Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe

Overview

General Information

Sample name:SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe
Analysis ID:1437706
MD5:f886615860dbbcd3fe966cf1c79203f9
SHA1:cdcce183c817b5a291dd2a3d6ef6dca93ce3f01d
SHA256:5a0ae314a3ccfcd8e2a77585fb96f650574aac0d5dcb48a85f2f4e0be698845f
Tags:exe
Infos:

Detection

Score:22
Range:0 - 100
Whitelisted:false
Confidence:40%

Signatures

Sigma detected: Cmd.EXE Missing Space Characters Execution Anomaly
Creates a process in suspended mode (likely to inject code)
PE file contains sections with non-standard names
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)

Classification

Analysis Advice

Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior
Sample may offer command line options, please run it with the 'Execute binary with arguments' cookbook (it's possible that the command line switches require additional characters like: "-", "/", "--")
Sample reads itself and does not show any behavior, likely it performs some host environment checks which are compared to an embedded key
  • System is w10x64
  • cleanup
No configs have been found
No yara matches

System Summary

barindex
Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: cmd.exe /K, CommandLine: cmd.exe /K, CommandLine|base64offset|contains: , Image: C:\Windows\System32\cmd.exe, NewProcessName: C:\Windows\System32\cmd.exe, OriginalFileName: C:\Windows\System32\cmd.exe, ParentCommandLine: "C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe", ParentImage: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe, ParentProcessId: 5352, ParentProcessName: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe, ProcessCommandLine: cmd.exe /K, ProcessId: 4144, ProcessName: cmd.exe
No Snort rule has matched

