Is "Bulk Image Convert" on Microsoft Edge Add-ons Safe to Install?

Free Simple Apps · edge · v3.0.0

Need a quick and easy method to convert your images in bulk? Use our custom image converter extension today. With this extension, you can convert all your images with a simple click of the mouse button.

Risk Assessment

Analyzed
100
out of 100
CRITICAL

250 security findings detected across all analyzers

Severity Breakdown

0
Critical
62
High
130
Medium
0
Low
0
Info

Finding Categories

62
Malware Signatures
129
IoC Indicators

YARA Rules Matched

11 rules(62 hits)
postinstall crypto operations postinstall system command postinstall file download postinstall network communication postinstall environment access postinstall obfuscation postinstall file manipulation postinstall persistence mechanism AlertStatementsShouldNotBeUsed LocalStorageShouldNotBeUsed postinstall registry modification

Detailed Findings

120 total

YARA Rule Matches

11 rules

Indicators of Compromise

Network indicators, suspicious strings, and potential IoCs extracted during analysis

URLs
13
IP Addresses
18
Domains
105
Strings
129

All Indicators · 129

URL
detected URL: http://stuartk.com/jszip

XIOC detected URL: http://stuartk.com/jszip

extracted_from_files

Domain
detected Domain: format.name

XIOC detected Domain: format.name

extracted_from_files

IP
detected Domain: s.zip

XIOC detected Domain: s.zip

extracted_from_files

Domain
detected Domain: this.reader.zero

XIOC detected Domain: this.reader.zero

extracted_from_files

Other
detected Email: [email protected]

XIOC detected Email: [email protected]

