Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MicrosoftEdgeUpdate.exe

Overview

General Information

Sample name:MicrosoftEdgeUpdate.exe
Analysis ID:1432222
MD5:c019e421d9f897108e51666cbae2c8b0
SHA1:3d26b0dc519e04999118f4a02ea8acd5f1db8feb
SHA256:3096d8e82917a9b73f322f4b1743e52e9b0c8b3c5933a957e73e29d6973cdd5b
Infos:

Detection

Score:0
Range:0 - 100
Whitelisted:true
Confidence:100%

Signatures

Monitors registry run keys for changes
Contains capabilities to detect virtual machines
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64_ra
  • MicrosoftEdgeUpdate.exe (PID: 6956 cmdline: "C:\Users\user\Desktop\MicrosoftEdgeUpdate.exe" MD5: C019E421D9F897108E51666CBAE2C8B0)
  • Taskmgr.exe (PID: 6672 cmdline: "C:\Windows\system32\taskmgr.exe" /4 MD5: 58D5BC7895F7F32EE308E34F06F25DD5)
  • Taskmgr.exe (PID: 1544 cmdline: "C:\Windows\system32\taskmgr.exe" /4 MD5: 58D5BC7895F7F32EE308E34F06F25DD5)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results
Source: MicrosoftEdgeUpdate.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: MicrosoftEdgeUpdate.exeStatic PE information: certificate valid
Source: MicrosoftEdgeUpdate.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: MicrosoftEdgeUpdate_unsigned.pdb source: MicrosoftEdgeUpdate.exe
Source: Taskmgr.exe, 0000000E.00000003.1472545843.000001C7EFB84000.00000004.00000020.00020000.00000000.sdmp, Taskmgr.exe, 0000000E.00000003.1473390487.000001C7EFBA9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.m
Source: Taskmgr.exe, 0000000E.00000003.1472545843.000001C7EFB84000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.microsPk
Source: Taskmgr.exe, 0000000E.00000003.1472545843.000001C7EFB84000.00000004.00000020.00020000.00000000.sdmp, Taskmgr.exe, 0000000E.00000003.1473390487.000001C7EFBA9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.microsoft.c
Source: Taskmgr.exe, 0000000E.00000003.1472545843.000001C7EFB84000.00000004.00000020.00020000.00000000.sdmp, Taskmgr.exe, 0000000E.00000003.1473390487.000001C7EFBA9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.microsoft.co
Source: MicrosoftEdgeUpdate.exe, 00000000.00000000.1109659146.00000000004BC000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamemsedgeupdate.dllL vs MicrosoftEdgeUpdate.exe
Source: MicrosoftEdgeUpdate.exeBinary or memory string: OriginalFilenamemsedgeupdate.dllL vs MicrosoftEdgeUpdate.exe
Source: MicrosoftEdgeUpdate.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: clean22.winEXE@3/1@0/0
Source: C:\Windows\System32\Taskmgr.exeMutant created: \Sessions\1\BaseNamedObjects\Local\TM.750ce7b0-e5fd-454f-9fad-2f66513dfa1b
Source: MicrosoftEdgeUpdate.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\MicrosoftEdgeUpdate.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\MicrosoftEdgeUpdate.exe "C:\Users\user\Desktop\MicrosoftEdgeUpdate.exe"
Source: unknownProcess created: C:\Windows\System32\Taskmgr.exe "C:\Windows\system32\taskmgr.exe" /4
Source: unknownProcess created: C:\Windows\System32\Taskmgr.exe "C:\Windows\system32\taskmgr.exe" /4
Source: C:\Users\user\Desktop\MicrosoftEdgeUpdate.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\MicrosoftEdgeUpdate.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\MicrosoftEdgeUpdate.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\Taskmgr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{09c5dd34-009d-40fa-bcb9-0165ad0c15d4}\InProcServer32Jump to behavior
Source: C:\Windows\System32\Taskmgr.exeWindow found: window name: SysTabControl32Jump to behavior
Source: MicrosoftEdgeUpdate.exeStatic PE information: certificate valid
Source: initial sampleStatic PE information: Valid certificate with Microsoft Issuer
Source: MicrosoftEdgeUpdate.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: MicrosoftEdgeUpdate.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: MicrosoftEdgeUpdate.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: MicrosoftEdgeUpdate.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: MicrosoftEdgeUpdate.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: MicrosoftEdgeUpdate.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: MicrosoftEdgeUpdate.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: MicrosoftEdgeUpdate.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: MicrosoftEdgeUpdate_unsigned.pdb source: MicrosoftEdgeUpdate.exe

Boot Survival

barindex
Source: C:\Windows\System32\Taskmgr.exeRegistry key monitored: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunJump to behavior
Source: C:\Windows\System32\Taskmgr.exeRegistry key monitored: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunJump to behavior
Source: C:\Windows\System32\Taskmgr.exeRegistry key monitored: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunJump to behavior
