| URL: | https://kelvrix.cfd/Audio-wav/voicemail.html |
| Full analysis: | https://app.any.run/tasks/81a48c30-3176-4d51-9c48-cfdda4c30cf8 |
| Verdict: | Malicious activity |
| Threats: | Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security. |
| Analysis date: | February 20, 2026, 15:54:37 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MD5: | 000E2610F1E59011F2C7366AF0FF1DD3 |
| SHA1: | 83BBF938330E9C1DE13AC929F22FFBB57262736C |
| SHA256: | EBED9EEFE64FDE6A3DDA9B994F5DE341CE873BEF183D9F84821E3A9ECC2ACBD2 |
| SSDEEP: | 3:N8FmID8/MKI3TIWtT8:2JD3TIoT8 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 416 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | netsh.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 508 | "C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --string-annotations --extension-process --renderer-sub-type=extension --pdf-upsell-enabled --video-capture-use-gpu-memory-buffer --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=3 --enable-main-frame-before-activation --renderer-client-id=7 --always-read-main-dll --field-trial-handle=4292,i,12156129405847830654,3020221368786845165,262144 --disable-features=HttpsFirstBalancedMode,HttpsFirstModeV2,HttpsOnlyMode,HttpsUpgrades --variations-seed-version --mojo-platform-channel-handle=4300 /prefetch:2 | C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe | — | msedge.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: LOW Description: Microsoft Edge Exit code: 0 Version: 133.0.3065.92 Modules
| |||||||||||||||
| 508 | "C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access Bundle-00118607124\JWrapper-Remote Access-00118607124-complete\elev_win.exe" "--mouselocation" | C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access Bundle-00118607124\JWrapper-Remote Access-00118607124-complete\elev_win.exe | — | session_win.exe | |||||||||||
User: SYSTEM Company: SimpleHelp Ltd Integrity Level: SYSTEM Description: SimpleHelp Remote Access Client Exit code: 1879 Version: 5.5.14.0 Modules
| |||||||||||||||
| 1424 | icacls "C:\ProgramData\JWrapper-Remote Access\JWApps" /t /c /grant *S-1-5-32-545:(OI)(CI)RX | C:\Windows\System32\icacls.exe | — | Remote Access.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1432 | "C:\Users\admin\Downloads\Voicemailaudio222896.scr" /S | C:\Users\admin\Downloads\Voicemailaudio222896.scr | msedge.exe | ||||||||||||
User: admin Company: SimpleHelp Ltd Integrity Level: HIGH Description: SimpleHelp Remote Access Client Exit code: 0 Version: 5.5.14.0 Modules
| |||||||||||||||
| 1520 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | icacls.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1700 | "C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access Bundle-00118607124\JWrapper-Remote Access-00118607124-complete\elev_win.exe" "--mouselocation" | C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access Bundle-00118607124\JWrapper-Remote Access-00118607124-complete\elev_win.exe | — | session_win.exe | |||||||||||
User: SYSTEM Company: SimpleHelp Ltd Integrity Level: SYSTEM Description: SimpleHelp Remote Access Client Exit code: 1616 Version: 5.5.14.0 Modules
| |||||||||||||||
| 1824 | "C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access Bundle-00118607124\JWrapper-Remote Access-00118607124-complete\elev_win.exe" "--mouselocation" | C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access Bundle-00118607124\JWrapper-Remote Access-00118607124-complete\elev_win.exe | — | session_win.exe | |||||||||||
User: SYSTEM Company: SimpleHelp Ltd Integrity Level: SYSTEM Description: SimpleHelp Remote Access Client Exit code: 1616 Version: 5.5.14.0 Modules
| |||||||||||||||
