File name:

Hola-Setup-C-HPE.exe

Full analysis: https://app.any.run/tasks/84cc9043-1824-442d-92bf-aa5ac95df18c
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: June 23, 2025, 18:22:37
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto
generic
evasion
loader
nodejs
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

4B3285AF71292E71621652D581FE6E66

SHA1:

2EBB20AFE428FB144BA8403982D9A4943210D814

SHA256:

F4442BC2B0B06C677752715767D6AA5D271CBCDA73C39406E7DDD0213E3FE685

SSDEEP:

98304:zINMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMMM:th

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • GENERIC has been found (auto)

      • Hola-Setup-C-HPE.exe (PID: 3632)
    • Changes the autorun value in the registry

      • Hola-Setup-x64-1.243.946.exe (PID: 4520)
  • SUSPICIOUS

    • Application launched itself

      • Hola-Setup-C-HPE.exe (PID: 3676)
      • Hola-Setup-C-HPE.exe (PID: 3632)
      • hola_svc.exe (PID: 4476)
      • hola_cr.exe (PID: 6376)
      • hola_cr.exe (PID: 6368)
      • updater.exe (PID: 6768)
    • Reads security settings of Internet Explorer

      • Hola-Setup-C-HPE.exe (PID: 3632)
      • Hola-Setup-C-HPE.exe (PID: 3676)
      • net_updater64.exe (PID: 1036)
      • net_updater64.exe (PID: 5896)
    • Executable content was dropped or overwritten

      • Hola-Setup-x64-1.243.946.exe (PID: 4520)
      • Hola-Setup-C-HPE.exe (PID: 3676)
      • net_updater64.exe (PID: 1036)
      • net_updater64.exe (PID: 2680)
      • net_updater64.exe (PID: 5896)
      • net_updater64.exe (PID: 2620)
      • 7zr.exe (PID: 2460)
      • Hola-Setup-x64-1.243.946.exe (PID: 6852)
      • net_updater64.exe (PID: 10920)
    • Creates a software uninstall entry

      • Hola-Setup-x64-1.243.946.exe (PID: 4520)
    • Drops 7-zip archiver for unpacking

      • Hola-Setup-x64-1.243.946.exe (PID: 4520)
    • Process drops legitimate windows executable

      • net_updater64.exe (PID: 1036)
    • The process drops C-runtime libraries

      • net_updater64.exe (PID: 1036)
    • Executes as Windows Service

      • net_updater64.exe (PID: 2680)
      • hola_svc.exe (PID: 4476)
      • WmiApSrv.exe (PID: 2528)
    • Drops a system driver (possible attempt to evade defenses)

      • Hola-Setup-x64-1.243.946.exe (PID: 4520)
    • Detected use of alternative data streams (AltDS)

      • net_updater64.exe (PID: 5896)
      • net_updater64.exe (PID: 2680)
      • net_updater64.exe (PID: 2620)
      • net_updater64.exe (PID: 10920)
    • Creates file in the systems drive root

      • hola_svc.exe (PID: 4476)
    • The process checks if it is being run in the virtual environment

      • net_updater64.exe (PID: 2680)
      • hola_cr.exe (PID: 6376)
    • Checks for external IP

      • net_updater64.exe (PID: 2680)
    • Process requests binary or script from the Internet

      • hola.exe (PID: 7544)
    • Starts SC.EXE for service management

      • hola_svc.exe (PID: 4476)
    • Windows service management via SC.EXE

      • sc.exe (PID: 8912)
      • sc.exe (PID: 8944)
      • sc.exe (PID: 8940)
      • sc.exe (PID: 9064)
      • sc.exe (PID: 8864)
      • sc.exe (PID: 9016)
      • sc.exe (PID: 8888)
      • sc.exe (PID: 8892)
      • sc.exe (PID: 8856)
      • sc.exe (PID: 8808)
      • sc.exe (PID: 8872)
      • sc.exe (PID: 9200)
      • sc.exe (PID: 8804)
      • sc.exe (PID: 6216)
      • sc.exe (PID: 9208)
      • sc.exe (PID: 9212)
      • sc.exe (PID: 6796)
      • sc.exe (PID: 6372)
      • sc.exe (PID: 8308)
      • sc.exe (PID: 5368)
      • sc.exe (PID: 1080)
      • sc.exe (PID: 640)
      • sc.exe (PID: 6232)
      • sc.exe (PID: 7156)
      • sc.exe (PID: 5928)
      • sc.exe (PID: 8820)
      • sc.exe (PID: 9196)
      • sc.exe (PID: 3832)
      • sc.exe (PID: 8620)
      • sc.exe (PID: 8628)
      • sc.exe (PID: 2272)
      • sc.exe (PID: 3800)
      • sc.exe (PID: 7128)
      • sc.exe (PID: 2028)
      • sc.exe (PID: 8732)
      • sc.exe (PID: 7032)
      • sc.exe (PID: 8780)
      • sc.exe (PID: 8760)
      • sc.exe (PID: 5716)
      • sc.exe (PID: 3028)
      • sc.exe (PID: 3396)
      • sc.exe (PID: 8632)
      • sc.exe (PID: 3644)
      • sc.exe (PID: 9052)
      • sc.exe (PID: 7120)
      • sc.exe (PID: 9508)
      • sc.exe (PID: 9252)
      • sc.exe (PID: 9480)
      • sc.exe (PID: 9280)
      • sc.exe (PID: 9300)
      • sc.exe (PID: 9440)
      • sc.exe (PID: 9384)
      • sc.exe (PID: 9372)
      • sc.exe (PID: 9416)
      • sc.exe (PID: 9392)
      • sc.exe (PID: 9424)
      • sc.exe (PID: 9536)
      • sc.exe (PID: 9112)
      • sc.exe (PID: 9232)
      • sc.exe (PID: 9268)
      • sc.exe (PID: 9316)
      • sc.exe (PID: 9348)
      • sc.exe (PID: 8772)
      • sc.exe (PID: 9584)
    • Connects to unusual port

