File name:

Hola-Browser.exe

Full analysis: https://app.any.run/tasks/650c037a-96d8-401c-8487-5a212760d6d3
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: February 23, 2025, 11:06:02
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
evasion
loader
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

5CF1DE9AF2534DB219C0F0852F9ED3A0

SHA1:

F6C670F042ACDBBE96EAD87BD0E30C952696DA1D

SHA256:

6F8DCBF79C942763EE42EAA733DC4E6D468BEA5A4A0F739A9BF23084BAC21294

SSDEEP:

98304:XINMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMp:hm

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • Hola-Setup-x64-1.233.367.exe (PID: 3552)
  • SUSPICIOUS

    • Application launched itself

      • Hola-Browser.exe (PID: 6348)
      • Hola-Browser.exe (PID: 6952)
      • hola_svc.exe (PID: 5628)
      • hola_cr.exe (PID: 6876)
      • hola_cr.exe (PID: 1796)
    • Reads security settings of Internet Explorer

      • Hola-Browser.exe (PID: 6348)
      • Hola-Browser.exe (PID: 6952)
      • net_updater64.exe (PID: 4164)
    • Executable content was dropped or overwritten

      • Hola-Browser.exe (PID: 6952)
      • Hola-Setup-x64-1.233.367.exe (PID: 3552)
      • net_updater64.exe (PID: 5572)
      • net_updater64.exe (PID: 4164)
      • net_updater64.exe (PID: 5548)
      • 7zr.exe (PID: 6732)
      • Hola-Setup-x64-1.233.367.exe (PID: 6592)
      • net_updater64.exe (PID: 7868)
    • Drops 7-zip archiver for unpacking

      • Hola-Setup-x64-1.233.367.exe (PID: 3552)
    • Creates a software uninstall entry

      • Hola-Setup-x64-1.233.367.exe (PID: 3552)
    • Executes as Windows Service

      • net_updater64.exe (PID: 5572)
      • WmiApSrv.exe (PID: 968)
      • hola_svc.exe (PID: 5628)
    • Checks Windows Trust Settings

      • net_updater64.exe (PID: 5572)
      • net_updater64.exe (PID: 4164)
      • net_updater64.exe (PID: 5548)
      • net_updater64.exe (PID: 7868)
    • The process drops C-runtime libraries

      • net_updater64.exe (PID: 5572)
    • Process drops legitimate windows executable

      • net_updater64.exe (PID: 5572)
    • Detected use of alternative data streams (AltDS)

      • net_updater64.exe (PID: 5572)
      • net_updater64.exe (PID: 4164)
      • net_updater64.exe (PID: 5548)
      • net_updater64.exe (PID: 7868)
    • The process checks if it is being run in the virtual environment

      • net_updater64.exe (PID: 5572)
      • hola_cr.exe (PID: 1796)
    • Creates file in the systems drive root

      • hola_svc.exe (PID: 5628)
    • Connects to unusual port

      • hola_svc.exe (PID: 5628)
    • Checks for external IP

      • net_updater64.exe (PID: 5572)
    • Process requests binary or script from the Internet