Click to jump to signature section

Show All Signature Results
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://api.ngrok.comhttps://ngrok.com/tosin
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://dashboard.ngrok.com/api
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://dashboard.ngrok.com/api/keys)API
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://dashboard.ngrok.com/api/keys.
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://dashboard.ngrok.com/billing/subscription
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://dashboard.ngrok.com/billing/subscription-----BEGIN
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://dashboard.ngrok.com/billing/subscription0001020304050607080910111213141516171819202122232425
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://dashboard.ngrok.com/billing/subscriptionA
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://dashboard.ngrok.com/billing/subscriptionAn
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://dashboard.ngrok.com/billing/subscriptionCPU
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://dashboard.ngrok.com/billing/subscriptionCreate
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://dashboard.ngrok.com/billing/subscriptionCreates
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://dashboard.ngrok.com/billing/subscriptionEmpty
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://dashboard.ngrok.com/billing/subscriptionEndpoints
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://dashboard.ngrok.com/billing/subscriptionGenerate
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://dashboard.ngrok.com/billing/subscriptionHTTP/1.1
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://dashboard.ngrok.com/billing/subscriptionID
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://dashboard.ngrok.com/billing/subscriptionIf
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://dashboard.ngrok.com/billing/subscriptionInvalid
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://dashboard.ngrok.com/billing/subscriptionOnly
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://dashboard.ngrok.com/billing/subscriptionSSH
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://dashboard.ngrok.com/billing/subscriptionThis
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://dashboard.ngrok.com/billing/subscriptionYou
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://dashboard.ngrok.com/billing/subscriptionYour
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://dashboard.ngrok.com/billing/subscriptiona
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://dashboard.ngrok.com/billing/subscriptionif
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://dashboard.ngrok.com/billing/subscriptiontls:
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://dashboard.ngrok.com/billing/subscriptionunable
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://dashboard.ngrok.com/get-started/your-authtokenCertificate
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://dashboard.ngrok.com/get-started/your-authtokenStatusNormalClosureStatusGoingAwayStatusProtoc
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://dashboard.ngrok.com/get-started/your-authtokenTunnel
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://dashboard.ngrok.com/get-started/your-authtokenUpdates
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://dashboard.ngrok.com/get-started/your-authtokenduplicate
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://dashboard.ngrok.com/get-started/your-authtokenthe
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://dashboard.ngrok.com/security/ip-restrictionsThe
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://dashboard.ngrok.com/signup
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://dashboard.ngrok.com/tunnels/ssh-keys
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://dashboard.ngrok.com/tunnels/ssh-keysa
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://dns.google.com/resolve?https://update.equinox.io/checkillegal
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://github.com/openssh/openssh-portable/blob/master/PROTOCOL.certkeys)the
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://github.com/spf13/cobra/issues/1279
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://github.com/spf13/cobra/issues/1508
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://ngrok.com/docs/a...Abuse
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://ngrok.com/docs/api#authentication)ngrok
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://ngrok.com/docs/api#tls-certificates-pem)Certificate
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://ngrok.com/docs/cloud-edge#compatible-clientsYour
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe, 00000003.00000002.2132016154.000000C0000E6000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://ngrok.com/docs/errors/err_ngrok_8012