      • hola_svc.exe (PID: 4476)
    • Searches for installed software

      • explorer.exe (PID: 1080)
    • The process executes via Task Scheduler

      • updater.exe (PID: 6768)
  • INFO

    • Checks supported languages

      • Hola-Setup-C-HPE.exe (PID: 3632)
      • Hola-Setup-C-HPE.exe (PID: 3676)
      • Hola-Setup-C-HPE.exe (PID: 5372)
      • Hola-Setup-x64-1.243.946.exe (PID: 4520)
      • net_updater64.exe (PID: 1036)
      • test_wpf.exe (PID: 5968)
      • net_updater64.exe (PID: 2680)
      • test_wpf.exe (PID: 1512)
      • test_wpf.exe (PID: 4196)
      • net_updater64.exe (PID: 5896)
      • hola_svc.exe (PID: 4476)
      • hola_svc.exe (PID: 3888)
      • test_wpf.exe (PID: 6148)
      • net_updater64.exe (PID: 2620)
      • idle_report.exe (PID: 3924)
      • 7zr.exe (PID: 2460)
      • Hola-Setup-x64-1.243.946.exe (PID: 3720)
      • hola.exe (PID: 7544)
      • hola_cr.exe (PID: 6376)
      • hola_cr.exe (PID: 6368)
      • hola_cr.exe (PID: 5124)
      • hola_cr.exe (PID: 1296)
      • hola_cr.exe (PID: 6216)
      • hola_cr.exe (PID: 3460)
      • hola_cr.exe (PID: 2876)
      • hola_cr.exe (PID: 316)
      • hola_cr.exe (PID: 3948)
      • hola_cr.exe (PID: 6264)
      • hola_cr.exe (PID: 7932)
      • hola_cr.exe (PID: 8024)
      • hola_cr.exe (PID: 5168)
      • hola_cr.exe (PID: 8216)
      • hola_cr.exe (PID: 8224)
      • identity_helper.exe (PID: 8332)
      • hola_cr.exe (PID: 8720)
      • hola_cr.exe (PID: 8852)
      • hola_svc.exe (PID: 8868)
      • hola_cr.exe (PID: 9120)
      • hola_cr.exe (PID: 8712)
      • Hola-Setup-x64-1.243.946.exe (PID: 6852)
      • net_updater64.exe (PID: 10920)
      • test_wpf.exe (PID: 9944)
      • hola_cr.exe (PID: 8300)
      • idle_report.exe (PID: 9020)
      • hola_cr.exe (PID: 11148)
      • hola_cr.exe (PID: 3760)
      • hola_svc.exe (PID: 7364)
      • hola_cr.exe (PID: 7808)
      • hola_cr.exe (PID: 9508)
      • hola_cr.exe (PID: 10512)
      • idle_report.exe (PID: 10400)
      • hola_svc.exe (PID: 8892)
      • hola_cr.exe (PID: 8920)
      • updater.exe (PID: 6768)
      • updater.exe (PID: 9804)
      • hola_cr.exe (PID: 10284)
      • idle_report.exe (PID: 9240)
      • hola_cr.exe (PID: 2732)
      • hola_cr.exe (PID: 11044)
      • hola_svc.exe (PID: 10068)
      • hola_cr.exe (PID: 8844)
    • Checks proxy server information

      • Hola-Setup-C-HPE.exe (PID: 3632)
      • Hola-Setup-C-HPE.exe (PID: 3676)
      • Hola-Setup-C-HPE.exe (PID: 5372)
      • net_updater64.exe (PID: 1036)
      • hola_cr.exe (PID: 6376)
      • slui.exe (PID: 8972)
    • Reads the software policy settings