Source: C:\Windows\System32\Taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\Taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\Taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\Taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\Taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\Taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\Taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\Taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\Taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\Taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\Taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\Taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\Taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\Taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\Taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\Taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\Taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\Taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\Taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\Taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\Taskmgr.exeFile opened / queried: SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}Jump to behavior
Source: Taskmgr.exe, 0000000E.00000002.2381381348.000001C7F021F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Root Partition/
Source: Taskmgr.exe, 0000000E.00000003.1475341722.000001C7EFB9B000.00000004.00000020.00020000.00000000.sdmp, Taskmgr.exe, 0000000E.00000003.1472545843.000001C7EFB84000.00000004.00000020.00020000.00000000.sdmp, Taskmgr.exe, 0000000E.00000002.2377809703.000001C7EFB9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V VM Vid Partitionll
Source: Taskmgr.exe, 0000000E.00000002.2377809703.000001C7EF980000.00000004.00000020.00020000.00000000.sdmp, Taskmgr.exe, 0000000E.00000002.2377809703.000001C7EFAA7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Dynamic Memory Integration Service
Source: Taskmgr.exe, 0000000E.00000002.2377809703.000001C7EF980000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Root Virtual Processor
Source: Taskmgr.exe, 0000000E.00000002.2381381348.000001C7F021F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 2Hyper-V Heartbeat Service
Source: Taskmgr.exe, 0000000E.00000002.2381381348.000001C7F021F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HHyper-V Volume Shadow Copy Requestor&
Source: Taskmgr.exe, 0000000E.00000002.2381381348.000001C7F0188000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&0000000
Source: Taskmgr.exe, 0000000E.00000002.2377809703.000001C7EFAA7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: THyper-V Hypervisor Root Virtual Processor
Source: Taskmgr.exe, 0000000E.00000002.2377809703.000001C7EFAA7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: JHyper-V Hypervisor Logical Processor8
Source: Taskmgr.exe, 0000000E.00000002.2377809703.000001C7EFAA7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: THyper-V Hypervisor Root Virtual Processor
Source: Taskmgr.exe, 0000000E.00000002.2377809703.000001C7EF980000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: >Hyper-V Guest Service Interface
Source: Taskmgr.exe, 0000000E.00000002.2377809703.000001C7EFAA7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: sWDHyper-V Hypervisor Root Partition
Source: Taskmgr.exe, 0000000E.00000002.2377809703.000001C7EF980000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DHyper-V Hypervisor Root Partition
Source: Taskmgr.exe, 0000000E.00000002.2377809703.000001C7EFAA7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &Hyper-V Hypervisor
Source: Taskmgr.exe, 0000000E.00000002.2377809703.000001C7EF980000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: :Hyper-V Data Exchange Service
Source: Taskmgr.exe, 0000000E.00000002.2377809703.000001C7EF980000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DHyper-V Virtual Machine Bus Pipes
Source: Taskmgr.exe, 0000000E.00000002.2377809703.000001C7EF980000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Dynamic Memory Integration Service*
Source: Taskmgr.exe, 0000000E.00000002.2381381348.000001C7F021F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: BHyper-V PowerShell Direct Service
Source: Taskmgr.exe, 0000000E.00000002.2377809703.000001C7EFAA7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: X2Hyper-V VM Vid Partition$'-"
Source: Taskmgr.exe, 0000000E.00000002.2381381348.000001C7F021F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
Source: Taskmgr.exe, 0000000E.00000002.2377809703.000001C7EF980000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Logical Processor.syszU
Source: Taskmgr.exe, 0000000E.00000002.2381381348.000001C7F0170000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V nyyempmfbiidaux Bus3
