URL:

https://download.tenorshare.net/downloads/icarefone-bing_1387.exe

Full analysis: https://app.any.run/tasks/1a2ff44b-c608-43e2-8525-47e403ba1f2e
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: April 18, 2025, 09:41:30
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
evasion
adware
upx
delphi
inno
installer
Indicators:
MD5:

708F3698CE83D8A722ADFDE5236B3183

SHA1:

8DE8DC1BBF5AAF2483A330F1D5236948B2062F43

SHA256:

8D795BE8F252064A111E0B66B6C43C5E80D5B9D6E686873CD930DD92E8BDF838

SSDEEP:

3:N8SElzILLz8XKeAgeQJ:2SKELsaeAQJ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Connects to the CnC server

      • icarefone-bing.exe (PID: 9132)
  • SUSPICIOUS

    • Checks for external IP

      • svchost.exe (PID: 2196)
      • icarefone-bing.exe (PID: 9132)
    • Reads security settings of Internet Explorer

      • icarefone-bing.exe (PID: 9132)
      • iCareFonetrial_bing_en_9.3.3.tmp (PID: 9108)
    • Potential Corporate Privacy Violation

      • icarefone-bing.exe (PID: 9132)
    • Access to an unwanted program domain was detected

      • icarefone-bing.exe (PID: 9132)
    • Executable content was dropped or overwritten

      • iCareFonetrial_bing_en_9.3.3.exe (PID: 9076)
      • iCareFonetrial_bing_en_9.3.3.tmp (PID: 9108)
    • Reads the Windows owner or organization settings

      • iCareFonetrial_bing_en_9.3.3.tmp (PID: 9108)
    • Starts CMD.EXE for commands execution

      • iCareFonetrial_bing_en_9.3.3.tmp (PID: 9108)
    • Uses TASKKILL.EXE to kill process

      • cmd.exe (PID: 8924)
    • Searches for installed software

      • iCareFonetrial_bing_en_9.3.3.tmp (PID: 9108)
    • Process drops legitimate windows executable

      • iCareFonetrial_bing_en_9.3.3.tmp (PID: 9108)
    • Drops 7-zip archiver for unpacking

      • iCareFonetrial_bing_en_9.3.3.tmp (PID: 9108)
    • The process drops C-runtime libraries

      • iCareFonetrial_bing_en_9.3.3.tmp (PID: 9108)
    • Drops a system driver (possible attempt to evade defenses)

      • iCareFonetrial_bing_en_9.3.3.tmp (PID: 9108)
    • Uses NETSH.EXE to add a firewall rule or allowed programs

      • cmd.exe (PID: 7860)
      • cmd.exe (PID: 8768)
      • cmd.exe (PID: 8976)
      • cmd.exe (PID: 8496)
      • cmd.exe (PID: 9056)
      • cmd.exe (PID: 6808)
      • cmd.exe (PID: 4068)
      • cmd.exe (PID: 5864)
      • cmd.exe (PID: 6516)
      • cmd.exe (PID: 5172)
      • cmd.exe (PID: 3620)
      • cmd.exe (PID: 8580)
      • cmd.exe (PID: 3888)
      • cmd.exe (PID: 7224)
      • cmd.exe (PID: 8808)
      • cmd.exe (PID: 8104)
      • cmd.exe (PID: 4756)
      • cmd.exe (PID: 8508)
    • Uses NETSH.EXE to delete a firewall rule or allowed programs

      • cmd.exe (PID: 7744)
      • cmd.exe (PID: 8420)
      • cmd.exe (PID: 9008)
      • cmd.exe (PID: 8400)
      • cmd.exe (PID: 1276)
      • cmd.exe (PID: 5408)
      • cmd.exe (PID: 8724)
      • cmd.exe (PID: 7208)
      • cmd.exe (PID: 8012)
    • Creates a software uninstall entry

      • icarefone-bing.exe (PID: 9132)
  • INFO

    • Executable content was dropped or overwritten

      • msedge.exe (PID: 5324)
      • msedge.exe (PID: 7336)
      • msedge.exe (PID: 2092)
    • Application launched itself

      • msedge.exe (PID: 5324)
    • The sample compiled with english language support

      • msedge.exe (PID: 7336)
      • msedge.exe (PID: 5324)
      • iCareFonetrial_bing_en_9.3.3.tmp (PID: 9108)
      • msedge.exe (PID: 2092)
    • Checks supported languages

      • identity_helper.exe (PID: 8372)
      • icarefone-bing.exe (PID: 9132)
      • iCareFonetrial_bing_en_9.3.3.exe (PID: 9076)
      • iCareFonetrial_bing_en_9.3.3.tmp (PID: 9108)
    • Reads the computer name

      • identity_helper.exe (PID: 8372)
      • icarefone-bing.exe (PID: 9132)
      • iCareFonetrial_bing_en_9.3.3.tmp (PID: 9108)
    • Reads Environment values

