Edit tour

Windows Analysis Report
upd.exe

Overview

General Information

Sample name:upd.exe
Analysis ID:1676499
MD5:d5bfc5859be9782f3165c875038ccb54
SHA1:8b7d6648a58a8aa2ceb73cc2cb4b5b4b08400d63
SHA256:464839161c13a65252341bc9a2d6bb1b36eed1d42bcf24186e5f5284b6ef3423
Infos:

Detection

Score:1
Range:0 - 100
Confidence:40%

Signatures

AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
One or more processes crash
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Uses 32bit PE files

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • upd.exe (PID: 6496 cmdline: "C:\Users\user\Desktop\upd.exe" MD5: D5BFC5859BE9782F3165C875038CCB54)
    • WerFault.exe (PID: 6968 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 6496 -s 688 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: upd.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: upd.exeStatic PE information: certificate valid
Source: upd.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\user\actions-runner\_work\pdf-fast-software\pdf-fast-software\upd_source\upd\x86\Release\upd.pdbE source: upd.exe
Source: Binary string: C:\Users\user\actions-runner\_work\pdf-fast-software\pdf-fast-software\upd_source\upd\x86\Release\upd.pdb source: upd.exe
Source: upd.exeString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
Source: upd.exeString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0
Source: upd.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0z
Source: upd.exeString found in binary or memory: http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0
Source: upd.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#
Source: upd.exeString found in binary or memory: http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#
Source: upd.exeString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
Source: upd.exeString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
Source: upd.exeString found in binary or memory: http://ocsp.sectigo.com0
Source: upd.exeString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
Source: upd.exeString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
Source: upd.exeString found in binary or memory: https://sectigo.com/CPS0
Source: upd.exeString found in binary or memory: https://www.globalsign.com/repository/0
Source: C:\Users\user\Desktop\upd.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6496 -s 688
Source: upd.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: upd.exeStatic PE information: Section: .rsrc ZLIB complexity 1.0000065734118637
Source: classification engineClassification label: clean1.winEXE@2/5@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6496
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\2b0943cd-f450-459e-b601-696731c235e6Jump to behavior
Source: upd.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\upd.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: upd.exeString found in binary or memory: /additional_script_
Source: upd.exeString found in binary or memory: Invalid string formatInvalid escape sequenceVersionURLVersionupdaterInfo.txtmsiexec.exe_starting/additional_script_cd_failled/additional_script__succeeded/additional_script_" -noguiupdaterInfo.txt\updater.exe /silentall -nofreqcheck -url "file://AdditionaaplAttributesd=dc=c\"\\/\infnan(ind)nannan(snan)infnan(ind)nannan(snan)infnan(ind)nannan(snan)infnan(ind)nannan(snan)infnan(ind)nannan(snan)infnan(ind)nannan(snan)/~1~~0nfinityanindsnannfinityanindsnan0p+00p+00e+000e+00SOFTWARE\Microsoft\CryptographyMachineGuid%02xInternal error loading IANA database informationInternal error loading IANA database informationSoftware.exeUpdater.exeSoftware Application Updater-Controllerpdf-ize/"powershell -ExecutionPolicy Bypass -Command ""powershell -encodedCommand "'"
Source: unknownProcess created: C:\Users\user\Desktop\upd.exe "C:\Users\user\Desktop\upd.exe"
Source: C:\Users\user\Desktop\upd.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6496 -s 688
Source: C:\Users\user\Desktop\upd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\upd.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\upd.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\upd.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\upd.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\upd.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\upd.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\upd.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\upd.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\upd.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\upd.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\upd.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
Source: upd.exeStatic PE information: certificate valid
Source: upd.exeStatic file information: File size 1804576 > 1048576
Source: upd.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x129200
