File name:

HotspotShield-8.7.1-plain-773-plain.exe

Full analysis: https://app.any.run/tasks/ae619b61-69a9-4a44-9559-cbfd842c5cee
Verdict: Malicious activity
Analysis date: November 06, 2019, 01:39:55
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

6EADE58744303E75F9938441F7F2855E

SHA1:

BD659EA533717D8440036016F348C2908CF68E22

SHA256:

2925984D625A30F29A7DB8CAAB9E526B7104BCE6ADD678607CA9BF454BCBA674

SSDEEP:

393216:KorH3lle+5zJnruBwUBfHWoIQarOgYpS/Z1ZuF0FtY9:Kobu+HKwU1TarOgYpS/Z1g+o

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • HotspotShield-8.7.1-plain-773-plain.exe (PID: 1884)
      • HSS-8.7.1-install-plain-773-plain.exe (PID: 1948)
      • ns17E.tmp (PID: 3100)
      • ns383.tmp (PID: 3352)
      • tapinstall.exe (PID: 1724)
      • tap-windows-9.21.2.exe (PID: 520)
      • tapinstall.exe (PID: 2260)
      • cmw_srv.exe (PID: 4044)
      • hsscp.exe (PID: 3960)
      • hsscp.exe (PID: 3956)
    • Loads dropped or rewritten executable

      • rundll32.exe (PID: 3696)
      • HotspotShield-8.7.1-plain-773-plain.exe (PID: 1884)
      • rundll32.exe (PID: 1780)
      • rundll32.exe (PID: 2080)
      • rundll32.exe (PID: 2684)
      • rundll32.exe (PID: 776)
      • rundll32.exe (PID: 3448)
      • rundll32.exe (PID: 532)
      • rundll32.exe (PID: 3280)
      • tap-windows-9.21.2.exe (PID: 520)
      • rundll32.exe (PID: 2196)
      • rundll32.exe (PID: 2428)
      • rundll32.exe (PID: 4020)
      • rundll32.exe (PID: 2208)
      • cmw_srv.exe (PID: 4044)
      • rundll32.exe (PID: 3172)
      • hsscp.exe (PID: 3956)
      • hsscp.exe (PID: 3960)
      • rundll32.exe (PID: 3796)
    • Changes the autorun value in the registry

      • HSS-8.7.1-install-plain-773-plain.exe (PID: 1948)
    • Changes settings of System certificates

      • msiexec.exe (PID: 2996)
      • certutil.exe (PID: 1160)
      • certutil.exe (PID: 2372)
      • tapinstall.exe (PID: 2260)
  • SUSPICIOUS

    • Creates files in the program directory

      • HotspotShield-8.7.1-plain-773-plain.exe (PID: 1884)
      • HSS-8.7.1-install-plain-773-plain.exe (PID: 1948)
      • tap-windows-9.21.2.exe (PID: 520)
      • cmw_srv.exe (PID: 4044)
      • hsscp.exe (PID: 3960)
    • Executable content was dropped or overwritten

      • HotspotShield-8.7.1-plain-773-plain.exe (PID: 1884)
      • HotspotShield-8.7.1-plain-773-plain.exe (PID: 3176)
      • rundll32.exe (PID: 1780)
      • HSS-8.7.1-install-plain-773-plain.exe (PID: 1948)
      • msiexec.exe (PID: 2996)
      • rundll32.exe (PID: 3280)
      • rundll32.exe (PID: 532)
      • rundll32.exe (PID: 776)
      • rundll32.exe (PID: 2080)
      • rundll32.exe (PID: 2196)
      • tap-windows-9.21.2.exe (PID: 520)
      • tapinstall.exe (PID: 2260)
      • DrvInst.exe (PID: 1784)
      • DrvInst.exe (PID: 392)
      • rundll32.exe (PID: 2428)
      • rundll32.exe (PID: 4020)
      • rundll32.exe (PID: 2208)
      • rundll32.exe (PID: 3172)
    • Creates a software uninstall entry