      • identity_helper.exe (PID: 8372)
    • Manual execution by a user

      • icarefone-bing.exe (PID: 9084)
      • icarefone-bing.exe (PID: 9132)
    • Reads the machine GUID from the registry

      • icarefone-bing.exe (PID: 9132)
    • Create files in a temporary directory

      • icarefone-bing.exe (PID: 9132)
      • iCareFonetrial_bing_en_9.3.3.exe (PID: 9076)
      • iCareFonetrial_bing_en_9.3.3.tmp (PID: 9108)
    • Checks proxy server information

      • icarefone-bing.exe (PID: 9132)
      • slui.exe (PID: 4448)
    • Reads the software policy settings

      • icarefone-bing.exe (PID: 9132)
      • slui.exe (PID: 8308)
      • slui.exe (PID: 4448)
    • Creates files or folders in the user directory

      • icarefone-bing.exe (PID: 9132)
    • UPX packer has been detected

      • icarefone-bing.exe (PID: 9132)
    • Creates files in the program directory

      • icarefone-bing.exe (PID: 9132)
      • iCareFonetrial_bing_en_9.3.3.tmp (PID: 9108)
    • Process checks computer location settings

      • iCareFonetrial_bing_en_9.3.3.tmp (PID: 9108)
    • Creates a software uninstall entry

      • iCareFonetrial_bing_en_9.3.3.tmp (PID: 9108)
    • The sample compiled with chinese language support

      • iCareFonetrial_bing_en_9.3.3.tmp (PID: 9108)
    • Detects InnoSetup installer (YARA)

      • iCareFonetrial_bing_en_9.3.3.exe (PID: 9076)
      • iCareFonetrial_bing_en_9.3.3.tmp (PID: 9108)
    • Compiled with Borland Delphi (YARA)

      • iCareFonetrial_bing_en_9.3.3.tmp (PID: 9108)
      • iCareFonetrial_bing_en_9.3.3.exe (PID: 9076)
    • The sample compiled with spanish language support

      • iCareFonetrial_bing_en_9.3.3.tmp (PID: 9108)
    • The sample compiled with Italian language support

      • iCareFonetrial_bing_en_9.3.3.tmp (PID: 9108)
    • The sample compiled with german language support

      • iCareFonetrial_bing_en_9.3.3.tmp (PID: 9108)
    • The sample compiled with korean language support

      • iCareFonetrial_bing_en_9.3.3.tmp (PID: 9108)
    • The sample compiled with french language support

      • iCareFonetrial_bing_en_9.3.3.tmp (PID: 9108)
    • The sample compiled with japanese language support

      • iCareFonetrial_bing_en_9.3.3.tmp (PID: 9108)
    • SQLite executable

      • iCareFonetrial_bing_en_9.3.3.tmp (PID: 9108)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
279
Monitored processes
143
Malicious processes
3
Suspicious processes
0

Behavior graph

Click at the process to see the details
start msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs sppextcomobj.exe no specs slui.exe identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs rundll32.exe no specs icarefone-bing.exe no specs icarefone-bing.exe svchost.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs icarefonetrial_bing_en_9.3.3.exe icarefonetrial_bing_en_9.3.3.tmp cmd.exe no specs conhost.exe no specs taskkill.exe no specs msedge.exe no specs msedge.exe no specs slui.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs msedge.exe cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs netsh.exe no specs netsh.exe no specs cmd.exe no specs conhost.exe no specs cmd.exe no specs conhost.exe no specs netsh.exe no specs netsh.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
540\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
644"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=6184 --field-trial-handle=2412,i,993728165248669746,6647354868539465961,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
924netsh advfirewall firewall add rule name="TSFoundationService" dir=in action=allow program="C:\Program Files (x86)\Tenorshare\Tenorshare iCareFone\TSFoundationService.exe" enable=yesC:\Windows\SysWOW64\netsh.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\netsh.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
1040netsh advfirewall firewall delete rule name=all program="C:\Program Files (x86)\Tenorshare\Tenorshare iCareFone\AirplayLibService.exe"C:\Windows\SysWOW64\netsh.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Network Command Shell
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\netsh.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
1056\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1116"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=6172 --field-trial-handle=2412,i,993728165248669746,6647354868539465961,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1276"C:\WINDOWS\system32\cmd.exe" /c netsh advfirewall firewall delete rule name=all program="C:\Program Files (x86)\Tenorshare\Tenorshare iCareFone\SimilarPhotosService.exe"C:\Windows\SysWOW64\cmd.exeiCareFonetrial_bing_en_9.3.3.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
1452"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5580 --field-trial-handle=2412,i,993728165248669746,6647354868539465961,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1532"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=5488 --field-trial-handle=2412,i,993728165248669746,6647354868539465961,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1600\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
20 204
Read events
20 162
Write events
41
Delete events
1