Source: upd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: upd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: upd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: upd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: upd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: upd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: upd.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: upd.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\user\actions-runner\_work\pdf-fast-software\pdf-fast-software\upd_source\upd\x86\Release\upd.pdbE source: upd.exe
Source: Binary string: C:\Users\user\actions-runner\_work\pdf-fast-software\pdf-fast-software\upd_source\upd\x86\Release\upd.pdb source: upd.exe
Source: upd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: upd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: upd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: upd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: upd.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\upd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\upd.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT UUID FROM Win32_ComputerSystemProduct
Source: Amcache.hve.4.drBinary or memory string: VMware
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: vmci.sys
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: VMware20,1
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\upd.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\upd.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\upd.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Windows Management Instrumentation
1
DLL Side-Loading
1
Process Injection
2
Virtualization/Sandbox Evasion
OS Credential Dumping31
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault Accounts2
Command and Scripting Interpreter
Boot or Logon Initialization Scripts1
DLL Side-Loading
1
Software Packing
LSASS Memory2
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS12
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1676499 Sample: upd.exe Startdate: 28/04/2025 Architecture: WINDOWS Score: 1 5 upd.exe 2->5         started        process3 7 WerFault.exe 22 16 5->7         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
upd.exe8%ReversingLabs
upd.exe6%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://crl.sectigo.com/SectigoPublicTimeStampingRootR46.crl0upd.exefalse
    high
    http://upx.sf.netAmcache.hve.4.drfalse
      high
      https://sectigo.com/CPS0upd.exefalse
        high
        http://crt.sectigo.com/SectigoPublicTimeStampingCAR36.crt0#upd.exefalse
          high
          http://ocsp.sectigo.com0upd.exefalse
            high
            http://crl.sectigo.com/SectigoPublicTimeStampingCAR36.crl0zupd.exefalse
              high
              http://crt.sectigo.com/SectigoPublicTimeStampingRootR46.p7c0#upd.exefalse
                high
                No contacted IP infos
                Joe Sandbox version:42.0.0 Malachite
                Analysis ID:1676499
                Start date and time:2025-04-28 18:50:51 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 5m 10s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Run name:Run with higher sleep bypass
                Number of analysed new started processes analysed:15
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:upd.exe
                Detection:CLEAN
                Classification:clean1.winEXE@2/5@0/0
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                • Excluded IPs from analysis (whitelisted): 20.189.173.20, 184.29.183.29, 20.190.151.133
                • Excluded domains from analysis (whitelisted): fs.microsoft.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, c.pki.goog, fe3cr.delivery.mp.microsoft.com
                • Not all processes where analyzed, report is missing behavior information
                No simulations
                No context
                No context
                No context
                No context
                No context
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):65536
                Entropy (8bit):0.8630868138440307
                Encrypted:false
                SSDEEP:96:9QFFQ7PDl9hss0hZ+7MnSKQXIDcQac62cEHcw3XX+HbHg/KownOg1NlXqOE8Ov0I:u3Q7PDljse0UyNQjLxzuiFRZ24IO8m6
                MD5:0CFC4D1154E95F26EC54874F15E56858
                SHA1:0B39B3EF69ED82D87843783126BE6F0E27AD8C83
                SHA-256:43478A717FF0945AA2A933EA907A90C19EC70A7C00976FF95C226F76E5277536
                SHA-512:76D308D5FAE6C945C12B470BB15341CE36323D2F8AC1980D891E66152701EFDD5233BFBFB757D433D1E21908E4C18372928EED6FEC2B506717A8864F7FDBBF42
                Malicious:false
                Reputation:low
