Edit tour

Windows Analysis Report
upd.exe

Overview

General Information

Sample name:upd.exe
Analysis ID:1671428
MD5:d5bfc5859be9782f3165c875038ccb54
SHA1:8b7d6648a58a8aa2ceb73cc2cb4b5b4b08400d63
SHA256:464839161c13a65252341bc9a2d6bb1b36eed1d42bcf24186e5f5284b6ef3423
Infos:

Detection

Score:1
Range:0 - 100
Confidence:40%

Signatures

AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
One or more processes crash
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Uses 32bit PE files

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • upd.exe (PID: 8188 cmdline: "C:\Users\user\Desktop\upd.exe" MD5: D5BFC5859BE9782F3165C875038CCB54)
    • WerFault.exe (PID: 7552 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 8188 -s 732 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: upd.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: upd.exeStatic PE information: certificate valid
Source: upd.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\user\actions-runner\_work\pdf-fast-software\pdf-fast-software\upd_source\upd\x86\Release\upd.pdbE source: upd.exe
Source: Binary string: C:\Users\user\actions-runner\_work\pdf-fast-software\pdf-fast-software\upd_source\upd\x86\Release\upd.pdb source: upd.exe
Source: upd.exeString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
Source: upd.exeString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0
Source: upd.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
Source: upd.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0
Source: upd.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#
Source: upd.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
Source: upd.exeString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
Source: upd.exeString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
Source: upd.exeString found in binary or memory: http://ocsp.sectigo.com0
Source: upd.exeString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
Source: upd.exeString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
Source: Amcache.hve.5.drString found in binary or memory: http://upx.sf.net
Source: upd.exeString found in binary or memory: https://sectigo.com/CPS0
Source: upd.exeString found in binary or memory: https://www.globalsign.com/repository/0
Source: C:\Users\user\Desktop\upd.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 8188 -s 732
Source: upd.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: upd.exeStatic PE information: Section: .rsrc ZLIB complexity 1.0000065734118637
Source: classification engineClassification label: clean1.winEXE@2/5@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess8188
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\d15e111a-f25f-4595-86ea-23bac10de284Jump to behavior
Source: upd.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\upd.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: upd.exeString found in binary or memory: /additional_script_
Source: upd.exeString found in binary or memory: Invalid string formatInvalid escape sequenceVersionURLVersionupdaterInfo.txtmsiexec.exe_starting/additional_script_cd_failled/additional_script__succeeded/additional_script_" -noguiupdaterInfo.txt\updater.exe /silentall -nofreqcheck -url "file://AdditionaaplAttributesd=dc=c\"\\/\infnan(ind)nannan(snan)infnan(ind)nannan(snan)infnan(ind)nannan(snan)infnan(ind)nannan(snan)infnan(ind)nannan(snan)infnan(ind)nannan(snan)/~1~~0nfinityanindsnannfinityanindsnan0p+00p+00e+000e+00SOFTWARE\Microsoft\CryptographyMachineGuid%02xInternal error loading IANA database informationInternal error loading IANA database informationSoftware.exeUpdater.exeSoftware Application Updater-Controllerpdf-ize/"powershell -ExecutionPolicy Bypass -Command ""powershell -encodedCommand "'"
Source: unknownProcess created: C:\Users\user\Desktop\upd.exe "C:\Users\user\Desktop\upd.exe"
Source: C:\Users\user\Desktop\upd.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 8188 -s 732
Source: C:\Users\user\Desktop\upd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\upd.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\upd.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\upd.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\upd.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\upd.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\upd.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\upd.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\upd.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\upd.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\upd.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\upd.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
Source: upd.exeStatic PE information: certificate valid
Source: upd.exeStatic file information: File size 1804576 > 1048576
Source: upd.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x129200
