File name:

10ecf68cb435b7f0875eacd6a1316f99.exe

Full analysis: https://app.any.run/tasks/97440dac-18de-4e68-afcb-85df1495d027
Verdict: Malicious activity
Analysis date: June 19, 2025, 06:48:45
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto-reg
ssh
confuser
golang
upx
metasploit
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

10ECF68CB435B7F0875EACD6A1316F99

SHA1:

7E63C4D0228F8A8213BF86567635CEDFA8FD66E8

SHA256:

EC29FF2DA134D93611C102FA24FC335C9A14773B8B59794D61168F8B2282CFF0

SSDEEP:

98304:rGKlPuwnoK6zAhWjMP0zfSqXo4scwftZkS3f92xWc+cfFGcsSyW8X3+jI1li22ef:JYuta2BQElKeCXCynXc5qQrr

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • 10ecf68cb435b7f0875eacd6a1316f99.exe (PID: 2732)
    • METASPLOIT has been detected (YARA)

      • 10ecf68cb435b7f0875eacd6a1316f99.exe (PID: 5124)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • 10ecf68cb435b7f0875eacd6a1316f99.exe (PID: 2732)
    • Executable content was dropped or overwritten

      • 10ecf68cb435b7f0875eacd6a1316f99.exe (PID: 2732)
      • psiphon-181-20240331.exe (PID: 5644)
    • Reads security settings of Internet Explorer

      • 10ecf68cb435b7f0875eacd6a1316f99.exe (PID: 2732)
      • psiphon-181-20240331.exe (PID: 5644)
    • Psiphon VPN has been detected

      • psiphon-181-20240331.exe (PID: 5644)
    • Reads Microsoft Outlook installation path

      • psiphon-181-20240331.exe (PID: 5644)
    • Reads Internet Explorer settings

      • psiphon-181-20240331.exe (PID: 5644)
    • Starts a Microsoft application from unusual location

      • 10ecf68cb435b7f0875eacd6a1316f99.exe (PID: 5124)
      • 10ecf68cb435b7f0875eacd6a1316f99.exe (PID: 2732)
    • Application launched itself

      • 10ecf68cb435b7f0875eacd6a1316f99.exe (PID: 2732)
    • Potential Corporate Privacy Violation

      • psiphon-tunnel-core.exe (PID: 4088)
    • Connects to SSH

      • psiphon-tunnel-core.exe (PID: 4088)
    • Connects to unusual port

      • psiphon-tunnel-core.exe (PID: 4088)
    • Adds/modifies Windows certificates

      • psiphon-tunnel-core.exe (PID: 4088)
    • There is functionality for taking screenshot (YARA)

      • psiphon-181-20240331.exe (PID: 5644)
    • Psiphon VPN server synchronization mutex

      • psiphon-181-20240331.exe (PID: 5644)
  • INFO

    • The sample compiled with english language support

      • 10ecf68cb435b7f0875eacd6a1316f99.exe (PID: 2732)
    • Checks supported languages

      • 10ecf68cb435b7f0875eacd6a1316f99.exe (PID: 2732)
      • psiphon-181-20240331.exe (PID: 5644)
      • psiphon-tunnel-core.exe (PID: 4088)
      • 10ecf68cb435b7f0875eacd6a1316f99.exe (PID: 5124)
      • StartupKey.exe (PID: 6264)
      • identity_helper.exe (PID: 2040)
    • Process checks computer location settings

      • 10ecf68cb435b7f0875eacd6a1316f99.exe (PID: 2732)
    • Reads the computer name

      • psiphon-181-20240331.exe (PID: 5644)
      • 10ecf68cb435b7f0875eacd6a1316f99.exe (PID: 2732)
      • psiphon-tunnel-core.exe (PID: 4088)
      • StartupKey.exe (PID: 6264)
      • identity_helper.exe (PID: 2040)
    • Creates files or folders in the user directory

      • psiphon-181-20240331.exe (PID: 5644)
      • 10ecf68cb435b7f0875eacd6a1316f99.exe (PID: 2732)
      • psiphon-tunnel-core.exe (PID: 4088)
    • Disables trace logs

      • psiphon-181-20240331.exe (PID: 5644)
    • Create files in a temporary directory

      • psiphon-181-20240331.exe (PID: 5644)
    • Checks proxy server information

      • psiphon-181-20240331.exe (PID: 5644)
      • slui.exe (PID: 7380)
    • Launching a file from a Registry key

      • 10ecf68cb435b7f0875eacd6a1316f99.exe (PID: 2732)
    • Confuser has been detected (YARA)

      • 10ecf68cb435b7f0875eacd6a1316f99.exe (PID: 2732)
      • StartupKey.exe (PID: 6264)
    • Reads the software policy settings