                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.....E.v.e.n.t.T.i.m.e.=.1.3.3.9.0.3.3.2.7.1.0.3.6.8.7.7.7.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.9.0.3.3.2.7.1.1.0.5.6.2.8.2.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.b.c.b.b.5.a.e.-.f.6.f.0.-.4.3.0.f.-.b.e.4.6.-.d.a.e.e.5.0.7.4.e.0.f.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.e.6.3.e.5.4.2.-.f.9.e.8.-.4.e.1.7.-.b.d.f.c.-.6.c.0.7.f.9.6.3.2.8.7.8.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.u.p.d...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.9.6.0.-.0.0.0.1.-.0.0.1.9.-.6.f.b.3.-.b.7.d.5.5.d.b.8.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.f.8.6.0.2.d.8.1.f.3.3.d.1.f.b.f.4.9.2.e.d.4.8.a.a.b.d.8.7.7.4.2.0.0.0.0.f.f.f.f.!.0.0.0.0.8.b.7.d.6.6.4.8.a.5.8.a.8.a.a.2.c.e.b.7.3.c.c.2.c.b.4.b.5.b.4.b.0.8.4.0.0.d.6.3.!.u.p.d...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.5././.0.4././.0.8.:.1.5.
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:Mini DuMP crash report, 15 streams, Mon Apr 28 16:51:50 2025, 0x1205a4 type
                Category:dropped
                Size (bytes):70124
                Entropy (8bit):2.0173267824628653
                Encrypted:false
                SSDEEP:384:p4N/OOrV7IcJTmM5GsDOhyAs/znfoI2hiHg5:eNGOrV7IcBJJznoiHk
                MD5:130ECD6CE499E3E08B3AE624D1CF5256
                SHA1:B3AFA4103F74BA177EF7F1EA3874F34D1B04BE93
                SHA-256:B4C9B9FDA628171E44143EAC6DBCE383E34587FB7EDCA8C95FCE6FE0360D2119
                SHA-512:858F5CF38934AFB4C7A9F8603BC1652105974C622BB787824FD60E399089DAEBC15D60B66481DCAE2F6089B08013BC119BEBA12172829D1BBE1DD1250587B777
                Malicious:false
                Reputation:low
                Preview:MDMP..a..... .......&..h............$...............8.......................43..........`.......8...........T...........P...............\...........H...............................................................................eJ..............GenuineIntel............T.......`...%..h.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.......................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):8324
                Entropy (8bit):3.6910617877105
                Encrypted:false
                SSDEEP:192:R6l7wVeJt+6bUM6YZ/SUtszgmfIrpDM89bnysf1ANm:R6lXJE6bH6YBSUtigmfIHnxfN
                MD5:77FFF6880898DAE889A15CE88F2E07F3
                SHA1:FAFC8375AC55306CBC9C10C6196548C7BA503427
                SHA-256:DADD1F917CB2FD8FEF606F14289E3F7FE1538EBD25C0366CCE50CA0E8B61FA05
                SHA-512:ADD6AEDCD13CB069C851DE29A66B254196A0FB5C34211267C0D3A933B8603725F02FBBD8F5609B4F3C674DA42E94A6F21E2315AAA3DA7C40464BCD1FF05C167B
                Malicious:false
                Reputation:low
                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.4.9.6.<./.P.i.
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):4636
                Entropy (8bit):4.426866705527372
                Encrypted:false
                SSDEEP:48:cvIwWl8zsfJg77aI9O/DWpW8VYgYm8M4JqRGwEFEo+q8vKRGwOkgd+8zd:uIjfBI7Cy7VcJqYUoKKYjlY8zd
                MD5:A21479B90DBD4DA79E1A0FC2A89CBA63
                SHA1:A335E794B2BF5917E6F765D8AF473C5B61705F51
                SHA-256:2C874D4E45209793EE0DE5CC07A3E6205C19F440AEA43A493F585DFE9A64720B
                SHA-512:F7BF8E84A37B21B32FFD11618CECEFED714DCDD1FF99C6DCDBD350EEE6E9951084F01709E26619463E0A92D5B25E71723B5F936A9C64A851BCFFE449A82A97D9
                Malicious:false
                Reputation:low
                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="825594" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                Process:C:\Windows\SysWOW64\WerFault.exe
                File Type:MS Windows registry file, NT/2000 or above
                Category:dropped
                Size (bytes):1835008
                Entropy (8bit):4.471656501686752
                Encrypted:false
                SSDEEP:6144:yzZfpi6ceLPx9skLmb0faZWSP3aJG8nAgeiJRMMhA2zX4WABlFuNnjDH5S:UZHtaZWOKnMM6bFkFj4
                MD5:0D325EE09903D319566CBEC65841AAB8
                SHA1:B4815B60AAF12458105DFA45216FA1196B100F55
                SHA-256:BA4836D70CCBBCFC8550B2A725553BF2A7F289B7B33783A03D2A06729106784F
                SHA-512:886A4ED7C2598BA691E1820F36AD49E88D80409FD4E89A03E421A95837D59722CFCD567D93F63D05DDAB229DAAAAD7FCAB3B7B9B4C90D08F8728FE05CF192594
                Malicious:false
                Reputation:low
                Preview:regfL...L....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.e7.]................................................................................................................................................................................................................................................................................................................................................!.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                Entropy (8bit):7.748761661757988
                TrID:
                • Win32 Executable (generic) a (10002005/4) 99.96%
                • Generic Win/DOS Executable (2004/3) 0.02%
                • DOS Executable Generic (2002/1) 0.02%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:upd.exe
                File size:1'804'576 bytes