Source: Taskmgr.exe, 0000000E.00000002.2377809703.000001C7EFAA7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VHyper-V Dynamic Memory Integration Service$
Source: Taskmgr.exe, 0000000E.00000003.1475341722.000001C7EFB9B000.00000004.00000020.00020000.00000000.sdmp, Taskmgr.exe, 0000000E.00000003.1472545843.000001C7EFB84000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V VM Vid Partitionz_
Source: Taskmgr.exe, 0000000E.00000002.2377809703.000001C7EFAA7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Root Virtual ProcessorF
Source: Taskmgr.exe, 0000000E.00000002.2381381348.000001C7F021F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Root Partition
Source: Taskmgr.exe, 0000000E.00000002.2377809703.000001C7EFAA7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor,
Source: Taskmgr.exe, 0000000E.00000002.2377809703.000001C7EF980000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmicshutdownSubSyst
Source: Taskmgr.exe, 0000000E.00000002.2377809703.000001C7EFAA7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 2Hyper-V VM Vid Partitionx
Source: Taskmgr.exe, 0000000E.00000002.2377809703.000001C7EFAA7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VHyper-V Dynamic Memory Integration Service|x
Source: Taskmgr.exe, 0000000E.00000002.2377809703.000001C7EF980000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: JHyper-V Hypervisor Logical ProcessorO
Source: Taskmgr.exe, 0000000E.00000002.2377809703.000001C7EFAA7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Logical Processor.mui|
Source: Taskmgr.exe, 0000000E.00000002.2381381348.000001C7F021F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Virtual Machine Bus Pipes
Source: Taskmgr.exe, 0000000E.00000002.2381381348.000001C7F021F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Virtual Machine Bus Pipesl
Source: Taskmgr.exe, 0000000E.00000002.2377809703.000001C7EFAA7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AlDHyper-V Virtual Machine Bus Pipes%
Source: Taskmgr.exe, 0000000E.00000002.2377809703.000001C7EF980000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ZHyper-V Remote Desktop Virtualization Service
Source: Taskmgr.exe, 0000000E.00000002.2377809703.000001C7EF980000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmicvss
Source: Taskmgr.exe, 0000000E.00000002.2377809703.000001C7EF980000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Taskmgr.exe, 0000000E.00000002.2377809703.000001C7EFAA7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V nyyempmfbiidaux Bus Pipes
Source: Taskmgr.exe, 0000000E.00000002.2381381348.000001C7F021F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\Disk&Ven_VMware&Prod_Virtual_disk\4&1656f219&0&000000^
Source: Taskmgr.exe, 0000000E.00000002.2377809703.000001C7EF980000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor
Source: Taskmgr.exe, 0000000E.00000002.2381381348.000001C7F021F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <Hyper-V Guest Shutdown Service@
Source: Taskmgr.exe, 0000000E.00000002.2377809703.000001C7EF980000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &Hyper-V HypervisorXG
Source: Taskmgr.exe, 0000000E.00000002.2381381348.000001C7F0188000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware Virtual disk SCSI Disk DeviceZ
Source: Taskmgr.exe, 0000000E.00000002.2381381348.000001C7F021F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HHyper-V Time Synchronization Service&
Source: Taskmgr.exe, 0000000E.00000002.2377809703.000001C7EF980000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
Source: C:\Windows\System32\Taskmgr.exeQueries volume information: C:\ProgramData\Microsoft\User Account Pictures\user.png VolumeInformationJump to behavior
Source: C:\Windows\System32\Taskmgr.exeQueries volume information: C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\Assets\SmallLogo.scale-100.png VolumeInformationJump to behavior
Source: C:\Windows\System32\Taskmgr.exeQueries volume information: C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\Assets\Icons\AppListIcon.scale-100.png VolumeInformationJump to behavior
Source: C:\Windows\System32\Taskmgr.exeQueries volume information: C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\StoreAppList.scale-100.png VolumeInformationJump to behavior
Source: C:\Windows\System32\Taskmgr.exeQueries volume information: C:\Windows\System32\RuntimeBroker.exe VolumeInformationJump to behavior
Source: C:\Windows\System32\Taskmgr.exeQueries volume information: C:\Windows\System32\RuntimeBroker.exe VolumeInformationJump to behavior
Source: C:\Windows\System32\Taskmgr.exeQueries volume information: C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\Assets\Icons\AppListIcon.scale-100.png VolumeInformationJump to behavior