Modification events

(PID) Process:(5324) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(5324) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(5324) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(5324) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(5324) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\WindowProperties\262774
Operation:writeName:WindowTabManagerFileMappingId
Value:
{790CE7E0-78FD-4A29-883C-A26B25FFF937}
(PID) Process:(5324) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
885F8F9BA0912F00
(PID) Process:(5324) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
B730989BA0912F00
(PID) Process:(5324) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1693682860-607145093-2874071422-1001
Value:
3875BC9BA0912F00
(PID) Process:(5324) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\Profiles
Operation:writeName:EnhancedLinkOpeningDefault
Value:
Default
(PID) Process:(5324) msedge.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:MicrosoftEdgeAutoLaunch_29EBC4579851B72EE312C449CF839B1A
Value:
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-startup-window --win-session-start
Executable files
805
Suspicious files
439
Text files
301
Unknown types
0

Dropped files

PID
Process
Filename
Type
5324msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old~RF10b7a9.TMP
MD5:
SHA256:
5324msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old~RF10b7a9.TMP
MD5:
SHA256:
5324msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
5324msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
5324msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF10b7a9.TMP
MD5:
SHA256:
5324msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
5324msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF10b7f7.TMP
MD5:
SHA256:
5324msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old
MD5:
SHA256:
5324msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old~RF10b826.TMP
MD5:
SHA256:
5324msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
83
TCP/UDP connections
208
DNS requests
71
Threats
6

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
9132
icarefone-bing.exe
GET
301
104.18.25.249:80
http://www.tenorshare.com/downloads/service/softwarelog.txt
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
9132
icarefone-bing.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAhflMAthXvozBT%2FU%2B2iPio%3D
unknown
whitelisted
GET
200
23.216.77.33:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
9132
icarefone-bing.exe
GET
200
208.95.112.1:80
http://ip-api.com/csv
unknown
whitelisted
9132
icarefone-bing.exe
POST
200
142.250.186.78:80
http://www.google-analytics.com/collect
unknown
whitelisted
9132
icarefone-bing.exe
POST
200
142.250.186.78:80
http://www.google-analytics.com/collect
unknown
whitelisted
9132
icarefone-bing.exe
POST
200
142.250.186.78:80
http://www.google-analytics.com/collect
unknown
whitelisted
9132
icarefone-bing.exe
POST
200
142.250.186.78:80
http://www.google-analytics.com/collect
unknown
whitelisted
9132
icarefone-bing.exe
POST
200
142.250.186.78:80
http://www.google-analytics.com/collect
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2104
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
23.216.77.33:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
5324
msedge.exe
239.255.255.250:1900
whitelisted
7336
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7336
msedge.exe
104.18.10.138:443
download.tenorshare.net
CLOUDFLARENET
whitelisted
7336
msedge.exe
150.171.28.11:443
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7336
msedge.exe
13.107.253.45:443
edge-mobile-static.azureedge.net
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 20.73.194.208
whitelisted
crl.microsoft.com
  • 23.216.77.33
  • 23.216.77.18
  • 23.216.77.41
  • 23.216.77.20
  • 23.216.77.35
  • 23.216.77.12
  • 23.216.77.13
  • 23.216.77.26
  • 23.216.77.30
whitelisted
google.com
  • 216.58.212.174
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
download.tenorshare.net
  • 104.18.10.138
  • 104.18.11.138
whitelisted
edge.microsoft.com
  • 150.171.28.11
  • 150.171.27.11
whitelisted
edge-mobile-static.azureedge.net
  • 13.107.253.45
whitelisted
business.bing.com
  • 13.107.6.158
whitelisted
edgeservices.bing.com
  • 92.123.104.59
  • 92.123.104.11
  • 92.123.104.52
  • 92.123.104.63
  • 92.123.104.7
  • 92.123.104.64
  • 92.123.104.65
  • 92.123.104.67
  • 92.123.104.62
whitelisted
update.googleapis.com
  • 216.58.212.131
whitelisted

Threats

PID
Process
Class
Message
9132
icarefone-bing.exe
Potential Corporate Privacy Violation
ET INFO Unsupported/Fake Windows NT Version 5.0
2196
svchost.exe
Device Retrieving External IP Address Detected
INFO [ANY.RUN] External IP Check (ip-api .com)
2196
svchost.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup Domain in DNS Lookup (ip-api .com)
9132
icarefone-bing.exe
Potential Corporate Privacy Violation
ET INFO Unsupported/Fake Windows NT Version 5.0
9132
icarefone-bing.exe
Device Retrieving External IP Address Detected
ET INFO External IP Lookup ip-api.com
9132
icarefone-bing.exe
Possibly Unwanted Program Detected
ET ADWARE_PUP Tenorshare Google Analytics Checkin
No debug info