File name:

Hide.me-Setup-3.17.3.exe

Full analysis: https://app.any.run/tasks/24e2aa25-2aab-4f96-896e-cda766f665a4
Verdict: Malicious activity
Analysis date: December 19, 2024, 16:32:26
OS: Windows 10 Professional (build: 19045, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 11 sections
MD5:

76D02F6B9E7681C05F4E9EFD82543C8C

SHA1:

5EA89EE60CD61DB9C5B82F612D9E771FBCED5127

SHA256:

D1853A77142B349187FBDC32EC529739627AE9B4512119E5E5F899B6B0A11142

SSDEEP:

196608:x9XYdnDkTLUlgWxTlOYPoD9jfmKJfk18kA:UdnIUmgT8fHfk18kA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Create files in the Startup directory

      • Hide.me-Setup-3.17.3.tmp (PID: 4444)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • Hide.me-Setup-3.17.3.tmp (PID: 4996)
      • hidemesvc.exe (PID: 6576)
    • Executable content was dropped or overwritten

      • Hide.me-Setup-3.17.3.exe (PID: 4528)
      • Hide.me-Setup-3.17.3.exe (PID: 3620)
      • Hide.me-Setup-3.17.3.tmp (PID: 4444)
      • drvinst.exe (PID: 6520)
      • drvinst.exe (PID: 6156)
      • hidemesvc.exe (PID: 6700)
    • Reads the Windows owner or organization settings

      • Hide.me-Setup-3.17.3.tmp (PID: 4444)
      • msiexec.exe (PID: 5460)
    • Drops a system driver (possible attempt to evade defenses)

      • Hide.me-Setup-3.17.3.tmp (PID: 4444)
      • msiexec.exe (PID: 5460)
      • msiexec.exe (PID: 6476)
      • drvinst.exe (PID: 6520)
      • drvinst.exe (PID: 6156)
      • hidemesvc.exe (PID: 6700)
    • The process drops C-runtime libraries

      • Hide.me-Setup-3.17.3.tmp (PID: 4444)
    • Process drops legitimate windows executable

      • Hide.me-Setup-3.17.3.tmp (PID: 4444)
    • Executes as Windows Service

      • VSSVC.exe (PID: 2008)
      • hidemesvc.exe (PID: 6700)
    • Creates files in the driver directory

      • msiexec.exe (PID: 6476)
      • drvinst.exe (PID: 6520)
      • drvinst.exe (PID: 6156)
    • Checks Windows Trust Settings

      • drvinst.exe (PID: 6520)
      • hidemesvc.exe (PID: 6576)
    • Uses powercfg.exe to modify the power settings

      • hidemesvc.exe (PID: 6700)
  • INFO

    • Create files in a temporary directory

      • Hide.me-Setup-3.17.3.exe (PID: 4528)
      • Hide.me-Setup-3.17.3.exe (PID: 3620)
    • Checks supported languages

      • Hide.me-Setup-3.17.3.exe (PID: 4528)
      • Hide.me-Setup-3.17.3.tmp (PID: 4996)
      • Hide.me-Setup-3.17.3.exe (PID: 3620)
      • Hide.me-Setup-3.17.3.tmp (PID: 4444)
      • msiexec.exe (PID: 5460)
      • msiexec.exe (PID: 1684)
      • msiexec.exe (PID: 6424)
      • drvinst.exe (PID: 6156)
      • drvinst.exe (PID: 6520)
      • Hide.me.exe (PID: 6820)
      • hidemesvc.exe (PID: 6576)
      • hidemesvc.exe (PID: 6700)
    • Reads the computer name

      • Hide.me-Setup-3.17.3.tmp (PID: 4996)
      • Hide.me-Setup-3.17.3.exe (PID: 3620)
      • Hide.me-Setup-3.17.3.tmp (PID: 4444)
      • msiexec.exe (PID: 5460)
      • msiexec.exe (PID: 1684)
      • drvinst.exe (PID: 6520)
      • hidemesvc.exe (PID: 6576)
      • Hide.me.exe (PID: 6820)
    • Process checks computer location settings