      • psiphon-tunnel-core.exe (PID: 4088)
      • psiphon-181-20240331.exe (PID: 5644)
    • Reads the machine GUID from the registry

      • psiphon-tunnel-core.exe (PID: 4088)
    • Application launched itself

      • msedge.exe (PID: 432)
      • msedge.exe (PID: 5952)
    • Detects GO elliptic curve encryption (YARA)

      • psiphon-181-20240331.exe (PID: 5644)
      • psiphon-tunnel-core.exe (PID: 4088)
    • UPX packer has been detected

      • psiphon-181-20240331.exe (PID: 5644)
    • Application based on Golang

      • psiphon-181-20240331.exe (PID: 5644)
      • psiphon-tunnel-core.exe (PID: 4088)
    • Reads Environment values

      • identity_helper.exe (PID: 2040)
    • Manual execution by a user

      • StartupKey.exe (PID: 6264)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (63.1)
.exe | Win64 Executable (generic) (23.8)
.dll | Win32 Dynamic Link Library (generic) (5.6)
.exe | Win32 Executable (generic) (3.8)
.exe | Generic Win/DOS Executable (1.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:04:04 00:38:59+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 8088064
InitializedDataSize: 194560
UninitializedDataSize: -
EntryPoint: 0x7b895e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 6.3.9600.16384
ProductVersionNumber: 6.3.9600.16384
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Dynamic link library
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Microsoft Corporation
FileDescription: Windows Application Verifier Automation DLL
FileVersion: 6.3.9600.16384 (winblue_rtm.130821-1623)
InternalName: -
LegalCopyright: © Microsoft Corporation. All rights reserved.
OriginalFileName: vrfauto.dll
ProductName: Microsoft® Windows® Operating System
ProductVersion: 6.3.9600.16384
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
168
Monitored processes
30
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 10ecf68cb435b7f0875eacd6a1316f99.exe psiphon-181-20240331.exe psiphon-tunnel-core.exe conhost.exe no specs #METASPLOIT 10ecf68cb435b7f0875eacd6a1316f99.exe startupkey.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs slui.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
236"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.92\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --disable-quic --string-annotations --always-read-main-dll --field-trial-handle=6996,i,7009689705266951035,15815967128642662369,262144 --variations-seed-version --mojo-platform-channel-handle=7012 /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.92\identity_helper.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
PWA Identity Proxy Host
Exit code:
3221226029
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\identity_helper.exe
c:\windows\system32\ntdll.dll
432"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --edge-skip-compat-layer-relaunch --single-argument https://ipfounder.net/?sponsor_id=1BC527D3D09985CF&sponsor=psiphon&client_region=IT&client_asn=137409&client_platform=windows&secret=580EfjEI29xL3hoyU6dgP4vSEVxdcGI7JDFkxgjds7PHulSEF0wmORpvzbqxyTwYtpowsY4xMFnfWEnTghe6l8jiV9K5QSZoir2i6fDeKJD6EhL6DkoYTEMu2EE9YJvy3LdCUZ7ncdVC6ipgWx06wznvDLbY1ajfcfRGCpfsQJei2q6tb0GSFh1QK3x3qXKwyjmNPc5J&psireason=connect&psicash=eyJtZXRhZGF0YSI6eyJjbGllbnRfcmVnaW9uIjoiSVQiLCJjbGllbnRfdmVyc2lvbiI6IjE4MSIsInByb3BhZ2F0aW9uX2NoYW5uZWxfaWQiOiI5MkFBQ0M1QkFCRTA5NDRDIiwic3BvbnNvcl9pZCI6IjFCQzUyN0QzRDA5OTg1Q0YiLCJ1c2VyX2FnZW50IjoiUHNpcGhvbi1Qc2lDYXNoLVdpbmRvd3MiLCJ2IjoxfSwidGltZXN0YW1wIjoiMjAyNS0wNi0xOVQwNjo0OTowOC4yNzRaIiwidG9rZW5zIjpudWxsLCJ2IjoxfQC:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
724"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --always-read-main-dll --field-trial-handle=3612,i,7009689705266951035,15815967128642662369,262144 --variations-seed-version --mojo-platform-channel-handle=3692 /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1328"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --disable-quic --string-annotations --always-read-main-dll --field-trial-handle=6520,i,7009689705266951035,15815967128642662369,262144 --variations-seed-version --mojo-platform-channel-handle=6508 /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2040"C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.92\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --disable-quic --string-annotations --always-read-main-dll --field-trial-handle=6996,i,7009689705266951035,15815967128642662369,262144 --variations-seed-version --mojo-platform-channel-handle=7012 /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\133.0.3065.92\identity_helper.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
PWA Identity Proxy Host
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\identity_helper.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2532"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --always-read-main-dll --field-trial-handle=3592,i,7009689705266951035,15815967128642662369,262144 --variations-seed-version --mojo-platform-channel-handle=3608 /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2732"C:\Users\admin\AppData\Local\Temp\10ecf68cb435b7f0875eacd6a1316f99.exe" C:\Users\admin\AppData\Local\Temp\10ecf68cb435b7f0875eacd6a1316f99.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Application Verifier Automation DLL
Version:
6.3.9600.16384 (winblue_rtm.130821-1623)
Modules
Images
c:\users\admin\appdata\local\temp\10ecf68cb435b7f0875eacd6a1316f99.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
2808"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --disable-quic --string-annotations --always-read-main-dll --field-trial-handle=2308,i,7009689705266951035,15815967128642662369,262144 --variations-seed-version --mojo-platform-channel-handle=3276 /prefetch:3C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4088C:\Users\admin\AppData\Local\Temp\psiphon-tunnel-core.exe --config "C:\Users\admin\AppData\Local\Psiphon3\psiphon.config" --serverList "C:\Users\admin\AppData\Local\Psiphon3\server_list.dat"C:\Users\admin\AppData\Local\Temp\psiphon-tunnel-core.exe
psiphon-181-20240331.exe
User:
admin
Integrity Level:
MEDIUM
Modules
Images
c:\users\admin\appdata\local\temp\psiphon-tunnel-core.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
5124"C:\Users\admin\AppData\Local\Temp\10ecf68cb435b7f0875eacd6a1316f99.exe"C:\Users\admin\AppData\Local\Temp\10ecf68cb435b7f0875eacd6a1316f99.exe
10ecf68cb435b7f0875eacd6a1316f99.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Application Verifier Automation DLL
Version:
6.3.9600.16384 (winblue_rtm.130821-1623)
Modules
Images
c:\users\admin\appdata\local\temp\10ecf68cb435b7f0875eacd6a1316f99.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
Total events
10 764
Read events
10 717
Write events
41
Delete events
6

