File name:

Hola-Setup-C-HPE.exe

Full analysis: https://app.any.run/tasks/532f0f42-d70f-4613-aa9d-1c233b70333f
Verdict: Malicious activity
Analysis date: September 01, 2024, 21:11:27
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
evasion
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

203ACCDF587DD38B24A1A5021F3F46DA

SHA1:

FC8F3E96A67C8A92313C9987B7F7C8E7CFC3810F

SHA256:

9E65B85E4E33AACA1A3BD8AA5E2C5F67D9EC82224386B5B713479B4073FDA32D

SSDEEP:

98304:7UINMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM/:gf

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • Hola-Setup-x64-1.228.101.exe (PID: 3316)
    • Actions looks like stealing of personal data

      • 7zr.exe (PID: 4068)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • Hola-Setup-C-HPE.exe (PID: 7140)
      • Hola-Setup-C-HPE.exe (PID: 4980)
      • net_updater64.exe (PID: 2136)
      • net_updater64.exe (PID: 1124)
    • Reads the date of Windows installation

      • Hola-Setup-C-HPE.exe (PID: 7140)
      • Hola-Setup-C-HPE.exe (PID: 4980)
    • Application launched itself

      • Hola-Setup-C-HPE.exe (PID: 7140)
      • Hola-Setup-C-HPE.exe (PID: 4980)
      • hola_svc.exe (PID: 964)
    • Executable content was dropped or overwritten

      • Hola-Setup-C-HPE.exe (PID: 4980)
      • Hola-Setup-x64-1.228.101.exe (PID: 3316)
      • net_updater64.exe (PID: 3980)
      • net_updater64.exe (PID: 2136)
      • net_updater64.exe (PID: 1124)
      • net_updater64.exe (PID: 1964)
    • Drops the executable file immediately after the start

      • Hola-Setup-C-HPE.exe (PID: 4980)
      • Hola-Setup-x64-1.228.101.exe (PID: 3316)
      • net_updater64.exe (PID: 2136)
      • net_updater64.exe (PID: 3980)
      • net_updater64.exe (PID: 1124)
      • net_updater64.exe (PID: 1964)
    • Creates a software uninstall entry

      • Hola-Setup-x64-1.228.101.exe (PID: 3316)
    • Drops a system driver (possible attempt to evade defenses)

      • Hola-Setup-x64-1.228.101.exe (PID: 3316)
    • Checks Windows Trust Settings

      • net_updater64.exe (PID: 2136)
      • net_updater64.exe (PID: 3980)
      • net_updater64.exe (PID: 1124)
      • net_updater64.exe (PID: 1964)
    • The process drops C-runtime libraries

      • net_updater64.exe (PID: 2136)
    • Process drops legitimate windows executable

      • net_updater64.exe (PID: 2136)
    • Drops 7-zip archiver for unpacking

      • Hola-Setup-x64-1.228.101.exe (PID: 3316)
    • Executes as Windows Service

      • net_updater64.exe (PID: 3980)
      • hola_svc.exe (PID: 964)
      • WmiApSrv.exe (PID: 4020)
    • Detected use of alternative data streams (AltDS)

      • net_updater64.exe (PID: 3980)
      • net_updater64.exe (PID: 1124)
      • net_updater64.exe (PID: 1964)
    • Creates file in the systems drive root

      • hola_svc.exe (PID: 964)
    • The process checks if it is being run in the virtual environment

      • net_updater64.exe (PID: 3980)
    • Potential Corporate Privacy Violation

      • net_updater64.exe (PID: 3980)
    • Checks for external IP

      • net_updater64.exe (PID: 3980)
    • Connects to unusual port

      • hola_svc.exe (PID: 964)
  • INFO

    • Create files in a temporary directory

      • Hola-Setup-C-HPE.exe (PID: 7140)
      • Hola-Setup-x64-1.228.101.exe (PID: 3316)
      • Hola-Setup-C-HPE.exe (PID: 4980)
      • Hola-Setup-x64-1.228.101.exe (PID: 6460)
    • Reads the machine GUID from the registry