      • hola.exe (PID: 5912)
    • Windows service management via SC.EXE

      • sc.exe (PID: 6460)
      • sc.exe (PID: 6484)
      • sc.exe (PID: 6092)
      • sc.exe (PID: 2976)
      • sc.exe (PID: 1856)
      • sc.exe (PID: 4020)
      • sc.exe (PID: 5004)
      • sc.exe (PID: 4544)
      • sc.exe (PID: 3724)
      • sc.exe (PID: 7028)
      • sc.exe (PID: 6492)
      • sc.exe (PID: 6844)
      • sc.exe (PID: 6496)
      • sc.exe (PID: 5212)
      • sc.exe (PID: 2448)
      • sc.exe (PID: 7180)
      • sc.exe (PID: 7188)
      • sc.exe (PID: 7220)
      • sc.exe (PID: 7196)
      • sc.exe (PID: 7212)
      • sc.exe (PID: 1076)
      • sc.exe (PID: 5980)
      • sc.exe (PID: 7240)
      • sc.exe (PID: 7360)
      • sc.exe (PID: 7304)
      • sc.exe (PID: 7328)
      • sc.exe (PID: 7320)
      • sc.exe (PID: 7340)
      • sc.exe (PID: 7348)
      • sc.exe (PID: 7376)
      • sc.exe (PID: 7492)
      • sc.exe (PID: 7384)
      • sc.exe (PID: 7392)
      • sc.exe (PID: 7408)
      • sc.exe (PID: 7508)
      • sc.exe (PID: 7424)
      • sc.exe (PID: 7448)
      • sc.exe (PID: 7264)
      • sc.exe (PID: 7280)
      • sc.exe (PID: 7296)
      • sc.exe (PID: 7524)
      • sc.exe (PID: 7584)
      • sc.exe (PID: 7688)
      • sc.exe (PID: 7652)
      • sc.exe (PID: 7676)
      • sc.exe (PID: 7700)
      • sc.exe (PID: 7728)
      • sc.exe (PID: 7828)
      • sc.exe (PID: 7708)
      • sc.exe (PID: 7756)
      • sc.exe (PID: 7780)
      • sc.exe (PID: 7816)
      • sc.exe (PID: 7804)
      • sc.exe (PID: 7876)
      • sc.exe (PID: 7848)
      • sc.exe (PID: 7544)
      • sc.exe (PID: 7560)
      • sc.exe (PID: 7608)
      • sc.exe (PID: 7480)
      • sc.exe (PID: 7888)
      • sc.exe (PID: 7904)
      • sc.exe (PID: 7924)
      • sc.exe (PID: 7932)
      • sc.exe (PID: 7952)
    • Starts SC.EXE for service management

      • hola_svc.exe (PID: 5628)
  • INFO

    • Checks supported languages

      • Hola-Browser.exe (PID: 6348)
      • Hola-Browser.exe (PID: 6952)
      • Hola-Browser.exe (PID: 7040)
      • Hola-Setup-x64-1.233.367.exe (PID: 3552)
      • net_updater64.exe (PID: 6388)
      • net_updater64.exe (PID: 5572)
      • test_wpf.exe (PID: 732)
      • idle_report.exe (PID: 6356)
      • net_updater64.exe (PID: 4164)
      • hola_svc.exe (PID: 5628)
      • net_updater64.exe (PID: 5548)
      • test_wpf.exe (PID: 4136)
      • test_wpf.exe (PID: 2756)
      • Hola-Setup-x64-1.233.367.exe (PID: 6592)
      • 7zr.exe (PID: 6732)
      • Hola-Setup-x64-1.233.367.exe (PID: 6192)
      • hola_cr.exe (PID: 1796)
      • hola.exe (PID: 5912)
      • hola_cr.exe (PID: 3984)
      • hola_cr.exe (PID: 6972)
      • hola_cr.exe (PID: 6876)
      • hola_cr.exe (PID: 1216)
      • hola_cr.exe (PID: 2324)
      • hola_cr.exe (PID: 720)
      • hola_cr.exe (PID: 6180)
      • hola_cr.exe (PID: 2844)
      • hola_cr.exe (PID: 7068)
      • hola_cr.exe (PID: 7016)
      • hola_cr.exe (PID: 3688)
      • hola_cr.exe (PID: 6760)
      • hola_cr.exe (PID: 6368)
      • hola_cr.exe (PID: 7040)
      • hola_cr.exe (PID: 3544)
      • hola_cr.exe (PID: 6512)
      • hola_cr.exe (PID: 2464)
      • hola_svc.exe (PID: 5544)
      • hola_cr.exe (PID: 7112)
      • hola_cr.exe (PID: 6408)
      • hola_cr.exe (PID: 5872)
      • hola_cr.exe (PID: 4036)
      • hola_cr.exe (PID: 3560)
      • hola_svc.exe (PID: 4500)
      • hola_cr.exe (PID: 2976)
      • hola_cr.exe (PID: 3540)
      • net_updater64.exe (PID: 7868)
      • test_wpf.exe (PID: 8392)
      • hola_cr.exe (PID: 9128)
      • idle_report.exe (PID: 7420)
      • hola_cr.exe (PID: 8260)
    • Reads the computer name