      • Hide.me-Setup-3.17.3.tmp (PID: 4996)
    • Creates files in the program directory

      • Hide.me-Setup-3.17.3.tmp (PID: 4444)
      • hidemesvc.exe (PID: 6576)
      • hidemesvc.exe (PID: 6700)
    • The sample compiled with english language support

      • Hide.me-Setup-3.17.3.tmp (PID: 4444)
      • msiexec.exe (PID: 5460)
      • msiexec.exe (PID: 6476)
      • drvinst.exe (PID: 6520)
      • drvinst.exe (PID: 6156)
      • hidemesvc.exe (PID: 6700)
    • Creates files or folders in the user directory

      • Hide.me-Setup-3.17.3.tmp (PID: 4444)
      • hidemesvc.exe (PID: 6700)
    • Creates a software uninstall entry

      • Hide.me-Setup-3.17.3.tmp (PID: 4444)
      • msiexec.exe (PID: 5460)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 5460)
      • msiexec.exe (PID: 6476)
    • Application launched itself

      • msiexec.exe (PID: 5460)
    • Manages system restore points

      • SrTasks.exe (PID: 2612)
      • SrTasks.exe (PID: 6348)
    • Reads the machine GUID from the registry

      • drvinst.exe (PID: 6156)
      • drvinst.exe (PID: 6520)
      • hidemesvc.exe (PID: 6700)
      • Hide.me.exe (PID: 6820)
      • hidemesvc.exe (PID: 6576)
    • Reads the software policy settings

      • drvinst.exe (PID: 6520)
      • drvinst.exe (PID: 6156)
      • hidemesvc.exe (PID: 6576)
      • Hide.me.exe (PID: 6820)
    • Checks proxy server information

      • hidemesvc.exe (PID: 6576)
    • The process uses the downloaded file

      • hidemesvc.exe (PID: 6576)
    • Disables trace logs

      • hidemesvc.exe (PID: 6700)
    • Sends debugging messages

      • hidemesvc.exe (PID: 6700)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Inno Setup installer (67.7)
.exe | Win32 EXE PECompact compressed (generic) (25.6)
.exe | Win32 Executable (generic) (2.7)
.exe | Win16/32 Executable Delphi generic (1.2)
.exe | Generic Win/DOS Executable (1.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:07:12 07:26:53+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 2.25
CodeSize: 685056
InitializedDataSize: 171520
UninitializedDataSize: -
EntryPoint: 0xa83bc
OSVersion: 6.1
ImageVersion: -
SubsystemVersion: 6.1
Subsystem: Windows GUI
FileVersionNumber: 3.17.3.0
ProductVersionNumber: 3.17.3.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName: eVenture Limited
FileDescription: hide.me VPN Setup
FileVersion: 3.17.3
LegalCopyright:
OriginalFileName:
ProductName: hide.me VPN
ProductVersion: 3.17.3
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
148
Monitored processes
25
Malicious processes
9
Suspicious processes
0

