File name:

imyfone-lockwiper-android_setup-com_tw.exe

Full analysis: https://app.any.run/tasks/1fbf5a29-c6c0-48d2-b3f6-5020ab56a194
Verdict: Malicious activity
Analysis date: July 29, 2024, 14:08:15
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
qrcode
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

BAB45D0F16D78724162136776E1ABCA1

SHA1:

8F79AF20CF1B07EA1158D5844B4A7D69636EB584

SHA256:

6E826D6F2B32DACA6B5AF4A8C7A29882B20844333CD69F9ED9271008481F8196

SSDEEP:

98304:rg5E057nmBV0wb/Zd0Xwi1ZZ6UWVWe0XEeqO3vbq+HqnwrFUtPx8VuZCcbP2Hyx/:9FBc1hA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • imyfone-lockwiper-android_setup-com_tw.exe (PID: 7028)
      • imyfone-download.exe (PID: 1180)
      • imyfone-download.tmp (PID: 2112)
  • SUSPICIOUS

    • Reads security settings of Internet Explorer

      • imyfone-lockwiper-android_setup-com_tw.exe (PID: 7028)
    • Executable content was dropped or overwritten

      • imyfone-download.exe (PID: 1180)
      • imyfone-download.tmp (PID: 2112)
    • Reads the Windows owner or organization settings

      • imyfone-download.tmp (PID: 2112)
    • Process drops legitimate windows executable

      • imyfone-download.tmp (PID: 2112)
    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 2480)
      • cmd.exe (PID: 2668)
      • cmd.exe (PID: 2192)
    • Starts CMD.EXE for commands execution

      • imyfone-download.tmp (PID: 2112)
    • Drops 7-zip archiver for unpacking

      • imyfone-download.tmp (PID: 2112)
    • The process drops C-runtime libraries

      • imyfone-download.tmp (PID: 2112)
    • Process drops legitimate windows executable (CertUtil.exe)

      • imyfone-download.tmp (PID: 2112)
    • Drops a system driver (possible attempt to evade defenses)

      • imyfone-download.tmp (PID: 2112)
  • INFO

    • Creates files in the program directory

      • imyfone-lockwiper-android_setup-com_tw.exe (PID: 7028)
      • imyfone-download.tmp (PID: 2112)
    • Checks supported languages

      • imyfone-lockwiper-android_setup-com_tw.exe (PID: 7028)
      • imyfone-download.exe (PID: 1180)
      • imyfone-download.tmp (PID: 2112)
    • Reads product name

      • imyfone-lockwiper-android_setup-com_tw.exe (PID: 7028)
    • Reads the computer name

      • imyfone-lockwiper-android_setup-com_tw.exe (PID: 7028)
      • imyfone-download.tmp (PID: 2112)
    • Checks proxy server information

      • slui.exe (PID: 6788)
      • imyfone-lockwiper-android_setup-com_tw.exe (PID: 7028)
    • Reads Environment values

      • imyfone-lockwiper-android_setup-com_tw.exe (PID: 7028)
    • Reads the software policy settings

      • imyfone-lockwiper-android_setup-com_tw.exe (PID: 7028)
      • slui.exe (PID: 6788)
    • Reads the machine GUID from the registry

      • imyfone-lockwiper-android_setup-com_tw.exe (PID: 7028)
    • Create files in a temporary directory