Source: upd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: upd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: upd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: upd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: upd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: upd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: upd.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: upd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\user\actions-runner\_work\pdf-fast-software\pdf-fast-software\upd_source\upd\x86\Release\upd.pdbE source: upd.exe
Source: Binary string: C:\Users\user\actions-runner\_work\pdf-fast-software\pdf-fast-software\upd_source\upd\x86\Release\upd.pdb source: upd.exe
Source: upd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: upd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: upd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: upd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: upd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\upd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\upd.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT UUID FROM Win32_ComputerSystemProduct
Source: Amcache.hve.5.drBinary or memory string: VMware
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.5.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.5.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.5.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.5.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.5.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.5.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.5.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.5.drBinary or memory string: vmci.sys
Source: Amcache.hve.5.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.5.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.5.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.5.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.5.drBinary or memory string: VMware20,1
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.5.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.5.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.5.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.5.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.5.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.5.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.5.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.5.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\upd.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\upd.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\upd.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: Amcache.hve.5.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.5.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Windows Management Instrumentation
1
DLL Side-Loading
1
Process Injection
2
Virtualization/Sandbox Evasion
OS Credential Dumping31
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts2
Command and Scripting Interpreter
Boot or Logon Initialization Scripts1
DLL Side-Loading
1
Software Packing
LSASS Memory2
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS12
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1671428 Sample: upd.exe Startdate: 22/04/2025 Architecture: WINDOWS Score: 1 5 upd.exe 2->5         started        process3 7 WerFault.exe 21 16 5->7         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
upd.exe6%VirustotalBrowse
upd.exe8%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0upd.exefalse
    high
    http://upx.sf.netAmcache.hve.5.drfalse
      high
      https://sectigo.com/CPS0upd.exefalse
        high
        http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#upd.exefalse
          high
          http://ocsp.sectigo.com0upd.exefalse
            high
            http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0zupd.exefalse
              high
              http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#upd.exefalse
                high
                No contacted IP infos
                Joe Sandbox version:42.0.0 Malachite
                Analysis ID:1671428
                Start date and time:2025-04-22 21:02:39 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 4m 20s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:14
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:upd.exe
                Detection:CLEAN
                Classification:clean1.winEXE@2/5@0/0
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, sppsvc.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                • Excluded IPs from analysis (whitelisted): 20.42.65.92, 184.29.183.29, 20.190.151.67, 20.109.210.53
                • Excluded domains from analysis (whitelisted): fs.microsoft.com, onedsblobprdeus17.eastus.cloudapp.azure.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                • Not all processes where analyzed, report is missing behavior information
                TimeTypeDescription
                15:03:53API Interceptor1x Sleep call for process: WerFault.exe modified
                No context
                No context
                No context
                No context
                No context
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):65536
                Entropy (8bit):0.8614131945790284
                Encrypted:false
                SSDEEP:192:FbJpEPDlj9e0UyNQjLyzuiFkZ24IO8a6:XWPDlj9FUyNQjezuiFkY4IO8a