      • Hola-Setup-C-HPE.exe (PID: 7140)
      • Hola-Setup-C-HPE.exe (PID: 4980)
      • Hola-Setup-C-HPE.exe (PID: 2232)
      • net_updater64.exe (PID: 2136)
      • test_wpf.exe (PID: 6372)
      • test_wpf.exe (PID: 3176)
      • net_updater64.exe (PID: 3980)
      • net_updater64.exe (PID: 1124)
      • test_wpf.exe (PID: 6156)
      • idle_report.exe (PID: 1944)
      • hola_svc.exe (PID: 964)
      • net_updater64.exe (PID: 1964)
      • test_wpf.exe (PID: 7020)
    • Reads the computer name

      • Hola-Setup-C-HPE.exe (PID: 7140)
      • Hola-Setup-C-HPE.exe (PID: 4980)
      • Hola-Setup-C-HPE.exe (PID: 2232)
      • Hola-Setup-x64-1.228.101.exe (PID: 3316)
      • net_updater64.exe (PID: 2136)
      • test_wpf.exe (PID: 6372)
      • net_updater64.exe (PID: 3980)
      • net_updater64.exe (PID: 1124)
      • test_wpf.exe (PID: 6156)
      • test_wpf.exe (PID: 3176)
      • hola_svc.exe (PID: 964)
      • idle_report.exe (PID: 1944)
      • net_updater64.exe (PID: 1964)
      • Hola-Setup-x64-1.228.101.exe (PID: 6460)
      • test_wpf.exe (PID: 7020)
      • 7zr.exe (PID: 4068)
    • Disables trace logs

      • Hola-Setup-C-HPE.exe (PID: 7140)
      • Hola-Setup-C-HPE.exe (PID: 4980)
      • Hola-Setup-C-HPE.exe (PID: 2232)
      • net_updater64.exe (PID: 3980)
      • rasdial.exe (PID: 5284)
      • hola_svc.exe (PID: 964)
    • Reads Environment values

      • Hola-Setup-C-HPE.exe (PID: 7140)
      • Hola-Setup-C-HPE.exe (PID: 4980)
      • Hola-Setup-C-HPE.exe (PID: 2232)
      • net_updater64.exe (PID: 2136)
      • net_updater64.exe (PID: 1124)
      • net_updater64.exe (PID: 3980)
      • net_updater64.exe (PID: 1964)
    • Checks supported languages

      • Hola-Setup-C-HPE.exe (PID: 7140)
      • Hola-Setup-C-HPE.exe (PID: 4980)
      • Hola-Setup-C-HPE.exe (PID: 2232)
      • Hola-Setup-x64-1.228.101.exe (PID: 3316)
      • net_updater64.exe (PID: 2136)
      • test_wpf.exe (PID: 6372)
      • net_updater64.exe (PID: 3980)
      • test_wpf.exe (PID: 3176)
      • net_updater64.exe (PID: 1124)
      • test_wpf.exe (PID: 6156)
      • hola_svc.exe (PID: 964)
      • idle_report.exe (PID: 1944)
      • net_updater64.exe (PID: 1964)
      • hola_svc.exe (PID: 6396)
      • test_wpf.exe (PID: 7020)
      • hola_svc.exe (PID: 6704)
      • Hola-Setup-x64-1.228.101.exe (PID: 6460)
      • 7zr.exe (PID: 4068)
    • Checks proxy server information

      • Hola-Setup-C-HPE.exe (PID: 7140)
      • Hola-Setup-C-HPE.exe (PID: 4980)
      • Hola-Setup-C-HPE.exe (PID: 2232)
      • net_updater64.exe (PID: 2136)
    • Reads the software policy settings

      • Hola-Setup-C-HPE.exe (PID: 7140)
      • Hola-Setup-C-HPE.exe (PID: 4980)
      • Hola-Setup-C-HPE.exe (PID: 2232)
      • net_updater64.exe (PID: 2136)
      • Hola-Setup-x64-1.228.101.exe (PID: 3316)
      • net_updater64.exe (PID: 3980)
      • net_updater64.exe (PID: 1124)
      • net_updater64.exe (PID: 1964)
      • Hola-Setup-x64-1.228.101.exe (PID: 6460)
    • Process checks computer location settings

      • Hola-Setup-C-HPE.exe (PID: 7140)
      • Hola-Setup-C-HPE.exe (PID: 4980)
      • net_updater64.exe (PID: 2136)
      • net_updater64.exe (PID: 3980)
      • net_updater64.exe (PID: 1124)
      • net_updater64.exe (PID: 1964)
    • The process uses the downloaded file