extracted_from_files

URL
detected URL: http://www.iec.ch

XIOC detected URL: http://www.iec.ch

extracted_from_files

URL
detected URL: https://microsoftedge.microsoft.com/addons/detail/

XIOC detected URL: https://microsoftedge.microsoft.com/addons/detail/

extracted_from_files

URL
detected URL: https://chrome.google.com/webstore/detail/$

XIOC detected URL: https://chrome.google.com/webstore/detail/$

extracted_from_files

Domain
detected Domain: e.total

XIOC detected Domain: e.total

extracted_from_files

Domain
detected Domain: t.work

XIOC detected Domain: t.work

extracted_from_files

Domain
detected Domain: r.head.name

XIOC detected Domain: r.head.name

extracted_from_files

Domain
detected Domain: r.work

XIOC detected Domain: r.work

extracted_from_files

Domain
detected Domain: r.total

XIOC detected Domain: r.total

extracted_from_files

Domain
detected Domain: t.bi

XIOC detected Domain: t.bi

extracted_from_files

Domain
detected Domain: c-t.bi

XIOC detected Domain: c-t.bi

extracted_from_files

Domain
detected Domain: a.next

XIOC detected Domain: a.next

extracted_from_files

Domain
detected Domain: a.total

XIOC detected Domain: a.total

extracted_from_files

Domain
detected Domain: this.bi

XIOC detected Domain: this.bi

extracted_from_files

Domain
detected Domain: i.gzhead.name

XIOC detected Domain: i.gzhead.name

extracted_from_files

Domain
detected Domain: this.total

XIOC detected Domain: this.total

extracted_from_files

Domain
detected Domain: this.next

XIOC detected Domain: this.next

extracted_from_files

Domain
detected Domain: this.work

XIOC detected Domain: this.work

extracted_from_files

Domain
detected Domain: a.data

XIOC detected Domain: a.data

extracted_from_files

Domain
detected Domain: u.call

XIOC detected Domain: u.call

extracted_from_files

Domain
detected Domain: n.next

XIOC detected Domain: n.next

extracted_from_files

Domain
detected Domain: this.options.to

XIOC detected Domain: this.options.to

extracted_from_files

Domain
detected Domain: h.next

XIOC detected Domain: h.next

extracted_from_files

Domain
detected Domain: t.next

XIOC detected Domain: t.next

extracted_from_files

Domain
detected Domain: t.total

XIOC detected Domain: t.total

extracted_from_files

Domain
detected Domain: e.data

XIOC detected Domain: e.data

extracted_from_files

Domain
detected Domain: n.prototype.cleanup.call

XIOC detected Domain: n.prototype.cleanup.call

extracted_from_files

Domain
detected Domain: this.name

XIOC detected Domain: this.name

extracted_from_files

URL
detected URL: https://edge.microsoft.com/extensionwebstorebase/v1/crx

XIOC detected URL: https://edge.microsoft.com/extensionwebstorebase/v1/crx

extracted_from_files

Domain
detected Domain: e.name

XIOC detected Domain: e.name

extracted_from_files

Domain
detected Domain: i.call

XIOC detected Domain: i.call

extracted_from_files

URL
detected URL: https://github.com/nodeca/pako/blob/master/LICENSE

XIOC detected URL: https://github.com/nodeca/pako/blob/master/LICENSE

extracted_from_files

Domain
detected Domain: t.strm.data

XIOC detected Domain: t.strm.data

extracted_from_files

Domain
detected Domain: photo-resizer.freeonlineapps.net

XIOC detected Domain: photo-resizer.freeonlineapps.net

extracted_from_files

Domain
detected Domain: this.data

XIOC detected Domain: this.data

extracted_from_files

Domain
detected Domain: this.zero

XIOC detected Domain: this.zero

extracted_from_files

Domain
detected Domain: s-this.zero

XIOC detected Domain: s-this.zero

extracted_from_files

IP
detected Domain: r.zip

XIOC detected Domain: r.zip

extracted_from_files

Domain
detected Domain: n.prototype.processchunk.call

XIOC detected Domain: n.prototype.processchunk.call

extracted_from_files

Domain
detected Domain: i.support

XIOC detected Domain: i.support

extracted_from_files

Domain
detected Domain: n.date

XIOC detected Domain: n.date

extracted_from_files

Domain
detected Domain: n.prototype.pause.call

XIOC detected Domain: n.prototype.pause.call

extracted_from_files

Domain
detected Domain: s.date

XIOC detected Domain: s.date

extracted_from_files

Domain
detected Domain: b.call

XIOC detected Domain: b.call

extracted_from_files

Domain
detected Domain: s.call

XIOC detected Domain: s.call

extracted_from_files

Domain
detected Domain: object.prototype.tostring.call

XIOC detected Domain: object.prototype.tostring.call

extracted_from_files

Domain
detected Domain: n.prototype.push.call

XIOC detected Domain: n.prototype.push.call

extracted_from_files

Domain
detected Domain: t.file.name

XIOC detected Domain: t.file.name

extracted_from_files

Domain
detected Domain: r.data

XIOC detected Domain: r.data

extracted_from_files

Domain
detected Domain: n.prototype.resume.call

XIOC detected Domain: n.prototype.resume.call

extracted_from_files

Domain
detected Domain: n.prototype.error.call

XIOC detected Domain: n.prototype.error.call

extracted_from_files

Domain
detected Domain: n.prototype.lock.call

XIOC detected Domain: n.prototype.lock.call

extracted_from_files

Domain
detected Domain: e.date

XIOC detected Domain: e.date

extracted_from_files

Domain
detected Domain: a.call

XIOC detected Domain: a.call

extracted_from_files

Domain
detected Domain: t.data

XIOC detected Domain: t.data

extracted_from_files

Domain
detected Domain: a.prototype.flush.call

XIOC detected Domain: a.prototype.flush.call

extracted_from_files

Domain
detected Domain: a.prototype.cleanup.call

XIOC detected Domain: a.prototype.cleanup.call

extracted_from_files

Domain
detected Domain: h.name

XIOC detected Domain: h.name

extracted_from_files

Domain
detected Domain: h.date

XIOC detected Domain: h.date

extracted_from_files

URL
detected URL: https://raw.github.com/Stuk/jszip/master/LICENSE.markdown.

