Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MicrosoftEdgeUpdate.exe

Overview

General Information

Sample name:MicrosoftEdgeUpdate.exe
Analysis ID:1432230
MD5:b55ad19c6c110e9bf985bc8674f7bcb3
SHA1:accd3e9360bb920985f1a42ee00eda43cf6405e9
SHA256:9991ba022173f283ee99068b708f60ac5143fe0c81c9e3673cc7835b108a4f44
Infos:

Detection

Score:22
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

Monitors registry run keys for changes
Contains capabilities to detect virtual machines
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64_ra
  • MicrosoftEdgeUpdate.exe (PID: 7020 cmdline: "C:\Users\user\Desktop\MicrosoftEdgeUpdate.exe" MD5: B55AD19C6C110E9BF985BC8674F7BCB3)
  • Taskmgr.exe (PID: 6856 cmdline: "C:\Windows\system32\taskmgr.exe" /4 MD5: 58D5BC7895F7F32EE308E34F06F25DD5)
  • Taskmgr.exe (PID: 6880 cmdline: "C:\Windows\system32\taskmgr.exe" /4 MD5: 58D5BC7895F7F32EE308E34F06F25DD5)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results
Source: MicrosoftEdgeUpdate.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: MicrosoftEdgeUpdate.exeStatic PE information: certificate valid
Source: MicrosoftEdgeUpdate.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: MicrosoftEdgeUpdate_unsigned.pdb source: MicrosoftEdgeUpdate.exe
Source: Taskmgr.exe, 0000000E.00000002.2400783386.0000025564053000.00000004.00000020.00020000.00000000.sdmp, Taskmgr.exe, 0000000E.00000003.1679030829.0000025564076000.00000004.00000020.00020000.00000000.sdmp, Taskmgr.exe, 0000000E.00000003.1679590377.0000025564086000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.microsoft.VMq
Source: Taskmgr.exe, 0000000E.00000003.1679030829.0000025564076000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.microsoft.c
Source: Taskmgr.exe, 0000000E.00000003.1679030829.0000025564076000.00000004.00000020.00020000.00000000.sdmp, Taskmgr.exe, 0000000E.00000003.1679590377.0000025564086000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://go.microsoft.fMa
Source: MicrosoftEdgeUpdate.exe, 00000000.00000000.1115168180.0000000000BEB000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamemsedgeupdate.dllL vs MicrosoftEdgeUpdate.exe
Source: MicrosoftEdgeUpdate.exeBinary or memory string: OriginalFilenamemsedgeupdate.dllL vs MicrosoftEdgeUpdate.exe
Source: MicrosoftEdgeUpdate.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: sus22.winEXE@3/1@0/0
Source: C:\Windows\System32\Taskmgr.exeMutant created: \Sessions\1\BaseNamedObjects\Local\TM.750ce7b0-e5fd-454f-9fad-2f66513dfa1b
Source: MicrosoftEdgeUpdate.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\MicrosoftEdgeUpdate.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\MicrosoftEdgeUpdate.exe "C:\Users\user\Desktop\MicrosoftEdgeUpdate.exe"
Source: unknownProcess created: C:\Windows\System32\Taskmgr.exe "C:\Windows\system32\taskmgr.exe" /4
Source: unknownProcess created: C:\Windows\System32\Taskmgr.exe "C:\Windows\system32\taskmgr.exe" /4
Source: C:\Users\user\Desktop\MicrosoftEdgeUpdate.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\MicrosoftEdgeUpdate.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\MicrosoftEdgeUpdate.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\System32\Taskmgr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{09c5dd34-009d-40fa-bcb9-0165ad0c15d4}\InProcServer32Jump to behavior
Source: C:\Windows\System32\Taskmgr.exeWindow found: window name: SysTabControl32Jump to behavior
Source: MicrosoftEdgeUpdate.exeStatic PE information: certificate valid
Source: initial sampleStatic PE information: Valid certificate with Microsoft Issuer
Source: MicrosoftEdgeUpdate.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: MicrosoftEdgeUpdate.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: MicrosoftEdgeUpdate.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: MicrosoftEdgeUpdate.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: MicrosoftEdgeUpdate.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: MicrosoftEdgeUpdate.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: MicrosoftEdgeUpdate.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: MicrosoftEdgeUpdate.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: MicrosoftEdgeUpdate_unsigned.pdb source: MicrosoftEdgeUpdate.exe

Boot Survival

barindex
Source: C:\Windows\System32\Taskmgr.exeRegistry key monitored: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunJump to behavior
Source: C:\Windows\System32\Taskmgr.exeRegistry key monitored: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunJump to behavior
Source: C:\Windows\System32\Taskmgr.exeRegistry key monitored: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunJump to behavior