      • Hola-Setup-C-HPE.exe (PID: 7140)
      • Hola-Setup-C-HPE.exe (PID: 4980)
      • net_updater64.exe (PID: 2136)
      • net_updater64.exe (PID: 3980)
    • Creates files in the program directory

      • net_updater64.exe (PID: 2136)
      • Hola-Setup-x64-1.228.101.exe (PID: 3316)
      • net_updater64.exe (PID: 3980)
      • net_updater64.exe (PID: 1124)
      • hola_svc.exe (PID: 964)
      • net_updater64.exe (PID: 1964)
      • 7zr.exe (PID: 4068)
    • Creates files or folders in the user directory

      • net_updater64.exe (PID: 2136)
    • Reads the time zone

      • net_updater64.exe (PID: 3980)
    • Reads CPU info

      • net_updater64.exe (PID: 3980)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2094:07:16 03:28:36+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32
LinkerVersion: 48
CodeSize: 2917888
InitializedDataSize: 414208
UninitializedDataSize: -
EntryPoint: 0x2ca596
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.227.226.0
ProductVersionNumber: 1.227.226.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: Hola VPN Ltd.
FileDescription: Hola VPN App Setup
FileVersion: 1.227.226.0
InternalName: hola_setup.exe
LegalCopyright: Copyright © 2023 Hola VPN Ltd.
LegalTrademarks: -
OriginalFileName: hola_setup.exe
ProductName: Hola Setup
ProductVersion: 1.227.226.0
AssemblyVersion: 1.227.226.0
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
156
Monitored processes
28
Malicious processes
7
Suspicious processes
1

Behavior graph

Click at the process to see the details
start hola-setup-c-hpe.exe hola-setup-c-hpe.exe hola-setup-c-hpe.exe hola-setup-x64-1.228.101.exe net_updater64.exe conhost.exe no specs test_wpf.exe no specs net_updater64.exe test_wpf.exe no specs net_updater64.exe conhost.exe no specs test_wpf.exe no specs hola_svc.exe idle_report.exe no specs conhost.exe no specs net_updater64.exe conhost.exe no specs rasdial.exe no specs conhost.exe no specs hola_svc.exe no specs test_wpf.exe no specs wmiapsrv.exe no specs sppextcomobj.exe no specs slui.exe no specs hola_svc.exe no specs hola-setup-x64-1.228.101.exe 7zr.exe conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
964"C:\Program Files\Hola\app\hola_svc.exe" --serviceC:\Program Files\Hola\app\hola_svc.exe
services.exe
User:
SYSTEM
Company:
Hola Networks Ltd.
Integrity Level:
SYSTEM
Description:
Hola VPN Service
Version:
1.228.101
Modules
Images
c:\program files\hola\app\hola_svc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ws2_32.dll
1124"C:\Program Files\Hola\app\net_updater64.exe" --uuidC:\Program Files\Hola\app\net_updater64.exe
Hola-Setup-x64-1.228.101.exe
User:
admin
Company:
BrightData Ltd. (certified)
Integrity Level:
HIGH
Description:
BrightData service allows free use of certain features in an app you installed
Exit code:
0
Version:
1.474.630
Modules
Images
c:\program files\hola\app\net_updater64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
1140\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exenet_updater64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1944C:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\idle_report.exe --id 79515 --screenC:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\idle_report.exenet_updater64.exe
User:
admin
Company:
BrightData Ltd.
Integrity Level:
MEDIUM
Description:
idle_report
Exit code:
0
Version:
1.474.630
Modules
Images
c:\programdata\brightdata\108a47921d08860d64656218998ab66204caf497\idle_report.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
1964"C:\Program Files\Hola\app\net_updater64.exe" --uuidC:\Program Files\Hola\app\net_updater64.exe
hola_svc.exe
User:
SYSTEM
Company:
BrightData Ltd. (certified)
Integrity Level:
SYSTEM
Description:
BrightData service allows free use of certain features in an app you installed
Exit code:
0
Version:
1.474.630
Modules
Images
c:\program files\hola\app\net_updater64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\advapi32.dll
1964\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exe7zr.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2008\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exenet_updater64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2080\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exenet_updater64.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2136"C:\Program Files\Hola\app\net_updater64.exe" --install win_hola.org --campaign hpeC:\Program Files\Hola\app\net_updater64.exe
Hola-Setup-x64-1.228.101.exe
User:
admin
Company:
BrightData Ltd. (certified)
Integrity Level:
HIGH
Description:
BrightData service allows free use of certain features in an app you installed
Exit code:
0
Version:
1.474.630
Modules
Images
c:\program files\hola\app\net_updater64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\wintrust.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
2232"C:\Users\admin\AppData\Local\Temp\Hola-Setup-C-HPE.exe" --monitor 1988C:\Users\admin\AppData\Local\Temp\Hola-Setup-C-HPE.exe
Hola-Setup-C-HPE.exe
User:
admin
Company:
Hola VPN Ltd.
Integrity Level:
HIGH
Description:
Hola VPN App Setup
Version:
1.227.226.0
Modules
Images
c:\users\admin\appdata\local\temp\hola-setup-c-hpe.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
Total events
39 197
Read events
39 070
Write events
126
Delete events
1