Source: C:\Windows\System32\Taskmgr.exeQueries volume information: C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\Assets\SmallLogo.scale-100.png VolumeInformationJump to behavior
Source: C:\Windows\System32\Taskmgr.exeQueries volume information: C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\Assets\SquareLogo44x44.scale-100.png VolumeInformationJump to behavior
Source: C:\Windows\System32\Taskmgr.exeQueries volume information: C:\Program Files\WindowsApps\Microsoft.WindowsAlarms_10.1906.2182.0_x64__8wekyb3d8bbwe\Assets\AlarmsAppList.targetsize-256.png VolumeInformationJump to behavior
Source: C:\Windows\System32\Taskmgr.exeQueries volume information: C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\Assets\SquareLogo44x44.scale-100.png VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
Query Registry
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory11
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS11
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1432222 Sample: MicrosoftEdgeUpdate.exe Startdate: 26/04/2024 Architecture: WINDOWS Score: 0 4 Taskmgr.exe 2 13 2->4         started        7 MicrosoftEdgeUpdate.exe 2->7         started        9 Taskmgr.exe 2->9         started        signatures3 11 Monitors registry run keys for changes 4->11

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
MicrosoftEdgeUpdate.exe0%ReversingLabs
MicrosoftEdgeUpdate.exe0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://go.microsoft.c0%URL Reputationsafe
http://go.microsoft.c0%URL Reputationsafe
http://go.m0%Avira URL Cloudsafe
http://go.microsPk0%Avira URL Cloudsafe
http://go.microsoft.co0%Avira URL Cloudsafe
http://go.microsoft.co1%VirustotalBrowse
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://go.mTaskmgr.exe, 0000000E.00000003.1472545843.000001C7EFB84000.00000004.00000020.00020000.00000000.sdmp, Taskmgr.exe, 0000000E.00000003.1473390487.000001C7EFBA9000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://go.microsPkTaskmgr.exe, 0000000E.00000003.1472545843.000001C7EFB84000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://go.microsoft.coTaskmgr.exe, 0000000E.00000003.1472545843.000001C7EFB84000.00000004.00000020.00020000.00000000.sdmp, Taskmgr.exe, 0000000E.00000003.1473390487.000001C7EFBA9000.00000004.00000020.00020000.00000000.sdmpfalse
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
http://go.microsoft.cTaskmgr.exe, 0000000E.00000003.1472545843.000001C7EFB84000.00000004.00000020.00020000.00000000.sdmp, Taskmgr.exe, 0000000E.00000003.1473390487.000001C7EFBA9000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1432222
Start date and time:2024-04-26 17:48:53 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 3m 56s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultwindowsinteractivecookbook.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:16
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:1
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:MicrosoftEdgeUpdate.exe
Detection:CLEAN
Classification:clean22.winEXE@3/1@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, consent.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtEnumerateKey calls found.
  • Report size getting too big, too many NtOpenFile calls found.
  • Report size getting too big, too many NtOpenKey calls found.
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
No simulations
No context
No context
No context
No context
No context
Process:C:\Windows\System32\Taskmgr.exe
File Type:ASCII text, with no line terminators
Category:modified
Size (bytes):4
Entropy (8bit):1.5
Encrypted:false
SSDEEP:3:R:R
MD5:F49655F856ACB8884CC0ACE29216F511
SHA1:CB0F1F87EC0455EC349AAA950C600475AC7B7B6B
SHA-256:7852FCE59C67DDF1D6B8B997EAA1ADFAC004A9F3A91C37295DE9223674011FBA
SHA-512:599E93D25B174524495ED29653052B3590133096404873318F05FD68F4C9A5C9A3B30574551141FBB73D7329D6BE342699A17F3AE84554BAB784776DFDA2D5F8
Malicious:false
Reputation:moderate, very likely benign file
Preview:EERF
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):5.631888449445425
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:MicrosoftEdgeUpdate.exe
File size:214'952 bytes
MD5:c019e421d9f897108e51666cbae2c8b0
SHA1:3d26b0dc519e04999118f4a02ea8acd5f1db8feb
SHA256:3096d8e82917a9b73f322f4b1743e52e9b0c8b3c5933a957e73e29d6973cdd5b
SHA512:5aa5da738b65f820d23c01ddbafaccdef51975ce8ade4225a34e1bcc1e23235d78062cb3b7da0579f0ce1bcc3b76875f7fea1bc8c982691d3856d488e03b7e02
SSDEEP:3072:ZgNpVWYxi/7gKNkhSC+t+MMCTs0kH+Bkx6uyXnZeiB+N6LpCcu51lviIzdXfEqMM:P7gKNkhSR/5kHouyXnZhB+h8WH3
TLSH:14246F2233F84969F8F35E316C349F29993EBC35AE35E72E1644219E2D35A41D921B33
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........w...............}.......}..C....}.......y.......y.......y.......}.......}..............Hf......Hf+.......C.....Hf......Rich...
