File name:

edimakor.hitpaw.com hitpaw-edimakor-full.exe

Full analysis: https://app.any.run/tasks/7d73ac4e-f030-4d67-af6a-90746fa53858
Verdict: Malicious activity
Analysis date: December 30, 2024, 04:23:39
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
evasion
upx
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, UPX compressed, 3 sections
MD5:

11C21DE37E98A41BFC615520C3B8093E

SHA1:

A8FBFC56D74AB77924B87BF2D0225BA29C245929

SHA256:

B1FA18F25ED6F8137E8ADECF59F3052B9AB63A4E22E190D0611F9A5F1705B174

SSDEEP:

98304:bm2JbZKs1PyDsUPO0RHYxuyfpCd5iIQto65E0KqLvyInJl1Fg2tJ6X5TCyliloYY:hVFu

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • edimakor.hitpaw.com hitpaw-edimakor-full.exe (PID: 6672)
      • hitpawedimakor_hitpawem_3.4.1.tmp (PID: 5972)
    • Checks Windows Trust Settings

      • edimakor.hitpaw.com hitpaw-edimakor-full.exe (PID: 6672)
    • Potential Corporate Privacy Violation

      • edimakor.hitpaw.com hitpaw-edimakor-full.exe (PID: 6672)
    • Checks for external IP

      • edimakor.hitpaw.com hitpaw-edimakor-full.exe (PID: 6672)
      • svchost.exe (PID: 2192)
    • Executable content was dropped or overwritten

      • hitpawedimakor_hitpawem_3.4.1.exe (PID: 3848)
      • hitpawedimakor_hitpawem_3.4.1.tmp (PID: 5972)
    • Reads the Windows owner or organization settings

      • hitpawedimakor_hitpawem_3.4.1.tmp (PID: 5972)
    • Creates/Modifies COM task schedule object

      • dxdiag.exe (PID: 3436)
    • Uses TASKKILL.EXE to kill process

      • hitpawedimakor_hitpawem_3.4.1.tmp (PID: 5972)
    • Starts CMD.EXE for commands execution

      • hitpawedimakor_hitpawem_3.4.1.tmp (PID: 5972)
    • Get information on the list of running processes

      • cmd.exe (PID: 3532)
      • hitpawedimakor_hitpawem_3.4.1.tmp (PID: 5972)
      • cmd.exe (PID: 3628)
    • Drops 7-zip archiver for unpacking

      • hitpawedimakor_hitpawem_3.4.1.tmp (PID: 5972)
    • Process drops legitimate windows executable

      • hitpawedimakor_hitpawem_3.4.1.tmp (PID: 5972)
    • The process drops C-runtime libraries

      • hitpawedimakor_hitpawem_3.4.1.tmp (PID: 5972)
  • INFO

    • Checks supported languages

      • edimakor.hitpaw.com hitpaw-edimakor-full.exe (PID: 6672)
      • hitpawedimakor_hitpawem_3.4.1.exe (PID: 3848)
      • hitpawedimakor_hitpawem_3.4.1.tmp (PID: 5972)
    • The sample compiled with english language support

      • edimakor.hitpaw.com hitpaw-edimakor-full.exe (PID: 6672)
      • hitpawedimakor_hitpawem_3.4.1.tmp (PID: 5972)
    • Reads the computer name

      • edimakor.hitpaw.com hitpaw-edimakor-full.exe (PID: 6672)
      • hitpawedimakor_hitpawem_3.4.1.tmp (PID: 5972)
    • Creates files or folders in the user directory

      • edimakor.hitpaw.com hitpaw-edimakor-full.exe (PID: 6672)
      • dxdiag.exe (PID: 3436)
    • Reads the machine GUID from the registry

      • edimakor.hitpaw.com hitpaw-edimakor-full.exe (PID: 6672)
    • Reads the software policy settings

      • edimakor.hitpaw.com hitpaw-edimakor-full.exe (PID: 6672)
      • dxdiag.exe (PID: 3436)
    • Creates files in the program directory