      • Hola-Browser.exe (PID: 6348)
      • Hola-Browser.exe (PID: 6952)
      • Hola-Browser.exe (PID: 7040)
      • Hola-Setup-x64-1.233.367.exe (PID: 3552)
      • net_updater64.exe (PID: 6388)
      • net_updater64.exe (PID: 5572)
      • test_wpf.exe (PID: 732)
      • idle_report.exe (PID: 6356)
      • net_updater64.exe (PID: 4164)
      • test_wpf.exe (PID: 4136)
      • hola_svc.exe (PID: 5628)
      • net_updater64.exe (PID: 5548)
      • Hola-Setup-x64-1.233.367.exe (PID: 6592)
      • 7zr.exe (PID: 6732)
      • Hola-Setup-x64-1.233.367.exe (PID: 6192)
      • hola.exe (PID: 5912)
      • hola_cr.exe (PID: 1796)
      • hola_cr.exe (PID: 3984)
      • hola_cr.exe (PID: 6972)
      • hola_cr.exe (PID: 6876)
      • hola_cr.exe (PID: 2324)
      • hola_cr.exe (PID: 720)
      • hola_cr.exe (PID: 6180)
      • hola_cr.exe (PID: 2844)
      • test_wpf.exe (PID: 2756)
      • hola_cr.exe (PID: 2976)
      • net_updater64.exe (PID: 7868)
      • test_wpf.exe (PID: 8392)
      • idle_report.exe (PID: 7420)
    • Disables trace logs

      • Hola-Browser.exe (PID: 6348)
      • Hola-Browser.exe (PID: 6952)
      • Hola-Browser.exe (PID: 7040)
      • net_updater64.exe (PID: 5572)
      • rasdial.exe (PID: 904)
      • hola_svc.exe (PID: 5628)
      • rasdial.exe (PID: 6820)
      • rasdial.exe (PID: 3052)
      • rasdial.exe (PID: 2800)
      • rasdial.exe (PID: 6996)
      • rasdial.exe (PID: 6524)
      • rasdial.exe (PID: 1292)
      • rasdial.exe (PID: 4908)
      • rasdial.exe (PID: 6820)
      • rasdial.exe (PID: 7120)
      • rasdial.exe (PID: 5200)
      • rasdial.exe (PID: 5936)
      • rasdial.exe (PID: 6764)
      • rasdial.exe (PID: 8844)
      • rasdial.exe (PID: 8260)
      • rasdial.exe (PID: 8536)
      • rasdial.exe (PID: 8264)
      • rasdial.exe (PID: 7008)
      • rasdial.exe (PID: 7976)
      • rasdial.exe (PID: 7264)
      • rasdial.exe (PID: 1792)
      • rasdial.exe (PID: 8928)
      • rasdial.exe (PID: 8660)
      • rasdial.exe (PID: 8528)
      • rasdial.exe (PID: 8816)
      • rasdial.exe (PID: 7700)
      • rasdial.exe (PID: 8020)
      • rasdial.exe (PID: 7744)
      • rasdial.exe (PID: 7396)
      • rasdial.exe (PID: 9120)
      • rasdial.exe (PID: 9080)
      • rasdial.exe (PID: 9004)
      • rasdial.exe (PID: 7620)
      • rasdial.exe (PID: 8716)
      • rasdial.exe (PID: 8832)
      • rasdial.exe (PID: 7524)
      • rasdial.exe (PID: 8496)
      • rasdial.exe (PID: 7196)
      • rasdial.exe (PID: 7772)
      • rasdial.exe (PID: 8012)
      • rasdial.exe (PID: 8516)
    • Checks proxy server information

      • Hola-Browser.exe (PID: 6348)
      • Hola-Browser.exe (PID: 6952)
      • Hola-Browser.exe (PID: 7040)
      • net_updater64.exe (PID: 4164)
      • hola_cr.exe (PID: 1796)
    • Reads the software policy settings