Icon Hash:2f232d67b7934633
Entrypoint:0x40b612
Entrypoint Section:.text
Digitally signed:true
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x60F8C6E6 [Thu Jul 22 01:16:22 2021 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:1
File Version Major:5
File Version Minor:1
Subsystem Version Major:5
Subsystem Version Minor:1
Import Hash:e00d60405a249a05d3b09aa7fe924b17
Signature Valid:true
Signature Issuer:CN=Microsoft Code Signing PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
Signature Validation Error:The operation completed successfully
Error Number:0
Not Before, Not After
  • 15/12/2020 22:31:47 02/12/2021 22:31:47
Subject Chain
  • CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
Version:3
Thumbprint MD5:1443093D80E98F18DBCFB9E721DFDE54
Thumbprint SHA-1:C774204049D25D30AF9AC2F116B3C1FB88EE00A4
Thumbprint SHA-256:88FBD83CDEDDB75CCDA592E59B6F5CE0932C0AFDA61F446C6C950E508B2818E6
Serial:33000001E2F17D92020E49F87F0000000001E2
Instruction
call 00007F36FCE00C45h
jmp 00007F36FCE006FFh
ret
push ebp
mov ebp, esp
push esi
push dword ptr [ebp+08h]
mov esi, ecx
call 00007F36FCE008DDh
mov dword ptr [esi], 004011B4h
mov eax, esi
pop esi
pop ebp
retn 0004h
and dword ptr [ecx+04h], 00000000h
mov eax, ecx
and dword ptr [ecx+08h], 00000000h
mov dword ptr [ecx+04h], 004011BCh
mov dword ptr [ecx], 004011B4h
ret
push ebp
mov ebp, esp
push esi
push dword ptr [ebp+08h]
mov esi, ecx
call 00007F36FCE008AAh
mov dword ptr [esi], 004011D0h
mov eax, esi
pop esi
pop ebp
retn 0004h
and dword ptr [ecx+04h], 00000000h
mov eax, ecx
and dword ptr [ecx+08h], 00000000h
mov dword ptr [ecx+04h], 00406E10h
mov dword ptr [ecx], 004011D0h
ret
push ebp
mov ebp, esp
push esi
mov esi, ecx
lea eax, dword ptr [esi+04h]
mov dword ptr [esi], 00401194h
and dword ptr [eax], 00000000h
and dword ptr [eax+04h], 00000000h
push eax
mov eax, dword ptr [ebp+08h]
add eax, 04h
push eax
call 00007F36FCE02D5Dh
pop ecx
pop ecx
mov eax, esi
pop esi
pop ebp
retn 0004h
lea eax, dword ptr [ecx+04h]
mov dword ptr [ecx], 00401194h
push eax
call 00007F36FCE02DA8h
pop ecx
ret
push ebp
mov ebp, esp
push esi
mov esi, ecx
lea eax, dword ptr [esi+04h]
mov dword ptr [esi], 00401194h
push eax
call 00007F36FCE02D91h
test byte ptr [ebp+08h], 00000001h
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x1c1500x3c.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x1d0000x17110.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x324000x23a8
IMAGE_DIRECTORY_ENTRY_BASERELOC0x350000x143c.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x75140x54.text
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x10d80x40.text
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x1c0000x14c.idata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x190240x60.text
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x181000x18200e16802b266e214beb8b7976b23c81712False0.5424425194300518Matlab v4 mat-file (little endian) |\264@, numeric, rows 4240516, columns 06.354561953363584IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.data0x1a0000x16980xc0066a41492c66ae3891e26393c70d5b0beFalse0.17252604166666666data2.551462668407192IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata0x1c0000x8c20xa00c665dfc84f9a5d4e881b2d498e8f163dFalse0.4203125data5.03422162536055IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x1d0000x171100x172000187706d95de95869a5b94fd714ee472False0.07183277027027027data3.9211552458320087IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x350000x143c0x1600d805d7e598f8f9da8a71e774a51b4eb8False0.7212357954545454data6.367622959465254IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0x1e0400x128Device independent bitmap graphic, 16 x 32 x 4, image size 192, 16 important colorsEnglishUnited States0.6317567567567568
