Cloudflare WARP.exe threat report

MD5 97f979933538781cd8103ce9b32edebb
Latest seen 2023-03-09 23:39:05 (3 years ago)
First seen 2023-02-27 23:47:54 (3 years ago)
Size 222 MB
Publisher Cloudflare
Product Cloudflare WARP
Signed by Cloudflare, Inc.

GridinSoft Anti-Malware detection

Detected by GridinSoft before you download

The current ThreatInfo record shows this exact file hash detected as Trojan.Gen. Download GridinSoft Anti-Malware to scan the device, confirm whether this file is present, and remove the detected object if it is found.

Detection name
Trojan.Gen
Recommended action
Scan and remove
Last analysis
2023-03-09 23:39:05 (3 years ago)
File hash
97f979933538781cd8103ce9b32edebb
Download Anti-Malware

Why it matters

Why GridinSoft flags this file

Detection

GridinSoft identifies the sample as Trojan.Gen.

Timeline

First seen 2023-02-27 23:47:54 (3 years ago); latest analysis 2023-03-09 23:39:05 (3 years ago).

Publisher context

Company metadata: Cloudflare. Product metadata: Cloudflare WARP.

Digital signature

Signed by Cloudflare, Inc.. The signature is reported as valid, but signed files can still be bundled or abused.

Observed locations

ThreatInfo has seen this file in user or system paths listed below. Unexpected locations increase the need for local verification.

Recommended action

What to do next

  1. Compare the MD5 above with the file found on the device.
  2. Check whether the file appears in the observed locations or under one of the alternate names.
  3. Run GridinSoft Anti-Malware to confirm the detection and remove the file if it is present.

Cloudflare WARP.exe is a Windows file recorded in the ThreatInfo database. It is associated with Cloudflare WARP. The reported company name is Cloudflare. The current detection status is Trojan.Gen, based on the latest analysis from 2023-03-09 23:39:05 (3 years ago).

If Cloudflare WARP.exe appears on your computer unexpectedly, treat it as suspicious. Check its location, digital signature, and recent system changes before allowing it to run. A full anti-malware scan is recommended when this file is detected as Trojan.Gen.

Product Name: Cloudflare WARP
Company Name: Cloudflare
MD5: 97f979933538781cd8103ce9b32edebb
Size: 222 MB
First Published: 2023-02-27 23:47:54 (3 years ago)
Latest Published: 2023-03-09 23:39:05 (3 years ago)
Status: Trojan.Gen (on last analysis)
Analysis Date: 2023-03-09 23:39:05 (3 years ago)
Cloudflare WARP.exe detection screenshot

The screenshot is a visual record of a GridinSoft Anti-Malware detection for this sample. Use the hash and metadata above as the primary identifiers when comparing the file on your system.

Signed By: Cloudflare, Inc.
Status: Valid

The signature on Cloudflare WARP.exe is reported as valid. A valid signature helps confirm publisher identity, but it does not automatically make the file safe if the installer was bundled, abused, or downloaded from an untrusted source.

%programfiles%\cloudflare

ThreatInfo has observed Cloudflare WARP.exe in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

100.0%

The strongest geographic signal for this file is United States with 100.0% of observed hits. Geographic distribution can help identify targeted campaigns, regional software bundles, or where a file is most commonly reported.

Windows 10 100.0%

The most common operating system signal for Cloudflare WARP.exe is Windows 10 with 100.0% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

Cloudflare WARP.exe is identified as pe for 64 systems. The subsystem is Windows GUI. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Subsystem: Windows GUI
PE Type: pe
OS Bitness: 64
Image Base: 0x0000000140000000
Entry Address: 0x005a0d90

PE Sections:

Name Size of data MD5
.text 6272000 fcf2733785fd5920b54129b0bd340d7a
.CLR_UEF 512 66c042b0029b087d224a84943ed3f644
.rdata 1532416 6eb1137a8845269cb70b09bd0bcf72c3
.data 28672 d24d65e5b895e359e7b5587e234b9239
.pdata 220160 fc39b7b6d3eb590398b91d37c4e25e43
.didat 512 80476f4f41d9acc35ba609cdeaa3cea6
Section 512 bf619eac0cdf3f68d496ea9344137e8b
_RDATA 78848 01b97fe5618268b684aac15a20776fb3
.rsrc 1619456 361d794c3a418647c8e2147ce4979e69
.reloc 29184 86d0a93ffbd46de6f12e60c9ec18d92e

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

More information: