Edit tour

Windows Analysis Report
upd.exe

Overview

General Information

Sample name:upd.exe
Analysis ID:1671091
MD5:4c1dbbb8b24ff1825d6a6ce3990c9220
SHA1:0e94d00678180306964485fb85464a35754881d2
SHA256:efea4b2f5df566c507e96f11a8a74b00724015cac86e5d08b85f6c31d2284413
Infos:

Detection

Score:2
Range:0 - 100
Confidence:60%

Signatures

Checks if the current process is being debugged
One or more processes crash
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Uses 32bit PE files

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64_ra
  • upd.exe (PID: 6296 cmdline: "C:\Users\user\Desktop\upd.exe" MD5: 4C1DBBB8B24FF1825D6A6CE3990C9220)
    • WerFault.exe (PID: 6388 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6296 -s 692 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: upd.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: upd.exeStatic PE information: certificate valid
Source: upd.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\upd.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6296 -s 692
Source: upd.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: upd.exeStatic PE information: Section: .rsrc ZLIB complexity 1.0000123251472444
Source: classification engineClassification label: clean2.winEXE@2/5@0/11
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6296
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\69440df6-471e-4fcd-b401-2898a872ebeb
Source: upd.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\upd.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: unknownProcess created: C:\Users\user\Desktop\upd.exe "C:\Users\user\Desktop\upd.exe"
Source: C:\Users\user\Desktop\upd.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6296 -s 692
Source: C:\Users\user\Desktop\upd.exeSection loaded: apphelp.dll
Source: C:\Users\user\Desktop\upd.exeSection loaded: winhttp.dll
Source: C:\Users\user\Desktop\upd.exeSection loaded: kernel.appcore.dll
Source: C:\Users\user\Desktop\upd.exeSection loaded: wbemcomn.dll
Source: C:\Users\user\Desktop\upd.exeSection loaded: amsi.dll
Source: C:\Users\user\Desktop\upd.exeSection loaded: userenv.dll
Source: C:\Users\user\Desktop\upd.exeSection loaded: profapi.dll
Source: C:\Users\user\Desktop\upd.exeSection loaded: version.dll
Source: C:\Users\user\Desktop\upd.exeSection loaded: cryptsp.dll
Source: C:\Users\user\Desktop\upd.exeSection loaded: rsaenh.dll
Source: C:\Users\user\Desktop\upd.exeSection loaded: cryptbase.dll
Source: C:\Users\user\Desktop\upd.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32
Source: upd.exeStatic PE information: certificate valid
Source: upd.exeStatic file information: File size 1804528 > 1048576
Source: upd.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x129200
Source: upd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: upd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: upd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: upd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: upd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: upd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: upd.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: upd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: upd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: upd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: upd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: upd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: upd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\upd.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOX
Source: C:\Users\user\Desktop\upd.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT UUID FROM Win32_ComputerSystemProduct
Source: C:\Users\user\Desktop\upd.exeProcess information queried: ProcessInformation
Source: C:\Users\user\Desktop\upd.exeProcess queried: DebugPort
Source: C:\Users\user\Desktop\upd.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Windows Management Instrumentation
1
DLL Side-Loading
1
Process Injection
2
Virtualization/Sandbox Evasion
OS Credential Dumping2
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Software Packing
LSASS Memory2
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS12
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
upd.exe8%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
20.189.173.21
unknownUnited States
8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
Joe Sandbox version:42.0.0 Malachite
Analysis ID:1671091
Start date and time:2025-04-22 16:13:26 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:defaultwindowsinteractivecookbook.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:14
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • EGA enabled
Analysis Mode:stream
Analysis stop reason:Timeout
Sample name:upd.exe
Detection:CLEAN
Classification:clean2.winEXE@2/5@0/11
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): WerFault.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 20.189.173.21, 20.190.151.69
  • Excluded domains from analysis (whitelisted): login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, c.pki.goog
  • Not all processes where analyzed, report is missing behavior information
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.8610418073139098
Encrypted:false
SSDEEP:
MD5:AE173F3927AA14EB7F387B2A72E9C2F1
SHA1:B36637F4693AFCB975A78506244C933ED5382634
SHA-256:EE5A9F0E6AAE60DAC1CCE2624751C48C03146FB74BFF58DA766498ECCA1FF328
SHA-512:4A5F875D1CBB8C03475CFEC24120D2B1B821C4BD859ADFF440B63AD8CA1EB6BC8F993C6D3812A511D4EA667924CA4FF44E5673D5AF193CF904ACAEC4220DE793
Malicious:false
Reputation:unknown
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.9.8.0.4.8.3.3.3.0.3.4.0.6.3.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.9.8.0.4.8.3.3.6.0.6.4.0.4.9.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.4.e.c.2.0.8.2.-.e.7.3.f.-.4.c.1.f.-.9.3.2.6.-.c.f.8.9.9.2.9.4.f.6.a.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.5.4.c.c.f.b.c.-.f.8.1.e.-.4.7.1.a.-.b.d.e.3.-.a.b.a.e.d.b.7.8.8.d.d.3.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.u.p.d...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.8.9.8.-.0.0.0.1.-.0.0.1.9.-.b.9.5.1.-.a.4.c.6.9.0.b.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.f.8.6.0.2.d.8.1.f.3.3.d.1.f.b.f.4.9.2.e.d.4.8.a.a.b.d.8.7.7.4.2.0.0.0.0.f.f.f.f.!.0.0.0.0.0.e.9.4.d.0.0.6.7.8.1.8.0.3.0.6.9.6.4.4.8.5.f.b.8.5.4.6.4.a.3.5.7.5.4.8.8.1.d.2.!.u.p.d...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.5././.0.4././.2.2.:.1.1.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:Mini DuMP crash report, 15 streams, Tue Apr 22 14:13:53 2025, 0x1205a4 type
Category:dropped
Size (bytes):76816
Entropy (8bit):1.9451357683182215
Encrypted:false
SSDEEP:
MD5:386EBB93423CAFBBBC404BD13DC3D7D0
SHA1:94B6DFADA3B17E196F12C5F09024F5F605D29138
SHA-256:F6AADD3521A391FDBB21168EDDEDEF332C381B48BF46E081E93C4A05103E0EB9
SHA-512:77CD5365A9E0753A6E14BA655E8A1712C5E7436FE7A9442946A848A09B69A69DDA6A9B947A086BF55CB8D6465EF738A9C161C6A30EF114E09130DEA0F827FD05
Malicious:false
Reputation:unknown
Preview:MDMP..a..... .......!..h............T...............h...................D...06..........`.......8...........T...........P...........................x...............................................................................eJ..............GenuineIntel............T........... ..h.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8324
Entropy (8bit):3.68965003551404
Encrypted:false
SSDEEP:
MD5:FD4EC0CD3B91E80E5D49D5D5179F3680
SHA1:B0A66A815751D710F1DE3C99644B0FCDA8726C88
SHA-256:76084F5E64A49DE9644929D071F4819EADBF49E0F87456CBDBD70D6971DAEBF0
SHA-512:AA61AD3AC50829F667607156C2E54499264E51CD741DEA10BBF2EAC24EFA11600E993BB2A229068F1010CBFCD904FCDC6162A5FE2C79056167A24FB27520CDB7
Malicious:false
Reputation:unknown
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.2.9.6.<./.P.i.
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4636
Entropy (8bit):4.416855884610374
Encrypted:false
SSDEEP:
MD5:1B4825AFDADE740F23177759505D3B17
SHA1:5B1D24D4FA5E86318B6DD997018B1CCCEEFAA110
SHA-256:5C8504F646AB268C8B74F1D24CD762FF9CB27308FD426D4A223B75A853D0E69C
SHA-512:92F5A761B92D460F76B324638A0FC5B2E4D3FA2997BD4483A24175F64607EDD4BC1AA74B0ED5B792438173E43BA6F59B2E796395CEEB457515F9E64A638047AE
Malicious:false
Reputation:unknown
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="816796" />.. <arg nm="osinsty" val="2" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\SysWOW64\WerFault.exe
File Type:MS Windows registry file, NT/2000 or above
Category:dropped
Size (bytes):1835008
Entropy (8bit):4.310139000348336
Encrypted:false
SSDEEP:
MD5:8D1D2F0720743DB240904E40F3BCD09A
SHA1:70C9485C94728A0500ECA4A4B7AD8274466D38C8
SHA-256:1B823A414B808EAD24694B5B7CA2FA43FF9171672910E3B35D5D0B9518712606
SHA-512:E0A83087C8EE67CA5DBF11C6720B71F4D24F90A4B3ADBB7AE7FD0F04EC6F43295C9DBCE217C3E8452418F32EB06583B287F8681618304596F7E543E9604D9D55
Malicious:false
Reputation:unknown
Preview:regfJ...J....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):7.747952522821978
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:upd.exe
File size:1'804'528 bytes
MD5:4c1dbbb8b24ff1825d6a6ce3990c9220
SHA1:0e94d00678180306964485fb85464a35754881d2
SHA256:efea4b2f5df566c507e96f11a8a74b00724015cac86e5d08b85f6c31d2284413
SHA512:bc0136f50b90c0568a619d32366b4d6a45b3c6732c28cd56244b81bce0c5964cf07e06d24ab4a12793ab063ac54a42b151282df817b579ff0c97f4e7812d448a
SSDEEP:24576:8svBVGojEq8q2oF2SJ6nNPrcgggHP416rUAVuINvffaFqyD+/fWuOsfPVv:LBVFv8q5hAhQqPbrUZI0jDweuOU
TLSH:1185E124B202523AF8B705778AFE455D572CBA61074A28DBA3CC1C6E4BA79F17F31127
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........Z...;...;...;...C...;...C..3;...C...;.......;.......;.......;...C...;...;..O;.......;....{..;.......;..Rich.;.................
Icon Hash:90cececece8e8eb0
Entrypoint:0x44f953
Entrypoint Section:.text
Digitally signed:true
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x680780DC [Tue Apr 22 11:43:24 2025 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:b94f60d7658a973ea422e67903afbc64
Signature Valid:true
Signature Issuer:CN=GlobalSign GCC R45 CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE
Signature Validation Error:The operation completed successfully
Error Number:0
Not Before, Not After
  • 30/09/2024 08:32:13 01/10/2025 08:32:13
Subject Chain
  • E=REEMA77IK@GMAIL.COM, CN=SHINE YOUR GUTS (SMC-PRIVATE) LIMITED, O=SHINE YOUR GUTS (SMC-PRIVATE) LIMITED, L=Lahore, S=Punjab, C=PK
Version:3
Thumbprint MD5:70FD5AAE46D68CDDB7A104B8E55DF8FA
Thumbprint SHA-1:F59F7E5AD23D964F614D0A7549F5D49EB166EFEE
Thumbprint SHA-256:30DC991205E0FB266C9AF8E2E5FBB2F3249C93D52703AF7281DCD0A78C710AC3
Serial:6F967286B3DB0B954F9A84E7
Instruction
call 00007F9BC85071FFh
jmp 00007F9BC85068AFh
retn 0000h
push ebp
mov ebp, esp
and dword ptr [0048AD74h], 00000000h
sub esp, 28h
or dword ptr [00489110h], 01h
push 0000000Ah
call dword ptr [00475164h]
test eax, eax
je 00007F9BC8506D3Bh
push ebx
push esi
push edi
xor eax, eax
lea edi, dword ptr [ebp-28h]
xor ecx, ecx
push ebx
cpuid
mov esi, ebx
pop ebx
nop
mov dword ptr [edi], eax
mov dword ptr [edi+04h], esi
mov dword ptr [edi+08h], ecx
xor ecx, ecx
mov dword ptr [edi+0Ch], edx
mov eax, dword ptr [ebp-28h]
mov edi, dword ptr [ebp-24h]
mov dword ptr [ebp-04h], eax
xor edi, 756E6547h
mov eax, dword ptr [ebp-1Ch]
xor eax, 49656E69h
mov dword ptr [ebp-18h], eax
mov eax, dword ptr [ebp-20h]
xor eax, 6C65746Eh
mov dword ptr [ebp-14h], eax
xor eax, eax
inc eax
push ebx
cpuid
mov esi, ebx
pop ebx
nop
lea ebx, dword ptr [ebp-28h]
mov dword ptr [ebx], eax
mov eax, dword ptr [ebp-18h]
or eax, dword ptr [ebp-14h]
or eax, edi
mov dword ptr [ebx+04h], esi
mov dword ptr [ebx+08h], ecx
mov dword ptr [ebx+0Ch], edx
jne 00007F9BC8506A6Bh
mov eax, dword ptr [ebp-28h]
and eax, 0FFF3FF0h
cmp eax, 000106C0h
je 00007F9BC8506A55h
cmp eax, 00020660h
je 00007F9BC8506A4Eh
cmp eax, 00020670h
je 00007F9BC8506A47h
cmp eax, 00030650h
je 00007F9BC8506A40h
cmp eax, 00030660h
je 00007F9BC8506A39h
cmp eax, 00030670h
jne 00007F9BC8506A39h
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x87d7c0xb4.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x8c0000x129070.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x1b5e000x2af0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x1b60000x3d64.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x801a00x54.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x800e00x40.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x750000x238.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x7354c0x73600fe7a622697c24e4516e8a39be4783e4eFalse0.4524288156825569data6.3138121733775305IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x750000x13aa20x13c00f39a0ff5b0500b2db95e797b2e6f5166False0.3899945609177215data4.975338379313229IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x890000x263c0x180038680f33f80e843af742fb2cf2f12945False0.19645182291666666DOS executable (block device driver)3.81312374516348IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x8c0000x1290700x1292001c2ccf4d31ce57e2fdb00ada00ba80cbFalse1.0000123251472444data7.999808480352302IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x1b60000x3d640x3e00078f9f64d0d873b2ec136c506dc3984eFalse0.6978956653225806data6.531519689983887IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_RCDATA0x8c0600x129010dataEnglishUnited States1.0003108978271484
DLLImport
bcrypt.dllBCryptSetProperty, BCryptDestroyKey, BCryptOpenAlgorithmProvider, BCryptGetProperty, BCryptDecrypt, BCryptCloseAlgorithmProvider, BCryptGenerateSymmetricKey
ADVAPI32.dllCryptCreateHash, CryptDestroyHash, CryptGetHashParam, RegOpenKeyExW, RegQueryValueExW, CryptAcquireContextW, CryptHashData, RegCloseKey, CryptReleaseContext
SHELL32.dllCommandLineToArgvW
KERNEL32.dllHeapSize, WriteConsoleW, SetEndOfFile, HeapReAlloc, HeapAlloc, SetStdHandle, GetProcessHeap, WaitForSingleObject, GetLastError, GetModuleFileNameW, WideCharToMultiByte, GetCommandLineW, TerminateProcess, GetTempPathW, OpenProcess, CreateToolhelp32Snapshot, Process32NextW, Process32FirstW, CloseHandle, SizeofResource, LockResource, LoadResource, FindResourceW, GetModuleHandleW, HeapFree, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineA, GetOEMCP, GetACP, IsValidCodePage, GetConsoleMode, GetConsoleOutputCP, FlushFileBuffers, CreateProcessW, DeleteFileW, ReadConsoleW, ReadFile, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetLocaleInfoW, LCMapStringW, LocalFree, FormatMessageA, GetLocaleInfoEx, CreateFileW, FindClose, FindFirstFileW, FindFirstFileExW, FindNextFileW, GetFileAttributesW, GetFileAttributesExW, SetFileInformationByHandle, AreFileApisANSI, GetProcAddress, GetFileInformationByHandleEx, MultiByteToWideChar, QueryPerformanceCounter, QueryPerformanceFrequency, GetFileType, Sleep, GetCurrentThreadId, GetStringTypeW, LCMapStringEx, InitializeCriticalSectionEx, GetSystemTimeAsFileTime, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, EncodePointer, DecodePointer, CompareStringEx, GetCPInfo, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetStartupInfoW, GetCurrentProcessId, InitializeSListHead, RtlUnwind, RaiseException, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, ExitProcess, GetModuleHandleExW, GetStdHandle, WriteFile, GetFileSizeEx, SetFilePointerEx
ole32.dllCoCreateInstance, CoInitializeSecurity, CoInitializeEx, CoSetProxyBlanket, CoUninitialize
OLEAUT32.dllVariantClear, SysAllocString, SysFreeString
CRYPT32.dllCryptBinaryToStringA
WINHTTP.dllWinHttpSetOption, WinHttpCloseHandle, WinHttpSendRequest, WinHttpConnect, WinHttpCrackUrl, WinHttpQueryDataAvailable, WinHttpReadData, WinHttpOpenRequest, WinHttpReceiveResponse, WinHttpOpen
Language of compilation systemCountry where language is spokenMap
EnglishUnited States