                MD5:d5bfc5859be9782f3165c875038ccb54
                SHA1:8b7d6648a58a8aa2ceb73cc2cb4b5b4b08400d63
                SHA256:464839161c13a65252341bc9a2d6bb1b36eed1d42bcf24186e5f5284b6ef3423
                SHA512:ce370bfd94c9f8e66574291957f59f07b70227f220978fd76fa1dafb1e8c41d5a647b83d896cb828e78175af9e16eeeb58e62bfbedf386ff77be0053cf8eb440
                SSDEEP:49152:aidXy6U8Pq4VDg87WIqbsy4tobwBIUFIpVK06Ewy4Sor++:aidXy6U8nV8Z4tVOpVz6EwWoz
                TLSH:7985F115B102623AF8F304768AFE469D972CB922071A14DBA3CC1C5E5BA79F27F31527
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......G[...:...:...:..HB...:..HB...:..HB...:.......:.......:......Z:..HB...:...:...:..K....:..K.{..:..K....:..Rich.:.................
                Icon Hash:90cececece8e8eb0
                Entrypoint:0x44f9a3
                Entrypoint Section:.text
                Digitally signed:true
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                Time Stamp:0x67F53F3A [Tue Apr 8 15:22:34 2025 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:6
                OS Version Minor:0
                File Version Major:6
                File Version Minor:0
                Subsystem Version Major:6
                Subsystem Version Minor:0
                Import Hash:b94f60d7658a973ea422e67903afbc64
                Signature Valid:true
                Signature Issuer:CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE
                Signature Validation Error:The operation completed successfully
                Error Number:0
                Not Before, Not After
                • 09/04/2024 23:55:19 10/04/2025 23:55:19
                Subject Chain
                • E=fm760984@gmail.com, CN=AL STARE LLC, O=AL STARE LLC, L=AUSTIN, S=TEXAS, C=US, OID.1.3.6.1.4.1.311.60.2.1.2=Texas, OID.1.3.6.1.4.1.311.60.2.1.3=US, SERIALNUMBER=0805239913, OID.2.5.4.15=Private Organization
                Version:3
                Thumbprint MD5:F711884FEF512428C39B8FEC31DDB11E
                Thumbprint SHA-1:2DEFD4D6CBB10B7AFD9B5A3DBD61E756549EE3CB
                Thumbprint SHA-256:74792AECA362661E69F0B5032DA41E8106472223ECF2965A9A7DA753A75B740F
                Serial:7D3626E63E3516AB22116D1E
                Instruction
                call 00007FD30CB96E7Fh
                jmp 00007FD30CB9652Fh
                retn 0000h
                push ebp
                mov ebp, esp
                and dword ptr [0048AD74h], 00000000h
                sub esp, 28h
                or dword ptr [00489110h], 01h
                push 0000000Ah
                call dword ptr [00475164h]
                test eax, eax
                je 00007FD30CB969BBh
                push ebx
                push esi
                push edi
                xor eax, eax
                lea edi, dword ptr [ebp-28h]
                xor ecx, ecx
                push ebx
                cpuid
                mov esi, ebx
                pop ebx
                nop
                mov dword ptr [edi], eax
                mov dword ptr [edi+04h], esi
                mov dword ptr [edi+08h], ecx
                xor ecx, ecx
                mov dword ptr [edi+0Ch], edx
                mov eax, dword ptr [ebp-28h]
                mov edi, dword ptr [ebp-24h]
                mov dword ptr [ebp-04h], eax
                xor edi, 756E6547h
                mov eax, dword ptr [ebp-1Ch]
                xor eax, 49656E69h
                mov dword ptr [ebp-18h], eax
                mov eax, dword ptr [ebp-20h]
                xor eax, 6C65746Eh
                mov dword ptr [ebp-14h], eax
                xor eax, eax
                inc eax
                push ebx
                cpuid
                mov esi, ebx
                pop ebx
                nop
                lea ebx, dword ptr [ebp-28h]
                mov dword ptr [ebx], eax
                mov eax, dword ptr [ebp-18h]
                or eax, dword ptr [ebp-14h]
                or eax, edi
                mov dword ptr [ebx+04h], esi
                mov dword ptr [ebx+08h], ecx
                mov dword ptr [ebx+0Ch], edx
                jne 00007FD30CB966EBh
                mov eax, dword ptr [ebp-28h]
                and eax, 0FFF3FF0h
                cmp eax, 000106C0h
                je 00007FD30CB966D5h
                cmp eax, 00020660h
                je 00007FD30CB966CEh
                cmp eax, 00020670h
                je 00007FD30CB966C7h
                cmp eax, 00030650h
                je 00007FD30CB966C0h
                cmp eax, 00030660h
                je 00007FD30CB966B9h
                cmp eax, 00030670h
                jne 00007FD30CB966B9h
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x87d7c0xb4.rdata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x8c0000x129070.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x1b5e000x2b20
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x1b60000x3d50.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x801a00x54.rdata