      • Hola-Setup-C-HPE.exe (PID: 3632)
      • Hola-Setup-C-HPE.exe (PID: 5372)
      • Hola-Setup-C-HPE.exe (PID: 3676)
      • Hola-Setup-x64-1.243.946.exe (PID: 4520)
      • net_updater64.exe (PID: 1036)
      • net_updater64.exe (PID: 2680)
      • net_updater64.exe (PID: 2620)
      • net_updater64.exe (PID: 5896)
      • Hola-Setup-x64-1.243.946.exe (PID: 6852)
      • Hola-Setup-x64-1.243.946.exe (PID: 3720)
      • hola.exe (PID: 7544)
      • net_updater64.exe (PID: 10920)
      • slui.exe (PID: 8972)
    • Process checks computer location settings

      • Hola-Setup-C-HPE.exe (PID: 3632)
      • Hola-Setup-C-HPE.exe (PID: 3676)
      • net_updater64.exe (PID: 1036)
      • net_updater64.exe (PID: 5896)
      • net_updater64.exe (PID: 2620)
      • net_updater64.exe (PID: 2680)
      • hola_cr.exe (PID: 316)
      • hola_cr.exe (PID: 6264)
      • hola_cr.exe (PID: 6376)
      • hola_cr.exe (PID: 5168)
      • hola_cr.exe (PID: 8024)
      • hola_cr.exe (PID: 8224)
      • hola_cr.exe (PID: 7932)
      • hola_cr.exe (PID: 8216)
      • hola_cr.exe (PID: 8720)
      • hola_cr.exe (PID: 9120)
      • net_updater64.exe (PID: 10920)
    • Disables trace logs