      • Hola-Browser.exe (PID: 6348)
      • Hola-Browser.exe (PID: 6952)
      • Hola-Browser.exe (PID: 7040)
      • Hola-Setup-x64-1.233.367.exe (PID: 3552)
      • net_updater64.exe (PID: 5572)
      • net_updater64.exe (PID: 4164)
      • net_updater64.exe (PID: 5548)
      • Hola-Setup-x64-1.233.367.exe (PID: 6592)
      • Hola-Setup-x64-1.233.367.exe (PID: 6192)
      • hola.exe (PID: 5912)
      • net_updater64.exe (PID: 7868)
    • Create files in a temporary directory

      • Hola-Browser.exe (PID: 6348)
      • Hola-Browser.exe (PID: 6952)
      • Hola-Setup-x64-1.233.367.exe (PID: 3552)
      • Hola-Setup-x64-1.233.367.exe (PID: 6592)
      • Hola-Setup-x64-1.233.367.exe (PID: 6192)
      • hola_cr.exe (PID: 1796)
    • Process checks computer location settings

      • Hola-Browser.exe (PID: 6348)
      • Hola-Browser.exe (PID: 6952)
      • net_updater64.exe (PID: 5572)
      • net_updater64.exe (PID: 4164)
      • net_updater64.exe (PID: 5548)
      • hola_cr.exe (PID: 1796)
      • hola_cr.exe (PID: 6408)
      • hola_cr.exe (PID: 6760)
      • hola_cr.exe (PID: 6368)
      • hola_cr.exe (PID: 7040)
      • hola_cr.exe (PID: 3544)
      • hola_cr.exe (PID: 7016)
      • hola_cr.exe (PID: 7112)
      • hola_cr.exe (PID: 5872)
      • hola_cr.exe (PID: 4036)
      • hola_cr.exe (PID: 3560)
      • hola_cr.exe (PID: 6512)
      • hola_cr.exe (PID: 2464)
      • hola_cr.exe (PID: 3540)
      • net_updater64.exe (PID: 7868)
    • Reads the machine GUID from the registry

      • Hola-Browser.exe (PID: 6348)
      • Hola-Browser.exe (PID: 6952)
      • Hola-Browser.exe (PID: 7040)
      • net_updater64.exe (PID: 5572)
      • net_updater64.exe (PID: 6388)
      • test_wpf.exe (PID: 732)
      • idle_report.exe (PID: 6356)
      • net_updater64.exe (PID: 4164)
      • test_wpf.exe (PID: 4136)
      • hola_svc.exe (PID: 5628)
      • net_updater64.exe (PID: 5548)
      • test_wpf.exe (PID: 2756)
      • hola_cr.exe (PID: 1796)
      • net_updater64.exe (PID: 7868)
      • test_wpf.exe (PID: 8392)
      • idle_report.exe (PID: 7420)
    • The sample compiled with english language support

      • Hola-Browser.exe (PID: 6952)
      • Hola-Setup-x64-1.233.367.exe (PID: 3552)
      • net_updater64.exe (PID: 5572)
      • 7zr.exe (PID: 6732)
      • Hola-Setup-x64-1.233.367.exe (PID: 6592)
    • Creates files in the program directory

      • Hola-Setup-x64-1.233.367.exe (PID: 3552)
      • net_updater64.exe (PID: 6388)
      • net_updater64.exe (PID: 5572)
      • net_updater64.exe (PID: 4164)
      • hola_svc.exe (PID: 5628)
      • net_updater64.exe (PID: 5548)
      • 7zr.exe (PID: 6732)
      • Hola-Setup-x64-1.233.367.exe (PID: 6592)
      • Hola-Setup-x64-1.233.367.exe (PID: 6192)
      • hola.exe (PID: 5912)
      • net_updater64.exe (PID: 7868)
    • Creates files or folders in the user directory

      • net_updater64.exe (PID: 6388)
      • net_updater64.exe (PID: 4164)
      • hola_cr.exe (PID: 1796)
      • hola_cr.exe (PID: 6972)
      • hola_cr.exe (PID: 6876)
    • Reads Environment values

      • net_updater64.exe (PID: 5572)
      • net_updater64.exe (PID: 4164)
      • net_updater64.exe (PID: 5548)
      • net_updater64.exe (PID: 7868)
    • Reads CPU info

      • net_updater64.exe (PID: 5572)
    • Reads the time zone

      • net_updater64.exe (PID: 5572)
    • Reads security settings of Internet Explorer