RT_ICON0x1e1680x568Device independent bitmap graphic, 16 x 32 x 8, image size 320, 256 important colorsEnglishUnited States0.5823699421965318
RT_ICON0x1e6d00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640, 16 important colorsEnglishUnited States0.5120967741935484
RT_ICON0x1e9b80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.5455776173285198
RT_ICON0x1f2600x668Device independent bitmap graphic, 48 x 96 x 4, image size 1536EnglishUnited States0.36341463414634145
RT_ICON0x1f8c80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2688EnglishUnited States0.42350746268656714
RT_GROUP_ICON0x207700x5adataEnglishUnited States0.7333333333333333
RT_VERSION0x33d680x3a8data0.41346153846153844
RT_VERSION0x20b680x398OpenPGP Public KeyArabicSaudi Arabia0.40869565217391307
RT_VERSION0x20f000x398OpenPGP Public KeyBulgarianBulgaria0.4097826086956522
RT_VERSION0x216300x398OpenPGP Public KeyCatalanSpain0.4097826086956522
RT_VERSION0x2c6700x39cdataChineseTaiwan0.4145021645021645
RT_VERSION0x219c80x398OpenPGP Public KeyCzechCzech Republic0.4097826086956522
RT_VERSION0x21d600x398OpenPGP Public KeyDanishDenmark0.4076086956521739
RT_VERSION0x220f80x398OpenPGP Public KeyGermanGermany0.4097826086956522
RT_VERSION0x224900x398OpenPGP Public KeyGreekGreece0.40869565217391307
RT_VERSION0x228280x398OpenPGP Public KeyEnglishUnited States0.4076086956521739
RT_VERSION0x23dc80x398OpenPGP Public KeyFinnishFinland0.4097826086956522
RT_VERSION0x244f80x398OpenPGP Public KeyFrenchFrance0.4097826086956522
RT_VERSION0x261b80x398OpenPGP Public KeyHebrewIsrael0.4097826086956522
RT_VERSION0x253580x398OpenPGP Public KeyHungarianHungary0.4097826086956522
RT_VERSION0x25a880x398OpenPGP Public KeyIcelandicIceland0.4097826086956522
RT_VERSION0x25e200x398OpenPGP Public KeyItalianItaly0.4097826086956522
RT_VERSION0x265500x398OpenPGP Public KeyJapaneseJapan0.40869565217391307
RT_VERSION0x26c800x398OpenPGP Public KeyKoreanNorth Korea0.4097826086956522
RT_VERSION0x26c800x398OpenPGP Public KeyKoreanSouth Korea0.4097826086956522
RT_VERSION0x285a80x398OpenPGP Public KeyDutchNetherlands0.4097826086956522
RT_VERSION0x282100x398OpenPGP Public KeyNorwegianNorway0.4097826086956522
RT_VERSION0x289400x398OpenPGP Public KeyPolishPoland0.4097826086956522
RT_VERSION0x28cd80x39cdataPortugueseBrazil0.4145021645021645
RT_VERSION0x294180x398OpenPGP Public KeyRomanianRomania0.4076086956521739
RT_VERSION0x297b00x398OpenPGP Public KeyRussianRussia0.4097826086956522
RT_VERSION0x24fc00x398OpenPGP Public KeyCroatianCroatia0.4097826086956522
RT_VERSION0x29b480x398OpenPGP Public KeySlovakSlovakia0.4097826086956522
RT_VERSION0x327a80x398OpenPGP Public KeyAlbanianAlbania0.4097826086956522
RT_VERSION0x2a6100x398OpenPGP Public KeySwedishSweden0.4097826086956522
RT_VERSION0x2b0d80x398OpenPGP Public KeyThaiThailand0.4097826086956522
RT_VERSION0x2b4700x398OpenPGP Public KeyTurkishTurkey0.4076086956521739
RT_VERSION0x2bba00x398OpenPGP Public KeyUrduPakistan0.40869565217391307
RT_VERSION0x2bba00x398OpenPGP Public KeyUrduIndia0.40869565217391307
RT_VERSION0x256f00x398OpenPGP Public KeyIndonesianIndonesia0.4097826086956522
RT_VERSION0x2b8080x398OpenPGP Public KeyUkrainianUkrain0.4097826086956522
RT_VERSION0x29ee00x398OpenPGP Public KeySlovenianSlovenia0.40869565217391307
RT_VERSION0x236980x398OpenPGP Public KeyEstonianEstonia0.40869565217391307
RT_VERSION0x273b00x398OpenPGP Public KeyLatvianLativa0.4097826086956522
RT_VERSION0x270180x398OpenPGP Public KeyLithuanianLithuania0.4097826086956522