| 1856 | "C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\SimpleGatewayService\Remote Access Service.exe" | C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\SimpleGatewayService\Remote Access Service.exe | SimpleService.exe | ||||||||||||
User: SYSTEM Company: SimpleHelp Ltd Integrity Level: SYSTEM Description: SimpleHelp Remote Access Client Exit code: 0 Version: 5.5.14.0 Modules
| |||||||||||||||
| 1884 | icacls "C:\ProgramData\JWrapper-Remote Access\JWAppsSharedConfig\SimpleGatewayService\Remote Access Service.exe" /t /c /grant *S-1-5-32-545:RX | C:\Windows\System32\icacls.exe | — | Remote Access.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (1432) Voicemailaudio222896.scr | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (1432) Voicemailaudio222896.scr | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (1432) Voicemailaudio222896.scr | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (1432) Voicemailaudio222896.scr | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Remote Access |
| Operation: | write | Name: | EstimatedSize |
Value: 116387 | |||
| (PID) Process: | (1432) Voicemailaudio222896.scr | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Remote Access |
| Operation: | write | Name: | UninstallString |
Value: "C:\ProgramData\JWrapper-Remote Access\Remote AccessWinLauncher.exe" JWVAPP JWRAPPER_UNINSTALLER | |||
| (PID) Process: | (1432) Voicemailaudio222896.scr | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Remote Access |
| Operation: | write | Name: | DisplayName |
Value: Remote Access | |||
| (PID) Process: | (1432) Voicemailaudio222896.scr | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Remote Access |
| Operation: | write | Name: | DisplayIcon |
Value: "C:\ProgramData\JWrapper-Remote Access\JWApps\Remote_Access_ConfigureICO.ico" | |||
| (PID) Process: | (1432) Voicemailaudio222896.scr | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Remote Access |
| Operation: | write | Name: | InstallLocation |
Value: "C:\ProgramData\JWrapper-Remote Access\JWrapper-Remote Access Bundle-00118607124\JWrapper-JWrapper-00118607049-complete" | |||
| (PID) Process: | (1432) Voicemailaudio222896.scr | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Remote Access |
| Operation: | write | Name: | URLUpdateInfo |
Value: http://172.86.126.246/access/ | |||
| (PID) Process: | (1432) Voicemailaudio222896.scr | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Remote Access |
| Operation: | write | Name: | DisplayVersion |
Value: 5.5.14.0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 8108 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\ClientCertificates\LOG.old~RF1e514a.TMP | — | |
MD5:— | SHA256:— | |||
| 8108 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old~RF1e515a.TMP | — | |
MD5:— | SHA256:— | |||
| 8108 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF1e515a.TMP | — | |
MD5:— | SHA256:— | |||
| 8108 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\ClientCertificates\LOG.old | — | |
MD5:— | SHA256:— | |||
| 8108 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old~RF1e515a.TMP | — | |
MD5:— | SHA256:— | |||
| 8108 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old~RF1e515a.TMP | — | |
MD5:— | SHA256:— | |||
| 8108 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\discounts_db\LOG.old | — | |
MD5:— | SHA256:— | |||
| 8108 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old | — | |
MD5:— | SHA256:— | |||
| 8108 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\parcel_tracking_db\LOG.old | — | |
MD5:— | SHA256:— | |||
| 8108 | msedge.exe | C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old | — | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3384 | msedge.exe | GET | 200 | 2.16.241.222:443 | https://www.bing.com/bloomfilterfiles/ExpandedDomainsFilterGlobal.json | unknown | binary | 665 Kb | whitelisted |