Source: C:\Windows\System32\Taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\Taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\Taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\Taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\Taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\Taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\Taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\Taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\Taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\Taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\Taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\Taskmgr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\Taskmgr.exeFile opened / queried: SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}Jump to behavior
Source: Taskmgr.exe, 0000000E.00000002.2400783386.0000025563CF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Root PartitionSm
Source: Taskmgr.exe, 0000000E.00000002.2398991255.0000025563909000.00000004.00000020.00020000.00000000.sdmp, Taskmgr.exe, 0000000E.00000003.1679666253.00000255638F7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V VM Vid Partitionll
Source: Taskmgr.exe, 0000000E.00000002.2400783386.0000025563CF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ZHyper-V Remote Desktop Virtualization Service~
Source: Taskmgr.exe, 0000000E.00000002.2400783386.0000025563CF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Dynamic Memory Integration Service
Source: Taskmgr.exe, 0000000E.00000002.2400783386.0000025563CF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Root Virtual Processor
Source: Taskmgr.exe, 0000000E.00000002.2398071826.00000255633BA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: X2Hyper-V VM Vid Partition
Source: Taskmgr.exe, 0000000E.00000002.2398991255.0000025563909000.00000004.00000020.00020000.00000000.sdmp, Taskmgr.exe, 0000000E.00000003.1679666253.00000255638F7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisorr
Source: Taskmgr.exe, 0000000E.00000002.2398991255.0000025563909000.00000004.00000020.00020000.00000000.sdmp, Taskmgr.exe, 0000000E.00000003.1679666253.00000255638F7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Logical Processori.0
Source: Taskmgr.exe, 0000000E.00000002.2400783386.0000025563CF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: THyper-V Hypervisor Root Virtual Processor-
Source: Taskmgr.exe, 0000000E.00000002.2400783386.0000025563CF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: THyper-V Hypervisor Root Virtual Processor
Source: Taskmgr.exe, 0000000E.00000002.2398991255.0000025563909000.00000004.00000020.00020000.00000000.sdmp, Taskmgr.exe, 0000000E.00000003.1679666253.00000255638F7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V VM Vid Partitionll&
Source: Taskmgr.exe, 0000000E.00000003.1677677269.0000025563EF0000.00000004.00000020.00020000.00000000.sdmp, Taskmgr.exe, 0000000E.00000002.2400783386.0000025563EF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: JHyper-V Hypervisor Logical Processor
Source: Taskmgr.exe, 0000000E.00000002.2400783386.0000025563CF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: >Hyper-V Guest Service Interface
Source: Taskmgr.exe, 0000000E.00000002.2398991255.0000025563909000.00000004.00000020.00020000.00000000.sdmp, Taskmgr.exe, 0000000E.00000003.1679666253.00000255638F7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Root Virtual ProcessorU
Source: Taskmgr.exe, 0000000E.00000003.1677677269.0000025563EF0000.00000004.00000020.00020000.00000000.sdmp, Taskmgr.exe, 0000000E.00000002.2400783386.0000025563EF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DHyper-V Hypervisor Root PartitionZ1
Source: Taskmgr.exe, 0000000E.00000002.2400783386.0000025563CF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 2Hyper-V Heartbeat ServiceM
Source: Taskmgr.exe, 0000000E.00000002.2400783386.0000025563CF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VHyper-V Dynamic Memory Integration Service:
Source: Taskmgr.exe, 0000000E.00000002.2400783386.0000025563CF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: :Hyper-V Data Exchange Service
Source: Taskmgr.exe, 0000000E.00000003.1677677269.0000025563EF0000.00000004.00000020.00020000.00000000.sdmp, Taskmgr.exe, 0000000E.00000002.2400783386.0000025563EF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: DHyper-V Virtual Machine Bus Pipes
Source: Taskmgr.exe, 0000000E.00000002.2400783386.0000025563CF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: BHyper-V PowerShell Direct ServiceV[
Source: Taskmgr.exe, 0000000E.00000003.1677677269.0000025563EF0000.00000004.00000020.00020000.00000000.sdmp, Taskmgr.exe, 0000000E.00000002.2400783386.0000025563EF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V lsrhhigeeveinyg Bus Pipes
Source: Taskmgr.exe, 0000000E.00000002.2400783386.0000025563CF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <Hyper-V Guest Shutdown Service
