File name:

HogWarp.exe

Full analysis: https://app.any.run/tasks/e2010344-4200-4e52-998d-ddc388d06912
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: September 24, 2024, 16:28:05
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
discordgrabber
generic
stealer
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

D8E7CD71D225418122BC3A3A7C7905F9

SHA1:

ED6311B4367C1AC9D2A54DAC769C95E89E5408EC

SHA256:

CFA11FBB326A7F525E1A5194C84CB26D0E6957673A474144E7C5AEA7481F5692

SSDEEP:

786432:J/+9M33Efw3bZFGbCC6YqBAGwHx4gphOiJ:JG9M33Efw3bbGPa5wHx4gphJJ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • HogWarp.exe (PID: 1884)
      • HogWarp.exe (PID: 7020)
    • DISCORDGRABBER has been detected (YARA)

      • HogWarp.exe (PID: 1884)
  • SUSPICIOUS

    • Malware-specific behavior (creating "System.dll" in Temp)

      • HogWarp.exe (PID: 2988)
    • Uses WMIC.EXE to obtain Windows Installer data

      • cmd.exe (PID: 6876)
      • cmd.exe (PID: 7112)
    • Drops 7-zip archiver for unpacking

      • HogWarp.exe (PID: 2988)
    • Reads security settings of Internet Explorer

      • HogWarp.exe (PID: 2988)
    • Executable content was dropped or overwritten

      • HogWarp.exe (PID: 2988)
      • HogWarp.exe (PID: 7020)
      • HogWarp.exe (PID: 1884)
    • Process drops legitimate windows executable

      • HogWarp.exe (PID: 2988)
    • The process creates files with name similar to system file names

      • HogWarp.exe (PID: 2988)
    • Creates a software uninstall entry

      • HogWarp.exe (PID: 2988)
    • Accesses product unique identifier via WMI (SCRIPT)

      • WMIC.exe (PID: 4680)
      • WMIC.exe (PID: 5996)
    • Get information on the list of running processes

      • HogWarp.exe (PID: 1884)
      • cmd.exe (PID: 6364)
      • cmd.exe (PID: 1932)
      • cmd.exe (PID: 6704)
      • HogWarp.exe (PID: 7020)
      • cmd.exe (PID: 5092)
    • Application launched itself

      • HogWarp.exe (PID: 1884)
      • HogWarp.exe (PID: 7020)
    • Starts CMD.EXE for commands execution

      • HogWarp.exe (PID: 7020)
      • HogWarp.exe (PID: 1884)
  • INFO

    • Checks supported languages

      • HogWarp.exe (PID: 2988)
      • HogWarp.exe (PID: 1884)
      • HogWarp.exe (PID: 6500)
      • HogWarp.exe (PID: 7020)
      • HogWarp.exe (PID: 7032)
      • HogWarp.exe (PID: 448)
      • HogWarp.exe (PID: 4236)
      • HogWarp.exe (PID: 2844)
      • HogWarp.exe (PID: 6732)
    • Reads the computer name

      • HogWarp.exe (PID: 1884)
      • HogWarp.exe (PID: 2988)
      • HogWarp.exe (PID: 6500)
      • HogWarp.exe (PID: 7032)
      • HogWarp.exe (PID: 7020)
      • HogWarp.exe (PID: 2844)
      • HogWarp.exe (PID: 4236)
      • HogWarp.exe (PID: 448)
      • HogWarp.exe (PID: 6732)
    • Create files in a temporary directory

      • HogWarp.exe (PID: 2988)
      • HogWarp.exe (PID: 7020)
      • HogWarp.exe (PID: 1884)
    • Creates files or folders in the user directory

      • HogWarp.exe (PID: 2988)
      • HogWarp.exe (PID: 1884)
      • HogWarp.exe (PID: 2844)
    • Manual execution by a user

      • HogWarp.exe (PID: 1884)
      • HogWarp.exe (PID: 7020)
    • Reads security settings of Internet Explorer