Behavior graph

Click at the process to see the details
start hide.me-setup-3.17.3.exe hide.me-setup-3.17.3.tmp no specs hide.me-setup-3.17.3.exe hide.me-setup-3.17.3.tmp msiexec.exe no specs msiexec.exe msiexec.exe no specs vssvc.exe no specs srtasks.exe no specs conhost.exe no specs msiexec.exe no specs msiexec.exe no specs drvinst.exe msiexec.exe no specs srtasks.exe no specs conhost.exe no specs msiexec.exe no specs msiexec.exe drvinst.exe hidemesvc.exe conhost.exe no specs hidemesvc.exe hide.me.exe powercfg.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1536C:\Windows\System32\MsiExec.exe -Embedding F20B570A94A99B9642E7037E8F7C4B4F E Global\MSI0000C:\Windows\System32\msiexec.exemsiexec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1684C:\Windows\System32\MsiExec.exe -Embedding 7E9E3550A93335E0F74AF7C0C3395852C:\Windows\System32\msiexec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
2008C:\WINDOWS\system32\vssvc.exeC:\Windows\System32\VSSVC.exeservices.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Volume Shadow Copy Service
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\vssvc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2612C:\WINDOWS\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:11C:\Windows\System32\SrTasks.exemsiexec.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Microsoft® Windows System Protection background tasks.
Exit code:
2147942487
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\srtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
3568\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeSrTasks.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3620"C:\Users\admin\Desktop\Hide.me-Setup-3.17.3.exe" /SPAWNWND=$402D2 /NOTIFYWND=$901FA C:\Users\admin\Desktop\Hide.me-Setup-3.17.3.exe
Hide.me-Setup-3.17.3.tmp
User:
admin
Company:
eVenture Limited
Integrity Level:
HIGH
Description:
hide.me VPN Setup
Exit code:
0
Version:
3.17.3
Modules
Images
c:\users\admin\desktop\hide.me-setup-3.17.3.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comctl32.dll
4444"C:\Users\admin\AppData\Local\Temp\is-O2RBE.tmp\Hide.me-Setup-3.17.3.tmp" /SL5="$60224,14933946,857600,C:\Users\admin\Desktop\Hide.me-Setup-3.17.3.exe" /SPAWNWND=$402D2 /NOTIFYWND=$901FA C:\Users\admin\AppData\Local\Temp\is-O2RBE.tmp\Hide.me-Setup-3.17.3.tmp
Hide.me-Setup-3.17.3.exe
User:
admin
Company:
eVenture Limited
Integrity Level:
HIGH
Description:
Setup/Uninstall
Exit code:
0
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-o2rbe.tmp\hide.me-setup-3.17.3.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comdlg32.dll
4528"C:\Users\admin\Desktop\Hide.me-Setup-3.17.3.exe" C:\Users\admin\Desktop\Hide.me-Setup-3.17.3.exe
explorer.exe
User:
admin
Company:
eVenture Limited
Integrity Level:
MEDIUM
Description:
hide.me VPN Setup
Exit code:
0
Version:
3.17.3
Modules
Images
c:\users\admin\desktop\hide.me-setup-3.17.3.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comctl32.dll
4652"C:\WINDOWS\system32\msiexec.exe" /x "{6A3B09CD-8B4A-4A66-9C90-833023E463E9}" /passiveC:\Windows\SysWOW64\msiexec.exeHide.me-Setup-3.17.3.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
1605
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
4976"C:\WINDOWS\system32\msiexec.exe" /i "C:\Program Files (x86)\hide.me VPN\OpenVPN\drivers\ovpn-dco-x64.msi" /passiveC:\Windows\SysWOW64\msiexec.exeHide.me-Setup-3.17.3.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
Total events
25 611
Read events
25 012
Write events
561
Delete events
38