      • HSS-8.7.1-install-plain-773-plain.exe (PID: 1948)
      • tap-windows-9.21.2.exe (PID: 520)
    • Adds / modifies Windows certificates

      • msiexec.exe (PID: 2996)
    • Uses RUNDLL32.EXE to load library

      • MsiExec.exe (PID: 2396)
      • MsiExec.exe (PID: 3452)
    • Starts itself from another location

      • HotspotShield-8.7.1-plain-773-plain.exe (PID: 1884)
    • Reads the machine GUID from the registry

      • HotspotShield-8.7.1-plain-773-plain.exe (PID: 1884)
      • cmw_srv.exe (PID: 4044)
    • Creates files in the Windows directory

      • certutil.exe (PID: 1160)
      • certutil.exe (PID: 2372)
      • DrvInst.exe (PID: 1784)
      • DrvInst.exe (PID: 392)
      • cmw_srv.exe (PID: 4044)
    • Removes files from Windows directory

      • certutil.exe (PID: 1160)
      • DrvInst.exe (PID: 1784)
      • certutil.exe (PID: 2372)
      • DrvInst.exe (PID: 392)
      • cmw_srv.exe (PID: 4044)
    • Starts application with an unusual extension

      • tap-windows-9.21.2.exe (PID: 520)
    • Executed via COM

      • DrvInst.exe (PID: 1784)
      • DrvInst.exe (PID: 392)
    • Creates files in the driver directory

      • DrvInst.exe (PID: 1784)
      • DrvInst.exe (PID: 392)
    • Uses NETSH.EXE for network configuration

      • rundll32.exe (PID: 4020)
      • rundll32.exe (PID: 2428)
    • Executed as Windows Service

      • vssvc.exe (PID: 2500)
      • cmw_srv.exe (PID: 4044)
    • Reads Environment values

      • cmw_srv.exe (PID: 4044)
    • Changes IE settings (feature browser emulation)

      • hsscp.exe (PID: 3960)
  • INFO

    • Loads dropped or rewritten executable

      • MsiExec.exe (PID: 2396)
      • MsiExec.exe (PID: 3452)
      • msiexec.exe (PID: 2996)
    • Application launched itself

      • msiexec.exe (PID: 2996)
    • Creates files in the program directory

      • msiexec.exe (PID: 2996)
    • Dropped object may contain Bitcoin addresses

      • msiexec.exe (PID: 2996)
      • cmw_srv.exe (PID: 4044)
      • hsscp.exe (PID: 3960)
    • Searches for installed software

      • DrvInst.exe (PID: 1784)
    • Low-level read access rights to disk partition

      • vssvc.exe (PID: 2500)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 2996)
    • Reads the hosts file

      • rundll32.exe (PID: 2208)
    • Manual execution by user

      • hsscp.exe (PID: 3960)
    • Reads settings of System Certificates

      • cmw_srv.exe (PID: 4044)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2017:05:01 16:33:52+02:00
PEType: PE32
LinkerVersion: 14.1
CodeSize: 302080
InitializedDataSize: 192000
UninitializedDataSize: -
EntryPoint: 0x2e1fd
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 8.7.1.11380
ProductVersionNumber: 8.7.1.11380
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: AnchorFree Inc.
FileDescription: Hotspot Shield 8.7.1
FileVersion: 8.7.1.11380
InternalName: setup
LegalCopyright: © AnchorFree Inc. All rights reserved.
OriginalFileName: HSS-8.7.1-install-plain-773-plain.exe
ProductName: Hotspot Shield 8.7.1
ProductVersion: 8.7.1.11380

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 01-May-2017 14:33:52
Detected languages:
  • English - United States
Debug artifacts:
  • C:\build\work\eca3d12b\wix3\build\ship\x86\burn.pdb
CompanyName: AnchorFree Inc.
FileDescription: Hotspot Shield 8.7.1
FileVersion: 8.7.1.11380
InternalName: setup
LegalCopyright: © AnchorFree Inc. All rights reserved.
OriginalFilename: HSS-8.7.1-install-plain-773-plain.exe
ProductName: Hotspot Shield 8.7.1
ProductVersion: 8.7.1.11380