RT_VERSION0x23a300x398OpenPGP Public KeyFarsiIran0.4097826086956522
RT_VERSION0x23a300x398OpenPGP Public KeyFarsiAfganistan0.4097826086956522
RT_VERSION0x23a300x398OpenPGP Public KeyFarsiTajikistan0.4097826086956522
RT_VERSION0x23a300x398OpenPGP Public KeyFarsiUzbekistan0.4097826086956522
RT_VERSION0x2bf380x398OpenPGP Public KeyVietnameseVietnam0.4097826086956522
RT_VERSION0x2d1400x398OpenPGP Public KeyAzeriItaly0.4097826086956522
RT_VERSION0x2e3580x398OpenPGP Public KeyBasqueFrance0.4076086956521739
RT_VERSION0x2e3580x398OpenPGP Public KeyBasqueSpain0.4076086956521739
RT_VERSION0x30e800x398OpenPGP Public KeyFYRO MacedoniaMacedonia0.4097826086956522
RT_VERSION0x2ca100x398OpenPGP Public KeyAfrikaansSouth Africa0.40869565217391307
RT_VERSION0x2ca100x398OpenPGP Public KeyAfrikaansNamibia0.40869565217391307
RT_VERSION0x2f5580x398OpenPGP Public KeyGeorgianGeorgia0.40869565217391307
RT_VERSION0x24c280x398OpenPGP Public KeyHindiIndia0.4097826086956522
RT_VERSION0x312180x398OpenPGP Public KeyMalteseMalta0.4097826086956522
RT_VERSION0x27e780x398OpenPGP Public KeyMalayMalaysia0.4076086956521739
RT_VERSION0x2f8f00x398OpenPGP Public KeyKazakhKazakhstan0.40869565217391307
RT_VERSION0x336380x398OpenPGP Public KeyTatarRussia0.4097826086956522
RT_VERSION0x2d4d80x39cdataBengaliIndia0.4134199134199134
RT_VERSION0x320780x398OpenPGP Public KeyPunjabiPakistan0.40869565217391307
RT_VERSION0x320780x398OpenPGP Public KeyPunjabiIndia0.40869565217391307
RT_VERSION0x248900x398OpenPGP Public KeyGujaratiIndia0.4076086956521739
RT_VERSION0x31ce00x398OpenPGP Public KeyOriyaIndia0.4076086956521739
RT_VERSION0x2a9a80x398OpenPGP Public KeyTamilIndia0.4097826086956522
RT_VERSION0x2a9a80x398OpenPGP Public KeyTamilSri Lanka0.4097826086956522
RT_VERSION0x2ad400x398OpenPGP Public KeyTeluguIndia0.40869565217391307
RT_VERSION0x268e80x398OpenPGP Public KeyKannadaKanada0.4097826086956522
RT_VERSION0x277480x398OpenPGP Public KeyMalayalamIndia0.4097826086956522
RT_VERSION0x2cda80x398OpenPGP Public KeyAssameseIndia0.40869565217391307
RT_VERSION0x27ae00x398OpenPGP Public KeyMarathiIndia0.4097826086956522
RT_VERSION0x2dfc00x398OpenPGP Public KeyWelshEngland0.4097826086956522
RT_VERSION0x2fc880x398OpenPGP Public KeyKhmerVietnam0.40869565217391307
RT_VERSION0x2fc880x398OpenPGP Public KeyKhmerThailand0.40869565217391307
RT_VERSION0x307500x398OpenPGP Public KeyLaoLaos0.4097826086956522
RT_VERSION0x2f1c00x398OpenPGP Public KeyGalicianItaly0.40869565217391307
RT_VERSION0x300200x398OpenPGP Public KeyKonkaniIndia0.4076086956521739
RT_VERSION0x207d00x398OpenPGP Public KeyAmharicEthiopia0.4076086956521739
RT_VERSION0x315b00x398OpenPGP Public KeyNepaliNepal0.4097826086956522
RT_VERSION0x241600x398OpenPGP Public KeyFilipinoPhilippines0.40652173913043477
RT_VERSION0x303b80x398OpenPGP Public Key0.4097826086956522
RT_VERSION0x339d00x398OpenPGP Public Key0.4097826086956522
RT_VERSION0x30ae80x398OpenPGP Public KeyMaoriNew Zealand0.4097826086956522
RT_VERSION0x2ee280x398OpenPGP Public Key0.40869565217391307
RT_VERSION0x2dc100x3b0data0.4141949152542373
RT_VERSION0x2c2d00x39cdataChineseChina0.4145021645021645
RT_VERSION0x22bc00x39cdataEnglishGreat Britain0.4145021645021645
RT_VERSION0x232f80x3a0dataSpanishMexico0.41379310344827586
RT_VERSION0x319480x398OpenPGP Public KeyNorwegianNorway0.40869565217391307
RT_VERSION0x290780x39cdataPortuguesePortugal0.4134199134199134
RT_VERSION0x2a2780x398OpenPGP Public KeySerbianItaly0.4097826086956522
RT_VERSION0x2ea900x398OpenPGP Public KeyGaelicIreland0.40869565217391307
RT_VERSION0x212980x398OpenPGP Public KeyBengaliBangladesh0.4097826086956522
RT_VERSION0x22f600x398OpenPGP Public Key0.40869565217391307