Modification events

(PID) Process:(4444) Hide.me-Setup-3.17.3.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{0E00BDA5-7998-4889-BE4B-39A4BBD2EDFB}_is1
Operation:writeName:Inno Setup: Setup Version
Value:
6.3.3
(PID) Process:(4444) Hide.me-Setup-3.17.3.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{0E00BDA5-7998-4889-BE4B-39A4BBD2EDFB}_is1
Operation:writeName:Inno Setup: App Path
Value:
C:\Program Files (x86)\hide.me VPN
(PID) Process:(4444) Hide.me-Setup-3.17.3.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{0E00BDA5-7998-4889-BE4B-39A4BBD2EDFB}_is1
Operation:writeName:InstallLocation
Value:
C:\Program Files (x86)\hide.me VPN\
(PID) Process:(4444) Hide.me-Setup-3.17.3.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{0E00BDA5-7998-4889-BE4B-39A4BBD2EDFB}_is1
Operation:writeName:Inno Setup: Icon Group
Value:
hide.me VPN
(PID) Process:(4444) Hide.me-Setup-3.17.3.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{0E00BDA5-7998-4889-BE4B-39A4BBD2EDFB}_is1
Operation:writeName:Inno Setup: User
Value:
admin
(PID) Process:(4444) Hide.me-Setup-3.17.3.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{0E00BDA5-7998-4889-BE4B-39A4BBD2EDFB}_is1
Operation:writeName:Inno Setup: Language
Value:
en
(PID) Process:(4444) Hide.me-Setup-3.17.3.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{0E00BDA5-7998-4889-BE4B-39A4BBD2EDFB}_is1
Operation:writeName:DisplayName
Value:
hide.me VPN 3.17.3
(PID) Process:(4444) Hide.me-Setup-3.17.3.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{0E00BDA5-7998-4889-BE4B-39A4BBD2EDFB}_is1
Operation:writeName:DisplayIcon
Value:
C:\Program Files (x86)\hide.me VPN\unins000.exe
(PID) Process:(4444) Hide.me-Setup-3.17.3.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{0E00BDA5-7998-4889-BE4B-39A4BBD2EDFB}_is1
Operation:writeName:UninstallString
Value:
"C:\Program Files (x86)\hide.me VPN\unins000.exe"
(PID) Process:(4444) Hide.me-Setup-3.17.3.tmpKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{0E00BDA5-7998-4889-BE4B-39A4BBD2EDFB}_is1
Operation:writeName:QuietUninstallString
Value:
"C:\Program Files (x86)\hide.me VPN\unins000.exe" /SILENT
Executable files
128
Suspicious files
147
Text files
33
Unknown types
13