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://ngrok.com/docs/ngrok-link#service-api-content-typeOnly
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://ngrok.com/docs/ngrok-link#tls-certificates-key)Private
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://ngrok.com/tos
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: https://status.ngrok.com/
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe, 00000000.00000002.3373030981.000000C0000F6000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe, 00000000.00000002.3373030981.000000C000246000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe, 00000000.00000002.3373030981.000000C0000EE000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe, 00000003.00000002.2132016154.000000C000224000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe, 00000003.00000002.2132016154.000000C0000A2000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe, 00000003.00000002.2134733558.000000C000320000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com/gtm.js?id=
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe, 00000000.00000002.3373030981.000000C000112000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe, 00000000.00000002.3373030981.000000C0000F6000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe, 00000000.00000002.3373030981.000000C0000EE000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe, 00000003.00000002.2132016154.000000C00011C000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe, 00000003.00000002.2132016154.000000C0000A2000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe, 00000003.00000002.2134733558.000000C000320000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com/ns.html?id=GTM-K3RD62G
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe, 00000000.00000002.3373030981.000000C0000A6000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe, 00000003.00000002.2132016154.000000C0000EA000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://www.ngrok.com
Source: classification engineClassification label: sus22.winEXE@6/2@0/0
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4784:120:WilError_03
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeFile opened: C:\Windows\system32\284e2d521e76f96e45b73009c145aae39fcc3a980f27ffa0f86c0e7e5b4b42caAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeFile opened: C:\Windows\system32\dce5f5269411649a8ed9ec22e2ad213daf3ca6d125e074d57e947b42a22bee83AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAJump to behavior
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: _DATERANGE_GTSVECTOR_INT4RANGE_INT8RANGE_OIDVECTOR_REFCURSOR_REGCONFIG_TIMESTAMP_TINTERVAL_TSTZRANGE__complete_timestamp_tstzrangearg %d: %watomicand8audio/aiffaudio/midiaudio/mpegaudio/waveavx512bf16avx512gfniavx512ifmaavx512vaesavx512vbmiavx512vnnibackgroundbackprime;backsimeq;bad varintbasic-authbasic_authbigotimes;bytes */%dcenterdot;checkmark;cidr-allowcompletioncomplex128complexes;connectingconnectioncontentioncreatetempdebug calldecode: %sdefinitiondependencydeprecateddns: <nil>dnsapi.dlldotsquare;downarrow;error.htmlexitThreadexp masterextensionsfloat32nanfloat64nanfont/woff2formactionformmethodformtargetgetsockoptgo_packagegoogle.comgoroutine grpc.Recv.grpc.Sent.gtrapprox;gtreqless;gvertneqq;heapgrowthheartsuit;http-equivhttp-proxyhttp_proxyimage/avifimage/jpegimage/webpimpossibleinput_typeinstanceofint32Sliceint64Sliceinvalid IPinvalidptrkeep-alivekrbsrvnamelatency_msleftarrow;lesseqgtr;local-addrlog-formatlvertneqq;mSpanInUsematch-typemediagroupmodule.addmultipart-ngeqslant;nleqslant;notifyListnovalidatenparallel;nshortmid;nsubseteq;nsupseteq;oidc-scopeoneof_declowner diedpick_firstpitchfork;powershellpprof_addrprincipalspublic-keyradiogrouprationals;res binderres masterresumptionroundrobinrune <nil>runtime: gs.state = schedtracesemacquireset-cookiesetsockoptshort readsocks bindspadesuit;spellchecksslRequeststackLargestream endsubseteqq;subsetneq;supseteqq;supsetneq;t.Kind == tc_pvalloctc_reallocterminatedtherefore;ticks.locktracefree(tracegc()
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: parse errorpassthroughpb.db_codecplaceholderpostgres://precapprox;proxy-protopurge entryraw-controlread %q: %wreflect.SetreflectOffsremote-addrretry-afterrightarrow;rmoustache;round_robinruntime: P runtime: p runtime\..*scheddetailsechost.dllsecur32.dllserver_addrshell32.dllshort writesqsubseteq;sqsupseteq;sslrootcertstack tracestatus-codestream_idlestringArraystringSlicestringToIntsubsetneqq;succapprox;supsetneqq;tc_memaligntc_newarraytime: file timestamptztls: alert(tracealloc(traffic updtransparentunreachableupuparrows;userenv.dllvalid-aftervalid-untilvarepsilon;varnothing;version.dllwsarecvfromyYnNtTfFoO~ (sensitive) B (
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: .WithDeadline(.in-addr.arpa./abuse_reports/anon_hugepage/requests/http/tunnels/:name01-02|15:04:05127.0.0.1:4040190734863281252006010215040595367431640625: extra text: :[^/#?()\.\\]+<not Stringer>> :path: [%s]