XIOC detected URL: https://raw.github.com/Stuk/jszip/master/LICENSE.markdown.

extracted_from_files

Domain
detected Domain: e.call

XIOC detected Domain: e.call

extracted_from_files

Domain
detected Domain: m.mk

XIOC detected Domain: m.mk

extracted_from_files

Domain
detected Domain: raw.github.com

XIOC detected Domain: raw.github.com

extracted_from_files

Domain
detected Domain: stuk.github.io

XIOC detected Domain: stuk.github.io

extracted_from_files

Domain
detected Domain: this.streaminfo.data

XIOC detected Domain: this.streaminfo.data

extracted_from_files

Domain
detected Domain: r.store

XIOC detected Domain: r.store

extracted_from_files

Domain
detected Domain: r.date

XIOC detected Domain: r.date

extracted_from_files

Domain
detected Domain: this.date

XIOC detected Domain: this.date

extracted_from_files

Domain
detected Domain: modal-backdrop.show

XIOC detected Domain: modal-backdrop.show

extracted_from_files

IP
detected Domain: tooltip.show

XIOC detected Domain: tooltip.show

extracted_from_files

Domain
detected Domain: a.bg

XIOC detected Domain: a.bg

extracted_from_files

Domain
detected Domain: button.bg

XIOC detected Domain: button.bg

extracted_from_files

Domain
detected Domain: bootstrap.min.css.map

XIOC detected Domain: bootstrap.min.css.map

extracted_from_files

Domain
detected Domain: fontawesome.com

XIOC detected Domain: fontawesome.com

extracted_from_files

Domain
detected Domain: form-check-input.is

XIOC detected Domain: form-check-input.is

extracted_from_files

Domain
detected Domain: custom-control-input.is

XIOC detected Domain: custom-control-input.is

extracted_from_files

Domain
detected Domain: custom-file-input.is

XIOC detected Domain: custom-file-input.is

extracted_from_files

Domain
detected Domain: dropdown-menu.show

XIOC detected Domain: dropdown-menu.show

extracted_from_files

Domain
detected Domain: nav-item.show

XIOC detected Domain: nav-item.show

extracted_from_files

Domain
detected Domain: nav-link.show

XIOC detected Domain: nav-link.show

extracted_from_files

Domain
detected Domain: toast.show

XIOC detected Domain: toast.show

extracted_from_files

Domain
detected Domain: chrome.runtime.id

XIOC detected Domain: chrome.runtime.id

extracted_from_files

Domain
detected Domain: getbootstrap.com

XIOC detected Domain: getbootstrap.com

extracted_from_files

Domain
detected Domain: github.com

XIOC detected Domain: github.com

extracted_from_files

Domain
detected Domain: form-control.is

XIOC detected Domain: form-control.is

extracted_from_files

Domain
detected Domain: textarea.form-control.is

XIOC detected Domain: textarea.form-control.is

extracted_from_files

Domain
detected Domain: custom-select.is

XIOC detected Domain: custom-select.is

extracted_from_files

Domain
detected Domain: form-control-file.is

XIOC detected Domain: form-control-file.is

extracted_from_files

Domain
detected Domain: e.target

XIOC detected Domain: e.target

extracted_from_files

Domain
detected Domain: this.gallery

XIOC detected Domain: this.gallery

extracted_from_files

Domain
detected Domain: settings.name

XIOC detected Domain: settings.name

extracted_from_files

URL
detected URL: https://github.com/twbs/bootstrap/blob/master/LICENSE)

XIOC detected URL: https://github.com/twbs/bootstrap/blob/master/LICENSE)

extracted_from_files

URL
detected URL: https://getbootstrap.com/)

