize: 1601536
InitializedDataSize: 483328
UninitializedDataSize: 1449984
EntryPoint: 0x2e9cb0
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 2.7.20.1
ProductVersionNumber: 2.7.20.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: HitPaw
FileDescription: HitPaw Edimakor
FileVersion: 2.7.20.1
LegalCopyright: Copyright © 2021-2024 HITPAW CO.,LIMITED All Rights Reserved.
ProductName: 20241107160128
ProductVersion: 2.7.20.1
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
156
Monitored processes
32
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start edimakor.hitpaw.com  hitpaw-edimakor-full.exe svchost.exe hitpawedimakor_hitpawem_3.4.1.exe hitpawedimakor_hitpawem_3.4.1.tmp taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs find.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs find.exe no specs dxdiag.exe no specs edimakor.hitpaw.com  hitpaw-edimakor-full.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
440\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exetaskkill.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
716"C:\WINDOWS\system32\taskkill.exe" /F /IM ELime.exeC:\Windows\System32\taskkill.exehitpawedimakor_hitpawem_3.4.1.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1576"C:\WINDOWS\system32\dxdiag.exe" /whql:off /t C:\Users\admin\AppData\Local\cache\HitPaw Edimakor\sysinfo.txtC:\Windows\SysWOW64\dxdiag.exehitpawedimakor_hitpawem_3.4.1.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft DirectX Diagnostic Tool
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\dxdiag.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
1684\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exetaskkill.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1804\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2164"C:\Users\admin\AppData\Local\Temp\is-1HMF3.tmp\hitpawedimakor_hitpawem_3.4.1.tmp" /SL5="$60290,507847774,534528,C:\Users\admin\AppData\Local\Temp\hitpawedimakor_hitpawem\hitpawedimakor_hitpawem_3.4.1.exe" /VERYSILENT /SP- /NORESTART /DIR="C:\Program Files (x86)\HitPaw\HitPaw Edimakor\" /LANG=en /LOG="C:\Users\admin\AppData\Local\Temp\HitPaw Edimakor_Setup_20241230042928.log" /sptrack nullC:\Users\admin\AppData\Local\Temp\is-1HMF3.tmp\hitpawedimakor_hitpawem_3.4.1.tmp
hitpawedimakor_hitpawem_3.4.1.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-1hmf3.tmp\hitpawedimakor_hitpawem_3.4.1.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2280tasklist /fo csv C:\Windows\SysWOW64\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
2496"C:\WINDOWS\system32\taskkill.exe" /F /IM HitPawAIVideoScriptGenerator.exeC:\Windows\System32\taskkill.exehitpawedimakor_hitpawem_3.4.1.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
2680find /c /i "HitPawEdimakor.exe" C:\Windows\SysWOW64\find.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (grep) Utility
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\find.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
10 643
Read events
10 461
Write events
165
Delete events
17

Modification events

(PID) Process:(6836) edimakor.hitpaw.com hitpaw-edimakor-full.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Tenorshare\Downloader2.5.0
Operation:writeName:GA_PC
Value:
1
(PID) Process:(6836) edimakor.hitpaw.com hitpaw-edimakor-full.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\GuidGuidold
Operation:writeName:guid
Value:
EFAB9658-192D-4EB1-87B6-6389F640EAF0
(PID) Process:(6836) edimakor.hitpaw.com hitpaw-edimakor-full.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\GuidGuidold
Operation:writeName:user_id
Value:
1001
(PID) Process:(1576) dxdiag.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
Operation:delete valueName:DxDiag In SystemInfo
Value:

(PID) Process:(1576) dxdiag.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
Operation:writeName:DxDiag In DirectDraw
Value:
1
(PID) Process:(1576) dxdiag.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Apartment
(PID) Process:(1576) dxdiag.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
Operation:writeName:DxDiag In SystemInfo
Value:
1
(PID) Process:(1576) dxdiag.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
Operation:delete valueName:DxDiag In DirectDraw
Value:

(PID) Process:(1576) dxdiag.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
Operation:delete valueName:DxDiag In Diagnostics
Value:

(PID) Process:(1576) dxdiag.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
Operation:writeName:DxDiag In Media Foundation
Value:
1
Executable files
985
Suspicious files
45
Text files
1 995
Unknown types
1

