Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
upd-ps-x64-6.0.0.18849.exe

Overview

General Information

Sample name:upd-ps-x64-6.0.0.18849.exe
Analysis ID:1544053
MD5:b477a084884194e6c3cd2e09d8c69ea6
SHA1:95877637fdba4e91b22c8cf0e54346119bd84d5c
SHA256:2c8bc2ac1cfd4cfd19427bcb25c1e269195d0752aa29af836d4ef369ea18b329

Detection

Score:0
Range:0 - 100
Whitelisted:false
Confidence:80%

Signatures

PE file contains sections with non-standard names
Uses 32bit PE files

Classification

  • System is w10x64
  • upd-ps-x64-6.0.0.18849.exe (PID: 5956 cmdline: "C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exe" MD5: B477A084884194E6C3CD2E09D8C69EA6)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: upd-ps-x64-6.0.0.18849.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: upd-ps-x64-6.0.0.18849.exeStatic PE information: certificate valid
Source: Binary string: d:\cdp_cio\dot4-convergence\src\mscodebase\longhorn\dot4\HPbin\fre\amd64\HPZid412.pdb! source: HPZid412.sys
Source: Binary string: DIFXAPI.pdb source: difxapi.dll
Source: Binary string: d:\cdp_cio\dot4-convergence\src\mscodebase\longhorn\dot4\HPbin\fre\amd64\HPZius12.pdb! source: HPZius12.sys
Source: Binary string: F:\jnks\workspace\UnifiedIOAPI-2.0.0\builds\Win32\Release\hpbuio32.pdb source: hpbuio32.dll
Source: Binary string: d:\cdp_cio\dot4-convergence\src\mscodebase\longhorn\dot4\HPbin\fre\amd64\HPZid412.pdb source: HPZid412.sys
Source: Binary string: DIFXAPI.pdbE3 source: difxapi.dll
Source: Binary string: d:\cdp_cio\dot4-convergence\src\mscodebase\longhorn\dot4\HPbin\fre\amd64\HPZisc12.pdb source: HPZisc12.sys
Source: Binary string: F:\jnks\workspace\UnifiedIOAPI-2.0.0\builds\x64\Release\hpbuiodm64.pdb source: hpbuiodm64.dll
Source: Binary string: F:\jnks\workspace\UnifiedIOAPI-2.0.0\builds\Win32\Release\hpbuio32.pdb0 source: hpbuio32.dll
Source: Binary string: F:\jnks\workspace\Evo_F15\F15\evo-driver\builds\dll\x64\Release\Install.pdb source: Install.dll, Install.exe
Source: Binary string: d:\cdp_cio\dot4-convergence\src\mscodebase\longhorn\dot4\HPbin\fre\amd64\HPZipr12.pdb! source: HPZipr12.sys
Source: Binary string: d:\cdp_cio\dot4-convergence\src\mscodebase\longhorn\dot4\HPbin\fre\amd64\HPZius12.pdb source: HPZius12.sys
Source: Binary string: F:\jnks\workspace\UnifiedIOAPI-2.0.0\builds\x64\Release\hpbuio64.pdb source: hpbuio64.dll
Source: Binary string: e:\svn_root\dot4_co-installer_dll_2_x_3_51\x64\release\hppldcoi.pdb source: hppldcoi.dll
Source: Binary string: d:\cdp_cio\dot4-convergence\src\mscodebase\longhorn\dot4\HPbin\fre\amd64\HPZipr12.pdb source: HPZipr12.sys
Source: Binary string: d:\cdp_cio\dot4-convergence\src\mscodebase\longhorn\dot4\HPbin\fre\amd64\HPZisc12.pdb! source: HPZisc12.sys
Source: upd-ps-x64-6.0.0.18849.exe, HPZid412.sys, HPZipr12.sys, HPZisc12.sys, HPZius12.sys, difxapi.dll, hppldcoi.dll, Install.dll, Install.exe, hpbcfgre.dll, hpbuio32.dll, hpbuio64.dll, hpbuiodm64.dllString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: upd-ps-x64-6.0.0.18849.exe, HPZid412.sys, HPZipr12.sys, HPZisc12.sys, HPZius12.sys, difxapi.dll, hppldcoi.dll, Install.dll, Install.exe, hpbcfgre.dll, hpbuio32.dll, hpbuio64.dll, hpbuiodm64.dllString found in binary or memory: http://ocsp.thawte.com0
Source: Install.exeString found in binary or memory: http://printserver/cgi-bin/getUserMPL.cgi?computerName=%%COMPUTERNAME%%&userName=%%USERNAME%%&userDo
Source: Install.exeString found in binary or memory: http://printserver/userlist.asp
Source: Install.dllString found in binary or memory: http://schemas.mi
Source: hpbuio32.dll, hpbuio64.dllString found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next
Source: hpbuio32.dll, hpbuio64.dllString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
Source: hpbuio32.dll, hpbuio64.dllString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
Source: hpbuio64.dllString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/http://schemas.xmlsoap.org/soap/encoding/
