File name:

superfreevpn.exe

Full analysis: https://app.any.run/tasks/14277d14-31f6-4f69-beda-5a7081859c2e
Verdict: Malicious activity
Analysis date: February 10, 2026, 12:19:45
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

545ADD04DEF51ABBC6ADAC87A75801DB

SHA1:

B04B9B4CA5A2ED36FEC976C5E2D6096A25ADDA9E

SHA256:

CDE02BF18E6B524D34FD275DA0C1D532D6F830D85328D2904C44CEAB1659B4DC

SSDEEP:

1536:3aNxxvLs2Mf/0ttWmMj3+jQ34Sskn7PpqKm1MNrnM+tFbqEI4SSM:GxxQ2M30ttWmMSC4On7MzinM+tFOEI4C

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • superfreevpn.exe (PID: 7376)
      • superfreevpn.exe (PID: 8912)
  • SUSPICIOUS

    • Executes application which crashes

      • superfreevpn.exe (PID: 8912)
  • INFO

    • Checks supported languages

      • superfreevpn.exe (PID: 8912)
    • Reads the computer name

      • superfreevpn.exe (PID: 8912)
    • Checks proxy server information

      • WerFault.exe (PID: 2456)
    • Reads the machine GUID from the registry

      • superfreevpn.exe (PID: 8912)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 2456)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2038:12:10 22:15:31+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32
LinkerVersion: 48
CodeSize: 48128
InitializedDataSize: 5120
UninitializedDataSize: -
EntryPoint: 0xdbde
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: superfreevpn
FileVersion: 1.0.0.0
InternalName: superfreevpn.exe
LegalCopyright: Copyright © 2025
LegalTrademarks: -
OriginalFileName: superfreevpn.exe
ProductName: superfreevpn
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
152
Monitored processes
3
Malicious processes
0
Suspicious processes
2

Behavior graph

Click at the process to see the details
start superfreevpn.exe werfault.exe superfreevpn.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2456C:\WINDOWS\SysWOW64\WerFault.exe -u -p 8912 -s 856C:\Windows\SysWOW64\WerFault.exe
superfreevpn.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
7376"C:\Users\admin\AppData\Local\Temp\superfreevpn.exe" C:\Users\admin\AppData\Local\Temp\superfreevpn.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
superfreevpn
Exit code:
3221226540
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\superfreevpn.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
8912"C:\Users\admin\AppData\Local\Temp\superfreevpn.exe" C:\Users\admin\AppData\Local\Temp\superfreevpn.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
superfreevpn
Exit code:
3762504530
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\superfreevpn.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
Total events
3 270
Read events
3 262
Write events
5
Delete events
3