      • WMIC.exe (PID: 4680)
      • WMIC.exe (PID: 5996)
    • Process checks computer location settings

      • HogWarp.exe (PID: 1884)
      • HogWarp.exe (PID: 7020)
    • Reads the machine GUID from the registry

      • HogWarp.exe (PID: 1884)
      • HogWarp.exe (PID: 7020)
      • HogWarp.exe (PID: 2844)
      • HogWarp.exe (PID: 6732)
    • Checks proxy server information

      • HogWarp.exe (PID: 1884)
      • HogWarp.exe (PID: 7020)
    • Reads Environment values

      • HogWarp.exe (PID: 7020)
      • HogWarp.exe (PID: 1884)
    • Reads product name

      • HogWarp.exe (PID: 7020)
      • HogWarp.exe (PID: 1884)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2018:12:15 22:26:14+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 26624
InitializedDataSize: 473088
UninitializedDataSize: 16384
EntryPoint: 0x338f
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: Unity Game Inc.
FileDescription: <Latest.Version>
FileVersion: 1.0.0
LegalCopyright: Copyright © 2024 Unity Game Inc.
ProductName: <HogWarp>
ProductVersion: 1.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
152
Monitored processes
30
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start hogwarp.exe #DISCORDGRABBER hogwarp.exe cmd.exe no specs conhost.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs tasklist.exe no specs hogwarp.exe no specs hogwarp.exe no specs svchost.exe hogwarp.exe cmd.exe no specs conhost.exe no specs wmic.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs tasklist.exe no specs hogwarp.exe no specs hogwarp.exe no specs hogwarp.exe no specs hogwarp.exe no specs ucpdmgr.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
448"C:\Users\admin\AppData\Local\Programs\unitygame-setup\HogWarp.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\admin\AppData\Roaming\unitygame-setup" --mojo-platform-channel-handle=1944 --field-trial-handle=1936,i,6621778306563027077,4533812500198499022,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8C:\Users\admin\AppData\Local\Programs\unitygame-setup\HogWarp.exeHogWarp.exe
User:
admin
Company:
Unity Game Inc.
Integrity Level:
MEDIUM
Description:
<HogWarp>
Version:
1.0.0
Modules
Images
c:\users\admin\appdata\local\programs\unitygame-setup\hogwarp.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ws2_32.dll
1884"C:\Users\admin\AppData\Local\Programs\unitygame-setup\HogWarp.exe" C:\Users\admin\AppData\Local\Programs\unitygame-setup\HogWarp.exe
explorer.exe
User:
admin
Company:
Unity Game Inc.
Integrity Level:
MEDIUM
Description:
<HogWarp>
Version:
1.0.0
Modules
Images
c:\users\admin\appdata\local\programs\unitygame-setup\hogwarp.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1932C:\WINDOWS\system32\cmd.exe /d /s /c "tasklist"C:\Windows\System32\cmd.exeHogWarp.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
1944\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2256C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2844\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2844"C:\Users\admin\AppData\Local\Programs\unitygame-setup\HogWarp.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.3636 --user-data-dir="C:\Users\admin\AppData\Roaming\unitygame-setup" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1940 --field-trial-handle=1964,i,9534519671903316372,8674259494520186728,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2C:\Users\admin\AppData\Local\Programs\unitygame-setup\HogWarp.exeHogWarp.exe
User:
admin
Company:
Unity Game Inc.
Integrity Level:
MEDIUM
Description:
<HogWarp>
Exit code:
0
Version:
1.0.0
Modules
Images
c:\users\admin\appdata\local\programs\unitygame-setup\hogwarp.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2988"C:\Users\admin\Desktop\HogWarp.exe" C:\Users\admin\Desktop\HogWarp.exe
explorer.exe
User:
admin
Company:
Unity Game Inc.
Integrity Level:
MEDIUM
Description:
<Latest.Version>
Exit code:
0
Version:
1.0.0
Modules
Images
c:\users\admin\desktop\hogwarp.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
3068tasklistC:\Windows\System32\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
3924\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
5 077
Read events
5 064
Write events
13
Delete events
0