Source: hpbuio32.dll, hpbuio64.dllString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing
Source: hpbuio32.dll, hpbuio64.dll, hpbuiodm64.dllString found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous
Source: hpbuio32.dll, hpbuio64.dllString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/04/discovery
Source: hpbuio32.dll, hpbuio64.dllString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/04/discovery/Probe
Source: hpbuio32.dll, hpbuio64.dllString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/04/discovery/Resolve
Source: hpbuio32.dll, hpbuio64.dllString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/04/discoverywsdhttp://www.hp.com/schemas/imaging/con/discovery/20
Source: upd-ps-x64-6.0.0.18849.exe, HPZid412.sys, HPZipr12.sys, HPZisc12.sys, HPZius12.sys, difxapi.dll, hppldcoi.dll, Install.dll, Install.exe, hpbcfgre.dll, hpbuio32.dll, hpbuio64.dll, hpbuiodm64.dllString found in binary or memory: http://sf.symcb.com/sf.crl0f
Source: upd-ps-x64-6.0.0.18849.exe, HPZid412.sys, HPZipr12.sys, HPZisc12.sys, HPZius12.sys, difxapi.dll, hppldcoi.dll, Install.dll, Install.exe, hpbcfgre.dll, hpbuio32.dll, hpbuio64.dll, hpbuiodm64.dllString found in binary or memory: http://sf.symcb.com/sf.crt0
Source: upd-ps-x64-6.0.0.18849.exe, HPZid412.sys, HPZipr12.sys, HPZisc12.sys, HPZius12.sys, difxapi.dll, hppldcoi.dll, Install.dll, Install.exe, hpbcfgre.dll, hpbuio32.dll, hpbuio64.dll, hpbuiodm64.dllString found in binary or memory: http://sf.symcd.com0&
Source: upd-ps-x64-6.0.0.18849.exe, HPZid412.sys, HPZipr12.sys, HPZisc12.sys, HPZius12.sys, difxapi.dll, hppldcoi.dll, Install.dll, Install.exe, hpbcfgre.dll, hpbuio32.dll, hpbuio64.dll, hpbuiodm64.dllString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: upd-ps-x64-6.0.0.18849.exe, HPZid412.sys, HPZipr12.sys, HPZisc12.sys, HPZius12.sys, difxapi.dll, hppldcoi.dll, Install.dll, Install.exe, hpbcfgre.dll, hpbuio32.dll, hpbuio64.dll, hpbuiodm64.dllString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: upd-ps-x64-6.0.0.18849.exe, HPZid412.sys, HPZipr12.sys, HPZisc12.sys, HPZius12.sys, difxapi.dll, hppldcoi.dll, Install.dll, Install.exe, hpbcfgre.dll, hpbuio32.dll, hpbuio64.dll, hpbuiodm64.dllString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: hpbuio32.dll, hpbuio64.dllString found in binary or memory: http://www.hp.com/schemas/imaging/con/dictionaries/1.0
Source: hpbuio32.dll, hpbuio64.dllString found in binary or memory: http://www.hp.com/schemas/imaging/con/discovery/2006/09/19
Source: hpbuio32.dll, hpbuio64.dllString found in binary or memory: http://www.hp.com/schemas/imaging/con/discovery/2006/09/19hpdpIWSDiscoveryProvider-
Source: hpbuio32.dll, hpbuio64.dllString found in binary or memory: http://www.hp.com/schemas/imaging/con/pwg/sm/1.0
Source: upd-ps-x64-6.0.0.18849.exeString found in binary or memory: http://www.winzip.com
Source: upd-ps-x64-6.0.0.18849.exe, HPZid412.sys, HPZipr12.sys, HPZisc12.sys, HPZius12.sys, difxapi.dll, hppldcoi.dll, Install.dll, Install.exe, hpbcfgre.dll, hpbuio32.dll, hpbuio64.dll, hpbuiodm64.dllString found in binary or memory: https://d.symcb.com/cps0%
Source: upd-ps-x64-6.0.0.18849.exe, HPZid412.sys, HPZipr12.sys, HPZisc12.sys, HPZius12.sys, difxapi.dll, hppldcoi.dll, Install.dll, Install.exe, hpbcfgre.dll, hpbuio32.dll, hpbuio64.dll, hpbuiodm64.dllString found in binary or memory: https://d.symcb.com/rpa0
Source: upd-ps-x64-6.0.0.18849.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: HPZipr12.sysBinary string: Device name: %S\Device\
Source: HPZid412.sysBinary string: \Device\HP_DOT4Creating new dev. object for function
Source: HPZisc12.sysBinary string: \Device\
Source: classification engineClassification label: clean0.winEXE@1/0@0/0