      • explorer.exe (PID: 4164)
      • explorer.exe (PID: 3524)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1998:04:03 13:03:27+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 3018752
InitializedDataSize: 143360
UninitializedDataSize: -
EntryPoint: 0x2e2f7e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.239.613.0
ProductVersionNumber: 1.239.613.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: Hola VPN Ltd.
FileDescription: Hola Browser Setup
FileVersion: 1.239.613.0
InternalName: hola_setup.exe
LegalCopyright: Copyright © 2023 Hola VPN Ltd.
LegalTrademarks: -
OriginalFileName: hola_setup.exe
ProductName: Hola Setup
ProductVersion: 1.239.613.0
AssemblyVersion: 1.239.613.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
407
Monitored processes
273
Malicious processes
10
Suspicious processes
0

Behavior graph

Click at the process to see the details
start hola-browser.exe hola-browser.exe hola-browser.exe hola-setup-x64-1.233.367.exe net_updater64.exe conhost.exe no specs net_updater64.exe test_wpf.exe no specs idle_report.exe no specs conhost.exe no specs net_updater64.exe conhost.exe no specs wmiapsrv.exe no specs test_wpf.exe no specs hola_svc.exe net_updater64.exe conhost.exe no specs rasdial.exe no specs conhost.exe no specs hola_svc.exe no specs test_wpf.exe no specs hola-setup-x64-1.233.367.exe 7zr.exe conhost.exe no specs hola-setup-x64-1.233.367.exe explorer.exe no specs explorer.exe no specs hola.exe explorer.exe no specs explorer.exe no specs hola_cr.exe hola_cr.exe no specs hola_cr.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs hola_cr.exe no specs hola_cr.exe hola_cr.exe no specs hola_cr.exe no specs rasdial.exe no specs conhost.exe no specs hola_cr.exe no specs hola_cr.exe no specs hola_cr.exe no specs hola_cr.exe no specs rasdial.exe no specs conhost.exe no specs hola_cr.exe no specs hola_cr.exe no specs hola_cr.exe no specs hola_cr.exe no specs hola_cr.exe no specs hola_cr.exe no specs hola_cr.exe no specs hola_cr.exe no specs hola_cr.exe no specs hola_cr.exe no specs rasdial.exe no specs conhost.exe no specs hola_cr.exe no specs hola_cr.exe no specs rasdial.exe no specs conhost.exe no specs hola_svc.exe no specs hola_cr.exe no specs rasdial.exe no specs conhost.exe no specs hola_cr.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs net_updater64.exe conhost.exe no specs rasdial.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs test_wpf.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs hola_cr.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs idle_report.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs hola_cr.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
440\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exerasdial.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
440explorer "C:\Program Files\Hola\temp\browser_run.lnk"C:\Windows\explorer.exeHola-Setup-x64-1.233.367.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Explorer
Exit code:
1
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\explorer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\twinapi.dll
720"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=gpu-process --user-data-dir="C:\Users\admin\AppData\Roaming\Hola\chromium_profile" --no-pre-read-main-dll --no-subproc-heap-profiling --gpu-preferences=UAAAAAAAAADgAAAMAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAABAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --metrics-shmem-handle=3344,i,11867297853521464653,8348341694378878137,262144 --field-trial-handle=3676,i,16889899591076646610,18325462888818977173,262144 --variations-seed-version --mojo-platform-channel-handle=3140 /prefetch:2C:\Program Files\Hola\app\chromium\hola_cr.exehola_cr.exe
User:
admin
Company:
Hola VPN Ltd.
Integrity Level:
LOW
Description:
Hola
Exit code:
0
Version:
128.0.6613.86
Modules
Images
c:\program files\hola\app\chromium\hola_cr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\program files\hola\app\chromium\128.0.6613.86\hola_elf.dll
732C:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\test_wpf.exeC:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\test_wpf.exenet_updater64.exe
User:
SYSTEM
Company:
BrightData Ltd. (certified)
Integrity Level:
SYSTEM
Description:
test_wpf
Exit code:
0
Version:
1.489.750
Modules
Images
c:\programdata\brightdata\108a47921d08860d64656218998ab66204caf497\test_wpf.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
904rasdialC:\Windows\System32\rasdial.exehola_svc.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Remote Access Command Line Dial UI
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rasdial.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
968C:\WINDOWS\system32\wbem\WmiApSrv.exeC:\Windows\System32\wbem\WmiApSrv.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
WMI Performance Reverse Adapter
Exit code:
0
Version:
10.0.19041.3758 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\wbem\wmiapsrv.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\wbemcomn.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\psapi.dll
1076sc query luminati_net_updater_win_hola_ext_vpn_agreed_noconsent_hola_orgC:\Windows\System32\sc.exehola_svc.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Service Control Manager Configuration Tool
Exit code:
1060
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
1216"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=crashpad-handler --user-data-dir=C:\Users\admin\AppData\Roaming\Hola\chromium_profile /prefetch:4 --no-periodic-tasks --monitor-self-annotation=ptype=crashpad-handler --database=C:\Users\admin\AppData\Roaming\Hola\chromium_profile\Crashpad --annotation=plat=Win32 "--annotation=prod=Hola Browser" --annotation=ver=128.0.6613.86 --initial-client-data=0x1ec,0x1f0,0x1f4,0x1b4,0x1f8,0xed9db0,0xed9dbc,0xed9dc8C:\Program Files\Hola\app\chromium\hola_cr.exehola_cr.exe
User:
admin
Company:
Hola VPN Ltd.
Integrity Level:
MEDIUM
Description:
Hola
Version:
128.0.6613.86
Modules
Images
c:\program files\hola\app\chromium\hola_cr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\program files\hola\app\chromium\128.0.6613.86\hola_elf.dll
1292rasdialC:\Windows\System32\rasdial.exehola_svc.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Remote Access Command Line Dial UI
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rasdial.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\rasapi32.dll
c:\windows\system32\gdi32full.dll
1292\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exerasdial.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
45 703
Read events
45 551
Write events
150
Delete events
2