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000118

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 7
Time date stamp: 01-May-2017 14:33:52
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_NET_RUN_FROM_SWAP
  • IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x00049A67
0x00049C00
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.56282
.rdata
0x0004B000
0x0001EC60
0x0001EE00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.10841
.data
0x0006A000
0x00001730
0x00000A00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
3.15458
.wixburn8
0x0006C000
0x00000038
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
0.739068
.tls
0x0006D000
0x00000009
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
.rsrc
0x0006E000
0x0000B360
0x0000B400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
6.53921
.reloc
0x0007A000
0x00003DEC
0x00003E00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
6.79026

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.30829
1234
Latin 1 / Western European
English - United States
RT_MANIFEST
2
4.14453
2440
Latin 1 / Western European
English - United States
RT_ICON
3
3.96121
4264
Latin 1 / Western European
English - United States
RT_ICON
4
3.64277
9640
Latin 1 / Western European
English - United States
RT_ICON
5
7.95865
15425
Latin 1 / Western European
English - United States
RT_ICON

Imports

ADVAPI32.dll
Cabinet.dll (delay-loaded)
GDI32.dll
KERNEL32.dll
OLEAUT32.dll
RPCRT4.dll
SHELL32.dll
USER32.dll
ole32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
84
Monitored processes
36
Malicious processes
26
Suspicious processes
3

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start drop and start hotspotshield-8.7.1-plain-773-plain.exe hotspotshield-8.7.1-plain-773-plain.exe hss-8.7.1-install-plain-773-plain.exe msiexec.exe msiexec.exe no specs rundll32.exe no specs rundll32.exe rundll32.exe rundll32.exe no specs rundll32.exe msiexec.exe no specs rundll32.exe rundll32.exe no specs rundll32.exe certutil.exe no specs certutil.exe no specs rundll32.exe tap-windows-9.21.2.exe ns17e.tmp no specs tapinstall.exe no specs ns383.tmp no specs tapinstall.exe drvinst.exe vssvc.exe no specs drvinst.exe rundll32.exe netsh.exe no specs netsh.exe no specs rundll32.exe netsh.exe no specs rundll32.exe cmw_srv.exe hsscp.exe no specs hsscp.exe no specs rundll32.exe no specs rundll32.exe