      • Hola-Setup-C-HPE.exe (PID: 3632)
      • Hola-Setup-C-HPE.exe (PID: 3676)
      • Hola-Setup-C-HPE.exe (PID: 5372)
      • rasdial.exe (PID: 2528)
      • hola_svc.exe (PID: 4476)
      • net_updater64.exe (PID: 2680)
      • rasdial.exe (PID: 5060)
      • rasdial.exe (PID: 856)
      • rasdial.exe (PID: 7348)
      • rasdial.exe (PID: 3736)
      • rasdial.exe (PID: 8196)
      • rasdial.exe (PID: 8616)
      • rasdial.exe (PID: 8728)
      • rasdial.exe (PID: 8936)
      • rasdial.exe (PID: 9184)
      • rasdial.exe (PID: 8328)
      • rasdial.exe (PID: 8740)
      • rasdial.exe (PID: 8620)
      • rasdial.exe (PID: 9632)
      • rasdial.exe (PID: 8800)
      • rasdial.exe (PID: 10496)
      • rasdial.exe (PID: 10228)
      • rasdial.exe (PID: 10044)
      • rasdial.exe (PID: 8296)
      • rasdial.exe (PID: 7464)
      • rasdial.exe (PID: 9520)
      • rasdial.exe (PID: 9492)
      • rasdial.exe (PID: 10360)
      • rasdial.exe (PID: 10664)
      • rasdial.exe (PID: 6796)
      • rasdial.exe (PID: 9840)
      • rasdial.exe (PID: 6956)
      • rasdial.exe (PID: 5372)
      • rasdial.exe (PID: 11048)
      • rasdial.exe (PID: 9980)
      • rasdial.exe (PID: 8892)
      • rasdial.exe (PID: 10160)
      • rasdial.exe (PID: 8748)
      • rasdial.exe (PID: 9572)
      • rasdial.exe (PID: 9876)
      • rasdial.exe (PID: 10964)
      • rasdial.exe (PID: 10728)
      • rasdial.exe (PID: 9500)
      • rasdial.exe (PID: 2028)
      • rasdial.exe (PID: 9912)
      • rasdial.exe (PID: 10564)
      • rasdial.exe (PID: 9496)
      • rasdial.exe (PID: 11060)
      • rasdial.exe (PID: 10368)
      • rasdial.exe (PID: 8344)
      • rasdial.exe (PID: 9508)
      • rasdial.exe (PID: 8860)
      • rasdial.exe (PID: 10172)
      • rasdial.exe (PID: 8920)
      • rasdial.exe (PID: 9264)
      • rasdial.exe (PID: 9708)
      • rasdial.exe (PID: 7048)
      • rasdial.exe (PID: 8800)
      • rasdial.exe (PID: 8576)
      • rasdial.exe (PID: 10332)
      • rasdial.exe (PID: 11120)
      • rasdial.exe (PID: 9560)
      • rasdial.exe (PID: 11108)
      • rasdial.exe (PID: 9516)
      • rasdial.exe (PID: 4236)
      • rasdial.exe (PID: 6152)
      • rasdial.exe (PID: 8328)
      • rasdial.exe (PID: 10588)
      • rasdial.exe (PID: 3800)
      • rasdial.exe (PID: 10844)
      • rasdial.exe (PID: 9772)
      • rasdial.exe (PID: 2972)
      • rasdial.exe (PID: 10424)
      • rasdial.exe (PID: 8072)
      • rasdial.exe (PID: 10516)
      • rasdial.exe (PID: 8840)
      • rasdial.exe (PID: 9240)
      • rasdial.exe (PID: 3732)
      • rasdial.exe (PID: 8336)
      • rasdial.exe (PID: 8900)
      • rasdial.exe (PID: 11036)
      • rasdial.exe (PID: 9528)
      • rasdial.exe (PID: 10336)
      • rasdial.exe (PID: 6192)
      • rasdial.exe (PID: 10984)
      • rasdial.exe (PID: 10284)
      • rasdial.exe (PID: 9464)
      • rasdial.exe (PID: 8144)
      • rasdial.exe (PID: 8116)
      • rasdial.exe (PID: 8772)
      • rasdial.exe (PID: 10300)
      • rasdial.exe (PID: 10012)
      • rasdial.exe (PID: 11164)
      • rasdial.exe (PID: 9884)
      • rasdial.exe (PID: 11216)
      • rasdial.exe (PID: 3756)
      • rasdial.exe (PID: 984)
      • rasdial.exe (PID: 7332)
      • rasdial.exe (PID: 9732)
      • rasdial.exe (PID: 9588)
      • rasdial.exe (PID: 10148)
      • rasdial.exe (PID: 10592)
      • rasdial.exe (PID: 9548)
      • rasdial.exe (PID: 10236)
      • rasdial.exe (PID: 316)
      • rasdial.exe (PID: 416)
      • rasdial.exe (PID: 10704)
      • rasdial.exe (PID: 5288)
      • rasdial.exe (PID: 7236)
      • rasdial.exe (PID: 6808)
      • rasdial.exe (PID: 3644)
      • rasdial.exe (PID: 8372)
      • rasdial.exe (PID: 9316)
      • rasdial.exe (PID: 7156)
      • rasdial.exe (PID: 1324)
      • rasdial.exe (PID: 6504)
      • rasdial.exe (PID: 9912)
      • rasdial.exe (PID: 7128)
      • rasdial.exe (PID: 9308)
      • rasdial.exe (PID: 9500)
      • rasdial.exe (PID: 6016)
      • rasdial.exe (PID: 7120)
      • rasdial.exe (PID: 8800)
      • rasdial.exe (PID: 8388)
      • rasdial.exe (PID: 5080)
      • rasdial.exe (PID: 11012)
      • rasdial.exe (PID: 9848)
      • rasdial.exe (PID: 11132)
      • rasdial.exe (PID: 11144)
      • rasdial.exe (PID: 4748)
      • rasdial.exe (PID: 10964)
      • rasdial.exe (PID: 8104)
      • rasdial.exe (PID: 8832)
      • rasdial.exe (PID: 10172)
      • rasdial.exe (PID: 3756)
      • rasdial.exe (PID: 10540)
      • rasdial.exe (PID: 7460)
      • rasdial.exe (PID: 9312)
      • rasdial.exe (PID: 7180)
      • rasdial.exe (PID: 10028)
      • rasdial.exe (PID: 9588)
      • rasdial.exe (PID: 7380)
      • rasdial.exe (PID: 9004)
      • rasdial.exe (PID: 8300)
      • rasdial.exe (PID: 6080)
      • rasdial.exe (PID: 9660)
      • rasdial.exe (PID: 10352)
      • rasdial.exe (PID: 7172)
      • rasdial.exe (PID: 10616)
      • rasdial.exe (PID: 6384)
      • rasdial.exe (PID: 9060)
      • rasdial.exe (PID: 10676)
      • rasdial.exe (PID: 1704)
      • rasdial.exe (PID: 1508)
      • rasdial.exe (PID: 10384)
      • rasdial.exe (PID: 10620)
      • rasdial.exe (PID: 9808)
      • rasdial.exe (PID: 9888)
      • rasdial.exe (PID: 9840)
      • rasdial.exe (PID: 9428)
      • rasdial.exe (PID: 3732)
      • rasdial.exe (PID: 8096)
      • rasdial.exe (PID: 5008)
      • rasdial.exe (PID: 3840)
      • rasdial.exe (PID: 9928)
      • rasdial.exe (PID: 11084)
      • rasdial.exe (PID: 3852)
      • rasdial.exe (PID: 4040)
      • rasdial.exe (PID: 11012)
      • rasdial.exe (PID: 9812)
      • rasdial.exe (PID: 1324)
      • rasdial.exe (PID: 10964)
      • rasdial.exe (PID: 8592)
      • rasdial.exe (PID: 6268)
      • rasdial.exe (PID: 9988)
      • rasdial.exe (PID: 10540)
      • rasdial.exe (PID: 1180)
      • rasdial.exe (PID: 9304)
      • rasdial.exe (PID: 9516)
      • rasdial.exe (PID: 10820)
      • rasdial.exe (PID: 9696)
      • rasdial.exe (PID: 9400)
      • rasdial.exe (PID: 6216)
      • rasdial.exe (PID: 9136)
      • rasdial.exe (PID: 9432)
      • rasdial.exe (PID: 6232)
      • rasdial.exe (PID: 11112)
      • rasdial.exe (PID: 9200)
      • rasdial.exe (PID: 9708)
      • rasdial.exe (PID: 1580)
      • rasdial.exe (PID: 2964)
      • rasdial.exe (PID: 10376)
      • rasdial.exe (PID: 6224)
      • rasdial.exe (PID: 5060)
      • rasdial.exe (PID: 10428)
      • rasdial.exe (PID: 4444)
      • rasdial.exe (PID: 420)
      • rasdial.exe (PID: 2168)
      • rasdial.exe (PID: 2028)
      • rasdial.exe (PID: 10688)
      • rasdial.exe (PID: 10664)
      • rasdial.exe (PID: 8416)
    • Reads the machine GUID from the registry

