Threat Database Adware TopShape.me

TopShape.me

By GoldSparrow in Adware
Translate To:

Threat Scorecard

Popularity Rank: 14,116
Threat Level: 20 % (Normal)
Infected Computers: 18,674
First Seen: September 7, 2015
Last Seen: March 30, 2026
OS(es) Affected: Windows

Topshape.me is a domain that is registered to the 104.27.135.121 IP address. Topshape.me is used to promote a software update monitoring tool called 'TopShape.me' (a.k.a. 'TopShape-B3'). The 'TopShape.me' tools is reported to travel in freeware bundles. However, some Web surfers may stumble upon pop-up windows in the browser from:

h[tt]p://www.topshape[.]me/builds/download.php?cid=[string of 23 random characters]

The pop-ups promoting 'TopShape.me' feature names like 'TopShape Download Page' and recommend users download and install the 'TopShape.me' software. PC users may be suggested that 'TopShape.me' can help them install the latest versions of outdated hardware drivers. Unfortunately, the 'TopShape.me' software update instrument has no user-interface, and it is designed to run in the system background as the following process:

C:\Users\username\AppData\Roaming\topshape\softwareupdate.exe — (SHA-256: 77a40defd63a373a446d700553e2bbb567e7db4964ac9a0d14de5f327672ad72)

We have seen that the 'TopShape Download Page' pop-up windows may lead users to download files with the following names:

topshape_setup_w1F03JD6HE8SBOCDHTK6GG9E.exe (SHA-256: a5c53d3f7fdaabfaca267f37254566549f4fddd5f2c781f8dab14fb409fe5f08)
topshape_setup.exe (SHA-256: 79b7810b93ccbf04b9fed9bb396f937ea90d0f859f0c6bef8d9d44254c8ce0f1)
topshape_ed.exe (SHA-256: f7e4972a027ab3a98b9f651509541d172ea4a507ebc4ffd299badfc6059ad23d)
135370689.exe(SHA-256: a7c392173fe885bc7146d81cf04706b0ac4ae2e8564751c4ddbbf1daddc2748a)

All versions of the 'TopShape.me' installer seems to feature a digital signature by Keen Internet Technologies. The company does not appear to be listed as a valid services provider on the Internet. It is noted on topshape.me/legal/privacy that the 'TopShape.me' program collects non-personally identifiable information to show customized marketing materials. The 'softwareupdate.exe' process by 'TopShape.me' may inject code into your Web browser and show advertisements in the form of pop-up windows, hyperlinked text and sponsored search results on Google.com.

The 'TopShape.me' software is categorized as a Potentially Unwanted Program (PUP) that might display promotional materials in your browser and cause redirects to insecure pages. AV engines are known to flag files from Topshape.me with the following detection names:

  • Adware.Keenm.1
  • BehavesLike.Win32.Dropper.th
  • GrayWare[Downloader]/Win32.Adload.gen
  • ML.Attribute.HighConfidence
  • PUP.TopShape/Variant
  • Suspicious_GEN.F47V0420
  • Trojan.Injector.Win32.339708
  • Win32.Trojan.Hoster.Heur
  • Win32.Trojan.WisdomEyes.16070401.9500.9970
  • Win32/Virus.Downloader.ab8

SpyHunter Detects & Remove TopShape.me

File System Details

TopShape.me may create the following file(s):
# File Name MD5 Detections
1. softwareupdate.exe 5efa3a66b87d70a06dd95e03879702c7 8,338
2. topshape_setup_wJ6GDN92IGLUL1LT0AFD08L6.exe c4b67a8aae4912db0be788916b01e6f6 53
3. ShapeSrv.exe cf302a6787813cfff0b1a1c531e5fb4d 13
4. topshape-1005[1].exe a8023d3a900afdb7f913cdf5133669b2 5
5. topshape_ie.exe d17dd6843a76c0a5833079915f5a5f83 5
More files

Registry Details

TopShape.me may create the following registry entry or registry entries:
File name without path
www.topshape[1].xml
Software\Microsoft\Internet Explorer\DOMStorage\topshape.me
Software\Microsoft\Internet Explorer\DOMStorage\www.topshape.me
SOFTWARE\TopShape
SOFTWARE\TopShape-B3
SOFTWARE\TopShape-B3_mo
SOFTWARE\TopShape.me_mo
SOFTWARE\TopShape_mo
SOFTWARE\Wow6432Node\TopShape
SOFTWARE\Wow6432Node\TopShape-B3
SOFTWARE\Wow6432Node\TopShape-B3_mo
SOFTWARE\Wow6432Node\TopShape.me
SOFTWARE\Wow6432Node\TopShape.me_mo
SOFTWARE\Wow6432Node\TopShape_mo
SYSTEM\ControlSet001\services\TopShape Service
SYSTEM\ControlSet001\Services\TopShape-B3 Service
SYSTEM\ControlSet002\services\TopShape Service
SYSTEM\ControlSet002\Services\TopShape-B3 Service
SYSTEM\CurrentControlSet\services\TopShape Service
SYSTEM\CurrentControlSet\Services\TopShape-B3 Service

Directories

TopShape.me may create the following directory or directories:

%APPDATA%\TopShape-B4
%APPDATA%\TopShape-B7
%Appdata%\TopShape
%Appdata%\TopShape-B3
%Appdata%\TopShape.me
%PROGRAMFILES%\TopShape-B3
%PROGRAMFILES(x86)%\TopShape-B3