Process information

PID
CMD
Path
Indicators
Parent process
392DrvInst.exe "2" "211" "ROOT\NET\0000" "C:\Windows\INF\oem4.inf" "oemvista.inf:tap0901:tap0901.ndi:9.0.0.21:tap0901" "6d14a44ff" "000005CC" "000005D4" "0000039C"C:\Windows\system32\DrvInst.exe
svchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\drvinst.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
520"C:\Program Files\Hotspot Shield\driver\tap-windows-9.21.2.exe" /SC:\Program Files\Hotspot Shield\driver\tap-windows-9.21.2.exe
rundll32.exe
User:
SYSTEM
Integrity Level:
SYSTEM
Exit code:
0
Modules
Images
c:\program files\hotspot shield\driver\tap-windows-9.21.2.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
532rundll32.exe "C:\Windows\Installer\MSIF5D2.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_3798500 73 Hss.Setup.Actions!Hss.Setup.Actions.CustomActions.StopWinServiceC:\Windows\system32\rundll32.exe
MsiExec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
776rundll32.exe "C:\Windows\Installer\MSIF38E.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_3798000 65 Hss.Setup.Actions!Hss.Setup.Actions.CustomActions.StopWinServiceC:\Windows\system32\rundll32.exe
MsiExec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
1160"C:\Windows\system32\certutil.exe" -addstore TrustedPublisher "C:\Program Files\Hotspot Shield\driver\openvpn-sha1.cer"C:\Windows\system32\certutil.exeMsiExec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
CertUtil.exe
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\certutil.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\certcli.dll
c:\windows\system32\atl.dll
1520"C:\Windows\system32\netsh.exe" int ip set interface 18 metric=10C:\Windows\system32\netsh.exerundll32.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Network Command Shell
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\netsh.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\credui.dll
c:\windows\system32\user32.dll
1724"C:\Program Files\TAP-Windows\bin\tapinstall.exe" hwids tap0901C:\Program Files\TAP-Windows\bin\tapinstall.exens17E.tmp
User:
SYSTEM
Company:
Windows (R) Win 7 DDK provider
Integrity Level:
SYSTEM
Description:
Windows Setup API
Exit code:
0
Version:
6.1.7600.16385 built by: WinDDK
Modules
Images
c:\program files\tap-windows\bin\tapinstall.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\user32.dll
1780rundll32.exe "C:\Windows\Installer\MSID8B8.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_3791046 5 Hss.Setup.Actions!Hss.Setup.Actions.CustomActions.ServiceExecuteCommandC:\Windows\system32\rundll32.exe
MsiExec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
1784DrvInst.exe "4" "0" "C:\Users\admin\AppData\Local\Temp\{24ff3cea-fcdb-0a46-f8a9-9d302d5e8d5d}\oemvista.inf" "0" "6d14a44ff" "000005CC" "WinSta0\Default" "000003C4" "208" "c:\program files\tap-windows\driver"C:\Windows\system32\DrvInst.exe
svchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\drvinst.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1884"C:\Users\admin\AppData\Local\Temp\{A3A27C6E-D55D-48A6-A45D-ECD3DB5D9622}\.cr\HotspotShield-8.7.1-plain-773-plain.exe" -burn.clean.room="C:\Users\admin\Downloads\HotspotShield-8.7.1-plain-773-plain.exe" -burn.filehandle.attached=148 -burn.filehandle.self=156 C:\Users\admin\AppData\Local\Temp\{A3A27C6E-D55D-48A6-A45D-ECD3DB5D9622}\.cr\HotspotShield-8.7.1-plain-773-plain.exe
HotspotShield-8.7.1-plain-773-plain.exe
User:
admin
Company:
AnchorFree Inc.
Integrity Level:
MEDIUM
Description:
Hotspot Shield 8.7.1
Exit code:
0
Version:
8.7.1.11380
Modules
Images
c:\users\admin\appdata\local\temp\{a3a27c6e-d55d-48a6-a45d-ecd3db5d9622}\.cr\hotspotshield-8.7.1-plain-773-plain.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
Total events
3 154
Read events
2 098
Write events
1 004
Delete events
52

Modification events

(PID) Process:(1884) HotspotShield-8.7.1-plain-773-plain.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\HotspotShield-8_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(1884) HotspotShield-8.7.1-plain-773-plain.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\HotspotShield-8_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(1884) HotspotShield-8.7.1-plain-773-plain.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\HotspotShield-8_RASAPI32
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(1884) HotspotShield-8.7.1-plain-773-plain.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\HotspotShield-8_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
4294901760
(PID) Process:(1884) HotspotShield-8.7.1-plain-773-plain.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\HotspotShield-8_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(1884) HotspotShield-8.7.1-plain-773-plain.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\HotspotShield-8_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(1884) HotspotShield-8.7.1-plain-773-plain.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\HotspotShield-8_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(1884) HotspotShield-8.7.1-plain-773-plain.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\HotspotShield-8_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(1884) HotspotShield-8.7.1-plain-773-plain.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\HotspotShield-8_RASMANCS
Operation:writeName:FileTracingMask
Value:
4294901760
(PID) Process:(1884) HotspotShield-8.7.1-plain-773-plain.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\HotspotShield-8_RASMANCS
Operation:writeName:ConsoleTracingMask
Value:
4294901760
Executable files
152
Suspicious files
31
Text files
203
Unknown types
14