                MD5:913845A0B9A771F4865B1EF9B329478E
                SHA1:2D5BEFDDFA0BBC0B19224B1360441B4B0BA4D2DB
                SHA-256:49BC2021F28787208CFC1F29E9EE47D5D9F3FFA19713BEBBE4ABD144A6E19AC5
                SHA-512:63C9A64368324E91564AA85C35FCE80D365F6EA229EDD42E55DEA58F358368B3C4E769BED8085C414D290433C22FD00C8A2EFE6AD67E17024BA9D4DA90704C23
                Malicious:false
                Reputation:low
                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.8.9.8.2.2.2.2.9.2.4.8.7.4.2.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.8.9.8.2.2.2.3.0.0.4.5.6.1.6.7.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.9.8.5.c.3.f.2.5.-.2.a.0.e.-.4.f.a.a.-.a.b.d.6.-.5.8.c.e.a.8.b.1.6.f.b.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.0.0.4.5.8.c.e.-.5.c.6.f.-.4.b.a.d.-.8.7.2.1.-.d.1.4.4.2.5.4.2.4.8.4.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.u.p.d...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.f.f.c.-.0.0.0.1.-.0.0.1.8.-.e.d.1.8.-.a.0.4.6.b.9.b.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.f.8.6.0.2.d.8.1.f.3.3.d.1.f.b.f.4.9.2.e.d.4.8.a.a.b.d.8.7.7.4.2.0.0.0.0.f.f.f.f.!.0.0.0.0.8.b.7.d.6.6.4.8.a.5.8.a.8.a.a.2.c.e.b.7.3.c.c.2.c.b.4.b.5.b.4.b.0.8.4.0.0.d.6.3.!.u.p.d...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.5././.0.4././.0.8.:.1.5.
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:Mini DuMP crash report, 15 streams, Tue Apr 22 19:03:49 2025, 0x1205a4 type
                Category:dropped
                Size (bytes):69784
                Entropy (8bit):2.0714970996929414
                Encrypted:false
                SSDEEP:384:mJOJP9iORV7rAWNX/GoL4vAwP2UayS5VhdGpyVsZ:90ORV7rAWV/GoL4vhTaLGgsZ
                MD5:48A53DAB1FCF8F6F5E1A9EA0C62C5B70
                SHA1:F589006C7AA0D9452619D2DF3758D4182AA4C523
                SHA-256:29A4094E74D298C625B06ABB28E58315CAFF71D5859781DF788322CEC8D3FB6A
                SHA-512:098E8FD8326CDC15735EC0D11508B324195D35B3F871CE53C248042D698A2476C55C344EC4983F0C7BE5F8DED520A738C7C8E3B461A3F2E1CC9CC9DFC8FF9224
                Malicious:false
                Reputation:low
                Preview:MDMP..a..... ..........h............$...............8.......................43..........`.......8...........T...........P...H...........\...........H...............................................................................eJ..............GenuineIntel............T..............h.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):8330
                Entropy (8bit):3.6863956708839027
                Encrypted:false
                SSDEEP:192:R6l7wVeJRO6bwBe6Y63SUikjgmfI/pDk89bF7sfwoXm:R6lXJ46b36YKSUTjgmfI7FAfW
                MD5:D078BE266F37E341961BE688D41D2878
                SHA1:360611F1AF1653088038F8DADB9108693E577FDB
                SHA-256:BD8BC9C95C67B0EFF9B0644B0F4B8AD863B32BF1633B7DD1325A38AF414F4D84
                SHA-512:73470933FB46751F430FCA96EEEEE5D22819DBF9AB0A7B9500964561156006BE1BEC0DDAAA3EF533CDF94B659FD766C4734AEB1F8BC5832440A3E4368C2C8908
                Malicious:false
                Reputation:low
                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.8.1.8.8.<./.P.i.
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):4636
                Entropy (8bit):4.416721820398951
                Encrypted:false
                SSDEEP:48:cvIwWl8zsxuJg77aI9cXWpW8VY7vYm8M4JqRGwEFq+q8vKRGwWnkgd+82d:uIjfxkI7Gm7VfJqYaKKYrlY82d
                MD5:FAD7B99248E5E7D4AA4566FD7978E3C6
                SHA1:38CDDC4B0A5C32ABFC7E843C3B9466686E3D23A4
                SHA-256:57D45B65734D4C60A43F437EABFAE755F6AD2143A0D7035BF46B9CDBAF7C56DE
                SHA-512:9CC18BCB4E5A46B08EC482C598B2837F239C34984B7ECBF3FAF98AB2791E9F15CE0BF6146756667C639525048CC0876437ED8ECA06EEFC3831D6A867FEB46F55
                Malicious:false
                Reputation:low
                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="817086" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:MS Windows registry file, NT/2000 or above
                Category:dropped
                Size (bytes):1835008
                Entropy (8bit):4.468501845146344
                Encrypted:false
                SSDEEP:6144:xIXfpi67eLPU9skLmb0b4QWSPKaJG8nAgejZMMhA2gX4WABlVuNpdwBCswSbc:SXD94QWlLZMM6YFU/+c
                MD5:4EA8A9F22DFB1AABC2CE627970EAA3F4
                SHA1:281E76F43AEB15D643930F1BB62B374C37B39265
                SHA-256:94B3068CE14630A4A389951E73A665849EFE8F11B8D2D3BBC8E839A29952BCCC
                SHA-512:82F9E75C3A191717AADC0B66E9B9E6D6ED00A517D8FFE4AD4F08B838A0FB2EC74E4496C30E19978DCF2D03912DB29A3CFD54B7FE80CA02305C3B2B8C69EF72ED
                Malicious:false
                Reputation:low
                Preview:regf:...:....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm..G...................................................................................................................................................................................................................................................................................................................................................s........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                Entropy (8bit):7.748761661757988