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: [0m=%s_REGDICTIONARY_TXID_SNAPSHOTaccept-charsetadmin_shutdownallocfreetracebad allocCountbad record MACbad restart PCbad span statebigtriangleup;blacktriangle;body_write_errbuffer is fullbytes %d-%d/%dcannot scan %Tcase_not_foundcertificate-idcommand failedcontent-lengthcrash_shutdowndata truncateddata_corrupteddata_exceptiondeflate decodedivideontimes;document startduplicate_fileelliptic-curveencode requestfailed to authfallingdotseq;fdw_no_schemasfile too largefinalizer waitfirst_settingsformnovalidategcstoptheworldgetprotobynamegrouping_errorgrpc-trace-binhelp [command]hookleftarrow;http_proxy_envint4multirangeint8multirangeinternal errorinternal_errorinvalid Prefixinvalid kind: invalid methodinvalid statusinvalid syntaxis a directorykey size wrongleftarrowtail;leftharpoonup;len of type %slevel 2 haltedlevel 3 haltedlongleftarrow;looparrowleft;measuredangle;memory storagemessage is nilmodule.enabledmutual-tls-casneed more datangrok-diagnosenil elem type!no module datano such deviceno such regionnot an ip:portntriangleleft;oidc-client-idoidc.client-idpb.dash_unsafepb.enum_prefixping_on_streampollCache.lockpostgresql.crtpostgresql.keyprefix length protobuf errorprotobuf_oneofprotocol errorquery_canceledread mem statsread_frame_eofrequested stopreserved-addrsreserved_rangeruntime: full=runtime\.panics.allocCount= semaRoot queuesequence startsession closedshortparallel;show_sensitivesignal handlersmallsetminus;stack overflowstarted tunnelstopm spinningstore64 failedstringToStringsync.Cond.Waittc_deletearraytc_new_nothrowtext file busytoo many linkstoo many userstrailers_bogustriangleright;trimRightSpaceundefined_fileunexpected EOFunknown code: unknown error unknown methodunknown mode: unknown node: unreachable: unsafe.Pointerupdate appliedupdate_channelupharpoonleft;varsubsetneqq;varsupsetneqq;verify-webhookwinapi error #work.full != 0zero parameter with GC prog
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: Operation ID: %sambiguous_functionappendIfNotPresentapplication/x-gzipbackend.backend-idbad Content-Lengthbad authenticationbad extended rcodebad lfnode addressbad manualFreeListbad resolver stateblacktriangledown;blacktriangleleft;bufio: buffer fullcannot_connect_nowcleantimers: bad pcollation_mismatchconnection is idleconnection refusedconnection_failurecontext.Backgrounddecoding error: %vdelete-certificatedeprecated_featuredetect init systemduplicate name: %qduplicate_databaseduplicate_functionelem align too bigempty Huffman treeevent-destinationsexceeded max depthexpected element <export restrictionextra_float_digitsfailed to ping: %wfailed to read: %wfaketimeState.lockfdw_invalid_handlefile name too longflag %q contains =flag redefined: %sforEachP: not doneframe_goaway_shortgarbage collectionhalf join completeheartbeat receivedhttp: no such fileidentifier removedin numeric literalindex out of rangeindicator_overflowinput/output errorinvalid IP addressinvalid XML name: invalid character invalid config: %vinvalid hex formatinvalid length: %dinvalid length: %vkerberos error: %sleftrightharpoons;len of nil pointerless than a minutelock_not_availablemalloc_zone_callocmalloc_zone_mallocmalloc_zone_vallocmodule.force-authnmodule.min-versionmodule.num-bucketsmultihop attemptedmutual-tls.enablednegative bit indexnegative_int_valuenetip.ParsePrefix(ngrok-api-client/0no child processesno locks availableno secrets definedno signature foundnon-minimal lengthnot_null_violationoauth-allow-domainoidc app client idoidc-client-secretoidc.client-secretoidc.cookie-prefixoperation canceledoverflow packing apermessage-deflateport not a number?positive_int_valueprivate-key-formatprotocol_violationproxy-authenticateread timed out: %wreceived from peerreflect.Value.Callreflect.Value.Elemreflect.Value.Sendreflect.Value.Typereflect.Value.Uintreflect: Zero(nil)request-header-addrestrict_violationrightleftharpoons;runtime.semacreateruntime.semawakeupruntime: npages = runtime: range = {runtime: textAddr saml.cookie-prefixsaml.nameid-formatsegmentation faultsequence truncatedsilence-semicolonsstart a TCP tunnelstart a TLS tunnelstarting componentstatic/favicon.icostreams pipe errorsystem page size (tag:yaml.org,2002:termbox.EventErrortext/javascript1.0text/javascript1.1text/javascript1.2text/javascript1.3text/javascript1.4text/javascript1.5the stream is donetoo_many_argumentstracebackancestorstrailers_not_endedtruncated sequencetwoheadrightarrow;unable to parse IPundefined_functionunexpected messageunexpected newlineunexpected type %Tunknown error: %#vunknown flag: --%sunknown service %vunknown time zone update in progressuse of closed fileuse tcp keep-alivevalue out of rangewaiting for update commands+=(%q)
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: panic holding lockspanicwrap: no ( in panicwrap: no ) in parsing profile: %vpb.cli_pretty_printpb/extensions.protoproxy-authorizationpy_generic_servicesrange too short: %vreflect.Value.Fieldreflect.Value.Floatreflect.Value.Indexreflect.Value.IsNilreflect.Value.Slicerequest body closedrequest-headers.addresponding with 502response-header-addrevoked certificatersa: internal errorruntime: g0 stack [runtime: pcdata is runtime: preempt g0runtime\.call[0-9]*sampling period=%d