Modification events

(PID) Process:(2456) WerFault.exeKey:\REGISTRY\A\{6224ec8d-6a05-3c8e-3992-99b4a9a3abf4}\Root\InventoryApplicationFile
Operation:writeName:WritePermissionsCheck
Value:
1
(PID) Process:(2456) WerFault.exeKey:\REGISTRY\A\{6224ec8d-6a05-3c8e-3992-99b4a9a3abf4}\Root\InventoryApplicationFile\PermissionsCheckTestKey
Operation:delete keyName:(default)
Value:
(PID) Process:(2456) WerFault.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
Operation:writeName:ClockTimeSeconds
Value:
68228B6900000000
(PID) Process:(2456) WerFault.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
Operation:writeName:TickCount
Value:
55571E0000000000
Executable files
0
Suspicious files
5
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
2456WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportArchive\AppCrash_superfreevpn.exe_2512cf73d54f8778d85bbb6ebc9e3b1f23f0f6_5706571a_a4024560-cd46-4228-8d73-abc7c5e9bfd8\Report.wer
MD5:
SHA256:
2456WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\superfreevpn.exe.8912.dmp
MD5:
SHA256:
2456WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\37C951188967C8EB88D99893D9D191FEbinary
MD5:6AC7949577A8637929FC0A189026CDE5
SHA256:776255CFED11E5760E13720E4DF097DB0168DDCDF8DA69325CF70A88B03B0A17
2456WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER55B0.tmp.WERInternalMetadata.xmlxml
MD5:F863D56F2ACD4C116FFD587C829F5801
SHA256:001C9F420707C306D484CCE4DAD509BF4F9BEF9D215796AFECC259E9ABB1B05C
2456WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER5523.tmp.dmpbinary
MD5:8E3881C8EE9B828062684ECBD977DAEC
SHA256:F3DC5524FAF1599B2FF519BE18CFDE36FAAA4E11733FAACFD73214ED58DED4DE
2456WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WER55D0.tmp.xmlxml
MD5:66CDDA3349C52468E92D3B0B4BB655FF
SHA256:7EBB82CAC3831B7663FCC43834E297C653A8384BCEAAB9D3B5BE974D8A705696
2456WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\37C951188967C8EB88D99893D9D191FEbinary
MD5:05DDF56FC804F432398703E32AF90A79
SHA256:7193D01CF9580401784B76B581FABC0D63B97D49977EDD15370DF6967EF2F443
2456WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\21253908F3CB05D51B1C2DA8B681A785binary
MD5:A17FB3F87CC2D89C7FC9231B511A8659
SHA256:2A0D9D155C212AD1F3E2788044871DD1188B679F9F11A4584FD0431C8EBC6DBA
2456WerFault.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\21253908F3CB05D51B1C2DA8B681A785binary
MD5:1A3A08F5EC73273F18F9F94289DDA6B7
SHA256:2E306230AA41D2C40649BBB57E2F1EB54E6ACF15C6206B0AAABBDBA47A387462
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
23
TCP/UDP connections
27
DNS requests
18
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6768
MoUsoCoreWorker.exe
GET
304
51.124.78.146:443
https://settings-win.data.microsoft.com/settings/v3.0/OneSettings/Client?OSVersionFull=10.0.19045.4046.amd64fre.vb_release.191206-1406&LocalDeviceID=s%3ABAD99146-31D3-4EC6-A1A4-BE76F32BA5D4&FlightRing=Retail&AttrDataVer=186&OSUILocale=en-US&OSSkuId=48&App=WOSC&AppVer=&IsFlightingEnabled=0&TelemetryLevel=1&DeviceFamily=Windows.Desktop
US
whitelisted
5780
svchost.exe
GET
304
51.124.78.146:443
https://settings-win.data.microsoft.com/settings/v3.0/WSD/UpdateHealthTools?os=Windows&osVer=10.0.19041.1.amd64fre.vb_release.191206-&sku=48&deviceClass=Windows.Desktop&locale=en-US&deviceId=s:BAD99146-31D3-4EC6-A1A4-BE76F32BA5D4&sampleId=s:95271487&appVer=10.0.19041.3626&FlightRing=Retail&TelemetryLevel=1&HidOverGattReg=C%3A%5CWINDOWS%5CSystem32%5CDriverStore%5CFileRepository%5Chidbthle.inf_amd64_9610b4821fdf82a5%5CMicrosoft.Bluetooth.Profiles.HidOverGatt.dll&AppVer=&ProcessorIdentifier=AMD64%20Family%2023%20Model%201%20Stepping%202&OEMModel=DELL&UpdateOfferedDays=4294967295&ProcessorManufacturer=AuthenticAMD&InstallDate=1661339444&OEMModelBaseBoard=&BranchReadinessLevel=CB&OEMSubModel=J5CR&IsCloudDomainJoined=0&DeferFeatureUpdatePeriodInDays=30&IsDeviceRetailDemo=0&FlightingBranchName=&OSUILocale=en-US&DeviceFamily=Windows.Desktop&WuClientVer=10.0.19041.3996&UninstallActive=1&IsFlightingEnabled=0&OSSkuId=48&ProcessorClockSpeed=3094&TotalPhysicalRAM=6144&SecureBootCapable=0&App=SedimentPack&ProcessorCores=6&CurrentBranch=vb_release&InstallLanguage=en-US&DeferQualityUpdatePeriodInDays=0&OEMName_Uncleaned=DELL&TPMVersion=0&PrimaryDiskTotalCapacity=262144&InstallationType=Client&AttrDataVer=186&ProcessorModel=AMD%20Ryzen%205%203500%206-Core%20Processor&IsEdgeWithChromiumInstalled=1&OSVersion=10.0.19045.4046&IsMDMEnrolled=0&ActivationChannel=Retail&FirmwareVersion=A.40&TrendInstalledKey=1&OSArchitecture=AMD64&DefaultUserRegion=244&UpdateManagementGroup=2
US
whitelisted
6500
SIHClient.exe
GET
304
135.232.92.137:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
US
whitelisted
6500
SIHClient.exe
GET
200
74.179.77.164:443
https://fe3cr.delivery.mp.microsoft.com/clientwebservice/ping
US
whitelisted
6500
SIHClient.exe
GET
200
135.232.92.137:443
https://slscr.update.microsoft.com/sls/ping
US
whitelisted
6500
SIHClient.exe
GET
304
135.232.92.137:443
https://slscr.update.microsoft.com/SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
US
whitelisted
356
svchost.exe
POST
200
40.126.31.1:443
https://login.live.com/RST2.srf
US
xml
11.0 Kb
whitelisted
356
svchost.exe
POST
200
40.126.31.1:443
https://login.live.com/RST2.srf
US
xml
11.1 Kb
whitelisted
2456
WerFault.exe
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
NL
binary
825 b
whitelisted
2456
WerFault.exe
GET
200
23.59.18.102:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
US
binary
814 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
Not routed
whitelisted
7004
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6768
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
5780
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2.16.204.136:443
www.bing.com
AKAMAI-ASN1
NL
whitelisted
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
204.79.197.203:80
oneocsp.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
3412
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4
System
192.168.100.255:138
Not routed
whitelisted
356
svchost.exe
40.126.31.1:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
whitelisted
self.events.data.microsoft.com
  • 13.69.239.77
whitelisted
google.com
  • 142.251.208.174
whitelisted
www.bing.com
  • 2.16.204.136
  • 2.16.204.159
  • 2.16.204.147
  • 2.16.204.137
  • 2.16.204.141
  • 2.16.204.139
  • 2.16.204.143
  • 2.16.204.144
  • 2.16.204.151
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
oneocsp.microsoft.com
  • 204.79.197.203
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 40.126.31.1
  • 20.190.159.2
  • 20.190.159.129
  • 20.190.159.0
  • 20.190.159.131
  • 20.190.159.130
  • 20.190.159.75
  • 40.126.31.131
whitelisted
watson.events.data.microsoft.com
  • 135.233.45.221
whitelisted
crl.microsoft.com
  • 23.53.40.178
  • 23.53.41.90
whitelisted

Threats

PID
Process
Class
Message
2456
WerFault.exe
Unknown Traffic
ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW)
No debug info