Source: Taskmgr.exe, 0000000E.00000002.2400783386.0000025563CF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
Source: Taskmgr.exe, 0000000E.00000002.2400783386.0000025563CF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &Hyper-V Hypervisor
Source: Taskmgr.exe, 0000000E.00000002.2400783386.0000025563CF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Dynamic Memory Integration Service|w
Source: Taskmgr.exe, 0000000E.00000002.2398071826.00000255633B2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HHyper-V Volume Shadow Copy Requestorost.exeIxx
Source: Taskmgr.exe, 0000000E.00000002.2398991255.0000025563909000.00000004.00000020.00020000.00000000.sdmp, Taskmgr.exe, 0000000E.00000003.1679666253.00000255638F7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor-
Source: Taskmgr.exe, 0000000E.00000002.2400783386.0000025563CF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Root Partition
Source: Taskmgr.exe, 0000000E.00000002.2400783386.0000025563CF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: &Hyper-V Hypervisorman
Source: Taskmgr.exe, 0000000E.00000002.2398071826.00000255633BA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 2Hyper-V VM Vid PartitionRY\USu
Source: Taskmgr.exe, 0000000E.00000002.2400783386.0000025563CF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VHyper-V Dynamic Memory Integration Service
Source: Taskmgr.exe, 0000000E.00000002.2398071826.00000255633B2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: HHyper-V Time Synchronization Service
Source: Taskmgr.exe, 0000000E.00000002.2398991255.000002556388D000.00000004.00000020.00020000.00000000.sdmp, Taskmgr.exe, 0000000E.00000003.1679666253.0000025563851000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V lsrhhigeeveinyg BusvDE
Source: Taskmgr.exe, 0000000E.00000003.1677677269.0000025563EF0000.00000004.00000020.00020000.00000000.sdmp, Taskmgr.exe, 0000000E.00000002.2400783386.0000025563EF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AlDHyper-V Virtual Machine Bus Pipes
Source: Taskmgr.exe, 0000000E.00000002.2400783386.0000025563CF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Virtual Machine Bus Pipesl
Source: Taskmgr.exe, 0000000E.00000002.2400783386.0000025563CF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Hypervisor Logical Processor.mui
Source: Taskmgr.exe, 0000000E.00000003.1677677269.0000025563EF0000.00000004.00000020.00020000.00000000.sdmp, Taskmgr.exe, 0000000E.00000002.2400783386.0000025563EF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: sWDHyper-V Hypervisor Root Partitionh2
Source: Taskmgr.exe, 0000000E.00000003.1679666253.00000255638F7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Taskmgr.exe, 0000000E.00000002.2400783386.0000025563CF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmicvss
Source: Taskmgr.exe, 0000000E.00000002.2400783386.0000025563CF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 6242WorkflowServiceHost 4.0.0.06244Workflows Created6246Workflows Created Per Second6248Workflows Executing6250Workflows Completed6252Workflows Completed Per Second6254Workflows Aborted6256Workflows Aborted Per Second6258Workflows In Memory6260Workflows Persisted6262Workflows Persisted Per Second6264Workflows Terminated6266Workflows Terminated Per Second6268Workflows Loaded6270Workflows Loaded Per Second6272Workflows Unloaded6274Workflows Unloaded Per Second6276Workflows Suspended6278Workflows Suspended Per Second6280Workflows Idle Per Second6282Average Workflow Load Time6284Average Workflow Load Time Base6286Average Workflow Persist Time6288Average Workflow Persist Time Base6324Terminal Services6326Active Sessions6328Inactive Sessions6330Total Sessions4806Hyper-V Hypervisor Logical Processor4808Global Time4810Total Run Time4812Hypervisor Run Time4814Hardware Interrupts/sec4816Context Switches/sec4818Inter-Processor Interrupts/sec4820Scheduler Interrupts/sec4822Timer Interrupts/sec4824Inter-Processor Interrupts Sent/sec4826Processor Halts/sec4828Monitor Transition Cost4830Context Switch Time4832C1 Transitions/sec4834% C1 Time4836C2 Transitions/sec4838% C2 Time4840C3 Transitions/sec4842% C3 Time4844Frequency4846% of Max Frequency4848Parking Status4850Processor State Flags4852Root Vp Index4854Idle Sequence Number4856Global TSC Count4858Active TSC Count4860Idle Accumulation4862Reference Cycle Count 04864Actual Cycle Count 04866Reference Cycle Count 14868Actual Cycle Count 14870Proximity Domain Id4872Posted Interrupt Notifications/sec4874Hypervisor Branch Predictor Flushes/sec4876Hypervisor L1 Data Cache Flushes/sec4878Hypervisor Immediate L1 Data Cache Flushes/sec4880Hypervisor Microarchitectural Buffer Flushes/sec4882Counter Refresh Sequence Number4884Counter Refresh Reference Time4886Idle Accumulation Snapshot4888Active Tsc Count Snapshot