3384 | msedge.exe | GET | 200 | 188.114.97.3:443 | https://kelvrix.cfd/favicon.ico | unknown | html | 1.24 Kb | unknown |
3384 | msedge.exe | GET | 200 | 188.114.97.3:443 | https://kelvrix.cfd/Audio-wav/voicemail.html | unknown | html | 1.24 Kb | unknown |
3384 | msedge.exe | GET | 302 | 188.114.97.3:443 | https://kelvrix.cfd/Audio-wav/voicemail.html | unknown | html | 142 b | unknown |
3384 | msedge.exe | GET | 200 | 188.114.97.3:443 | https://kelvrix.cfd/?v=c3cd&session=1f3a8ceefa10933c5635f8ca80d1a4b1&ray=2d85180f4afd4417&ts=1771602884&geo=US&ver=4.2.0 | unknown | html | 7.74 Kb | unknown |
3384 | msedge.exe | GET | 304 | 150.171.28.11:443 | https://edge.microsoft.com/abusiveadblocking/api/v1/blocklist | unknown | — | — | whitelisted |
3384 | msedge.exe | GET | 200 | 188.114.97.3:443 | https://kelvrix.cfd/?v=12de6&session=6900b6203f08e931e9144d8404105f20&ray=d509df02744415f4&ts=1771602884&geo=US&ver=4.2.0 | unknown | html | 8.79 Kb | unknown |
3384 | msedge.exe | GET | 200 | 13.107.246.45:443 | https://xpaywalletcdn.azureedge.net/mswallet/ExpressCheckout/v1/GetGlobalConfig?EdgeChannel=stable&EdgeVersion=133.0.3065.92&ConfigVersion=0 | unknown | text | 393 Kb | whitelisted |
— | — | GET | 200 | 204.79.197.203:80 | http://oneocsp.microsoft.com/ocsp/MFQwUjBQME4wTDAJBgUrDgMCGgUABBQ3L3%2F%2Fa6ADK8NraY2GXzVaYrHG4AQUb6t%2B2v%2BXQ3LsO2d33oJhNYhHQoUCEzMAAAAGb6JMMcOVb6sAAAAAAAY%3D | unknown | — | — | whitelisted |
— | — | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAjTxtAB8my1oj8MfWpz%2F7Y%3D | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3004 | RUXIMICS.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
4 | System | 192.168.100.255:137 | — | Not routed | — | whitelisted |
6768 | MoUsoCoreWorker.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
8628 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
5568 | SearchApp.exe | 2.16.241.207:443 | www.bing.com | AKAMAI-ASN1 | NL | whitelisted |
— | — | 2.17.190.73:80 | ocsp.digicert.com | AKAMAI-AS | US | whitelisted |
— | — | 204.79.197.203:80 | oneocsp.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
3412 | svchost.exe | 172.211.123.250:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
3384 | msedge.exe | 150.171.27.11:80 | edge.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
3384 | msedge.exe | 150.171.22.17:443 | config.edge.skype.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
www.bing.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
oneocsp.microsoft.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
edge.microsoft.com |
| whitelisted |
config.edge.skype.com |
| whitelisted |
kelvrix.cfd |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
3384 | msedge.exe | Misc activity | ET INFO Observed DNS Query to .cfd TLD |
3384 | msedge.exe | Misc activity | ET INFO Observed DNS Query to .cfd TLD |
3384 | msedge.exe | Not Suspicious Traffic | INFO [ANY.RUN] Cloudflare Network Error Logging (NEL) |
3384 | msedge.exe | Not Suspicious Traffic | INFO [ANY.RUN] Cloudflare Network Error Logging (NEL) |
3384 | msedge.exe | Potentially Bad Traffic | ET FILE_SHARING Online File Storage Domain in DNS Lookup (gofile .io) |
3384 | msedge.exe | Potentially Bad Traffic | ET FILE_SHARING Online File Storage Domain in DNS Lookup (gofile .io) |
3384 | msedge.exe | Misc activity | ET FILE_SHARING File Sharing Related Domain in TLS SNI (gofile .io) |
3384 | msedge.exe | Misc activity | ET FILE_SHARING File Sharing Related Domain in TLS SNI (gofile .io) |
3384 | msedge.exe | Misc activity | ET FILE_SHARING File Sharing Related Domain in TLS SNI (gofile .io) |
3384 | msedge.exe | Potentially Bad Traffic | ET FILE_SHARING Online File Storage Domain in DNS Lookup (gofile .io) |