      • Hola-Setup-C-HPE.exe (PID: 3632)
      • Hola-Setup-C-HPE.exe (PID: 3676)
      • Hola-Setup-C-HPE.exe (PID: 5372)
      • net_updater64.exe (PID: 1036)
      • test_wpf.exe (PID: 5968)
      • test_wpf.exe (PID: 1512)
      • net_updater64.exe (PID: 2680)
      • test_wpf.exe (PID: 4196)
      • hola_svc.exe (PID: 4476)
      • test_wpf.exe (PID: 6148)
      • net_updater64.exe (PID: 2620)
      • net_updater64.exe (PID: 5896)
      • idle_report.exe (PID: 3924)
      • hola_cr.exe (PID: 6376)
      • test_wpf.exe (PID: 9944)
      • net_updater64.exe (PID: 10920)
      • idle_report.exe (PID: 9020)
      • idle_report.exe (PID: 10400)
      • hola_cr.exe (PID: 3948)
      • idle_report.exe (PID: 9240)
    • Create files in a temporary directory

      • Hola-Setup-C-HPE.exe (PID: 3632)
      • Hola-Setup-C-HPE.exe (PID: 3676)
      • Hola-Setup-x64-1.243.946.exe (PID: 4520)
      • Hola-Setup-x64-1.243.946.exe (PID: 6852)
      • Hola-Setup-x64-1.243.946.exe (PID: 3720)
      • hola_cr.exe (PID: 6376)
    • Reads the computer name

      • Hola-Setup-C-HPE.exe (PID: 3676)
      • Hola-Setup-C-HPE.exe (PID: 5372)
      • Hola-Setup-x64-1.243.946.exe (PID: 4520)
      • Hola-Setup-C-HPE.exe (PID: 3632)
      • net_updater64.exe (PID: 1036)
      • test_wpf.exe (PID: 5968)
      • net_updater64.exe (PID: 2680)
      • test_wpf.exe (PID: 1512)
      • test_wpf.exe (PID: 4196)
      • net_updater64.exe (PID: 5896)
      • hola_svc.exe (PID: 4476)
      • net_updater64.exe (PID: 2620)
      • test_wpf.exe (PID: 6148)
      • idle_report.exe (PID: 3924)
      • Hola-Setup-x64-1.243.946.exe (PID: 6852)
      • 7zr.exe (PID: 2460)
      • hola.exe (PID: 7544)
      • hola_cr.exe (PID: 6376)
      • hola_cr.exe (PID: 6368)
      • Hola-Setup-x64-1.243.946.exe (PID: 3720)
      • hola_cr.exe (PID: 6216)
      • hola_cr.exe (PID: 3460)
      • identity_helper.exe (PID: 8332)
      • hola_cr.exe (PID: 8852)
      • net_updater64.exe (PID: 10920)
      • test_wpf.exe (PID: 9944)
      • idle_report.exe (PID: 9020)
      • idle_report.exe (PID: 10400)
      • hola_cr.exe (PID: 3948)
      • updater.exe (PID: 6768)
      • idle_report.exe (PID: 9240)
    • The sample compiled with english language support

      • Hola-Setup-C-HPE.exe (PID: 3676)
      • Hola-Setup-x64-1.243.946.exe (PID: 4520)
      • net_updater64.exe (PID: 1036)
      • 7zr.exe (PID: 2460)
      • Hola-Setup-x64-1.243.946.exe (PID: 6852)
    • Creates files in the program directory

      • Hola-Setup-x64-1.243.946.exe (PID: 4520)
      • net_updater64.exe (PID: 1036)
      • net_updater64.exe (PID: 2680)
      • net_updater64.exe (PID: 5896)
      • hola_svc.exe (PID: 4476)
      • net_updater64.exe (PID: 2620)
      • 7zr.exe (PID: 2460)
      • Hola-Setup-x64-1.243.946.exe (PID: 6852)
      • Hola-Setup-x64-1.243.946.exe (PID: 3720)
      • hola.exe (PID: 7544)
      • net_updater64.exe (PID: 10920)
    • Launching a file from a Registry key

      • Hola-Setup-x64-1.243.946.exe (PID: 4520)
    • Creates files or folders in the user directory

