H
Low RiskWindows
hitmanpro.exeEXECUTABLE

HitmanPro - Portable Anti-Malware Scanner [2026]

HitmanPro is a portable anti-malware scanner from Sophos. It uses cloud-based behavioral analysis to detect threats. Legitimate security tool that could potentially be abused for reconnaissance.

3viewsLast verified: Jan 18, 2025

Risk Summary

## Risk Summary | Factor | Assessment | |--------|------------| | Detection Difficulty | Low | | Abuse Potential | Low | | Prevalence | Common | | Risk Score | 20/100 | HitmanPro is a legitimate second-opinion malware scanner that runs portably without installation.

Overview

What is hitmanpro.exe?

HitmanPro (formerly Surfright) is a portable anti-malware scanner acquired by Sophos. It uses cloud-based behavioral detection and multiple scan engines to identify threats.

Key Characteristics

AttributeValue
File NameHitmanPro.exe, HitmanPro_x64.exe
DeveloperSophos Ltd
Digital SignatureSophos Limited
Typical Size10-15 MB
TypePortable scanner

Technical Details

PropertyDescription
Process TypeUser Application
Network ActivityCloud-based scanning
InstallationNone required (portable)
Scan EnginesMultiple cloud engines

HitmanPro is commonly used as a "second opinion" scanner alongside primary antivirus solutions.

Normal Behavior

Normal Behavior

Legitimate Usage Patterns

HitmanPro.exe  (GUI scanner)
HitmanPro_x64.exe  (64-bit version)
hmpalert.exe  (Real-time protection)
hmpsched.exe  (Scheduler)

Expected Characteristics

AspectExpected Behavior
Parent Processexplorer.exe
User ContextAdministrator (for full scanning)
Network ConnectionsSophos cloud infrastructure
CPU UsageHigh during scans
Disk ActivityHigh during scans

Command-Line Options

ParameterPurpose
/scanRun scan
/quickQuick scan mode
/quietSilent mode
/logGenerate log file

Common Locations

C:\Users\<user>\Downloads\HitmanPro.exeC:\Users\<user>\Desktop\HitmanPro_x64.exeC:\Program Files\HitmanPro\HitmanPro.exe

Suspicious Indicators

Suspicious Indicators

Red Flags

IndicatorConcern LevelDescription
Renamed binaryMediumHitmanPro with different filename
Command-line only usageLowScripted scanning without GUI
Multiple quick scansLowReconnaissance activity
Results exfiltrationMediumScan results sent externally

Limited Abuse Potential

HitmanPro has limited abuse potential because:
- It is a detection tool, not an attack tool
- Requires valid license for full functionality
- Heavy cloud dependency limits offline abuse
- Well-signed binary with reputation

Potential Reconnaissance Use

ActivityPurpose
Enumerate security softwareIdentify installed defenses
Check for malware presenceAssess target cleanliness
Identify vulnerable softwareFind exploitation opportunities

Abuse Techniques

Abuse Techniques

Reconnaissance

Reconnaissance Scenario:
1. Attacker obtains HitmanPro (legitimate download)
2. Runs quick scan on compromised system
3. Reviews results to identify:
   - Installed security software
   - Existing malware (competition)
   - System vulnerabilities
4. Uses information for attack planning

Information Gathering

InformationAttacker Use
Installed AVCraft evasive payloads
Running processesIdentify security tools
Browser pluginsTarget browser attacks
Startup itemsFind persistence opportunities

Limited Evasion

Why HitmanPro is rarely abused:
- Detection-focused, not execution
- Requires cloud connectivity
- Generates telemetry to Sophos
- Signed by reputable vendor
- No execution capabilities

Remediation Steps

Remediation Steps

Policy Considerations

HitmanPro Policy:
- Generally a legitimate security tool
- May indicate security concern if user-initiated
- Review context of usage
- Check if IT-sanctioned

Investigation Approach

# Find HitmanPro executions
Get-ChildItem -Path C:\Users -Recurse -Filter "HitmanPro*.exe" -ErrorAction SilentlyContinue

# Check if scheduled
Get-ScheduledTask | Where-Object { $_.Actions.Execute -like "*HitmanPro*" }

Context Assessment

ContextResponse
IT-initiatedNormal security operation
User-initiatedMay indicate suspected infection
Unknown sourceInvestigate who deployed it
Scheduled taskVerify legitimate scheduling

Investigation Checklist

Investigation Checklist

Usage Context

  • Who initiated the HitmanPro scan?
  • Is this part of standard security procedures?
  • What prompted the scan?
  • Are there indicators of compromise that led to this?

Results Analysis

  • What did HitmanPro find?
  • Were threats detected?
  • What actions were taken on findings?
  • Were results exported or shared?

Timeline Correlation

  • What other activities occurred around this time?
  • Is this correlated with suspicious behavior?
  • Was system compromised before scan?
  • What happened after scan completed?

MITRE ATT&CK Techniques