      • imyfone-download.exe (PID: 1180)
      • imyfone-download.tmp (PID: 2112)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (3.6)
.exe | Generic Win/DOS Executable (1.6)
.exe | DOS Executable Generic (1.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:12:18 10:33:07+00:00
ImageFileCharacteristics: Executable, Large address aware, 32-bit
PEType: PE32
LinkerVersion: 12
CodeSize: 2118144
InitializedDataSize: 2534400
UninitializedDataSize: -
EntryPoint: 0x1bb644
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 4.3.0.1
ProductVersionNumber: 4.3.0.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
FileDescription: imyfone-lockwiper-android_setup-com_tw.exe
FileVersion: 4.3.0.1
LegalCopyright: Copyright (C) 2024 iMyFone. All rights reserved.
ProductName: iMyFone LockWiper (Android)
ProductVersion: 4.3.0.1
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
158
Monitored processes
14
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start imyfone-lockwiper-android_setup-com_tw.exe slui.exe imyfone-download.exe imyfone-download.tmp cmd.exe no specs conhost.exe no specs taskkill.exe no specs cmd.exe no specs conhost.exe no specs taskkill.exe no specs cmd.exe no specs conhost.exe no specs taskkill.exe no specs imyfone-lockwiper-android_setup-com_tw.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1180 /verysilent /imyfone_down /wait_run /path="C:\Program Files (x86)\" /progress="C:\Program Files (x86)\imyfone_down\imyfone-lockwiper-android_setup-com_tw\temp.progress"C:\Program Files (x86)\imyfone_down\imyfone-lockwiper-android_setup-com_tw\imyfone-download.exe
imyfone-lockwiper-android_setup-com_tw.exe
User:
admin
Company:
Shenzhen iMyFone Technology Co., Ltd.
Integrity Level:
HIGH
Description:
iMyFone LockWiper (Android)
Version:
5.4.8.1
Modules
Images
c:\program files (x86)\imyfone_down\imyfone-lockwiper-android_setup-com_tw\imyfone-download.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
2112"C:\Users\admin\AppData\Local\Temp\is-K9PIF.tmp\imyfone-download.tmp" /SL5="$B03FC,195668533,214016,C:\Program Files (x86)\imyfone_down\imyfone-lockwiper-android_setup-com_tw\imyfone-download.exe" /verysilent /imyfone_down /wait_run /path="C:\Program Files (x86)\" /progress="C:\Program Files (x86)\imyfone_down\imyfone-lockwiper-android_setup-com_tw\temp.progress"C:\Users\admin\AppData\Local\Temp\is-K9PIF.tmp\imyfone-download.tmp
imyfone-download.exe
User:
admin
Integrity Level:
HIGH
Description:
Setup/Uninstall
Version:
51.1052.0.0
Modules
Images
c:\users\admin\appdata\local\temp\is-k9pif.tmp\imyfone-download.tmp
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\oleaut32.dll
2116taskkill /f /t /im Feedback.exeC:\Windows\SysWOW64\taskkill.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
2124"C:\Users\admin\AppData\Local\Temp\imyfone-lockwiper-android_setup-com_tw.exe" C:\Users\admin\AppData\Local\Temp\imyfone-lockwiper-android_setup-com_tw.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
imyfone-lockwiper-android_setup-com_tw.exe
Exit code:
3221226540
Version:
4.3.0.1
Modules
Images
c:\users\admin\appdata\local\temp\imyfone-lockwiper-android_setup-com_tw.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
2192"cmd.exe" /c taskkill /f /t /im appAutoUpdate.exeC:\Windows\SysWOW64\cmd.exeimyfone-download.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
128
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
2480"cmd.exe" /c taskkill /f /t /im Feedback.exeC:\Windows\SysWOW64\cmd.exeimyfone-download.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
128
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
2668"cmd.exe" /c taskkill /f /t /im adb.exeC:\Windows\SysWOW64\cmd.exeimyfone-download.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
128
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
4548taskkill /f /t /im adb.exeC:\Windows\SysWOW64\taskkill.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Terminates Processes
Exit code:
128
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\taskkill.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
4820\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6372\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
3 106
Read events
3 100
Write events
6
Delete events
0

Modification events

(PID) Process:(7028) imyfone-lockwiper-android_setup-com_tw.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\iMyfone\iMyfoneDown
Operation:writeName:GUID
Value:
683A12CE-F6D9-4a43-BF2A-F26DB1547F92
(PID) Process:(2112) imyfone-download.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:Owner
Value:
40080000B142E511C1E1DA01
(PID) Process:(2112) imyfone-download.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:SessionHash
Value:
51421DF0C70FC49EF4306F9607C8436B91B7BC3C22B157D54F8CADF57AAC99C3
(PID) Process:(2112) imyfone-download.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:Sequence
Value:
1
(PID) Process:(2112) imyfone-download.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:RegFiles0000
Value:
C:\Program Files (x86)\iMyFone\iMyfone LockWiper (Android)\7z.dll
(PID) Process:(2112) imyfone-download.tmpKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Operation:writeName:RegFilesHash
Value:
820C3CD9BCDB48040FFDE3F9E8864A17F429127156F96C2861DA2677631AED76
Executable files
394
Suspicious files
179
Text files
1 545
Unknown types
123