Source: Taskmgr.exe, 0000000E.00000002.2400783386.0000025563CF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Virtual Machine Bus Pipes>
Source: Taskmgr.exe, 0000000E.00000003.1677677269.0000025563EF0000.00000004.00000020.00020000.00000000.sdmp, Taskmgr.exe, 0000000E.00000002.2400783386.0000025563EF8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: JHyper-V Hypervisor Logical ProcessorS1
Source: Taskmgr.exe, 0000000E.00000002.2400783386.0000025563CF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmicshutdown0
Source: Taskmgr.exe, 0000000E.00000002.2400783386.0000025563CF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: vmicheartbeat
Source: Taskmgr.exe, 0000000E.00000002.2400783386.0000025563CF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V Dynamic Memory Integration ServiceO
Source: C:\Windows\System32\Taskmgr.exeQueries volume information: C:\ProgramData\Microsoft\User Account Pictures\user.png VolumeInformationJump to behavior
Source: C:\Windows\System32\Taskmgr.exeQueries volume information: C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\Assets\SmallLogo.scale-100.png VolumeInformationJump to behavior
Source: C:\Windows\System32\Taskmgr.exeQueries volume information: C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\Assets\Icons\AppListIcon.scale-100.png VolumeInformationJump to behavior
Source: C:\Windows\System32\Taskmgr.exeQueries volume information: C:\Program Files\WindowsApps\Microsoft.WindowsStore_11910.1002.5.0_neutral_split.scale-100_8wekyb3d8bbwe\Assets\AppTiles\StoreAppList.scale-100.png VolumeInformationJump to behavior
Source: C:\Windows\System32\Taskmgr.exeQueries volume information: C:\Windows\System32\RuntimeBroker.exe VolumeInformationJump to behavior
Source: C:\Windows\System32\Taskmgr.exeQueries volume information: C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\Assets\Icons\AppListIcon.scale-100.png VolumeInformationJump to behavior
Source: C:\Windows\System32\Taskmgr.exeQueries volume information: C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\Assets\SmallLogo.scale-100.png VolumeInformationJump to behavior
Source: C:\Windows\System32\Taskmgr.exeQueries volume information: C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\Assets\SquareLogo44x44.scale-100.png VolumeInformationJump to behavior
Source: C:\Windows\System32\Taskmgr.exeQueries volume information: C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\Assets\SquareLogo44x44.scale-100.png VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
Query Registry
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory11
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS11
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1432230 Sample: MicrosoftEdgeUpdate.exe Startdate: 26/04/2024 Architecture: WINDOWS Score: 22 4 Taskmgr.exe 2 13 2->4         started        7 MicrosoftEdgeUpdate.exe 2->7         started        9 Taskmgr.exe 2->9         started        signatures3 11 Monitors registry run keys for changes 4->11

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
MicrosoftEdgeUpdate.exe0%ReversingLabs
MicrosoftEdgeUpdate.exe0%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://go.microsoft.c0%URL Reputationsafe
http://go.microsoft.fMa0%Avira URL Cloudsafe
http://go.microsoft.VMq0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://go.microsoft.VMqTaskmgr.exe, 0000000E.00000002.2400783386.0000025564053000.00000004.00000020.00020000.00000000.sdmp, Taskmgr.exe, 0000000E.00000003.1679030829.0000025564076000.00000004.00000020.00020000.00000000.sdmp, Taskmgr.exe, 0000000E.00000003.1679590377.0000025564086000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://go.microsoft.fMaTaskmgr.exe, 0000000E.00000003.1679030829.0000025564076000.00000004.00000020.00020000.00000000.sdmp, Taskmgr.exe, 0000000E.00000003.1679590377.0000025564086000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://go.microsoft.cTaskmgr.exe, 0000000E.00000003.1679030829.0000025564076000.00000004.00000020.00020000.00000000.sdmpfalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1432230
Start date and time:2024-04-26 17:58:47 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 3m 58s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultwindowsinteractivecookbook.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:16
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:1
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:MicrosoftEdgeUpdate.exe
Detection:SUS
Classification:sus22.winEXE@3/1@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, consent.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe
  • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtEnumerateKey calls found.
  • Report size getting too big, too many NtOpenFile calls found.
  • Report size getting too big, too many NtOpenKey calls found.