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x800e00x40.rdata
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x750000x238.rdata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x7359c0x73600c17b7a8e3dbb16925f62ebe14b803ef6False0.4528541440953413data6.313936449418768IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rdata0x750000x13aa20x13c005b52cca8fbfc40ddcacd7fb8c3f6f595False0.3897720530063291data4.97594122787701IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .data0x890000x263c0x18007bb7714113e9c5804b8a5a591040716dFalse0.19612630208333334DOS executable (block device driver)3.8116000567105464IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .rsrc0x8c0000x1290700x129200af86d347eda954ea112cb8720ac3e2f7False1.0000065734118637data7.999845983540252IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0x1b60000x3d500x3e00d7bef026b7faf0685482092bc129df72False0.6931703629032258data6.522341350789889IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountryZLIB Complexity
                RT_RCDATA0x8c0600x129010dataEnglishUnited States1.0003108978271484
                DLLImport
                bcrypt.dllBCryptSetProperty, BCryptDestroyKey, BCryptOpenAlgorithmProvider, BCryptGetProperty, BCryptDecrypt, BCryptCloseAlgorithmProvider, BCryptGenerateSymmetricKey
                ADVAPI32.dllCryptCreateHash, CryptDestroyHash, CryptGetHashParam, RegOpenKeyExW, RegQueryValueExW, CryptAcquireContextW, CryptHashData, RegCloseKey, CryptReleaseContext
                SHELL32.dllCommandLineToArgvW
                KERNEL32.dllHeapSize, WriteConsoleW, SetEndOfFile, HeapReAlloc, HeapAlloc, SetStdHandle, GetProcessHeap, WaitForSingleObject, GetLastError, GetModuleFileNameW, WideCharToMultiByte, GetCommandLineW, TerminateProcess, GetTempPathW, OpenProcess, CreateToolhelp32Snapshot, Process32NextW, Process32FirstW, CloseHandle, SizeofResource, LockResource, LoadResource, FindResourceW, GetModuleHandleW, HeapFree, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineA, GetOEMCP, GetACP, IsValidCodePage, GetConsoleMode, GetConsoleOutputCP, FlushFileBuffers, CreateProcessW, DeleteFileW, ReadConsoleW, ReadFile, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetLocaleInfoW, LCMapStringW, LocalFree, FormatMessageA, GetLocaleInfoEx, CreateFileW, FindClose, FindFirstFileW, FindFirstFileExW, FindNextFileW, GetFileAttributesW, GetFileAttributesExW, SetFileInformationByHandle, AreFileApisANSI, GetProcAddress, GetFileInformationByHandleEx, MultiByteToWideChar, QueryPerformanceCounter, QueryPerformanceFrequency, GetFileType, Sleep, GetCurrentThreadId, GetStringTypeW, LCMapStringEx, InitializeCriticalSectionEx, GetSystemTimeAsFileTime, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, EncodePointer, DecodePointer, CompareStringEx, GetCPInfo, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, IsProcessorFeaturePresent, IsDebuggerPresent, GetStartupInfoW, GetCurrentProcessId, InitializeSListHead, RtlUnwind, RaiseException, SetLastError, InitializeCriticalSectionAndSpinCount, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, FreeLibrary, LoadLibraryExW, ExitProcess, GetModuleHandleExW, GetStdHandle, WriteFile, GetFileSizeEx, SetFilePointerEx
                ole32.dllCoCreateInstance, CoInitializeSecurity, CoInitializeEx, CoSetProxyBlanket, CoUninitialize
                OLEAUT32.dllVariantClear, SysAllocString, SysFreeString
                CRYPT32.dllCryptBinaryToStringA
                WINHTTP.dllWinHttpSetOption, WinHttpCloseHandle, WinHttpSendRequest, WinHttpConnect, WinHttpCrackUrl, WinHttpQueryDataAvailable, WinHttpReadData, WinHttpOpenRequest, WinHttpReceiveResponse, WinHttpOpen
                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States
                No network behavior found
                050100150s020406080100

                Click to jump to process

                050100150s0.0051015MB

                Click to jump to process

                • File
                • Registry

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:12:51:49
                Start date:28/04/2025
                Path:C:\Users\user\Desktop\upd.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\upd.exe"
                Imagebase:0x8e0000
                File size:1'804'576 bytes
                MD5 hash:D5BFC5859BE9782F3165C875038CCB54
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low
                Has exited:true

                Target ID:4
                Start time:12:51:50
                Start date:28/04/2025
                Path:C:\Windows\SysWOW64\WerFault.exe
                Wow64 process (32bit):true
                Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6496 -s 688
                Imagebase:0x20000
                File size:483'680 bytes
                MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true
                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                No disassembly