Dropped files

PID
Process
Filename
Type
3176HotspotShield-8.7.1-plain-773-plain.exeC:\Users\admin\AppData\Local\Temp\{A3A27C6E-D55D-48A6-A45D-ECD3DB5D9622}\.cr\HotspotShield-8.7.1-plain-773-plain.exeexecutable
MD5:
SHA256:
1884HotspotShield-8.7.1-plain-773-plain.exeC:\Users\admin\AppData\Local\Temp\{4224D00F-07FB-41E5-A968-E0F4032C2B46}\.ba\1038\mbapreq.wxlxml
MD5:17FB605A2F02DA203DF06F714D1CC6DE
SHA256:55CF62D54EFB79801A9D94B24B3C9BA221C2465417A068950D40A67C52BA66EF
1884HotspotShield-8.7.1-plain-773-plain.exeC:\Users\admin\AppData\Local\Temp\{4224D00F-07FB-41E5-A968-E0F4032C2B46}\.ba\1043\mbapreq.wxlxml
MD5:67F28BCDB3BA6774CD66AA198B06FF38
SHA256:226B778604236931B4AE45F6F272586C884A11517444A34BF45CD5CAE49BE62E
1884HotspotShield-8.7.1-plain-773-plain.exeC:\Users\admin\AppData\Local\Temp\{4224D00F-07FB-41E5-A968-E0F4032C2B46}\.ba\1042\mbapreq.wxlxml
MD5:442F8463EF5CA42B99B2EFACA696BD01
SHA256:D22F6ADA97DBFFC1E7548E52163807F982B30B11A2A5109E71F42985102CCCBD
1884HotspotShield-8.7.1-plain-773-plain.exeC:\Users\admin\AppData\Local\Temp\{4224D00F-07FB-41E5-A968-E0F4032C2B46}\.ba\mbapreq.dllexecutable
MD5:6BA2E331E0F447AAFF0E8142DF5F7230
SHA256:58A135101A2044D96F470E29369A8214C5C2ADD774488D73C6AE81A588582239
1884HotspotShield-8.7.1-plain-773-plain.exeC:\Users\admin\AppData\Local\Temp\{4224D00F-07FB-41E5-A968-E0F4032C2B46}\.ba\1032\mbapreq.wxlxml
MD5:074D5921AF07E6126049CB45814246ED
SHA256:B8E90E20EDF110AAAAEA54FBC8533872831777BE5589E380CFDD17E1F93147B5
1884HotspotShield-8.7.1-plain-773-plain.exeC:\Users\admin\AppData\Local\Temp\{4224D00F-07FB-41E5-A968-E0F4032C2B46}\.ba\1046\mbapreq.wxlxml
MD5:BD39ADB6B872163FD2D570028E9F3213
SHA256:ECB5C22E6C2423CAF07AEBE69F4FAF22450164EEE9587B64EF45A2D7F658CA15
1884HotspotShield-8.7.1-plain-773-plain.exeC:\Users\admin\AppData\Local\Temp\{4224D00F-07FB-41E5-A968-E0F4032C2B46}\.ba\mbapreq.thmxml
MD5:A20778EC90A094A62A6C3A6AB2A6DC7D
SHA256:F8C3A03F47F0B9B3C20F0522A2481DA28C77FECDBB302F8DD8FBED87758CBAEA
1884HotspotShield-8.7.1-plain-773-plain.exeC:\Users\admin\AppData\Local\Temp\{4224D00F-07FB-41E5-A968-E0F4032C2B46}\.ba\BootstrapperCore.dllexecutable
MD5:1197872FA5DBF0A9D8C742558812DDE8
SHA256:C1232F304EC8B3CE1626569AC28C6D1EEEA2EB891FC52D39E56F0D6102AC3D7E
1884HotspotShield-8.7.1-plain-773-plain.exeC:\Users\admin\AppData\Local\Temp\{4224D00F-07FB-41E5-A968-E0F4032C2B46}\.ba\1045\mbapreq.wxlxml
MD5:96ACAAA5AEF7798E9048BAFF4C3FA8D3
SHA256:F4AA983E39FB29C95E3306082F034B3A43E1D26489C997B8E6697B6A3B2F9F3C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
18
DNS requests
18
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1884
HotspotShield-8.7.1-plain-773-plain.exe
GET
200
93.184.220.29:80
http://sv.symcb.com/sv.crl
US
binary
69.4 Kb
whitelisted