      • edimakor.hitpaw.com hitpaw-edimakor-full.exe (PID: 6672)
      • hitpawedimakor_hitpawem_3.4.1.tmp (PID: 5972)
    • Checks proxy server information

      • edimakor.hitpaw.com hitpaw-edimakor-full.exe (PID: 6672)
    • UPX packer has been detected

      • edimakor.hitpaw.com hitpaw-edimakor-full.exe (PID: 6672)
    • Create files in a temporary directory

      • edimakor.hitpaw.com hitpaw-edimakor-full.exe (PID: 6672)
      • hitpawedimakor_hitpawem_3.4.1.exe (PID: 3848)
      • hitpawedimakor_hitpawem_3.4.1.tmp (PID: 5972)
    • The process uses the downloaded file

      • hitpawedimakor_hitpawem_3.4.1.tmp (PID: 5972)
    • Process checks computer location settings

      • hitpawedimakor_hitpawem_3.4.1.tmp (PID: 5972)
    • Reads security settings of Internet Explorer

      • dxdiag.exe (PID: 3436)
    • The sample compiled with chinese language support

      • hitpawedimakor_hitpawem_3.4.1.tmp (PID: 5972)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | UPX compressed Win32 Executable (64.2)
.dll | Win32 Dynamic Link Library (generic) (15.6)
.exe | Win32 Executable (generic) (10.6)
.exe | Generic Win/DOS Executable (4.7)
.exe | DOS Executable Generic (4.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:11:07 08:01:58+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14
CodeSize: 1601536
InitializedDataSize: 483328
UninitializedDataSize: 1449984
EntryPoint: 0x2e9cb0
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 2.7.20.1
ProductVersionNumber: 2.7.20.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: HitPaw
FileDescription: HitPaw Edimakor
FileVersion: 2.7.20.1
LegalCopyright: Copyright © 2021-2024 HITPAW CO.,LIMITED All Rights Reserved.
ProductName: 20241107160128
ProductVersion: 2.7.20.1
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
158
Monitored processes
32
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start edimakor.hitpaw.com  hitpaw-edimakor-full.exe svchost.exe hitpawedimakor_hitpawem_3.4.1.exe hitpawedimakor_hitpawem_3.4.1.tmp taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs taskkill.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs find.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs find.exe no specs dxdiag.exe no specs edimakor.hitpaw.com  hitpaw-edimakor-full.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1512"C:\WINDOWS\system32\taskkill.exe" /F /IM HitPawAIVideoScriptGenerator.exeC:\Windows\System32\taskkill.exehitpawedimakor_hitpawem_3.4.1.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
1792\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1888\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exetaskkill.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2040"C:\WINDOWS\system32\taskkill.exe" /F /IM HitPawCut_VE.exeC:\Windows\System32\taskkill.exehitpawedimakor_hitpawem_3.4.1.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
2192C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2260"C:\WINDOWS\system32\taskkill.exe" /F /IM HitPawVideoEditor.exeC:\Windows\System32\taskkill.exehitpawedimakor_hitpawem_3.4.1.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
2292tasklist /fo csv C:\Windows\SysWOW64\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
2624"C:\WINDOWS\system32\taskkill.exe" /F /IM BsSndRpt64.exeC:\Windows\System32\taskkill.exehitpawedimakor_hitpawem_3.4.1.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
2828find /c /i "StartUp.exe" C:\Windows\SysWOW64\find.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Find String (grep) Utility
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\find.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
3436"C:\WINDOWS\system32\dxdiag.exe" /whql:off /t C:\Users\admin\AppData\Local\cache\HitPaw Edimakor\sysinfo.txtC:\Windows\SysWOW64\dxdiag.exehitpawedimakor_hitpawem_3.4.1.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft DirectX Diagnostic Tool
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\dxdiag.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
Total events
10 658
Read events
10 476
Write events
165
Delete events
17

Modification events

(PID) Process:(6672) edimakor.hitpaw.com hitpaw-edimakor-full.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Tenorshare\Downloader2.5.0
Operation:writeName:GA_PC
Value:
1
(PID) Process:(6672) edimakor.hitpaw.com hitpaw-edimakor-full.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\GuidGuidold
Operation:writeName:guid
Value:
2541C434-C09A-4360-AC32-99A46211DA69
(PID) Process:(6672) edimakor.hitpaw.com hitpaw-edimakor-full.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\GuidGuidold
Operation:writeName:user_id
Value:
1001
(PID) Process:(3436) dxdiag.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{EEB1CAE3-D0B2-446E-AEDE-727AA9089A1B}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Apartment
(PID) Process:(3436) dxdiag.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
Operation:writeName:DxDiag In SystemInfo
Value:
1
(PID) Process:(3436) dxdiag.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
Operation:delete valueName:DxDiag In DirectDraw
Value:

(PID) Process:(3436) dxdiag.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
Operation:writeName:DxDiag In DirectSound
Value:
1
(PID) Process:(3436) dxdiag.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
Operation:delete valueName:DxDiag In VideoCapture
Value:

(PID) Process:(3436) dxdiag.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
Operation:writeName:DxDiag In Diagnostics
Value:
1
(PID) Process:(3436) dxdiag.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\DirectX Diagnostic Tool
Operation:delete valueName:DxDiag In SystemInfo
Value:

Executable files
809
Suspicious files
41
Text files
278
Unknown types
1

Dropped files

PID
Process
Filename
Type
6672edimakor.hitpaw.com hitpaw-edimakor-full.exeC:\Users\admin\AppData\Local\Temp\hitpawedimakor_hitpawem\hitpawedimakor_hitpawem_3.4.1.exe
MD5:
SHA256:
6672edimakor.hitpaw.com hitpaw-edimakor-full.exeC:\Users\admin\AppData\Local\Temp\hitpawedimakor_hitpawem\galog.jsonbinary
MD5:B53881EB051A447ABF44B63F99A5F559
SHA256:246257FE3B94E1557E2563491F60A5D3A14E46DB654320F982FCAE651DD7F597
6672edimakor.hitpaw.com hitpaw-edimakor-full.exeC:\Users\admin\AppData\Local\Temp\hitpawedimakor_hitpawem\hitpawedimakor_hitpawem_3.4.1.exe.dbtext
MD5:6CFCE249D317569AE46316A2477A397B
SHA256:2FB301EA103ED149A1B6634179C8884D6F3CF2D7426B8BD21FC32B82CA6F8C63
5972hitpawedimakor_hitpawem_3.4.1.tmpC:\Users\admin\AppData\Local\Temp\is-KP5Q4.tmp\_isetup\_setup64.tmpexecutable
MD5:E4211D6D009757C078A9FAC7FF4F03D4
SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
5972hitpawedimakor_hitpawem_3.4.1.tmpC:\Users\admin\AppData\Local\Temp\is-KP5Q4.tmp\_isetup\_isdecmp.dllexecutable
MD5:77D6D961F71A8C558513BED6FD0AD6F1
SHA256:5DA7C8D33D3B7DB46277012D92875C0B850C8ABF1EB3C8C9C5B9532089A0BCF0
5972hitpawedimakor_hitpawem_3.4.1.tmpC:\Program Files (x86)\HitPaw\HitPaw Edimakor\is-1QV0K.tmpexecutable
MD5:C72437BEA06810AE31563F3AE03852DB
SHA256:488EF85004A7B4CCC51D22E476C0B12E8CD3981D5BE5ABA7F66D9891A2047A21
5972hitpawedimakor_hitpawem_3.4.1.tmpC:\Program Files (x86)\HitPaw\HitPaw Edimakor\unins000.exeexecutable
MD5:C72437BEA06810AE31563F3AE03852DB
SHA256:488EF85004A7B4CCC51D22E476C0B12E8CD3981D5BE5ABA7F66D9891A2047A21
5972hitpawedimakor_hitpawem_3.4.1.tmpC:\Program Files (x86)\HitPaw\HitPaw Edimakor\is-BM91B.tmpexecutable
MD5:502E774810B088EB15BF9701C54DE304
SHA256:A9C4B9A7C1632B0E1C12B8652A9845F781A4C6C6EC36417D7AD92C023C4FE1F7
3848hitpawedimakor_hitpawem_3.4.1.exeC:\Users\admin\AppData\Local\Temp\is-A1V7A.tmp\hitpawedimakor_hitpawem_3.4.1.tmpexecutable
MD5:C72437BEA06810AE31563F3AE03852DB
SHA256:488EF85004A7B4CCC51D22E476C0B12E8CD3981D5BE5ABA7F66D9891A2047A21
5972hitpawedimakor_hitpawem_3.4.1.tmpC:\Program Files (x86)\HitPaw\HitPaw Edimakor\7z.exeexecutable
MD5:758EF2D92DF594B005CB3006DE4B7177
SHA256:39D73E69F95A322DE3FB65CFFE533AF772A92B66BD92A629C145EC8F8448F7CB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
15
TCP/UDP connections
84
DNS requests
24
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1688
svchost.exe
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.16.164.49:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1688
svchost.exe
GET
200
23.38.185.166:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.38.185.166:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.38.185.166:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5064
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6672
edimakor.hitpaw.com hitpaw-edimakor-full.exe
GET
301
104.17.192.141:80
http://www.tenorshare.com/downloads/service/softwarelog.txt
unknown
whitelisted
6672
edimakor.hitpaw.com hitpaw-edimakor-full.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAhflMAthXvozBT%2FU%2B2iPio%3D
unknown
whitelisted
6672
edimakor.hitpaw.com hitpaw-edimakor-full.exe
GET
200
208.95.112.1:80
http://ip-api.com/csv
unknown
shared
1176
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
2.16.164.49:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
1688
svchost.exe
2.16.164.49:80
crl.microsoft.com
Akamai International B.V.
NL
whitelisted
4712
MoUsoCoreWorker.exe
23.38.185.166:80
www.microsoft.com
AKAMAI-AS
US
whitelisted
1688
svchost.exe
23.38.185.166:80
www.microsoft.com
AKAMAI-AS
US
whitelisted
23.38.185.166:80
www.microsoft.com
AKAMAI-AS
US
whitelisted
5064
SearchApp.exe
2.23.209.182:443
www.bing.com
Akamai International B.V.
GB
whitelisted
4
System
192.168.100.255:138
whitelisted
5064
SearchApp.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 2.16.164.49
  • 2.16.164.120
whitelisted
www.microsoft.com
  • 23.38.185.166
  • 184.30.21.171
whitelisted
google.com
  • 216.58.206.78
whitelisted
www.bing.com
  • 2.23.209.182
  • 2.23.209.133
  • 2.23.209.149
  • 2.23.209.179
  • 2.23.209.165
  • 2.23.209.140
  • 2.23.209.187
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
www.tenorshare.com
  • 104.17.192.141
  • 104.17.207.155
whitelisted
ip-api.com
  • 208.95.112.1
shared
update.tenorshare.com
  • 104.18.25.249
  • 104.18.24.249
unknown
www.google-analytics.com
  • 142.250.186.174
whitelisted

Threats

PID
Process
Class
Message
6672
edimakor.hitpaw.com hitpaw-edimakor-full.exe
Potential Corporate Privacy Violation
ET POLICY Unsupported/Fake Windows NT Version 5.0
2192
svchost.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Check (ip-api .com)
6672
edimakor.hitpaw.com hitpaw-edimakor-full.exe
Potential Corporate Privacy Violation
ET POLICY Unsupported/Fake Windows NT Version 5.0
2192
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)
6672
edimakor.hitpaw.com hitpaw-edimakor-full.exe
Device Retrieving External IP Address Detected
ET POLICY External IP Lookup ip-api.com
2 ETPRO signatures available at the full report
No debug info