Analysis Report

General information

Family Name: Adware.TopShape.me
Signature status: Self Signed

Known Samples

MD5: f45fbf54e45e2a21ba3b29e399cfc798
SHA1: c590aeaaefe78d01ee57582131cb219ca434aae7
SHA256: AD91AF4D9F835550462B15D9A1F8229E0EAFC639C0C31459CE3BAF7876574CDC
File Size: 1.43 MB, 1434592 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
Show More
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Company Name Keen Internet Technologies
File Description TopShape.me
File Version 1.0.0.4
Legal Copyright Keen Internet Technologies
Product Name TopShape.me
Product Version 9898.98

Digital Signatures

Signer Root Status
Boian Mihailov thawte SHA256 Code Signing CA Self Signed

File Traits

  • Installer Manifest
  • nosig nsis
  • Nullsoft Installer
  • x86

Files Modified

File Attributes
\device\namedpipe Generic Read,Write Attributes
\device\namedpipe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsca832.tmp\inetc.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsca832.tmp\nsexec.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsca832.tmp\system.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsha852.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsha852.tmp Synchronize,Write Attributes
c:\users\user\appdata\local\temp\nstaa67.tmp Generic Write,Read Attributes
c:\users\user\appdata\roaming\topshape.me\softwareupdate.exe Generic Write,Read Attributes
c:\users\user\appdata\roaming\topshape.me\softwareupdate.exe Synchronize,Write Attributes

Registry Modifications

Key::Value Data API Name
HKLM\software\wow6432node\topshape.me::install_params RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::proxybypass  RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::intranetname  RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::uncasintranet  RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::autodetect RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::proxybypass  RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::intranetname  RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::uncasintranet  RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::autodetect RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\content::cacheprefix RegNtPreCreateKey
Show More
HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\cookies::cacheprefix Cookie: RegNtPreCreateKey
HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\history::cacheprefix Visited: RegNtPreCreateKey
HKLM\software\wow6432node\topshape.me::install_dir C:\Users\Ppmdkdab\AppData\Roaming\TopShape.me RegNtPreCreateKey
HKLM\software\wow6432node\microsoft\windows\currentversion\uninstall\topshape.me::displayversion 1.0.0.4 RegNtPreCreateKey
HKLM\software\wow6432node\microsoft\windows\currentversion\uninstall\topshape.me::displayname TopShape.me RegNtPreCreateKey
HKLM\software\wow6432node\microsoft\windows\currentversion\uninstall\topshape.me::publisher Keen Internet Technologies RegNtPreCreateKey
HKLM\software\wow6432node\microsoft\windows\currentversion\uninstall\topshape.me::uninstallstring "C:\Users\Ppmdkdab\AppData\Roaming\TopShape.me\uninstall.exe" RegNtPreCreateKey
HKLM\software\wow6432node\microsoft\windows\currentversion\uninstall\topshape.me::displayicon "C:\Users\Ppmdkdab\AppData\Roaming\TopShape.me\SoftwareUpdate.exe" RegNtPreCreateKey
HKLM\software\wow6432node\microsoft\windows\currentversion\uninstall\topshape.me::estimatedsize ΀ RegNtPreCreateKey
HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe RegNtPreCreateKey

Windows API Usage

Category API
Network Wininet
  • HttpOpenRequest
  • HttpQueryInfo
  • HttpSendRequest
  • InternetConnect
  • InternetOpen
  • InternetQueryOption
  • InternetReadFile
  • InternetSetOption
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
Service Control
  • OpenSCManager
  • OpenService
  • StartService
Syscall Use
  • ntdll.dll!NtAlertThreadByThreadId
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtApphelpCacheControl
  • ntdll.dll!NtClose
  • ntdll.dll!NtConnectPort
  • ntdll.dll!NtCreateEvent
  • ntdll.dll!NtCreateSemaphore
  • ntdll.dll!NtDuplicateObject
  • ntdll.dll!NtEnumerateValueKey
  • ntdll.dll!NtFreeVirtualMemory
Show More
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenKeyEx
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtOpenSection
  • ntdll.dll!NtProtectVirtualMemory
  • ntdll.dll!NtQueryAttributesFile
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationThread
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQueryKey
  • ntdll.dll!NtQueryPerformanceCounter
  • ntdll.dll!NtQuerySecurityAttributesToken
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtReleaseWorkerFactoryWorker
  • ntdll.dll!NtRequestWaitReplyPort
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtWaitForAlertByThreadId
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWaitForWorkViaWorkerFactory
  • ntdll.dll!NtWaitLowEventPair
  • ntdll.dll!NtWorkerFactoryWorkerReady
  • ntdll.dll!NtWriteFile
  • UNKNOWN
Anti Debug
  • IsDebuggerPresent
User Data Access
  • GetUserObjectInformation

Shell Command Execution

C:\Users\Ppmdkdab\AppData\Roaming\TopShape.me\SoftwareUpdate.exe /uninstall
C:\Users\Ppmdkdab\AppData\Roaming\TopShape.me\SoftwareUpdate.exe /install
sc failure "Software Updater Service" actions= restart/60000/restart/60000// reset= 86400

Related Posts

Trending

Most Viewed

Loading...