Modification events

(PID) Process:(5644) psiphon-181-20240331.exeKey:HKEY_CURRENT_USER\SOFTWARE\Psiphon3
Operation:writeName:SkipProxySettings
Value:
0
(PID) Process:(5644) psiphon-181-20240331.exeKey:HKEY_CURRENT_USER\SOFTWARE\Psiphon3
Operation:writeName:SkipAutoConnect
Value:
0
(PID) Process:(5644) psiphon-181-20240331.exeKey:HKEY_CLASSES_ROOT\psiphon
Operation:writeName:URL Protocol
Value:
(PID) Process:(5644) psiphon-181-20240331.exeKey:HKEY_CURRENT_USER\SOFTWARE\Psiphon3
Operation:writeName:SSHParentProxyHost
Value:
(PID) Process:(5644) psiphon-181-20240331.exeKey:HKEY_CURRENT_USER\SOFTWARE\Psiphon3
Operation:writeName:SSHParentProxyUsername
Value:
(PID) Process:(5644) psiphon-181-20240331.exeKey:HKEY_CURRENT_USER\SOFTWARE\Psiphon3
Operation:writeName:SSHParentProxyPassword
Value:
(PID) Process:(5644) psiphon-181-20240331.exeKey:HKEY_CURRENT_USER\SOFTWARE\Psiphon3
Operation:writeName:SSHParentProxyDomain
Value:
(PID) Process:(5644) psiphon-181-20240331.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\psiphon-181-20240331_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(5644) psiphon-181-20240331.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\psiphon-181-20240331_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(5644) psiphon-181-20240331.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\psiphon-181-20240331_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
5
Suspicious files
72
Text files
103
Unknown types
59