Modification events

(PID) Process:(7140) Hola-Setup-C-HPE.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(7140) Hola-Setup-C-HPE.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Hola-Setup-C-HPE_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(7140) Hola-Setup-C-HPE.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Hola-Setup-C-HPE_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(7140) Hola-Setup-C-HPE.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Hola-Setup-C-HPE_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(7140) Hola-Setup-C-HPE.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Hola-Setup-C-HPE_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(7140) Hola-Setup-C-HPE.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Hola-Setup-C-HPE_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(7140) Hola-Setup-C-HPE.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Hola-Setup-C-HPE_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(7140) Hola-Setup-C-HPE.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Hola-Setup-C-HPE_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(7140) Hola-Setup-C-HPE.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Hola-Setup-C-HPE_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(7140) Hola-Setup-C-HPE.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Hola-Setup-C-HPE_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
Executable files
16
Suspicious files
104
Text files
13
Unknown types
0

Dropped files

PID
Process
Filename
Type
3316Hola-Setup-x64-1.228.101.exeC:\Program Files\Hola\app\image\Hola-Setup-x64-1.228.101.exeexecutable
MD5:BDEE13595B11279D1FB40EC0FCF543CB
SHA256:731211B7F5DB3B3E13BADDE77CEA9FAC97DBC1F6B8E5BF9C5EC69BE4C268D3DF
3316Hola-Setup-x64-1.228.101.exeC:\Users\admin\AppData\Local\Temp\install.logbinary
MD5:8816ED3D5B193B24247ABC0B9EE7E9A8
SHA256:E7336087162D223A8F44381131DE211CCDF29FA24B57889BC175797C348CB50D
3316Hola-Setup-x64-1.228.101.exeC:\Program Files\Hola\app\7zr.exeexecutable
MD5:5E2A8DAFA15134DAC9D682C890F3EA33
SHA256:9E28272320ED98A2F70E2E67984A8EBD416F3237075E2F2B07971CB0BDBE9F13
3316Hola-Setup-x64-1.228.101.exeC:\Program Files\Hola\app\hola.exeexecutable
MD5:9112BEA314BB9692FFBCFDEA07BB21CF
SHA256:A3BC9F44FFF837B5DD1D74E033C054D31699AE31CE256F7FFC03F8367A0DF098
2136net_updater64.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141binary
MD5:7327332A7FF3290684FEBF9728F937CF
SHA256:BC1BF7D60E813F1741B7CDB35FE0B74F8495E3D5066649B0705FF06808D25432
2136net_updater64.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEBbinary
MD5:2CE3D39222D618BF5596652E33E58BAF
SHA256:C5A5D9F55EEE596175BF6BAFF15C9D2D6A45248E18ECB2EF465A44BD7E753289
3316Hola-Setup-x64-1.228.101.exeC:\Program Files\Hola\app\hola_split_tunnel.sysexecutable
MD5:1BDD058F388F4C1DC78880ED07AD2851
SHA256:5CF70B46DF400C4F082747989C4C1B13C38781E990643526340512CCC7B918C0
3316Hola-Setup-x64-1.228.101.exeC:\Program Files\Hola\app\net_updater64.exeexecutable
MD5:E1D7A11A2539BCA27F44324C176377FA
SHA256:FDE758AA0E1DBFC47164AD518056E66D30A38012A1D60A103F97ABA7CA1C3382
2136net_updater64.exeC:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\20240901_211154_01_install_1.474.630.logbinary
MD5:68B329DA9893E34099C7D8AD5CB9C940
SHA256:01BA4719C80B6FE911B091A7C05124B64EEECE964E09C058EF8F9805DACA546B
2136net_updater64.exeC:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\20240901_211154_once_02_sent_cleanup_1.474.630.logbinary