Modification events

(PID) Process:(6348) Hola-Browser.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Hola-Browser_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6348) Hola-Browser.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Hola-Browser_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6348) Hola-Browser.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Hola-Browser_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(6348) Hola-Browser.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Hola-Browser_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(6348) Hola-Browser.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Hola-Browser_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(6348) Hola-Browser.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Hola-Browser_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(6348) Hola-Browser.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Hola-Browser_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(6348) Hola-Browser.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Hola-Browser_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(6348) Hola-Browser.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Hola-Browser_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(6348) Hola-Browser.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Hola-Browser_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
43
Suspicious files
359
Text files
45
Unknown types
1

Dropped files

PID
Process
Filename
Type
6952Hola-Browser.exeC:\Users\admin\AppData\Local\Temp\chromium-128.0.6613.86.1233355.zip
MD5:
SHA256:
6348Hola-Browser.exeC:\Users\admin\AppData\Local\Temp\hola_setup.logbinary
MD5:5850603CAB3C639EFC909C8AB74444C5
SHA256:92F0FFF2B63E489917F90F4E71BAD0C8B64ABB6A49D663203CBAE291D5E402D8
3552Hola-Setup-x64-1.233.367.exeC:\Users\admin\AppData\Local\Temp\install.logbinary
MD5:F08045A86151A5F4D87273FBF500960D
SHA256:7247087922BACA1343A9090182B307AE08F35E727CB240FFE84C123A1D3F6D83
3552Hola-Setup-x64-1.233.367.exeC:\Program Files\Hola\app\hola.exeexecutable
MD5:875983A2795BA15C50F915AEA77CA0D4
SHA256:96AC14FE5909EBFE399E7E8E6EEA5AE8ECE2E9F4234A8B41EFCDB2D95312D59D
3552Hola-Setup-x64-1.233.367.exeC:\Program Files\Hola\app\hola_setup.exeexecutable
MD5:F405C76E1AC6FFE8A4A5608CA3A40146
SHA256:D3317A7E0F6382F693AFA268C296B5A6F9D15B5D799EC98D253CBF7401AE06BE
3552Hola-Setup-x64-1.233.367.exeC:\Program Files\Hola\app\hola_svc.exeexecutable
MD5:CC7034021CE0F078BF2259BA933C576C
SHA256:FED6984598C2D4E018D9CC30E96ED6FC264DF381DD28C5C74CDF39216537C285
3552Hola-Setup-x64-1.233.367.exeC:\Program Files\Hola\app\lum_sdk64.dllexecutable
MD5:8754DC7283316D4862BB176F54861458
SHA256:37F41A61BA3CB1C6E1407A3D9DA874039AFD15CCBA24F48FFEBB319B2B87C3DA
3552Hola-Setup-x64-1.233.367.exeC:\Program Files\Hola\app\7zr.exeexecutable
MD5:8247550CD0BC2CE175A37E01FC575049
SHA256:B1B2F6CCC57EF0C10C8D606A0A2505F9D2B7212F01782B2A6C713E3602C6EBFA
6388net_updater64.exeC:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\20250223_110630_once_05_uninstall_invalid_1.489.750.logbinary
MD5:68B329DA9893E34099C7D8AD5CB9C940
SHA256:01BA4719C80B6FE911B091A7C05124B64EEECE964E09C058EF8F9805DACA546B
3552Hola-Setup-x64-1.233.367.exeC:\Program Files\Hola\app\net_updater64.exeexecutable