Modification events

(PID) Process:(2988) HogWarp.exeKey:HKEY_CURRENT_USER\SOFTWARE\f51fe3c3-f9c9-591d-a805-ec4f9e0b3b46
Operation:writeName:InstallLocation
Value:
C:\Users\admin\AppData\Local\Programs\unitygame-setup
(PID) Process:(2988) HogWarp.exeKey:HKEY_CURRENT_USER\SOFTWARE\f51fe3c3-f9c9-591d-a805-ec4f9e0b3b46
Operation:writeName:KeepShortcuts
Value:
true
(PID) Process:(2988) HogWarp.exeKey:HKEY_CURRENT_USER\SOFTWARE\f51fe3c3-f9c9-591d-a805-ec4f9e0b3b46
Operation:writeName:ShortcutName
Value:
HogWarp
(PID) Process:(2988) HogWarp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\f51fe3c3-f9c9-591d-a805-ec4f9e0b3b46
Operation:writeName:DisplayName
Value:
<HogWarp> 1.0.0
(PID) Process:(2988) HogWarp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\f51fe3c3-f9c9-591d-a805-ec4f9e0b3b46
Operation:writeName:UninstallString
Value:
"C:\Users\admin\AppData\Local\Programs\unitygame-setup\Uninstall HogWarp.exe" /currentuser
(PID) Process:(2988) HogWarp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\f51fe3c3-f9c9-591d-a805-ec4f9e0b3b46
Operation:writeName:QuietUninstallString
Value:
"C:\Users\admin\AppData\Local\Programs\unitygame-setup\Uninstall HogWarp.exe" /currentuser /S
(PID) Process:(2988) HogWarp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\f51fe3c3-f9c9-591d-a805-ec4f9e0b3b46
Operation:writeName:DisplayVersion
Value:
1.0.0
(PID) Process:(2988) HogWarp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\f51fe3c3-f9c9-591d-a805-ec4f9e0b3b46
Operation:writeName:DisplayIcon
Value:
C:\Users\admin\AppData\Local\Programs\unitygame-setup\HogWarp.exe,0
(PID) Process:(2988) HogWarp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\f51fe3c3-f9c9-591d-a805-ec4f9e0b3b46
Operation:writeName:Publisher
Value:
Unity Game Inc.
(PID) Process:(2988) HogWarp.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\f51fe3c3-f9c9-591d-a805-ec4f9e0b3b46
Operation:writeName:NoModify
Value:
1
Executable files
24
Suspicious files
127
Text files
6
Unknown types
14