Dropped files

PID
Process
Filename
Type
7028imyfone-lockwiper-android_setup-com_tw.exeC:\Program Files (x86)\imyfone_down\imyfone-lockwiper-android_setup-com_tw\language\Chinese\pr_1.pngimage
MD5:CE20D55C446BB069A51CD53BA2E8C815
SHA256:DD4982542675238C74B94A24B4044D46D6A1DB8A52B15601841A87B3766755AA
7028imyfone-lockwiper-android_setup-com_tw.exeC:\Program Files (x86)\imyfone_down\imyfone-lockwiper-android_setup-com_tw\language\ChineseTW\UrlInfo.initext
MD5:14279E2D6FE54AFA131C223AB73AC38A
SHA256:79A251CD5BE4907433F12C64900DCD472A15B1759FA3664ADD76DD5E27B05A77
7028imyfone-lockwiper-android_setup-com_tw.exeC:\Program Files (x86)\imyfone_down\imyfone-lockwiper-android_setup-com_tw\language\English\UrlInfo.initext
MD5:4C7FB6CCE77F34147F2AD73EA7A6A4D0
SHA256:30B80500F03A2C46E5D6076450DD02D01A29134B19F89E951D4528B4B271D1E6
7028imyfone-lockwiper-android_setup-com_tw.exeC:\Program Files (x86)\imyfone_down\imyfone-lockwiper-android_setup-com_tw\language\English\pr_2.pngimage
MD5:A56AB015E87698AC32143FDE4ACFAB79
SHA256:DAF13DA1C4D4C31C0AB87A1B5DA348DBF52E861D6C3B795234B1F9C5D2C4B4CC
7028imyfone-lockwiper-android_setup-com_tw.exeC:\Program Files (x86)\imyfone_down\imyfone-lockwiper-android_setup-com_tw\language\Dutch\text.initext
MD5:E91527FA739430A527C4780939287038
SHA256:EBB37E16A4A0A8E6E9B6E56938D2FC5BC80426A31D417E5955A599D24AC7E375
7028imyfone-lockwiper-android_setup-com_tw.exeC:\Program Files (x86)\imyfone_down\imyfone-lockwiper-android_setup-com_tw\language\ChineseTW\text.initext
MD5:CA3A0F1453F6210B9D87E1B4C2FEBD86
SHA256:51C9132DA03D5ACBD8CC641680ADF41E8E9E962766873B52E08A3238E683614B
7028imyfone-lockwiper-android_setup-com_tw.exeC:\Program Files (x86)\imyfone_down\imyfone-lockwiper-android_setup-com_tw\language\ChineseTW\pr_1.pngimage
MD5:9A0548388E035A60D788CAA093F6C143
SHA256:DF478B04784DCE0BE5D4DB6450DF2EA96D1ECB9970C29CA948FB4AF0C83972AB
7028imyfone-lockwiper-android_setup-com_tw.exeC:\Program Files (x86)\imyfone_down\imyfone-lockwiper-android_setup-com_tw\language\Chinese\text.initext
MD5:FFAA64827526F852271561EDB07F4231
SHA256:C423B0871C13A26DCE9D179090C9ACC4EE48B24F17E8C3D1380D7BF4C63B0C6E
7028imyfone-lockwiper-android_setup-com_tw.exeC:\Program Files (x86)\imyfone_down\imyfone-lockwiper-android_setup-com_tw\language\Chinese\UrlInfo.initext
MD5:D73850B48A31AAF94FFFDD2547E2789C
SHA256:444543DC030D831D03BA2B538F93AA0A375DC1A2F53ADF20C9CA02767E406230
7028imyfone-lockwiper-android_setup-com_tw.exeC:\Program Files (x86)\imyfone_down\imyfone-lockwiper-android_setup-com_tw\language\Chinese\pr_3.pngimage
MD5:E42B618E79EF6957E1B7E9730511ADCF
SHA256:1E055C753454AD7B3992792E19AAA3DEAECD363BE80246CBDB2B1056991B6F6C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
65
DNS requests
29
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4424
svchost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5368
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEApDqVCbATUviZV57HIIulA%3D
unknown
whitelisted
5368
SearchApp.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
3676
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
4132
OfficeClickToRun.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEA77flR%2B3w%2FxBpruV2lte6A%3D
unknown
whitelisted
5560
backgroundTaskHost.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
131.253.33.254:443
a-ring-fallback.msedge.net
MICROSOFT-CORP-MSN-AS-BLOCK
US
unknown
92.123.104.51:443
www.bing.com
Akamai International B.V.
DE
unknown
5800
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
6012
MoUsoCoreWorker.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
6076
slui.exe
20.83.72.98:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
1752
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
1328
slui.exe
20.83.72.98:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
3952
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:137
whitelisted

DNS requests

Domain
IP
Reputation
a-ring-fallback.msedge.net
  • 131.253.33.254
unknown
www.bing.com
  • 92.123.104.51
  • 92.123.104.47
  • 92.123.104.45
  • 92.123.104.42
  • 92.123.104.43
  • 92.123.104.52
  • 92.123.104.56
  • 92.123.104.46
  • 92.123.104.44
  • 92.123.104.15
  • 92.123.104.16
  • 92.123.104.21
  • 92.123.104.17
  • 92.123.104.11
  • 92.123.104.19
  • 92.123.104.12
  • 92.123.104.18
  • 92.123.104.20
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
  • 4.231.128.59
whitelisted
google.com
  • 142.250.185.78
whitelisted
download.imyfone.com
  • 65.9.66.119
  • 65.9.66.97
  • 65.9.66.61
  • 65.9.66.89
whitelisted
apipdm.imyfone.club
  • 52.39.55.200
unknown
www.google-analytics.com
  • 172.217.16.142
whitelisted
fp-afd-nocache-ccp.azureedge.net
  • 13.107.246.60
whitelisted
login.live.com
  • 40.126.32.76
  • 20.190.160.17
  • 40.126.32.136
  • 40.126.32.72
  • 20.190.160.14
  • 40.126.32.138
  • 40.126.32.68
  • 40.126.32.140
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted

Threats

No threats detected
No debug info