Source: upd-ps-x64-6.0.0.18849.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeFile read: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeSection loaded: aclayers.dllJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeSection loaded: mpr.dllJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeSection loaded: sfc.dllJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeSection loaded: sfc_os.dllJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeSection loaded: explorerframe.dllJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeSection loaded: thumbcache.dllJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeSection loaded: dataexchange.dllJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeSection loaded: d3d11.dllJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeSection loaded: dcomp.dllJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeSection loaded: dxgi.dllJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeSection loaded: twinapi.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeSection loaded: samlib.dllJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeSection loaded: policymanager.dllJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeSection loaded: msvcp110_win.dllJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeSection loaded: networkexplorer.dllJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeSection loaded: windows.fileexplorer.common.dllJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{AE054212-3535-4430-83ED-D501AA6680E6}\InProcServer32Jump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeAutomated click: OK
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeAutomated click: OK
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeAutomated click: OK
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeAutomated click: OK
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeAutomated click: OK
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeAutomated click: OK
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeAutomated click: OK
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeAutomated click: OK
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeAutomated click: OK
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: upd-ps-x64-6.0.0.18849.exeStatic PE information: certificate valid
Source: upd-ps-x64-6.0.0.18849.exeStatic file information: File size 20257008 > 1048576
Source: upd-ps-x64-6.0.0.18849.exeStatic PE information: Raw size of _winzip_ is bigger than: 0x100000 < 0x1332000
Source: Binary string: d:\cdp_cio\dot4-convergence\src\mscodebase\longhorn\dot4\HPbin\fre\amd64\HPZid412.pdb! source: HPZid412.sys
Source: Binary string: DIFXAPI.pdb source: difxapi.dll
Source: Binary string: d:\cdp_cio\dot4-convergence\src\mscodebase\longhorn\dot4\HPbin\fre\amd64\HPZius12.pdb! source: HPZius12.sys
Source: Binary string: F:\jnks\workspace\UnifiedIOAPI-2.0.0\builds\Win32\Release\hpbuio32.pdb source: hpbuio32.dll
Source: Binary string: d:\cdp_cio\dot4-convergence\src\mscodebase\longhorn\dot4\HPbin\fre\amd64\HPZid412.pdb source: HPZid412.sys
Source: Binary string: DIFXAPI.pdbE3 source: difxapi.dll
Source: Binary string: d:\cdp_cio\dot4-convergence\src\mscodebase\longhorn\dot4\HPbin\fre\amd64\HPZisc12.pdb source: HPZisc12.sys
Source: Binary string: F:\jnks\workspace\UnifiedIOAPI-2.0.0\builds\x64\Release\hpbuiodm64.pdb source: hpbuiodm64.dll
Source: Binary string: F:\jnks\workspace\UnifiedIOAPI-2.0.0\builds\Win32\Release\hpbuio32.pdb0 source: hpbuio32.dll
Source: Binary string: F:\jnks\workspace\Evo_F15\F15\evo-driver\builds\dll\x64\Release\Install.pdb source: Install.dll, Install.exe
Source: Binary string: d:\cdp_cio\dot4-convergence\src\mscodebase\longhorn\dot4\HPbin\fre\amd64\HPZipr12.pdb! source: HPZipr12.sys
Source: Binary string: d:\cdp_cio\dot4-convergence\src\mscodebase\longhorn\dot4\HPbin\fre\amd64\HPZius12.pdb source: HPZius12.sys
Source: Binary string: F:\jnks\workspace\UnifiedIOAPI-2.0.0\builds\x64\Release\hpbuio64.pdb source: hpbuio64.dll
Source: Binary string: e:\svn_root\dot4_co-installer_dll_2_x_3_51\x64\release\hppldcoi.pdb source: hppldcoi.dll