XIOC detected URL: https://getbootstrap.com/)

extracted_from_files

Domain
detected Domain: modal.show

XIOC detected Domain: modal.show

extracted_from_files

Domain
detected Domain: convert.js.map

XIOC detected Domain: convert.js.map

extracted_from_files

Domain
detected Domain: a.download

XIOC detected Domain: a.download

extracted_from_files

Domain
detected Domain: a.target

XIOC detected Domain: a.target

extracted_from_files

Domain
detected Domain: a.click

XIOC detected Domain: a.click

extracted_from_files

IP
detected Domain: this.zip

XIOC detected Domain: this.zip

extracted_from_files

IP
detected Domain: resized.zip

XIOC detected Domain: resized.zip

extracted_from_files

Domain
detected Domain: output.js.map

XIOC detected Domain: output.js.map

extracted_from_files

Domain
detected Domain: array.prototype.slice.call

XIOC detected Domain: array.prototype.slice.call

extracted_from_files

IP
detected IP: 1::bef

XIOC detected IP: 1::bef

extracted_from_files

Domain
detected Domain: n.call

XIOC detected Domain: n.call

extracted_from_files

IP
detected IP: 3::bef

XIOC detected IP: 3::bef

extracted_from_files

Domain
detected Domain: paint.net

XIOC detected Domain: paint.net

extracted_from_files

Domain
detected Domain: www.iec.ch

XIOC detected Domain: www.iec.ch

extracted_from_files

Domain
detected Domain: t.rw

XIOC detected Domain: t.rw

extracted_from_files

Domain
detected Domain: ө.ng

XIOC detected Domain: ө.ng

extracted_from_files

IP
detected IP: ::bef

XIOC detected IP: ::bef

extracted_from_files

IP
detected IP: e::af

XIOC detected IP: e::af

extracted_from_files

IP
detected IP: e::bef

XIOC detected IP: e::bef

extracted_from_files

IP
detected IP: e::

XIOC detected IP: e::

extracted_from_files

IP
detected IP: ed::

XIOC detected IP: ed::

extracted_from_files

IP
detected IP: ed::bef

XIOC detected IP: ed::bef

extracted_from_files

IP
detected IP: 9::bef

XIOC detected IP: 9::bef

extracted_from_files

URL
detected URL: https://fontawesome.com/license/free

XIOC detected URL: https://fontawesome.com/license/free

extracted_from_files

URL
detected URL: https://fontawesome.com

XIOC detected URL: https://fontawesome.com

extracted_from_files

Domain
detected Domain: stuartk.com

XIOC detected Domain: stuartk.com

extracted_from_files

IP
detected IP: ::af

XIOC detected IP: ::af

extracted_from_files

URL
detected URL: https://stuk.github.io/jszip/documentation/howto/read_zip.html

XIOC detected URL: https://stuk.github.io/jszip/documentation/howto/read_zip.html

extracted_from_files

URL
detected URL: https://photo-resizer.freeonlineapps.net/

XIOC detected URL: https://photo-resizer.freeonlineapps.net/

extracted_from_files

Domain
detected Domain: file.name

XIOC detected Domain: file.name

extracted_from_files

Domain
detected Domain: this.txtfiles.click

XIOC detected Domain: this.txtfiles.click

extracted_from_files

Domain
detected Domain: 0.ug

XIOC detected Domain: 0.ug

extracted_from_files

Security Analysis Summary

Security Analysis Overview

Bulk Image Convert is a edge extension published by Free Simple Apps. Version 3.0.0 has been analyzed by the Risky Plugins security platform, receiving a risk score of 100/100 (CRITICAL risk) based on 250 security findings.

Risk Assessment

This extension presents critical security risk. Severe issues were detected, potentially including malware indicators, exposed secrets, or dangerous behaviors. Installation is strongly discouraged until these issues are addressed.

Findings Breakdown

  • High: 62 finding(s)
  • Medium: 130 finding(s)

What Was Analyzed

The security assessment covers multiple analysis categories:

  • Malware Detection: YARA rule matching against 2,400+ malware signatures
  • Secret Detection: Scanning for exposed API keys, tokens, and credentials
  • Static Analysis: Code-level security analysis for common vulnerability patterns
  • Network Analysis: Detection of suspicious network communications and endpoints
  • Obfuscation Detection: Identification of code obfuscation techniques

Developer Information

Bulk Image Convert is published by Free Simple Apps on the edge marketplace.

Recommendation

This extension is not recommended for installation without thorough manual review. Consider alternatives with lower risk scores, or contact the developer to address the identified security concerns.

Frequently Asked Questions