      • net_updater64.exe (PID: 1036)
      • hola_cr.exe (PID: 6376)
      • hola_cr.exe (PID: 3460)
      • hola_cr.exe (PID: 6368)
    • Reads Environment values

      • net_updater64.exe (PID: 1036)
      • net_updater64.exe (PID: 5896)
      • net_updater64.exe (PID: 2620)
      • net_updater64.exe (PID: 2680)
      • identity_helper.exe (PID: 8332)
      • net_updater64.exe (PID: 10920)
    • Reads the time zone

      • net_updater64.exe (PID: 2680)
    • Reads CPU info

      • net_updater64.exe (PID: 2680)
    • Application launched itself

      • msedge.exe (PID: 6892)
      • msedge.exe (PID: 5012)
      • msedge.exe (PID: 5552)
    • Reads security settings of Internet Explorer

      • explorer.exe (PID: 7356)
    • Manual execution by a user

      • msedge.exe (PID: 5552)
    • Node.js compiler has been detected

      • hola_svc.exe (PID: 4476)
    • Process checks whether UAC notifications are on

      • updater.exe (PID: 6768)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2001:08:06 21:39:38+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 3019776
InitializedDataSize: 414208
UninitializedDataSize: -
EntryPoint: 0x2e32ee
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.240.839.0
ProductVersionNumber: 1.240.839.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: Hola VPN Ltd.
FileDescription: Hola VPN App Setup
FileVersion: 1.240.839.0
InternalName: hola_setup.exe
LegalCopyright: Copyright © 2023 Hola VPN Ltd.
LegalTrademarks: -
OriginalFileName: hola_setup.exe
ProductName: Hola Setup
ProductVersion: 1.240.839.0
AssemblyVersion: 1.240.839.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
774
Monitored processes
628
Malicious processes
9
Suspicious processes
3

Behavior graph

Click at the process to see the details
start hola-setup-c-hpe.exe hola-setup-c-hpe.exe hola-setup-c-hpe.exe hola-setup-x64-1.243.946.exe net_updater64.exe conhost.exe no specs test_wpf.exe no specs net_updater64.exe test_wpf.exe no specs net_updater64.exe conhost.exe no specs test_wpf.exe no specs hola_svc.exe net_updater64.exe conhost.exe no specs rasdial.exe no specs conhost.exe no specs hola_svc.exe no specs test_wpf.exe no specs idle_report.exe no specs conhost.exe no specs wmiapsrv.exe no specs hola-setup-x64-1.243.946.exe 7zr.exe conhost.exe no specs msedge.exe no specs msedge.exe no specs hola-setup-x64-1.243.946.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe explorer.exe no specs msedge.exe no specs explorer.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs hola.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs rasdial.exe no specs conhost.exe no specs hola_cr.exe hola_cr.exe no specs hola_cr.exe no specs msedge.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs hola_cr.exe no specs hola_cr.exe hola_cr.exe no specs hola_cr.exe no specs hola_cr.exe no specs rasdial.exe no specs conhost.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs hola_cr.exe no specs hola_cr.exe no specs hola_cr.exe no specs hola_cr.exe no specs hola_cr.exe no specs rasdial.exe no specs hola_cr.exe no specs hola_cr.exe no specs conhost.exe no specs identity_helper.exe no specs identity_helper.exe no specs rasdial.exe no specs conhost.exe no specs hola_cr.exe no specs hola_cr.exe no specs rasdial.exe no specs conhost.exe no specs hola_cr.exe no specs hola_svc.exe no specs rasdial.exe no specs slui.exe conhost.exe no specs hola_cr.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs conhost.exe no specs sc.exe no specs sc.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs conhost.exe no specs net_updater64.exe rasdial.exe no specs conhost.exe no specs sc.exe no specs conhost.exe no specs conhost.exe no specs test_wpf.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs hola_cr.exe no specs rasdial.exe no specs conhost.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs hola_cr.exe no specs rasdial.exe no specs conhost.exe no specs idle_report.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs hola_cr.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs msedge.exe no specs rasdial.exe no specs conhost.exe no specs msedge.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs msedge.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs hola_svc.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs hola_cr.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs msedge.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs hola_cr.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs idle_report.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs COpenControlPanel no specs msedge.exe no specs explorer.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs hola_cr.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs msedge.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs hola_svc.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs hola_cr.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs msedge.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs updater.exe no specs updater.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs hola_cr.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs idle_report.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs hola_cr.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs msedge.exe no specs msedge.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs hola_cr.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs hola_svc.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs hola_cr.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs rasdial.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
316"C:\Program Files\Hola\app\chromium\hola_cr.exe" --type=renderer --user-data-dir="C:\\Users\\admin\\AppData\\Roaming\\Hola\\chromium_profile" --extension-process --no-pre-read-main-dll --no-subproc-heap-profiling --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-GB --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=20 --metrics-shmem-handle=4172,i,13155376092141362358,2833516529983097016,2097152 --field-trial-handle=4188,i,7409355693710786277,602355536895999320,262144 --variations-seed-version --mojo-platform-channel-handle=4184 /prefetch:2C:\Program Files\Hola\app\chromium\hola_cr.exehola_cr.exe
User:
admin
Company:
Hola VPN Ltd.
Integrity Level:
LOW
Description:
Hola
Exit code:
0
Version:
128.0.6613.86
Modules
Images
c:\program files\hola\app\chromium\hola_cr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\program files\hola\app\chromium\128.0.6613.86\hola_elf.dll
c:\windows\syswow64\version.dll
316rasdialC:\Windows\System32\rasdial.exehola_svc.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Remote Access Command Line Dial UI
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rasdial.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\rasapi32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
416"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --disable-quic --onnx-enabled-for-ee --string-annotations --always-read-main-dll --field-trial-handle=5800,i,14520469383104222944,1157628044002031827,262144 --variations-seed-version --mojo-platform-channel-handle=5388 /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
416rasdialC:\Windows\System32\rasdial.exehola_svc.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Remote Access Command Line Dial UI
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rasdial.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\rasapi32.dll
c:\windows\system32\gdi32full.dll
420\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exerasdial.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
420rasdialC:\Windows\System32\rasdial.exehola_svc.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Remote Access Command Line Dial UI
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rasdial.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\rasapi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
620\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exerasdial.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
640sc query luminati_net_updater_org_hola_browser_updaterC:\Windows\System32\sc.exehola_svc.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Service Control Manager Configuration Tool
Exit code:
1060
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\bcrypt.dll
640\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exerasdial.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
640\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exerasdial.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
110 994
Read events
110 796
Write events
192
Delete events
6