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtProtectVirtualMemory calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
No simulations
No context
No context
No context
No context
No context
Process:C:\Windows\System32\Taskmgr.exe
File Type:ASCII text, with no line terminators
Category:modified
Size (bytes):4
Entropy (8bit):1.5
Encrypted:false
SSDEEP:3:R:R
MD5:F49655F856ACB8884CC0ACE29216F511
SHA1:CB0F1F87EC0455EC349AAA950C600475AC7B7B6B
SHA-256:7852FCE59C67DDF1D6B8B997EAA1ADFAC004A9F3A91C37295DE9223674011FBA
SHA-512:599E93D25B174524495ED29653052B3590133096404873318F05FD68F4C9A5C9A3B30574551141FBB73D7329D6BE342699A17F3AE84554BAB784776DFDA2D5F8
Malicious:false
Reputation:moderate, very likely benign file
Preview:EERF
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):5.63090116178004
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:MicrosoftEdgeUpdate.exe
File size:213'392 bytes
MD5:b55ad19c6c110e9bf985bc8674f7bcb3
SHA1:accd3e9360bb920985f1a42ee00eda43cf6405e9
SHA256:9991ba022173f283ee99068b708f60ac5143fe0c81c9e3673cc7835b108a4f44
SHA512:516634fe7f8632bc4ec640978199ff6eb807c23bdfa70e110cec5c4d1aa781e16688f9eaa058853a8017db14be6c8f29a281582c8eeeec563750dfac0359fb60
SSDEEP:3072:/WWG4aT9L5WeEfp8+Oqwbzs7VpRXW/wTJT0+o4yvRb3u0I3yz8B+Cu3FWgC1RxTW:wtoO9ipW4640u0I3yoB+iRMhI5Q
TLSH:D4246E1277F84A69F8F36E3058349F2A9A3FBC329D35EA2D1684219D1D34A51CD21B37
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........{e.W...W...W....r..]....r.......r..E...Vw..F...Vw..F...Vw..e....r..V....r..R...W...#....w..U....w..V...W........w..V...RichW..
Icon Hash:2f232d67b7934633
Entrypoint:0x40b388
Entrypoint Section:.text
Digitally signed:true
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x5EFBFF33 [Wed Jul 1 03:12:51 2020 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:1
File Version Major:5
File Version Minor:1
Subsystem Version Major:5
Subsystem Version Minor:1
Import Hash:30ad68b9dc9737d8c720dd9284051add
Signature Valid:true
Signature Issuer:CN=Microsoft Code Signing PCA 2011, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
Signature Validation Error:The operation completed successfully
Error Number:0
Not Before, Not After
  • 04/03/2020 19:39:50 03/03/2021 19:39:50
Subject Chain
  • CN=Microsoft Corporation, O=Microsoft Corporation, L=Redmond, S=Washington, C=US
Version:3
Thumbprint MD5:0416F02A45804A9A6E2E749C26602031
Thumbprint SHA-1:640386795F1D21244E7EA6E7A6E69E9C5B0A4F3E
Thumbprint SHA-256:020D7724BAAD9801C54329473DFCAA290960A3E9460C49C0695B641DD019F65E
Serial:330000018A073733CF2048893C00000000018A
Instruction
call 00007FCF98DD87E4h
jmp 00007FCF98DD829Fh
push ebp
mov ebp, esp
push esi
push dword ptr [ebp+08h]
mov esi, ecx
call 00007FCF98DD847Dh
mov dword ptr [esi], 004011A0h
mov eax, esi
pop esi
pop ebp
retn 0004h
and dword ptr [ecx+04h], 00000000h
mov eax, ecx
and dword ptr [ecx+08h], 00000000h
mov dword ptr [ecx+04h], 004011A8h
mov dword ptr [ecx], 004011A0h
ret
push ebp
mov ebp, esp
push esi
push dword ptr [ebp+08h]
mov esi, ecx
call 00007FCF98DD844Ah
mov dword ptr [esi], 004011BCh
mov eax, esi
pop esi
pop ebp
retn 0004h
and dword ptr [ecx+04h], 00000000h
mov eax, ecx
and dword ptr [ecx+08h], 00000000h
mov dword ptr [ecx+04h], 00406CF0h
mov dword ptr [ecx], 004011BCh
ret
push ebp
mov ebp, esp
push esi
mov esi, ecx
lea eax, dword ptr [esi+04h]
mov dword ptr [esi], 00401180h
and dword ptr [eax], 00000000h
and dword ptr [eax+04h], 00000000h
push eax
mov eax, dword ptr [ebp+08h]
add eax, 04h
push eax
call 00007FCF98DDA918h
pop ecx
pop ecx
mov eax, esi
pop esi
pop ebp
retn 0004h
lea eax, dword ptr [ecx+04h]
mov dword ptr [ecx], 00401180h
push eax
call 00007FCF98DDA963h
pop ecx
ret
push ebp
mov ebp, esp
push esi
mov esi, ecx
lea eax, dword ptr [esi+04h]
mov dword ptr [esi], 00401180h
push eax
call 00007FCF98DDA94Ch