1884
HotspotShield-8.7.1-plain-773-plain.exe
GET
200
23.37.43.27:80
http://s2.symcb.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS56bKHAoUD%2BOyl%2B0LhPg9JxyQm4gQUf9Nlp8Ld7LvwMAnzQzn6Aq8zMTMCED141%2Fl2SWCyYX308B7Khio%3D
NL
der
1.71 Kb
whitelisted
1884
HotspotShield-8.7.1-plain-773-plain.exe
GET
200
151.101.2.133:80
http://crl.globalsign.net/root-r3.crl
US
der
594 b
whitelisted
1884
HotspotShield-8.7.1-plain-773-plain.exe
GET
200
104.18.20.226:80
http://ocsp2.globalsign.com/gstimestampingsha2g2/ME0wSzBJMEcwRTAJBgUrDgMCGgUABBSjGBiH3r3C3XMEvNdiXYt4k1CKRwQUkiGnSpVdZLCbtB7mADdH5p1BK0wCDAynz10HBySsieeaOg%3D%3D
US
der
1.52 Kb
whitelisted
1080
svchost.exe
GET
200
172.217.22.35:80
http://ocsp.pki.goog/GTSGIAG3/MEkwRzBFMEMwQTAJBgUrDgMCGgUABBT27bBjYjKBmjX2jXWgnQJKEapsrQQUd8K4UJpndnaxLcKG0IOgfqZ%2BuksCCC7Rp3EQG0zo
US
binary
5 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1884
HotspotShield-8.7.1-plain-773-plain.exe
52.216.145.117:443
s3.amazonaws.com
Amazon.com, Inc.
US
unknown
1884
HotspotShield-8.7.1-plain-773-plain.exe
13.32.222.133:443
d30knos47lxv4f.cloudfront.net
Amazon.com, Inc.
US
whitelisted
1884
HotspotShield-8.7.1-plain-773-plain.exe
138.68.101.1:443
www.legaladviser.us
Digital Ocean, Inc.
DE
malicious
1884
HotspotShield-8.7.1-plain-773-plain.exe
23.37.43.27:80
s2.symcb.com
Akamai Technologies, Inc.
NL
whitelisted
1884
HotspotShield-8.7.1-plain-773-plain.exe
93.184.220.29:80
sv.symcb.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
1884
HotspotShield-8.7.1-plain-773-plain.exe
151.101.2.133:80
crl.globalsign.net
Fastly
US
malicious
1884
HotspotShield-8.7.1-plain-773-plain.exe
104.18.20.226:80
ocsp2.globalsign.com
Cloudflare Inc
US
shared
1080
svchost.exe
172.217.22.35:80
ocsp.pki.goog
Google Inc.
US
whitelisted
4044
cmw_srv.exe
13.32.222.8:443
d3qrgc52ksxp0f.cloudfront.net
Amazon.com, Inc.
US
unknown
4044
cmw_srv.exe
52.222.149.69:443
d3qrgc52ksxp0f.cloudfront.net
Amazon.com, Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
s3.amazonaws.com
  • 52.216.145.117
shared
d30knos47lxv4f.cloudfront.net
  • 13.32.222.133
  • 13.32.222.150
  • 13.32.222.175
  • 13.32.222.124
whitelisted
www.legaladviser.us
  • 138.68.101.1
  • 159.89.100.215
  • 138.68.77.102
  • 138.68.92.190
  • 159.89.27.102
  • 46.101.131.99
unknown
s2.symcb.com
  • 23.37.43.27
whitelisted
sv.symcd.com
  • 23.37.43.27
shared
sv.symcb.com
  • 93.184.220.29
whitelisted
crl.globalsign.net
  • 151.101.2.133
  • 151.101.66.133
  • 151.101.130.133
  • 151.101.194.133
whitelisted
ocsp2.globalsign.com
  • 104.18.20.226
  • 104.18.21.226
whitelisted
ocsp.pki.goog
  • 172.217.22.35
whitelisted
hsselite.com
  • 184.169.221.190
  • 52.9.81.184
whitelisted

Threats

No threats detected
No debug info