                TrID:
                • Win32 Executable (generic) a (10002005/4) 99.96%
                • Generic Win/DOS Executable (2004/3) 0.02%
                • DOS Executable Generic (2002/1) 0.02%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:upd.exe
                File size:1'804'576 bytes
                MD5:d5bfc5859be9782f3165c875038ccb54
                SHA1:8b7d6648a58a8aa2ceb73cc2cb4b5b4b08400d63
                SHA256:464839161c13a65252341bc9a2d6bb1b36eed1d42bcf24186e5f5284b6ef3423
                SHA512:ce370bfd94c9f8e66574291957f59f07b70227f220978fd76fa1dafb1e8c41d5a647b83d896cb828e78175af9e16eeeb58e62bfbedf386ff77be0053cf8eb440
                SSDEEP:49152:aidXy6U8Pq4VDg87WIqbsy4tobwBIUFIpVK06Ewy4Sor++:aidXy6U8nV8Z4tVOpVz6EwWoz
                TLSH:7985F115B102623AF8F304768AFE469D972CB922071A14DBA3CC1C5E5BA79F27F31527
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......G[...:...:...:..HB...:..HB...:..HB...:.......:.......:......Z:..HB...:...:...:..K....:..K.{..:..K....:..Rich.:.................
                Icon Hash:90cececece8e8eb0
                Entrypoint:0x44f9a3
                Entrypoint Section:.text
                Digitally signed:true
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                Time Stamp:0x67F53F3A [Tue Apr 8 15:22:34 2025 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:6
                OS Version Minor:0
                File Version Major:6
                File Version Minor:0
                Subsystem Version Major:6
                Subsystem Version Minor:0
                Import Hash:b94f60d7658a973ea422e67903afbc64
                Signature Valid:true
                Signature Issuer:CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE
                Signature Validation Error:The operation completed successfully
                Error Number:0
                Not Before, Not After
                • 09/04/2024 22:55:19 10/04/2025 22:55:19
                Subject Chain
                • E=fm760984@gmail.com, CN=AL STARE LLC, O=AL STARE LLC, L=AUSTIN, S=TEXAS, C=US, OID.1.3.6.1.4.1.311.60.2.1.2=Texas, OID.1.3.6.1.4.1.311.60.2.1.3=US, SERIALNUMBER=0805239913, OID.2.5.4.15=Private Organization
                Version:3
                Thumbprint MD5:F711884FEF512428C39B8FEC31DDB11E
                Thumbprint SHA-1:2DEFD4D6CBB10B7AFD9B5A3DBD61E756549EE3CB
                Thumbprint SHA-256:74792AECA362661E69F0B5032DA41E8106472223ECF2965A9A7DA753A75B740F
                Serial:7D3626E63E3516AB22116D1E
                Instruction
                call 00007F2258BF5E6Fh
                jmp 00007F2258BF551Fh
                retn 0000h
                push ebp
                mov ebp, esp
                and dword ptr [0048AD74h], 00000000h
                sub esp, 28h
                or dword ptr [00489110h], 01h
                push 0000000Ah
                call dword ptr [00475164h]
                test eax, eax
                je 00007F2258BF59ABh
                push ebx
                push esi
                push edi
                xor eax, eax
                lea edi, dword ptr [ebp-28h]
                xor ecx, ecx
                push ebx
                cpuid
                mov esi, ebx
                pop ebx
                nop
                mov dword ptr [edi], eax
                mov dword ptr [edi+04h], esi
                mov dword ptr [edi+08h], ecx
                xor ecx, ecx
                mov dword ptr [edi+0Ch], edx
                mov eax, dword ptr [ebp-28h]
                mov edi, dword ptr [ebp-24h]
                mov dword ptr [ebp-04h], eax
                xor edi, 756E6547h
                mov eax, dword ptr [ebp-1Ch]
                xor eax, 49656E69h
                mov dword ptr [ebp-18h], eax
                mov eax, dword ptr [ebp-20h]
                xor eax, 6C65746Eh
                mov dword ptr [ebp-14h], eax
                xor eax, eax
                inc eax
                push ebx
                cpuid
                mov esi, ebx
                pop ebx
                nop
                lea ebx, dword ptr [ebp-28h]
                mov dword ptr [ebx], eax
                mov eax, dword ptr [ebp-18h]
                or eax, dword ptr [ebp-14h]
                or eax, edi
                mov dword ptr [ebx+04h], esi
                mov dword ptr [ebx+08h], ecx
                mov dword ptr [ebx+0Ch], edx
                jne 00007F2258BF56DBh
                mov eax, dword ptr [ebp-28h]
                and eax, 0FFF3FF0h
                cmp eax, 000106C0h
                je 00007F2258BF56C5h
                cmp eax, 00020660h
                je 00007F2258BF56BEh
                cmp eax, 00020670h
                je 00007F2258BF56B7h
                cmp eax, 00030650h
                je 00007F2258BF56B0h
                cmp eax, 00030660h
                je 00007F2258BF56A9h
                cmp eax, 00030670h
                jne 00007F2258BF56A9h