test byte ptr [ebp+08h], 00000001h
pop ecx
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x1b14c0x3c.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x1c0000x16e28.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x31e000x2390
IMAGE_DIRECTORY_ENTRY_BASERELOC0x330000x1424.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x73600x54.text
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x10d80x40.text
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x1b0000x148.idata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x18c540x60.text
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x17d300x17e0077a35302b4580ceee7887439ffb49b3dFalse0.544533295157068Matlab v4 mat-file (little endian) \362\261@, numeric, rows 4239866, columns 06.369385160936053IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.data0x190000x16980xc008ad34fc450cd53392da6aef74183623dFalse0.17317708333333334data2.5592783937349814IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata0x1b0000x8a80xa006f48dd51bc82fab0e64b2cfb9e0f65d2False0.4140625data5.010048730343197IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x1c0000x16e280x17000c3b0a8348e9d36da10e0c2654d125112False0.07218070652173914data3.911456773273991IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x330000x14240x1600e7320ccdad6a0e7d738c6de378acb90eFalse0.7098721590909091data6.343567303456645IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0x1d0100x128Device independent bitmap graphic, 16 x 32 x 4, image size 192, 16 important colorsEnglishUnited States0.6317567567567568
RT_ICON0x1d1380x568Device independent bitmap graphic, 16 x 32 x 8, image size 320, 256 important colorsEnglishUnited States0.5823699421965318
RT_ICON0x1d6a00x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640, 16 important colorsEnglishUnited States0.5120967741935484
RT_ICON0x1d9880x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1024, 256 important colorsEnglishUnited States0.5455776173285198
RT_ICON0x1e2300x668Device independent bitmap graphic, 48 x 96 x 4, image size 1536EnglishUnited States0.36341463414634145
RT_ICON0x1e8980xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2688EnglishUnited States0.42350746268656714
RT_GROUP_ICON0x1f7400x5adataEnglishUnited States0.7333333333333333
RT_VERSION0x32a880x3a0data0.41163793103448276
RT_VERSION0x1fb300x390dataArabicSaudi Arabia0.40899122807017546
RT_VERSION0x1fec00x390dataBulgarianBulgaria0.41118421052631576
RT_VERSION0x205e00x390dataCatalanSpain0.4100877192982456
RT_VERSION0x2b4980x394OpenPGP Secret KeyChineseTaiwan0.4170305676855895
RT_VERSION0x209700x390dataCzechCzech Republic0.4100877192982456
RT_VERSION0x20d000x390dataDanishDenmark0.40899122807017546
RT_VERSION0x210900x390dataGermanGermany0.40899122807017546
RT_VERSION0x214200x390dataGreekGreece0.40899122807017546
RT_VERSION0x217b00x390dataEnglishUnited States0.40899122807017546
RT_VERSION0x22d200x390dataFinnishFinland0.4100877192982456
RT_VERSION0x234400x390dataFrenchFrance0.4100877192982456
RT_VERSION0x250c00x390dataHebrewIsrael0.4100877192982456
RT_VERSION0x242800x390dataHungarianHungary0.4100877192982456
RT_VERSION0x249a00x390dataIcelandicIceland0.4100877192982456
RT_VERSION0x24d300x390dataItalianItaly0.4100877192982456
RT_VERSION0x254500x390dataJapaneseJapan0.4100877192982456
RT_VERSION0x25b700x390dataKoreanNorth Korea0.4100877192982456
RT_VERSION0x25b700x390dataKoreanSouth Korea0.4100877192982456
RT_VERSION0x274600x390dataDutchNetherlands0.40899122807017546
RT_VERSION0x270d00x390dataNorwegianNorway0.4100877192982456
RT_VERSION0x277f00x390dataPolishPoland0.40899122807017546
RT_VERSION0x27b800x394OpenPGP Secret KeyPortugueseBrazil0.41593886462882096
RT_VERSION0x282b00x390dataRomanianRomania0.40899122807017546
RT_VERSION0x286400x390dataRussianRussia0.4100877192982456
RT_VERSION0x23ef00x390dataCroatianCroatia0.4100877192982456