Source: Binary string: d:\cdp_cio\dot4-convergence\src\mscodebase\longhorn\dot4\HPbin\fre\amd64\HPZipr12.pdb source: HPZipr12.sys
Source: Binary string: d:\cdp_cio\dot4-convergence\src\mscodebase\longhorn\dot4\HPbin\fre\amd64\HPZisc12.pdb! source: HPZisc12.sys
Source: upd-ps-x64-6.0.0.18849.exeStatic PE information: section name: _winzip_
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: upd-ps-x64-6.0.0.18849.exe, 00000000.00000003.2820829258.00000000018D7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}SM/K
Source: upd-ps-x64-6.0.0.18849.exe, 00000000.00000003.3101071774.0000000001903000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: upd-ps-x64-6.0.0.18849.exe, 00000000.00000002.3306673596.000000000185A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\D/
Source: upd-ps-x64-6.0.0.18849.exe, 00000000.00000002.3306673596.00000000018AC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&
Source: upd-ps-x64-6.0.0.18849.exe, 00000000.00000002.3306673596.000000000185A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
Source: upd-ps-x64-6.0.0.18849.exe, 00000000.00000003.2267440681.00000000018E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{55630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18(
Source: upd-ps-x64-6.0.0.18849.exe, 00000000.00000003.2294404499.00000000018E8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{55630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18f6
Source: upd-ps-x64-6.0.0.18849.exe, 00000000.00000002.3306673596.000000000185A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\
Source: upd-ps-x64-6.0.0.18849.exe, 00000000.00000003.2544737442.00000000018C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}&j
Source: upd-ps-x64-6.0.0.18849.exe, 00000000.00000003.2406275866.00000000018EF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 0uWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{55630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18f6
Source: upd-ps-x64-6.0.0.18849.exe, 00000000.00000002.3306673596.00000000018AC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}U
Source: upd-ps-x64-6.0.0.18849.exe, 00000000.00000002.3306673596.000000000185A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}f,
Source: upd-ps-x64-6.0.0.18849.exe, 00000000.00000003.2821803561.00000000018C3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 6e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&
Source: upd-ps-x64-6.0.0.18849.exe, 00000000.00000003.2294404499.0000000001903000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: upd-ps-x64-6.0.0.18849.exe, 00000000.00000002.3306673596.000000000185A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}I,
Source: upd-ps-x64-6.0.0.18849.exe, 00000000.00000003.2821803561.0000000001903000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _VMware_SATA_CD0
Source: upd-ps-x64-6.0.0.18849.exe, 00000000.00000002.3306673596.00000000018AC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b},
Source: upd-ps-x64-6.0.0.18849.exe, 00000000.00000002.3306673596.000000000185A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}a/d
Source: upd-ps-x64-6.0.0.18849.exe, 00000000.00000002.3306673596.00000000018D7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: _VMware_SATA_CD0gj
Source: upd-ps-x64-6.0.0.18849.exe, 00000000.00000002.3306673596.000000000185A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: upd-ps-x64-6.0.0.18849.exe, 00000000.00000003.2820829258.00000000018D7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:9
Source: upd-ps-x64-6.0.0.18849.exe, 00000000.00000003.2267677634.000000000190B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: upd-ps-x64-6.0.0.18849.exe, 00000000.00000003.2820829258.0000000001903000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \Device\CdRom0d_VMware_SATA_CD0
Source: upd-ps-x64-6.0.0.18849.exe, 00000000.00000003.2266593452.000000000190A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
Source: upd-ps-x64-6.0.0.18849.exe, 00000000.00000003.2683959105.00000000018C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}mr
Source: upd-ps-x64-6.0.0.18849.exe, 00000000.00000003.2683959105.00000000018C4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:
Source: upd-ps-x64-6.0.0.18849.exe, 00000000.00000003.3101125558.00000000018C3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 0000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&
Source: upd-ps-x64-6.0.0.18849.exe, 00000000.00000003.2683959105.0000000001903000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}x
Source: upd-ps-x64-6.0.0.18849.exe, 00000000.00000002.3306673596.00000000018AC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}6
Source: upd-ps-x64-6.0.0.18849.exe, 00000000.00000003.3101125558.00000000018C3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}4
Source: upd-ps-x64-6.0.0.18849.exe, 00000000.00000003.2572364818.0000000001903000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000000100000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000006500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000C5E500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\STORAGE#Volume#{a33c735c-61ca-11ee-8c18-806e6f6e6963}#0000000007500000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\\?\SCSI#CdRom&Ven_Msft&Prod_Virtual_DVD-ROM#2&1f4adffe&0&000001#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}ef
Source: upd-ps-x64-6.0.0.18849.exe, 00000000.00000002.3306673596.000000000185A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
File and Directory Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
upd-ps-x64-6.0.0.18849.exe0%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://schemas.xmlsoap.org/ws/2004/08/addressing0%URL Reputationsafe
http://crl.thawte.com/ThawteTimestampingCA.crl00%URL Reputationsafe
http://schemas.xmlsoap.org/soap/encoding/0%URL Reputationsafe
http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous0%URL Reputationsafe
http://ocsp.thawte.com00%URL Reputationsafe
http://schemas.xmlsoap.org/soap/envelope/0%URL Reputationsafe
http://schemas.xmlsoap.org/soap/actor/next0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://schemas.miInstall.dllfalse
    unknown
    http://www.hp.com/schemas/imaging/con/dictionaries/1.0hpbuio32.dll, hpbuio64.dllfalse
      unknown
      http://schemas.xmlsoap.org/ws/2004/08/addressinghpbuio32.dll, hpbuio64.dllfalse
      • URL Reputation: safe
      unknown
      http://crl.thawte.com/ThawteTimestampingCA.crl0upd-ps-x64-6.0.0.18849.exe, HPZid412.sys, HPZipr12.sys, HPZisc12.sys, HPZius12.sys, difxapi.dll, hppldcoi.dll, Install.dll, Install.exe, hpbcfgre.dll, hpbuio32.dll, hpbuio64.dll, hpbuiodm64.dllfalse
      • URL Reputation: safe
      unknown
      http://schemas.xmlsoap.org/soap/encoding/hpbuio32.dll, hpbuio64.dllfalse
      • URL Reputation: safe
      unknown
      http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymoushpbuio32.dll, hpbuio64.dll, hpbuiodm64.dllfalse
      • URL Reputation: safe
      unknown
      http://schemas.xmlsoap.org/ws/2005/04/discovery/Resolvehpbuio32.dll, hpbuio64.dllfalse
        unknown
        http://www.hp.com/schemas/imaging/con/discovery/2006/09/19hpdpIWSDiscoveryProvider-hpbuio32.dll, hpbuio64.dllfalse
          unknown
          http://www.hp.com/schemas/imaging/con/pwg/sm/1.0hpbuio32.dll, hpbuio64.dllfalse
            unknown
            http://ocsp.thawte.com0upd-ps-x64-6.0.0.18849.exe, HPZid412.sys, HPZipr12.sys, HPZisc12.sys, HPZius12.sys, difxapi.dll, hppldcoi.dll, Install.dll, Install.exe, hpbcfgre.dll, hpbuio32.dll, hpbuio64.dll, hpbuiodm64.dllfalse
            • URL Reputation: safe
            unknown
            http://printserver/userlist.aspInstall.exefalse
              unknown
              http://schemas.xmlsoap.org/soap/envelope/hpbuio32.dll, hpbuio64.dllfalse
              • URL Reputation: safe
              unknown
              http://www.hp.com/schemas/imaging/con/discovery/2006/09/19hpbuio32.dll, hpbuio64.dllfalse
                unknown
                http://www.winzip.comupd-ps-x64-6.0.0.18849.exefalse
                  unknown
                  http://schemas.xmlsoap.org/ws/2005/04/discovery/Probehpbuio32.dll, hpbuio64.dllfalse
                    unknown
                    http://schemas.xmlsoap.org/soap/envelope/http://schemas.xmlsoap.org/soap/encoding/hpbuio64.dllfalse
                      unknown
                      http://printserver/cgi-bin/getUserMPL.cgi?computerName=%%COMPUTERNAME%%&userName=%%USERNAME%%&userDoInstall.exefalse
                        unknown
                        http://schemas.xmlsoap.org/ws/2005/04/discoverywsdhttp://www.hp.com/schemas/imaging/con/discovery/20hpbuio32.dll, hpbuio64.dllfalse
                          unknown
                          http://schemas.xmlsoap.org/soap/actor/nexthpbuio32.dll, hpbuio64.dllfalse
                          • URL Reputation: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/04/discoveryhpbuio32.dll, hpbuio64.dllfalse
                            unknown
                            No contacted IP infos
                            Joe Sandbox version:41.0.0 Charoite
                            Analysis ID:1544053
                            Start date and time:2024-10-28 19:03:42 +01:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 5m 7s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:5
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:upd-ps-x64-6.0.0.18849.exe
                            Detection:CLEAN
                            Classification:clean0.winEXE@1/0@0/0
                            EGA Information:Failed
                            HCA Information:
                            • Successful, ratio: 100%
                            • Number of executed functions: 0
                            • Number of non-executed functions: 0
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                            • Excluded domains from analysis (whitelisted): ts-crl.ws.symantec.com, ocsp.thawte.com, crl.thawte.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ts-ocsp.ws.symantec.com, fe3cr.delivery.mp.microsoft.com
                            • Report size getting too big, too many NtOpenKeyEx calls found.
                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            • VT rate limit hit for: upd-ps-x64-6.0.0.18849.exe
                            No simulations
                            No context
                            No context
                            No context
                            No context
                            No context
                            No created / dropped files found
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Entropy (8bit):7.999005050376598
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.30%
                            • InstallShield setup (43055/19) 0.43%
                            • Winzip Win32 self-extracting archive (generic) (23002/1) 0.23%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            File name:upd-ps-x64-6.0.0.18849.exe
                            File size:20'257'008 bytes
                            MD5:b477a084884194e6c3cd2e09d8c69ea6
                            SHA1:95877637fdba4e91b22c8cf0e54346119bd84d5c
                            SHA256:2c8bc2ac1cfd4cfd19427bcb25c1e269195d0752aa29af836d4ef369ea18b329
                            SHA512:0e67421643f744d3bee26d4f2b487f768ee3d16172faed64cb70f068a260ecd088d00853ebe8aa3ae51b5e7b979db18c59395624a8d9cb28e334aadce272731a
                            SSDEEP:393216:M8NH+GKWXe/k0vtTPm0whcxytO19RxzUr6gkFOj6m3VYePVdmnANei2:dH+GKYOhmyLbc44V/PVQAwi2
                            TLSH:961733EEF875C6DED2360D3121A8A6B65DFA8A073C7F4022AFB5141B8D14AC3369C745
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......qw.W5...5...5.......&.......E...5...........8...............4.......4...5...7.......4...Rich5...........................PE..L..
                            Icon Hash:1b299da4ca723313
                            Entrypoint:0x40a79e
                            Entrypoint Section:.text
                            Digitally signed:true
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                            DLL Characteristics:
                            Time Stamp:0x4AEF3FA7 [Mon Nov 2 20:23:03 2009 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:f2f9102c7663962c22d17a8dabc5e7ce
                            Signature Valid:true
                            Signature Issuer:CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
                            Signature Validation Error:The operation completed successfully
                            Error Number:0
                            Not Before, Not After
                            • 24/06/2014 20:00:00 24/07/2016 19:59:59
                            Subject Chain
                            • CN=Hewlett-Packard Company, O=Hewlett-Packard Company, L=Palo Alto, S=California, C=US
                            Version:3
                            Thumbprint MD5:1D1A92DBF8F837F2F4E545FF9AF9C7E9
                            Thumbprint SHA-1:C0E8A43D6234B70F8B032E58CD674822AF32823E
                            Thumbprint SHA-256:20BC6B6DD4A56F3129BE34C394F82C87CA232AF230487F5A0B5AFE3E696B33D2
                            Serial:3FD0E01189629482B464D5D9FD033B30
                            Instruction
                            call 00007FC0E4BE2203h
                            jmp 00007FC0E4BDD5ABh
                            push ebp
                            mov ebp, esp
                            sub esp, 00000328h
                            mov dword ptr [00423C20h], eax
                            mov dword ptr [00423C1Ch], ecx
                            mov dword ptr [00423C18h], edx
                            mov dword ptr [00423C14h], ebx
                            mov dword ptr [00423C10h], esi
                            mov dword ptr [00423C0Ch], edi
                            mov word ptr [00423C38h], ss
                            mov word ptr [00423C2Ch], cs
                            mov word ptr [00423C08h], ds
                            mov word ptr [00423C04h], es
                            mov word ptr [00423C00h], fs
                            mov word ptr [00423BFCh], gs
                            pushfd
                            pop dword ptr [00423C30h]
                            mov eax, dword ptr [ebp+00h]
                            mov dword ptr [00423C24h], eax
                            mov eax, dword ptr [ebp+04h]
                            mov dword ptr [00423C28h], eax
                            lea eax, dword ptr [ebp+08h]
                            mov dword ptr [00423C34h], eax
                            mov eax, dword ptr [ebp-00000320h]
                            mov dword ptr [00423B70h], 00010001h
                            mov eax, dword ptr [00423C28h]
                            mov dword ptr [00423B24h], eax
                            mov dword ptr [00423B18h], C0000409h
                            mov dword ptr [00423B1Ch], 00000001h
                            mov eax, dword ptr [00417420h]
                            mov dword ptr [ebp-00000328h], eax
                            mov eax, dword ptr [00417424h]
                            mov dword ptr [ebp-00000324h], eax
                            call dword ptr [004131B4h]
                            Programming Language:
                            • [ASM] VS2005 build 50727
                            • [ C ] VS2005 build 50727
                            • [C++] VS2005 build 50727
                            • [EXP] VS2005 build 50727
                            • [RES] VS2005 build 50727
                            • [LNK] VS2005 build 50727
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x167100x32.rdata
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x158440x8c.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x260000x446c.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x13500000x18f0_winzip_
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x14e480x40.rdata
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x130000x2b8.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x11ff50x120008ad57c6baf27d65ae8dae769b564ae30False0.624267578125data6.620173902911684IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x130000x37420x40005936658766ce0c07e562dccd1db5a0e3False0.32928466796875OpenPGP Secret Key4.937916234393975IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0x170000xe7440x20003c6348430eff1c592de6c1918da96bebFalse0.173095703125data1.9776479734617283IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rsrc0x260000x446c0x50009b974418eb562887a6af519e969c1ae2False0.24970703125data4.6715218621798815IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            _winzip_0x2b0000x13320000x13320001435e25f81fda454b74cf5e9ac87556eunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            WZ_MANIFEST0x263480x5dfXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4311377245508982