Dropped files

PID
Process
Filename
Type
6836edimakor.hitpaw.com hitpaw-edimakor-full.exeC:\Users\admin\AppData\Local\Temp\hitpawedimakor_hitpawem\hitpawedimakor_hitpawem_3.4.1.exe
MD5:
SHA256:
6836edimakor.hitpaw.com hitpaw-edimakor-full.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_FB287BEB63DB9E8D59A799779773B97Cbinary
MD5:04C6AA01B1CA4C8030E6DE90A392EFB5
SHA256:FFB0E8CF0D6FDF10A8422687E3AC445CA2A1985AE2913CB04E55415A1F470DAA
6836edimakor.hitpaw.com hitpaw-edimakor-full.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_E5BB0F21B386C88093E718A87A877885binary
MD5:630038B69BC852CDDB7CAB123AEBEED7
SHA256:F1F4F82885AECF59DA8EFFC0DE31AAF037C3F6717B0FB6594656A04CE2569922
6836edimakor.hitpaw.com hitpaw-edimakor-full.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_E5BB0F21B386C88093E718A87A877885binary
MD5:163446E17FBD2B95939742FE939E23E6
SHA256:8AEF115E91293A438C84830EA7388D3A56C3D6ECBD0D3205B78A6519BC067974
2164hitpawedimakor_hitpawem_3.4.1.tmpC:\Users\admin\AppData\Local\Temp\is-4SUJF.tmp\_isetup\_setup64.tmpexecutable
MD5:E4211D6D009757C078A9FAC7FF4F03D4
SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
6836edimakor.hitpaw.com hitpaw-edimakor-full.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_FB287BEB63DB9E8D59A799779773B97Cbinary
MD5:39A098BFFF5D2266E4B0FD4F92094DCE
SHA256:6FC8191A5282232F5F1C6D66715763432B6925F2C71D10B69189AFBF81BACA80
2164hitpawedimakor_hitpawem_3.4.1.tmpC:\Program Files (x86)\HitPaw\HitPaw Edimakor\is-6ATKN.tmpexecutable
MD5:B87593CE7DD52FEDB751B4FCE0D50ADF
SHA256:25CD9CF8FA220FD3DB04771AC0DE76CB62D62A10C4EBCEA3E572237CA4B461BF
2164hitpawedimakor_hitpawem_3.4.1.tmpC:\Program Files (x86)\HitPaw\HitPaw Edimakor\is-UN6ER.tmpexecutable
MD5:758EF2D92DF594B005CB3006DE4B7177
SHA256:39D73E69F95A322DE3FB65CFFE533AF772A92B66BD92A629C145EC8F8448F7CB
2164hitpawedimakor_hitpawem_3.4.1.tmpC:\Program Files (x86)\HitPaw\HitPaw Edimakor\unins000.exeexecutable
MD5:C72437BEA06810AE31563F3AE03852DB
SHA256:488EF85004A7B4CCC51D22E476C0B12E8CD3981D5BE5ABA7F66D9891A2047A21
2164hitpawedimakor_hitpawem_3.4.1.tmpC:\Program Files (x86)\HitPaw\HitPaw Edimakor\is-8VTJ3.tmpexecutable
MD5:C72437BEA06810AE31563F3AE03852DB
SHA256:488EF85004A7B4CCC51D22E476C0B12E8CD3981D5BE5ABA7F66D9891A2047A21
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
14
TCP/UDP connections
84
DNS requests
25
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6092
svchost.exe
GET
200
2.19.217.218:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.216.77.25:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.19.217.218:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6092
svchost.exe
GET
200
23.216.77.25:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6836
edimakor.hitpaw.com hitpaw-edimakor-full.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAhflMAthXvozBT%2FU%2B2iPio%3D
unknown
whitelisted
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6448
SIHClient.exe
GET
200
2.19.217.218:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6836
edimakor.hitpaw.com hitpaw-edimakor-full.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTjzY2p9Pa8oibmj%2BNSMWsz63kmWgQUuhbZbU2FL3MpdpovdYxqII%2BeyG8CEAuuZrxaun%2BVh8b56QTjMwQ%3D
unknown
whitelisted
6448
SIHClient.exe
GET
200
2.19.217.218:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
6092
svchost.exe
23.216.77.25:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
23.216.77.25:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
6092
svchost.exe
2.19.217.218:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
4712
MoUsoCoreWorker.exe
2.19.217.218:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
5064
SearchApp.exe
23.212.110.144:443
www.bing.com
Akamai International B.V.
CZ
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
6836
edimakor.hitpaw.com hitpaw-edimakor-full.exe
104.17.207.155:80
www.tenorshare.com
CLOUDFLARENET
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 51.124.78.146
whitelisted
crl.microsoft.com
  • 23.216.77.25
  • 23.216.77.7
whitelisted
www.microsoft.com
  • 2.19.217.218
whitelisted
google.com
  • 172.217.23.110
whitelisted
www.bing.com
  • 23.212.110.144
  • 23.212.110.162
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
www.tenorshare.com
  • 104.17.207.155
  • 104.17.192.141
whitelisted
update.tenorshare.com
  • 104.18.24.249
  • 104.18.25.249
unknown
ip-api.com
  • 208.95.112.1
shared
www.google-analytics.com
  • 172.217.18.14
unknown

Threats

PID
Process
Class
Message
6836
edimakor.hitpaw.com hitpaw-edimakor-full.exe
Potential Corporate Privacy Violation
ET POLICY Unsupported/Fake Windows NT Version 5.0
2192
svchost.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Check (ip-api .com)
2192
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)
6836
edimakor.hitpaw.com hitpaw-edimakor-full.exe
Potential Corporate Privacy Violation
ET POLICY Unsupported/Fake Windows NT Version 5.0
6836
edimakor.hitpaw.com hitpaw-edimakor-full.exe
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup ip-api.com
2 ETPRO signatures available at the full report
No debug info