MD5:66EDB29D7A1C4D8EBBBA7EE104662AE0
SHA256:355325AA2BB7ACA9708B87880F8892E8C477DAF1AB401AD59EE641B157AEFFE6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
30
TCP/UDP connections
241
DNS requests
147
Threats
50

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6060
svchost.exe
GET
200
23.48.23.180:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
6060
svchost.exe
GET
200
69.192.161.161:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
1176
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
6468
backgroundTaskHost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
5472
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5472
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
4164
net_updater64.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfIs%2BLjDtGwQ09XEB1Yeq%2BtX%2BBgQQU7NfjgtJxXWRM3y5nP%2Be6mK4cD08CEAitQLJg0pxMn17Nqb2Trtk%3D
unknown
whitelisted
5572
net_updater64.exe
GET
301
3.94.40.55:80
http://http-test1.brdtnet.com/connection/http-test1.html
unknown
unknown
5628
hola_svc.exe
GET
200
142.250.186.132:80
http://www.google.com/blank.html
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
3628
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4712
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6060
svchost.exe
23.48.23.180:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
6060
svchost.exe
69.192.161.161:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5064
SearchApp.exe
92.123.104.32:443
www.bing.com
Akamai International B.V.
DE
whitelisted
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
1176
svchost.exe
20.190.160.128:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.48.23.180
  • 23.48.23.143
  • 23.48.23.177
  • 23.48.23.140
  • 23.48.23.194
  • 23.48.23.137
  • 23.48.23.193
  • 23.48.23.141
  • 23.48.23.190
whitelisted
www.microsoft.com
  • 69.192.161.161
  • 95.101.149.131
whitelisted
www.bing.com
  • 92.123.104.32
  • 92.123.104.59
  • 92.123.104.31
  • 92.123.104.28
  • 92.123.104.34
  • 92.123.104.62
  • 92.123.104.38
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
google.com
  • 172.217.16.142
whitelisted
login.live.com
  • 20.190.160.128
  • 20.190.160.131
  • 40.126.32.76
  • 40.126.32.136
  • 20.190.160.5
  • 40.126.32.72
  • 20.190.160.67
  • 20.190.160.4
whitelisted
perr.hola.org
  • 34.237.179.253
  • 23.22.252.240
whitelisted
hola.org
  • 107.22.193.119
  • 54.225.121.9
whitelisted
go.microsoft.com
  • 23.35.238.131
whitelisted

Threats

PID
Process
Class
Message
2192
svchost.exe
Misc activity
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
5572
net_updater64.exe
Misc activity
ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI
6972
hola_cr.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
6972
hola_cr.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
6972
hola_cr.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
6972
hola_cr.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
6972
hola_cr.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
6972
hola_cr.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
6972
hola_cr.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
6972
hola_cr.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
Process
Message
hola_cr.exe
RecursiveDirectoryCreate( C:\Users\admin\AppData\Roaming directory exists )