Dropped files

PID
Process
Filename
Type
4444Hide.me-Setup-3.17.3.tmpC:\Program Files (x86)\hide.me VPN\Common.dll.configxml
MD5:6F290F80121A624A7F27545B98BDAFF3
SHA256:D0DB0AC24C7C659E6AD0ABBBC15A5D4EEC3600CFB6DF99F49B8B181EE04D49F3
4444Hide.me-Setup-3.17.3.tmpC:\Program Files (x86)\hide.me VPN\is-D6LIQ.tmpexecutable
MD5:EB9CCEA99B956BC3FAE6FC5A5EBC6E21
SHA256:67366BEBFA49AF883AC25176E15FA4DEB3A947A9F307AE352EAD94936D6AA406
4444Hide.me-Setup-3.17.3.tmpC:\Program Files (x86)\hide.me VPN\CodeKicker.BBCode.dllexecutable
MD5:7DF949770C6AFC2C36F0A5D961087548
SHA256:F6B44BF917C89A3C36C4B5C85D0CFDF323697B0957191053B882EB5A92B99A89
4444Hide.me-Setup-3.17.3.tmpC:\Users\admin\AppData\Local\Temp\is-R4EHE.tmp\idp.dllexecutable
MD5:55C310C0319260D798757557AB3BF636
SHA256:54E7E0AD32A22B775131A6288F083ED3286A9A436941377FC20F85DD9AD983ED
4444Hide.me-Setup-3.17.3.tmpC:\Program Files (x86)\hide.me VPN\is-378H0.tmpexecutable
MD5:7DF949770C6AFC2C36F0A5D961087548
SHA256:F6B44BF917C89A3C36C4B5C85D0CFDF323697B0957191053B882EB5A92B99A89
4444Hide.me-Setup-3.17.3.tmpC:\Program Files (x86)\hide.me VPN\is-MKTS8.tmpexecutable
MD5:AEB2194B5C7D9046FBADA34954B2242F
SHA256:C3979C23F9F89E9FEEB89D0E9ED53511A9016AB304EABFBF652969B6C5AB568C
4444Hide.me-Setup-3.17.3.tmpC:\Program Files (x86)\hide.me VPN\Common.dllexecutable
MD5:210C1D906BFAC28272F6714776F6DB99
SHA256:FD8D832125EE22755BF82F11495CD2CAAC02C418202560756E5B554E3E6A22C3
4444Hide.me-Setup-3.17.3.tmpC:\Users\admin\AppData\Local\Temp\is-R4EHE.tmp\_isetup\_setup64.tmpexecutable
MD5:E4211D6D009757C078A9FAC7FF4F03D4
SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
4444Hide.me-Setup-3.17.3.tmpC:\Program Files (x86)\hide.me VPN\is-07M5L.tmpxml
MD5:6F290F80121A624A7F27545B98BDAFF3
SHA256:D0DB0AC24C7C659E6AD0ABBBC15A5D4EEC3600CFB6DF99F49B8B181EE04D49F3
3620Hide.me-Setup-3.17.3.exeC:\Users\admin\AppData\Local\Temp\is-O2RBE.tmp\Hide.me-Setup-3.17.3.tmpexecutable
MD5:2E9F9B1ABBB8D8D3D405ADFFEA3017B9
SHA256:687295EEF5E866CC1D3CD057394C3280FB7699C8899F48804CB74C4DCE13F5CA
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
21
DNS requests
12
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3040
svchost.exe
GET
200
23.48.23.194:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.48.23.194:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
2.23.9.218:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSRXerF0eFeSWRripTgTkcJWMm7iQQUaDfg67Y7%2BF8Rhvv%2BYXsIiGX0TkICEAV2do6CXHS9PJ6aGicg1DY%3D
unknown
whitelisted
6576
hidemesvc.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBT3xL4LQLXDRDM9P665TW442vrsUQQUReuir%2FSSy4IxLVGLp6chnfNtyA8CEA6bGI750C3n79tQ4ghAGFo%3D
unknown
whitelisted
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfIs%2BLjDtGwQ09XEB1Yeq%2BtX%2BBgQQU7NfjgtJxXWRM3y5nP%2Be6mK4cD08CEAitQLJg0pxMn17Nqb2Trtk%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4712
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3040
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
23.212.110.209:443
www.bing.com
Akamai International B.V.
CZ
whitelisted
192.168.100.255:138
whitelisted
4712
MoUsoCoreWorker.exe
23.48.23.194:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
3040
svchost.exe
23.48.23.194:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
2.23.9.218:80
www.microsoft.com
AKAMAI-AS
CZ
whitelisted
3040
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 40.127.240.158
whitelisted
www.bing.com
  • 23.212.110.209
  • 23.212.110.217
  • 23.212.110.211
  • 23.212.110.210
  • 23.212.110.218
  • 23.212.110.139
  • 23.212.110.136
  • 23.212.110.219
  • 23.212.110.216
whitelisted
google.com
  • 172.217.16.142
whitelisted
crl.microsoft.com
  • 23.48.23.194
  • 23.48.23.137
  • 23.48.23.164
  • 23.48.23.169
  • 23.48.23.180
  • 23.48.23.173
  • 23.48.23.167
  • 23.48.23.166
  • 23.48.23.139
whitelisted
www.microsoft.com
  • 2.23.9.218
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
dns.msftncsi.com
  • 131.107.255.255
whitelisted
api.hide.me
  • 45.77.53.224
unknown
sentry.thevpncompany.net
  • 49.12.210.138
unknown
self.events.data.microsoft.com
  • 20.189.173.3
whitelisted

Threats

No threats detected
Process
Message
hidemesvc.exe
Corrected RASENTRY size -> Prev: 5680. New: 6724
hidemesvc.exe
Corrected RASENTRY size -> Prev: 5680. New: 6724
hidemesvc.exe
Corrected RASENTRY size -> Prev: 5680. New: 6724
hidemesvc.exe
Corrected RASENTRY size -> Prev: 5680. New: 6724
hidemesvc.exe
Corrected RASENTRY size -> Prev: 5680. New: 6724
hidemesvc.exe
Corrected RASENTRY size -> Prev: 5680. New: 6724