RT_VERSION0x289d00x390dataSlovakSlovakia0.4100877192982456
RT_VERSION0x314f80x390dataAlbanianAlbania0.4100877192982456
RT_VERSION0x294800x390dataSwedishSweden0.4100877192982456
RT_VERSION0x29f300x390dataThaiThailand0.4100877192982456
RT_VERSION0x2a2c00x390dataTurkishTurkey0.40899122807017546
RT_VERSION0x2a9e00x390dataUrduPakistan0.4100877192982456
RT_VERSION0x2a9e00x390dataUrduIndia0.4100877192982456
RT_VERSION0x246100x390dataIndonesianIndonesia0.4100877192982456
RT_VERSION0x2a6500x390dataUkrainianUkrain0.4100877192982456
RT_VERSION0x28d600x390dataSlovenianSlovenia0.40789473684210525
RT_VERSION0x226000x390dataEstonianEstonia0.4100877192982456
RT_VERSION0x262900x390dataLatvianLativa0.4100877192982456
RT_VERSION0x25f000x390dataLithuanianLithuania0.4100877192982456
RT_VERSION0x229900x390dataFarsiIran0.4100877192982456
RT_VERSION0x229900x390dataFarsiAfganistan0.4100877192982456
RT_VERSION0x229900x390dataFarsiTajikistan0.4100877192982456
RT_VERSION0x229900x390dataFarsiUzbekistan0.4100877192982456
RT_VERSION0x2ad700x390dataVietnameseVietnam0.4100877192982456
RT_VERSION0x2bf500x390dataAzeriItaly0.40899122807017546
RT_VERSION0x2d1400x390dataBasqueFrance0.40899122807017546
RT_VERSION0x2d1400x390dataBasqueSpain0.40899122807017546
RT_VERSION0x2fc080x390dataFYRO MacedoniaMacedonia0.41118421052631576
RT_VERSION0x2b8300x390dataAfrikaansSouth Africa0.4100877192982456
RT_VERSION0x2b8300x390dataAfrikaansNamibia0.4100877192982456
RT_VERSION0x2e3180x390dataGeorgianGeorgia0.4100877192982456
RT_VERSION0x23b600x390dataHindiIndia0.4100877192982456
RT_VERSION0x2ff980x390dataMalteseMalta0.4100877192982456
RT_VERSION0x26d400x390dataMalayMalaysia0.40899122807017546
RT_VERSION0x2e6a80x390dataKazakhKazakhstan0.4100877192982456
RT_VERSION0x323680x390dataTatarRussia0.4100877192982456
RT_VERSION0x2c2e00x394OpenPGP Secret KeyBengaliIndia0.4148471615720524
RT_VERSION0x30dd80x390dataPunjabiPakistan0.40899122807017546
RT_VERSION0x30dd80x390dataPunjabiIndia0.40899122807017546
RT_VERSION0x237d00x390dataGujaratiIndia0.40899122807017546
RT_VERSION0x30a480x390dataOriyaIndia0.40899122807017546
RT_VERSION0x298100x390dataTamilIndia0.4100877192982456
RT_VERSION0x298100x390dataTamilSri Lanka0.4100877192982456
RT_VERSION0x29ba00x390dataTeluguIndia0.40899122807017546
RT_VERSION0x257e00x390dataKannadaKanada0.4100877192982456
RT_VERSION0x266200x390dataMalayalamIndia0.40899122807017546
RT_VERSION0x2bbc00x390dataAssameseIndia0.40899122807017546
RT_VERSION0x269b00x390dataMarathiIndia0.4100877192982456
RT_VERSION0x2cdb00x390dataWelshEngland0.4100877192982456
RT_VERSION0x2ea380x390dataKhmerVietnam0.4100877192982456
RT_VERSION0x2ea380x390dataKhmerThailand0.4100877192982456
RT_VERSION0x2f4e80x390dataLaoLaos0.4100877192982456
RT_VERSION0x2df880x390dataGalicianItaly0.40899122807017546
RT_VERSION0x2edc80x390dataKonkaniIndia0.40899122807017546
RT_VERSION0x1f7a00x390dataAmharicEthiopia0.40899122807017546
RT_VERSION0x303280x390dataNepaliNepal0.40899122807017546
RT_VERSION0x230b00x390dataFilipinoPhilippines0.4067982456140351
RT_VERSION0x2f1580x390data0.4100877192982456
RT_VERSION0x326f80x390data0.4100877192982456
RT_VERSION0x2f8780x390dataMaoriNew Zealand0.4100877192982456
RT_VERSION0x2dbf80x390data0.40899122807017546
RT_VERSION0x2ca080x3a8data0.41773504273504275
RT_VERSION0x2b1000x394OpenPGP Secret KeyChineseChina0.41593886462882096
RT_VERSION0x21b400x394OpenPGP Secret KeyEnglishGreat Britain0.41593886462882096
RT_VERSION0x222680x398OpenPGP Public KeySpanishMexico0.4152173913043478
RT_VERSION0x306b80x390dataNorwegianNorway0.40899122807017546
RT_VERSION0x27f180x394OpenPGP Secret KeyPortuguesePortugal0.4148471615720524
RT_VERSION0x290f00x390dataSerbianItaly0.4100877192982456
RT_VERSION0x2d8680x390dataGaelicIreland0.40899122807017546
RT_VERSION0x202500x390dataBengaliBangladesh0.4100877192982456