MD5:68B329DA9893E34099C7D8AD5CB9C940
SHA256:01BA4719C80B6FE911B091A7C05124B64EEECE964E09C058EF8F9805DACA546B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
14
TCP/UDP connections
146
DNS requests
38
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1764
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
3980
net_updater64.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT3xL4LQLXDRDM9P665TW442vrsUQQUReuir%2FSSy4IxLVGLp6chnfNtyA8CEA6bGI750C3n79tQ4ghAGFo%3D
unknown
whitelisted
2136
net_updater64.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT3xL4LQLXDRDM9P665TW442vrsUQQUReuir%2FSSy4IxLVGLp6chnfNtyA8CEA6bGI750C3n79tQ4ghAGFo%3D
unknown
whitelisted
2136
net_updater64.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfIs%2BLjDtGwQ09XEB1Yeq%2BtX%2BBgQQU7NfjgtJxXWRM3y5nP%2Be6mK4cD08CEAitQLJg0pxMn17Nqb2Trtk%3D
unknown
whitelisted
2136
net_updater64.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSRXerF0eFeSWRripTgTkcJWMm7iQQUaDfg67Y7%2BF8Rhvv%2BYXsIiGX0TkICEAdTF0YC22Gdh8cnyPwWxE0%3D
unknown
whitelisted
3980
net_updater64.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfIs%2BLjDtGwQ09XEB1Yeq%2BtX%2BBgQQU7NfjgtJxXWRM3y5nP%2Be6mK4cD08CEAitQLJg0pxMn17Nqb2Trtk%3D
unknown
whitelisted
3980
net_updater64.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSRXerF0eFeSWRripTgTkcJWMm7iQQUaDfg67Y7%2BF8Rhvv%2BYXsIiGX0TkICEAdTF0YC22Gdh8cnyPwWxE0%3D
unknown
whitelisted
964
hola_svc.exe
GET
301
23.35.237.160:80
http://i.s-microsoft.com/library/svy/close.gif
unknown
whitelisted
964
hola_svc.exe
GET
200
142.250.186.164:80
http://142.250.186.164:80/blank.html
unknown
unknown
964
hola_svc.exe
GET
200
142.250.186.164:80
http://www.google.com/blank.html
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
6856
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
892
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2120
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
7140
Hola-Setup-C-HPE.exe
23.22.252.240:443
perr.hola.org
AMAZON-AES
US
whitelisted
7140
Hola-Setup-C-HPE.exe
54.225.121.9:443
hola.org
AMAZON-AES
US
whitelisted
4980
Hola-Setup-C-HPE.exe
54.225.121.9:443
hola.org
AMAZON-AES
US
whitelisted
3260
svchost.exe
40.115.3.253:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
2232
Hola-Setup-C-HPE.exe
54.225.121.9:443
hola.org
AMAZON-AES
US
whitelisted
4980
Hola-Setup-C-HPE.exe
23.22.252.240:443
perr.hola.org
AMAZON-AES
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
  • 20.73.194.208
whitelisted
google.com
  • 142.250.184.206
whitelisted
perr.hola.org
  • 23.22.252.240
  • 34.237.179.253
whitelisted
hola.org
  • 54.225.121.9
  • 107.22.193.119
whitelisted
client.wns.windows.com
  • 40.115.3.253
whitelisted
hola-rmt-update.b-cdn.net
  • 89.187.169.39
whitelisted
login.live.com
  • 20.190.159.71
  • 20.190.159.68
  • 20.190.159.0
  • 20.190.159.64
  • 40.126.31.71
  • 20.190.159.75
  • 20.190.159.2
  • 20.190.159.4
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
client.hola.org
  • 54.243.128.120
  • 54.225.227.202
whitelisted
perr.lum-sdk.io
  • 192.81.214.145
  • 159.223.133.120
  • 206.189.231.23
  • 161.35.48.195
unknown

Threats

PID
Process
Class
Message
2256
svchost.exe
Misc activity
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
3980
net_updater64.exe
Misc activity
ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI
2 ETPRO signatures available at the full report
No debug info