                            RT_ICON0x269280x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 5905 x 5905 px/mEnglishUnited States0.3173076923076923
                            RT_DIALOG0x279d00x27edataEnglishUnited States0.5188087774294671
                            RT_DIALOG0x27c500x192dataEnglishUnited States0.5920398009950248
                            RT_STRING0x27de40x2fcMatlab v4 mat-file (little endian) h, numeric, rows 0, columns 0EnglishUnited States0.3717277486910995
                            RT_STRING0x280e00x16edataEnglishUnited States0.5683060109289617
                            RT_STRING0x282500x91adataEnglishUnited States0.3776824034334764
                            RT_STRING0x28b6c0x880dataEnglishUnited States0.35018382352941174
                            RT_STRING0x293ec0x4fedataEnglishUnited States0.3935837245696401
                            RT_STRING0x298ec0x518dataEnglishUnited States0.4125766871165644
                            RT_STRING0x29e040x6edataEnglishUnited States0.6727272727272727
                            RT_GROUP_ICON0x29e740x22dataEnglishUnited States0.6764705882352942
                            RT_MANIFEST0x29e980x5d4XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.43029490616621985
                            DLLImport
                            SHELL32.dllSHGetPathFromIDListA, SHGetSpecialFolderLocation, ShellExecuteA, FindExecutableA, SHBrowseForFolderA, SHGetMalloc
                            USER32.dllGetClientRect, SetRect, EndPaint, LoadCursorA, GetLastActivePopup, KillTimer, ShowWindow, PostMessageA, SendMessageA, EnableWindow, SetTimer, SetWindowTextA, SetForegroundWindow, SetActiveWindow, SetDlgItemTextA, GetKeyState, CharUpperBuffA, PeekMessageA, GetSysColor, DispatchMessageA, GetParent, SendDlgItemMessageA, GetDlgItem, InvalidateRect, UpdateWindow, LoadStringA, MessageBoxA, DialogBoxParamA, GetWindowLongA, SetWindowLongA, GetDlgItemTextA, EndDialog, GetWindowRect, GetSystemMetrics, SetWindowPos, SetCursor, CharNextA, BeginPaint, SetWindowWord, GetWindowWord, DefWindowProcA, RegisterClassA, TranslateMessage
                            KERNEL32.dllGetLocaleInfoA, GetStringTypeW, GetStringTypeA, GetSystemTimeAsFileTime, GetCurrentProcessId, GetTickCount, QueryPerformanceCounter, GetFileType, SetHandleCount, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetEnvironmentStrings, FreeEnvironmentStringsA, LCMapStringW, LCMapStringA, GetStdHandle, HeapCreate, HeapDestroy, VirtualAlloc, VirtualFree, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, HeapSize, Sleep, GetCurrentThreadId, SetLastError, TlsFree, TlsSetValue, GetVersionExA, FindClose, FindFirstFileA, GetCurrentDirectoryA, SetCurrentDirectoryA, CreateDirectoryA, SetFileTime, LocalFileTimeToFileTime, DosDateTimeToFileTime, LocalAlloc, GetDriveTypeA, GetEnvironmentVariableA, SetFilePointer, CreateFileA, GetWindowsDirectoryA, GlobalFree, GlobalUnlock, GlobalHandle, _lclose, _llseek, _lread, _lopen, GlobalLock, GlobalAlloc, GlobalMemoryStatus, GetVersion, GetModuleFileNameA, WriteFile, GetSystemTime, LocalFree, ExitProcess, FormatMessageA, GetLastError, GetModuleHandleA, GetVolumeInformationA, WideCharToMultiByte, CreateProcessA, lstrcmpiA, SetErrorMode, MultiByteToWideChar, GetLocalTime, lstrlenA, CreateFileW, ReadFile, GetConsoleCP, GetConsoleMode, LoadLibraryA, InitializeCriticalSection, SetStdHandle, WriteConsoleA, GetConsoleOutputCP, FlushFileBuffers, WriteConsoleW, CloseHandle, RtlUnwind, HeapAlloc, HeapFree, HeapReAlloc, RaiseException, TerminateProcess, GetCurrentProcess, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, GetCommandLineA, GetProcessHeap, GetStartupInfoA, GetCPInfo, InterlockedIncrement, InterlockedDecrement, GetACP, GetOEMCP, IsValidCodePage, GetProcAddress, TlsGetValue, TlsAlloc
                            GDI32.dllSetTextColor, SetTextAlign, GetBkColor, GetTextExtentPoint32A, ExtTextOutA, CreateDCA, GetDeviceCaps, CreateFontIndirectA, DeleteDC, SelectObject, DeleteObject, SetBkColor
                            ADVAPI32.dllRegQueryValueA
                            COMCTL32.dll
                            Language of compilation systemCountry where language is spokenMap
                            EnglishUnited States
                            No network behavior found

                            Click to jump to process

                            Click to jump to process

                            Target ID:0
                            Start time:14:04:32
                            Start date:28/10/2024
                            Path:C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\upd-ps-x64-6.0.0.18849.exe"
                            Imagebase:0x400000
                            File size:20'257'008 bytes
                            MD5 hash:B477A084884194E6C3CD2E09D8C69EA6
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Reputation:low
                            Has exited:false

                            No disassembly