Dropped files

PID
Process
Filename
Type
2988HogWarp.exeC:\Users\admin\AppData\Local\Temp\nsc35F9.tmp\app-64.7z
MD5:
SHA256:
2988HogWarp.exeC:\Users\admin\AppData\Local\Temp\nsc35F9.tmp\7z-out\icudtl.dat
MD5:
SHA256:
2988HogWarp.exeC:\Users\admin\AppData\Local\Temp\nsc35F9.tmp\7z-out\LICENSES.chromium.html
MD5:
SHA256:
2988HogWarp.exeC:\Users\admin\AppData\Local\Temp\nsc35F9.tmp\7z-out\chrome_100_percent.pakpgc
MD5:ACD0FA0A90B43CD1C87A55A991B4FAC3
SHA256:CCBCA246B9A93FA8D4F01A01345E7537511C590E4A8EFD5777B1596D10923B4B
2988HogWarp.exeC:\Users\admin\AppData\Local\Temp\nsc35F9.tmp\7z-out\locales\bg.pakpgc
MD5:945DE8A62865092B8100E93EA3E9828D
SHA256:F0E39893A39CE6133C1B993F1792207830B8670A6EB3185B7E5826D50FEA7BA2
2988HogWarp.exeC:\Users\admin\AppData\Local\Temp\nsc35F9.tmp\7z-out\chrome_200_percent.pakbinary
MD5:4610337E3332B7E65B73A6EA738B47DF
SHA256:C91ABF556E55C29D1EA9F560BB17CC3489CB67A5D0C7A22B58485F5F2FBCF25C
2988HogWarp.exeC:\Users\admin\AppData\Local\Temp\nsc35F9.tmp\7z-out\locales\am.pakpgc
MD5:C6EF9C40B48A069B70ED3335B52A9A9C
SHA256:73A1034BE12ABDA7401EB601819657CD7ADDF011BFD9CE39F115A442BCCBA995
2988HogWarp.exeC:\Users\admin\AppData\Local\Temp\nsc35F9.tmp\nsis7z.dllexecutable
MD5:80E44CE4895304C6A3A831310FBF8CD0
SHA256:B393F05E8FF919EF071181050E1873C9A776E1A0AE8329AEFFF7007D0CADF592
2988HogWarp.exeC:\Users\admin\AppData\Local\Temp\nsc35F9.tmp\7z-out\locales\cs.pakpgc
MD5:A934431D469D19A274243F88BB5AC6FB
SHA256:51C36A5ACDAD5930D8D4F1285315E66B2578F27534D37CD40F0625EE99852C51
2988HogWarp.exeC:\Users\admin\AppData\Local\Temp\nsc35F9.tmp\StdUtils.dllexecutable
MD5:C6A6E03F77C313B267498515488C5740
SHA256:B72E9013A6204E9F01076DC38DABBF30870D44DFC66962ADBF73619D4331601E
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
18
TCP/UDP connections
46
DNS requests
14
Threats
7

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4652
svchost.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
304
20.12.23.50:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
5516
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5516
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
5516
SIHClient.exe
GET
200
23.32.238.107:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl
unknown
whitelisted
5516
SIHClient.exe
GET
200
23.32.238.107:80
http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl
unknown
whitelisted
5516
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl
unknown
whitelisted
5516
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
5516
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.2.crl
unknown
whitelisted
GET
304
20.12.23.50:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
239.255.255.250:1900
whitelisted
4652
svchost.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:137
whitelisted
5336
SearchApp.exe
2.23.209.175:443
Akamai International B.V.
GB
unknown
1884
HogWarp.exe
13.91.222.70:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
1884
HogWarp.exe
45.112.123.126:443
api.gofile.io
AMAZON-02
SG
whitelisted
7020
HogWarp.exe
13.91.222.70:443
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
7020
HogWarp.exe
45.112.123.126:443
api.gofile.io
AMAZON-02
SG
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 4.231.128.59
whitelisted
google.com
  • 172.217.18.14
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
browser.pipe.aria.microsoft.com
  • 52.182.143.211
whitelisted
api.gofile.io
  • 45.112.123.126
  • 51.38.43.18
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
crl.microsoft.com
  • 23.32.238.107
  • 23.32.238.153
  • 23.32.238.115
  • 2.19.198.43
  • 23.32.238.155
  • 23.32.238.145
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted
self.events.data.microsoft.com
  • 13.69.239.79
whitelisted

Threats

PID
Process
Class
Message
2256
svchost.exe
Potentially Bad Traffic
ET INFO Online File Storage Domain in DNS Lookup (gofile .io)
1884
HogWarp.exe
Misc activity
ET INFO File Sharing Related Domain in TLS SNI (gofile .io)
1884
HogWarp.exe
Misc activity
ET INFO File Sharing Related Domain in TLS SNI (gofile .io)
1884
HogWarp.exe
Misc activity
ET INFO File Sharing Related Domain in TLS SNI (gofile .io)
7020
HogWarp.exe
Misc activity
ET INFO File Sharing Related Domain in TLS SNI (gofile .io)
7020
HogWarp.exe
Misc activity
ET INFO File Sharing Related Domain in TLS SNI (gofile .io)
7020
HogWarp.exe
Misc activity
ET INFO File Sharing Related Domain in TLS SNI (gofile .io)
No debug info