RT_VERSION0x2e6f00x39cdataFrenchCanada0.4134199134199134
RT_VERSION0x324100x398OpenPGP Public Key0.40869565217391307
RT_VERSION0x2d8780x398OpenPGP Public KeyBosnianBosnian0.4097826086956522
RT_VERSION0x32b400x3a8data0.41452991452991456
RT_VERSION0x332900x3a8data0.4113247863247863
RT_VERSION0x32ee80x3a8data0.41239316239316237
RT_MANIFEST0x1da300x60cXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4160206718346253
DLLImport
KERNEL32.dllGetModuleFileNameW, GetLastError, CloseHandle, GetProcAddress, CreateProcessW, FreeLibrary, GetTempFileNameW, LoadLibraryExW, GetCommandLineW, GetModuleHandleW, WriteConsoleW, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, LocalFree, FormatMessageA, CreateDirectoryW, CreateFileW, DeleteFileW, FindClose, FindFirstFileExW, FindNextFileW, GetFileAttributesExW, GetFileInformationByHandle, RemoveDirectoryW, SetFilePointerEx, AreFileApisANSI, SetLastError, CopyFileW, MultiByteToWideChar, WideCharToMultiByte, InitializeCriticalSectionAndSpinCount, SwitchToThread, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, RtlUnwind, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, EncodePointer, GetStdHandle, WriteFile, ExitProcess, GetModuleHandleExW, GetCPInfo, HeapAlloc, HeapFree, IsValidCodePage, GetACP, GetOEMCP, GetCommandLineA, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetStdHandle, GetFileType, GetStringTypeW, LCMapStringW, GetProcessHeap, HeapSize, HeapReAlloc, FlushFileBuffers, GetConsoleOutputCP, GetConsoleMode, DecodePointer
ole32.dllCoTaskMemFree
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
ArabicSaudi Arabia
BulgarianBulgaria
CatalanSpain
ChineseTaiwan
CzechCzech Republic
DanishDenmark
GermanGermany
GreekGreece
FinnishFinland
FrenchFrance
HebrewIsrael
HungarianHungary
IcelandicIceland
ItalianItaly
JapaneseJapan
KoreanNorth Korea
KoreanSouth Korea
DutchNetherlands
NorwegianNorway
PolishPoland
PortugueseBrazil
RomanianRomania
RussianRussia
CroatianCroatia
SlovakSlovakia
AlbanianAlbania
SwedishSweden
ThaiThailand
TurkishTurkey
UrduPakistan
UrduIndia
IndonesianIndonesia
UkrainianUkrain
SlovenianSlovenia
EstonianEstonia
LatvianLativa
LithuanianLithuania
FarsiIran
FarsiAfganistan
FarsiTajikistan
FarsiUzbekistan
VietnameseVietnam
FYRO MacedoniaMacedonia
AfrikaansSouth Africa
AfrikaansNamibia
GeorgianGeorgia
MalteseMalta
MalayMalaysia
KazakhKazakhstan
TamilSri Lanka
KannadaKanada
WelshEngland
LaoLaos
AmharicEthiopia
NepaliNepal
FilipinoPhilippines
MaoriNew Zealand
ChineseChina
EnglishGreat Britain
SpanishMexico
PortuguesePortugal
GaelicIreland
BengaliBangladesh
FrenchCanada
BosnianBosnian
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:17:49:20
Start date:26/04/2024
Path:C:\Users\user\Desktop\MicrosoftEdgeUpdate.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\MicrosoftEdgeUpdate.exe"
Imagebase:0x4a0000
File size:214'952 bytes
MD5 hash:C019E421D9F897108E51666CBAE2C8B0
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:11
Start time:17:49:55
Start date:26/04/2024
Path:C:\Windows\System32\Taskmgr.exe
Wow64 process (32bit):false
Commandline:"C:\Windows\system32\taskmgr.exe" /4
Imagebase:0x7ff78e410000
File size:1'213'232 bytes
MD5 hash:58D5BC7895F7F32EE308E34F06F25DD5
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language
Reputation:moderate
Has exited:true

Target ID:14
Start time:17:49:56
Start date:26/04/2024
Path:C:\Windows\System32\Taskmgr.exe
Wow64 process (32bit):false
Commandline:"C:\Windows\system32\taskmgr.exe" /4
Imagebase:0x7ff78e410000
File size:1'213'232 bytes
MD5 hash:58D5BC7895F7F32EE308E34F06F25DD5
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate
Has exited:false

No disassembly