RT_VERSION0x21ed80x390data0.40899122807017546
RT_VERSION0x2d4d00x394OpenPGP Secret KeyFrenchCanada0.41593886462882096
RT_VERSION0x311680x390data0.40789473684210525
RT_VERSION0x2c6780x390dataBosnianBosnian0.4100877192982456
RT_VERSION0x318880x3a0data0.41379310344827586
RT_VERSION0x31fc80x3a0data0.41163793103448276
RT_VERSION0x31c280x3a0data0.41379310344827586
RT_MANIFEST0x1ca300x5e0XML 1.0 document, ASCII textEnglishUnited States0.425531914893617
DLLImport
KERNEL32.dllGetModuleFileNameW, GetLastError, CloseHandle, GetProcAddress, CreateProcessW, FreeLibrary, GetTempFileNameW, LoadLibraryExW, GetCommandLineW, GetModuleHandleW, WriteConsoleW, RaiseException, GetSystemInfo, VirtualProtect, VirtualQuery, LoadLibraryExA, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, GetStartupInfoW, CreateDirectoryW, CreateFileW, DeleteFileW, FindClose, FindFirstFileExW, FindNextFileW, GetFileAttributesExW, GetFileInformationByHandle, RemoveDirectoryW, SetFilePointerEx, AreFileApisANSI, SetLastError, CopyFileW, MultiByteToWideChar, WideCharToMultiByte, FormatMessageW, InitializeCriticalSectionAndSpinCount, SwitchToThread, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, RtlUnwind, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, EncodePointer, GetStdHandle, WriteFile, ExitProcess, GetModuleHandleExW, GetCPInfo, HeapAlloc, HeapFree, IsValidCodePage, GetACP, GetOEMCP, GetCommandLineA, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetStdHandle, GetFileType, GetStringTypeW, LCMapStringW, GetProcessHeap, HeapSize, HeapReAlloc, FlushFileBuffers, GetConsoleCP, GetConsoleMode, DecodePointer
ole32.dllCoTaskMemFree
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
ArabicSaudi Arabia
BulgarianBulgaria
CatalanSpain
ChineseTaiwan
CzechCzech Republic
DanishDenmark
GermanGermany
GreekGreece
FinnishFinland
FrenchFrance
HebrewIsrael
HungarianHungary
IcelandicIceland
ItalianItaly
JapaneseJapan
KoreanNorth Korea
KoreanSouth Korea
DutchNetherlands
NorwegianNorway
PolishPoland
PortugueseBrazil
RomanianRomania
RussianRussia
CroatianCroatia
SlovakSlovakia
AlbanianAlbania
SwedishSweden
ThaiThailand
TurkishTurkey
UrduPakistan
UrduIndia
IndonesianIndonesia
UkrainianUkrain
SlovenianSlovenia
EstonianEstonia
LatvianLativa
LithuanianLithuania
FarsiIran
FarsiAfganistan
FarsiTajikistan
FarsiUzbekistan
VietnameseVietnam
FYRO MacedoniaMacedonia
AfrikaansSouth Africa
AfrikaansNamibia
GeorgianGeorgia
MalteseMalta
MalayMalaysia
KazakhKazakhstan
TamilSri Lanka
KannadaKanada
WelshEngland
LaoLaos
AmharicEthiopia
NepaliNepal
FilipinoPhilippines
MaoriNew Zealand
ChineseChina
EnglishGreat Britain
SpanishMexico
PortuguesePortugal
GaelicIreland
BengaliBangladesh
FrenchCanada
BosnianBosnian
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:17:59:13
Start date:26/04/2024
Path:C:\Users\user\Desktop\MicrosoftEdgeUpdate.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\MicrosoftEdgeUpdate.exe"
Imagebase:0xbd0000
File size:213'392 bytes
MD5 hash:B55AD19C6C110E9BF985BC8674F7BCB3
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:11
Start time:18:00:08
Start date:26/04/2024
Path:C:\Windows\System32\Taskmgr.exe
Wow64 process (32bit):false
Commandline:"C:\Windows\system32\taskmgr.exe" /4
Imagebase:0x7ff78e410000
File size:1'213'232 bytes
MD5 hash:58D5BC7895F7F32EE308E34F06F25DD5
Has elevated privileges:false
Has administrator privileges:false
Programmed in:C, C++ or other language
Reputation:moderate
Has exited:true

Target ID:14
Start time:18:00:09
Start date:26/04/2024
Path:C:\Windows\System32\Taskmgr.exe
Wow64 process (32bit):false
Commandline:"C:\Windows\system32\taskmgr.exe" /4
Imagebase:0x7ff78e410000
File size:1'213'232 bytes
MD5 hash:58D5BC7895F7F32EE308E34F06F25DD5
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate
Has exited:false

No disassembly