Dropped files

PID
Process
Filename
Type
4088psiphon-tunnel-core.exeC:\Users\admin\AppData\Local\Psiphon3\ca.psiphon.PsiphonTunnel.tunnel-core\upgrade.186.part
MD5:
SHA256:
4088psiphon-tunnel-core.exeC:\Users\admin\AppData\Local\Psiphon3\ca.psiphon.PsiphonTunnel.tunnel-core\upgrade.186
MD5:
SHA256:
4088psiphon-tunnel-core.exeC:\Users\admin\AppData\Local\Psiphon3\ca.psiphon.PsiphonTunnel.tunnel-core\upgrade
MD5:
SHA256:
5644psiphon-181-20240331.exeC:\Users\admin\AppData\Local\Psiphon3\psicash\psicashdatastore.prod.commitbinary
MD5:5AD5CC4D26869082EFD29C436B57384A
SHA256:C5C24F7CA1C946FA4DFD44407409C8E11EC6E41F0E1C7C45BF8381B42AFB31F1
5644psiphon-181-20240331.exeC:\Users\admin\AppData\Local\Psiphon3\psicash\psicashdatastore.prod.2.tempbinary
MD5:5AD5CC4D26869082EFD29C436B57384A
SHA256:C5C24F7CA1C946FA4DFD44407409C8E11EC6E41F0E1C7C45BF8381B42AFB31F1
5644psiphon-181-20240331.exeC:\Users\admin\AppData\Local\Temp\dat64B5.tmpeot
MD5:79CE7E9887A670AB6A18EAF59CAB7FA7
SHA256:24F0C91CD083494F5475C9DDE62F4477EA9FAE06DF25C398949781FF879FCD83
4088psiphon-tunnel-core.exeC:\Users\admin\AppData\Local\Psiphon3\ca.psiphon.PsiphonTunnel.tunnel-core\datastore\psiphon.boltdbabr
MD5:13D23DCD976E193953A08D5BB8F0325A
SHA256:C9775ACA965FC434D7AD87862CD70D4DC8B9C18076B7940BF060AFBB2B19415E
5644psiphon-181-20240331.exeC:\Users\admin\AppData\Local\Temp\psiphon-tunnel-core.exeexecutable
MD5:94569AFCAD4EEA24BBB83A0E31AEFC68
SHA256:68DBAE60F142845770675BD21BC1EF6DFCC44F22FA54409913257033004FACDD
432msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\ClientCertificates\LOG.old~RF17ab43.TMP
MD5:
SHA256:
432msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\ClientCertificates\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
36
DNS requests
14
Threats
6

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1268
svchost.exe
GET
200
23.53.40.176:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
3676
svchost.exe
GET
200
23.40.158.218:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
4088
psiphon-tunnel-core.exe
POST
200
37.46.115.146:80
http://www.sandjackgi.org/
unknown
unknown
4088
psiphon-tunnel-core.exe
POST
200
37.46.115.146:80
http://www.sandjackgi.org/
unknown
unknown
1268
svchost.exe
GET
200
23.222.10.99:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1268
svchost.exe
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4380
RUXIMICS.exe
20.73.194.208:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
4088
psiphon-tunnel-core.exe
104.18.152.190:443
CLOUDFLARENET
shared
2336
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
3676
svchost.exe
40.126.31.1:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3676
svchost.exe
23.40.158.218:80
ocsp.digicert.com
AKAMAI-AS
MX
whitelisted
1268
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.46
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
login.live.com
  • 40.126.31.1
  • 40.126.31.67
  • 20.190.159.71
  • 20.190.159.129
  • 40.126.31.2
  • 40.126.31.131
  • 40.126.31.3
  • 40.126.31.73
whitelisted
ocsp.digicert.com
  • 23.40.158.218
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
  • 51.104.136.2
whitelisted
crl.microsoft.com
  • 23.53.40.176
  • 23.53.40.178
whitelisted
www.microsoft.com
  • 23.222.10.99
whitelisted
nexusrules.officeapps.live.com
  • 52.111.227.13
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.85.23.206
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted

Threats

PID
Process
Class
Message
4088
psiphon-tunnel-core.exe
Potential Corporate Privacy Violation
POLICY [ANY.RUN] A SSH banner has been detected
4088
psiphon-tunnel-core.exe
Potential Corporate Privacy Violation
POLICY [ANY.RUN] A SSH banner has been detected
4088
psiphon-tunnel-core.exe
Potential Corporate Privacy Violation
POLICY [ANY.RUN] A SSH banner has been detected
4088
psiphon-tunnel-core.exe
Potentially Bad Traffic
ET INFO Psiphon VPN Related Activity (POST)
4088
psiphon-tunnel-core.exe
Potential Corporate Privacy Violation
POLICY [ANY.RUN] A SSH banner has been detected
4088
psiphon-tunnel-core.exe
Potential Corporate Privacy Violation
POLICY [ANY.RUN] A SSH banner has been detected
Process
Message
psiphon-181-20240331.exe
Client Version: 181
psiphon-181-20240331.exe
psiphon-181-20240331.exe
psiphon-181-20240331.exe
Psiphon Tunnel connecting...
psiphon-181-20240331.exe
2025-06-19T06:48:55.572Z:
psiphon-181-20240331.exe
2025-06-19T06:48:55.575Z:
psiphon-181-20240331.exe
psiphon-181-20240331.exe
{"data":{"data":{"message":"RemoteServerListURLs overridden by AdditionalParameters"},"noticeType":"Info","timestamp":"2025-06-19T06:48:55.957Z"},"msg":"CoreNotice","timestamp!!timestamp":"2025-06-19T06:48:56.006Z"}
psiphon-181-20240331.exe
{"data":{"data":{"message":"Config migration: need migration"},"noticeType":"Info","timestamp":"2025-06-19T06:48:55.957Z"},"msg":"CoreNotice","timestamp!!timestamp":"2025-06-19T06:48:56.006Z"}
psiphon-181-20240331.exe