Modification events

(PID) Process:(3632) Hola-Setup-C-HPE.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Hola-Setup-C-HPE_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3632) Hola-Setup-C-HPE.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Hola-Setup-C-HPE_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(3632) Hola-Setup-C-HPE.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Hola-Setup-C-HPE_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(3632) Hola-Setup-C-HPE.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Hola-Setup-C-HPE_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(3632) Hola-Setup-C-HPE.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Hola-Setup-C-HPE_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(3632) Hola-Setup-C-HPE.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Hola-Setup-C-HPE_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(3632) Hola-Setup-C-HPE.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Hola-Setup-C-HPE_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(3632) Hola-Setup-C-HPE.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Hola-Setup-C-HPE_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(3632) Hola-Setup-C-HPE.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Hola-Setup-C-HPE_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(3632) Hola-Setup-C-HPE.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Hola-Setup-C-HPE_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
23
Suspicious files
489
Text files
131
Unknown types
178

Dropped files

PID
Process
Filename
Type
3676Hola-Setup-C-HPE.exeC:\Users\admin\AppData\Local\Temp\chromium-128.0.6613.86.1242669.zip
MD5:
SHA256:
4520Hola-Setup-x64-1.243.946.exeC:\Program Files\Hola\app\net_updater64.exeexecutable
MD5:5501D592F6FB8EAA9C7FEB1869221C89
SHA256:5FBF85A022726CD979C585497A7D74FF164C99D55E9756F6BAAD201A01684497
1036net_updater64.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEBbinary
MD5:FF6154C6D23758C12C93297EC7AC9641
SHA256:BE4630B4D7F3A949DEE754F520B05A2F95FD16C22D245E8E133B5FE563A6FE31
3676Hola-Setup-C-HPE.exeC:\Users\admin\AppData\Local\Temp\Hola-Setup-x64-1.243.946.exeexecutable
MD5:A9BE739359470CE27CF3F89FA8617191
SHA256:8CF56CF24B0013C943D0047871EA8B65AD0339A55A8ABC3A8165630B5DEFF0BF
1036net_updater64.exeC:\ProgramData\BrightData\108a47921d08860d64656218998ab66204caf497\20250623_182257_once_03_is_admin_1.537.276.logbinary
MD5:68B329DA9893E34099C7D8AD5CB9C940
SHA256:01BA4719C80B6FE911B091A7C05124B64EEECE964E09C058EF8F9805DACA546B
1036net_updater64.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEBder
MD5:AC0EBB7A5BB4B2217DC6512780B684D6
SHA256:47BBA09500D167F8239DB40F2C9BA04855E89F62A4C074EDB779D9B4267D006B
4520Hola-Setup-x64-1.243.946.exeC:\Users\admin\AppData\Local\Temp\install.logbinary
MD5:22829919ED96BC1D912505C8E2CEA48A
SHA256:FB323D3B27646082454509FD9A7FB349C7701E6C3B56BEB8991E8AFC7CA5327F
3632Hola-Setup-C-HPE.exeC:\Users\admin\AppData\Local\Temp\hola_setup.logbinary
MD5:88DCB5DDA8956C55C81511A0F2630E6F
SHA256:8DA99A4828B44678B6374621CE835BAE7D02FF4F004DE7A3BB792DDC9FB376E0
4520Hola-Setup-x64-1.243.946.exeC:\Program Files\Hola\app\hola_setup.exeexecutable
MD5:A9BE739359470CE27CF3F89FA8617191
SHA256:8CF56CF24B0013C943D0047871EA8B65AD0339A55A8ABC3A8165630B5DEFF0BF
4520Hola-Setup-x64-1.243.946.exeC:\Program Files\Hola\app\lum_sdk64.dllexecutable
MD5:C3E9C29CA4F57916D3347D23D3A2279E
SHA256:CD928869686CC510559DB72656E081B025256E0C8FA5E13A716878F34ABBC243
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
115
TCP/UDP connections
349
DNS requests
232
Threats
78