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x87d7c0xb4.rdata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x8c0000x129070.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x1b5e000x2b20
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x1b60000x3d50.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x801a00x54.rdata
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x800e00x40.rdata
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x750000x238.rdata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x7359c0x73600c17b7a8e3dbb16925f62ebe14b803ef6False0.4528541440953413data6.313936449418768IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rdata0x750000x13aa20x13c005b52cca8fbfc40ddcacd7fb8c3f6f595False0.3897720530063291data4.97594122787701IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .data0x890000x263c0x18007bb7714113e9c5804b8a5a591040716dFalse0.19612630208333334DOS executable (block device driver)3.8116000567105464IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .rsrc0x8c0000x1290700x129200af86d347eda954ea112cb8720ac3e2f7False1.0000065734118637data7.999845983540252IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0x1b60000x3d500x3e00d7bef026b7faf0685482092bc129df72False0.6931703629032258data6.522341350789889IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountryZLIB Complexity
                RT_RCDATA0x8c0600x129010dataEnglishUnited States1.0003108978271484
                DLLImport
                bcrypt.dllBCryptSetProperty, BCryptDestroyKey, BCryptOpenAlgorithmProvider, BCryptGetProperty, BCryptDecrypt, BCryptCloseAlgorithmProvider, BCryptGenerateSymmetricKey
                ADVAPI32.dllCryptCreateHash, CryptDestroyHash, CryptGetHashParam, RegOpenKeyExW, RegQueryValueExW, CryptAcquireContextW, CryptHashData, RegCloseKey, CryptReleaseContext
                SHELL32.dllCommandLineToArgvW
                KERNEL32.dllHeapSize, WriteConsoleW, SetEndOfFile, HeapReAlloc, HeapAlloc, SetStdHandle, GetProcessHeap, WaitForSingleObject, GetLastError, GetModuleFileNameW, WideCharToMultiByte, GetCommandLineW, TerminateProcess, GetTempPathW, OpenProcess, CreateToolhelp32Snapshot, Process32NextW, Process32FirstW, CloseHandle, SizeofResource, LockResource, LoadResource, FindResourceW, GetModuleHandleW, HeapFree, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineA, GetOEMCP, GetACP, IsValidCodePage, GetConsoleMode, GetConsoleOutputCP, FlushFileBuffers, CreateProcessW, DeleteFileW, ReadConsoleW, ReadFile, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetLocaleInfoW, LCMapStringW, LocalFree, FormatMessageA, GetLocaleInfoEx, CreateFileW, FindClose, FindFirstFileW, FindFirstFileExW, FindNextFileW, GetFileAttributesW, GetFileAttributesExW, SetFileInformationByHandle, AreFileApisANSI, GetProcAddress, GetFileInformationByHandleEx, MultiByteToWideChar, QueryPerformanceCounter, QueryPerformanceFrequency, GetFileType, Sleep, GetCurrentThreadId, GetStringTypeW, LCMapStringEx, InitializeCriticalSectionEx, GetSystemTimeAsFileTime, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, EncodePointer, DecodePointer, CompareStringEx, GetCPInfo, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetStartupInfoW, GetCurrentProcessId, InitializeSListHead, RtlUnwind, RaiseException, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, ExitProcess, GetModuleHandleExW, GetStdHandle, WriteFile, GetFileSizeEx, SetFilePointerEx
                ole32.dllCoCreateInstance, CoInitializeSecurity, CoInitializeEx, CoSetProxyBlanket, CoUninitialize
                OLEAUT32.dllVariantClear, SysAllocString, SysFreeString
                CRYPT32.dllCryptBinaryToStringA
                WINHTTP.dllWinHttpSetOption, WinHttpCloseHandle, WinHttpSendRequest, WinHttpConnect, WinHttpCrackUrl, WinHttpQueryDataAvailable, WinHttpReadData, WinHttpOpenRequest, WinHttpReceiveResponse, WinHttpOpen
                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States
                No network behavior found
                050100s020406080100

                Click to jump to process

                050100s0.0051015MB

                Click to jump to process

                • File
                • Registry

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:1
                Start time:15:03:47
                Start date:22/04/2025
                Path:C:\Users\user\Desktop\upd.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\upd.exe"
                Imagebase:0xb30000
                File size:1'804'576 bytes
                MD5 hash:D5BFC5859BE9782F3165C875038CCB54
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low
                Has exited:true

                Target ID:5
                Start time:15:03:49
                Start date:22/04/2025
                Path:C:\Windows\SysWOW64\WerFault.exe
                Wow64 process (32bit):true
                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 8188 -s 732
                Imagebase:0x870000
                File size:483'680 bytes
                MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true
                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                No disassembly