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1036
net_updater64.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT3xL4LQLXDRDM9P665TW442vrsUQQUReuir%2FSSy4IxLVGLp6chnfNtyA8CEA6bGI750C3n79tQ4ghAGFo%3D
unknown
whitelisted
764
lsass.exe
GET
200
104.18.38.233:80
http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTNMNJMNDqCqx8FcBWK16EHdimS6QQUU3m%2FWqorSs9UgOHYm8Cd8rIDZssCEH1bUSa0droR23QWC7xTDac%3D
unknown
whitelisted
1036
net_updater64.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfIs%2BLjDtGwQ09XEB1Yeq%2BtX%2BBgQQU7NfjgtJxXWRM3y5nP%2Be6mK4cD08CEAitQLJg0pxMn17Nqb2Trtk%3D
unknown
whitelisted
436
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1036
net_updater64.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSRXerF0eFeSWRripTgTkcJWMm7iQQUaDfg67Y7%2BF8Rhvv%2BYXsIiGX0TkICEAdTF0YC22Gdh8cnyPwWxE0%3D
unknown
whitelisted
764
lsass.exe
GET
200
104.18.38.233:80
http://ocsp.comodoca.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRTtU9uFqgVGHhJwXZyWCNXmVR5ngQUoBEKIz6W8Qfs4q8p74Klf9AwpLQCEDlyRDr5IrdR19NsEN0xNZU%3D
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
184.24.77.39:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2680
net_updater64.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT3xL4LQLXDRDM9P665TW442vrsUQQUReuir%2FSSy4IxLVGLp6chnfNtyA8CEA6bGI750C3n79tQ4ghAGFo%3D
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2680
net_updater64.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfIs%2BLjDtGwQ09XEB1Yeq%2BtX%2BBgQQU7NfjgtJxXWRM3y5nP%2Be6mK4cD08CEAitQLJg0pxMn17Nqb2Trtk%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1268
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4172
RUXIMICS.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3632
Hola-Setup-C-HPE.exe
34.237.179.253:443
perr.hola.org
AMAZON-AES
US
whitelisted
4
System
192.168.100.255:138
whitelisted
3632
Hola-Setup-C-HPE.exe
54.225.121.9:443
hola.org
AMAZON-AES
US
whitelisted
3676
Hola-Setup-C-HPE.exe
54.225.121.9:443
hola.org
AMAZON-AES
US
whitelisted
5372
Hola-Setup-C-HPE.exe
54.225.121.9:443
hola.org
AMAZON-AES
US
whitelisted
3676
Hola-Setup-C-HPE.exe
34.237.179.253:443
perr.hola.org
AMAZON-AES
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
  • 4.231.128.59
whitelisted
google.com
  • 142.250.186.78
whitelisted
perr.hola.org
  • 34.237.179.253
  • 23.22.252.240
whitelisted
hola.org
  • 54.225.121.9
  • 107.22.193.119
whitelisted
hola-rmt-update.b-cdn.net
  • 138.199.37.225
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.160.5
  • 40.126.32.133
  • 40.126.32.68
  • 40.126.32.72
  • 40.126.32.140
  • 40.126.32.134
  • 20.190.160.65
  • 20.190.160.128
  • 40.126.31.131
  • 40.126.31.0
  • 40.126.31.67
  • 40.126.31.129
  • 40.126.31.71
  • 20.190.159.68
  • 20.190.159.75
  • 40.126.31.130
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
client.hola.org
  • 54.225.227.202
  • 54.243.128.120
whitelisted
nexusrules.officeapps.live.com
  • 52.111.243.29
whitelisted

Threats

PID
Process
Class
Message
2680
net_updater64.exe
Misc activity
ET INFO External IP Address Lookup Domain (ipify .org) in TLS SNI
2200
svchost.exe
Misc activity
ET INFO External IP Lookup Domain (ipify .org) in DNS Lookup
3460
hola_cr.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
3460
hola_cr.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
3460
hola_cr.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
3460
hola_cr.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
3460
hola_cr.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
3460
hola_cr.exe
Generic Protocol Command Decode
SURICATA QUIC failed decrypt
3460
hola_cr.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
3460
hola_cr.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
Process
Message
hola_cr.exe
RecursiveDirectoryCreate( C:\\Users\\admin\\AppData\\Roaming\ directory exists )