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: after top-level valuearray_subscript_errorasync stack too largeat range loop break: bad magic value foundbad number syntax: %qbad type in compare: block device requiredbuffer size too smallbufio: negative countcannot marshal type: cannot put %d into %Tcardinality_violationcheckdead: runnable gcommand not supportedconcurrent map writesdecompression failuredefer on system stackdiagnostics_exceptionexec: already startedexpected DOCUMENT-ENDexpected STREAM-STARTfailed to deserializefdw_invalid_data_typefeature not supportedfeature_not_supportedfindrunnable: wrong pflag %q begins with -flow control violatedforeign_key_violationframe_ping_has_streamgoogle.protobuf.Valuehttp: Handler timeouthttp: invalid patternhttp: nil Request.URLhttps-edge-mutual-tlshttps-edge-route-oidchttps-edge-route-samlhttps://api.ngrok.comhttps://ngrok.com/tosin string escape codeinternal server errorinvalid NumericStringinvalid emitter stateinvalid named captureinvalid nil Timestampinvalid scalar lengthinvalid stream id: %djava_generic_serviceskey is not comparablelink has been severedlistening on %s (%s)
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: Press return to continue...ReservedAddrUnavailableCodeRun '%v --help' for usage.
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: Press return to continue...ReservedAddrUnavailableCodeRun '%v --help' for usage.
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: .lib section in a.out corrupted/edges/tls/{{ .ID }}/mutual_tls/tunnel_sessions/{{ .ID }}/stop11368683772161602973937988281252006-1-2T15:4:5.999999999Z07:002006-1-2t15:4:5.999999999Z07:005684341886080801486968994140625APIRequestRateLimitExceededCodeAccount name must not be empty.BackendStaticAddressInvalidCodeBackendStaticAddressMissingCodeBillingAddressInvalidLengthCodeBillingEmailDeleteProtectedCodeBindACLForbidsRandomAddressCodeBindAgentDuplicateAddHeaderCodeBindConfigDisallowsIPPolicyCodeBindDomainBadPunycodePrefixCodeBindLabeledTunnelNotAllowedCodeBindTunnelRateLimitExceededCodeCLIENT_HANDSHAKE_TRAFFIC_SECRETCentral Brazilian Standard TimeCertDuplicateCertificateContextCertsSSHCAPublicKeyRequiredCodeCertsSSHCARateLimitExceededCodeDashClientNoChangesToSubmitCodeDashUserBelongsToNoAccountsCodeDuration value not an int64: %TEdgeHeaderKeyLengthExceededCodeEdgeHeaderValLengthExceededCodeEdgeOAuthEmailDomainTooLongCodeEdgeOAuthExactlyOneProviderCodeEdgeOAuthGoogleGroupTooLongCodeEdgeOAuthInvalidEmailDomainCodeEdgeOIDCCheckIntervalTooLowCodeEdgeOIDCClientSecretTooLongCodeEdgeOIDCCookiePrefixTooLongCodeEdgeSAMLIdPMetadataRequiredCodeEventDestinationMissingAuthCodeEventDestinationTooMuchAuthCodeEventSubscriptionNotAllowedCodeFeatureRequestLengthInvalidCodeMembershipsCreateDisallowedCodeMembershipsRemoveDisallowedCodeMountain Standard Time (Mexico)Mozilla/5.0 (compatible; ngrok)MwCompileBackendAddrInvalidCodeMwCompileHTTPMuxPathTooLongCodeMwCompileHandlerTypeInvalidCodeMwCompileIPFilterNoIPPolicyCodeMwRuntimeHTTPBackendTimeoutCodeMwRuntimeNoBackendAvailableCodeNetwork Authentication RequiredNgrok Connectivity - Region: %sPRIORITY frame with stream ID 0Public key is missing or empty.Request Header Fields Too LargeRequested Range Not SatisfiableReservedAddrDescrCharsLimitCodeReservedCustomExistingCNAMECodeReservedDomainCNAMENotFoundCodeReservedDomainInvalidPrefixCodeReservedDomainInvalidRegionCodeReservedDomainInvalidSuffixCodeReservedDomainWildcardLimitCodeResolver state updated: %s (%v)SERVER_HANDSHAKE_TRAFFIC_SECRETSSHTunnelNoMultipleForwardsCodeSSHTunnelPortForwardTimeoutCodeSSHTunnelPublicKeysNotFoundCodeSSHTunnelUpdateNotSupportedCodeSetupDiGetDeviceInfoListDetailWShellCompDirectiveFilterFileExtTLS: sequence number wraparoundTLS_RSA_WITH_AES_128_CBC_SHA256TLS_RSA_WITH_AES_128_GCM_SHA256TLS_RSA_WITH_AES_256_GCM_SHA384TunnelV2RestartNotSupportedCodeUsersDeleteBannedDisallowedCodeValid configuration file at %s
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: .lib section in a.out corrupted/edges/tls/{{ .ID }}/mutual_tls/tunnel_sessions/{{ .ID }}/stop11368683772161602973937988281252006-1-2T15:4:5.999999999Z07:002006-1-2t15:4:5.999999999Z07:005684341886080801486968994140625APIRequestRateLimitExceededCodeAccount name must not be empty.BackendStaticAddressInvalidCodeBackendStaticAddressMissingCodeBillingAddressInvalidLengthCodeBillingEmailDeleteProtectedCodeBindACLForbidsRandomAddressCodeBindAgentDuplicateAddHeaderCodeBindConfigDisallowsIPPolicyCodeBindDomainBadPunycodePrefixCodeBindLabeledTunnelNotAllowedCodeBindTunnelRateLimitExceededCodeCLIENT_HANDSHAKE_TRAFFIC_SECRETCentral Brazilian Standard TimeCertDuplicateCertificateContextCertsSSHCAPublicKeyRequiredCodeCertsSSHCARateLimitExceededCodeDashClientNoChangesToSubmitCodeDashUserBelongsToNoAccountsCodeDuration value not an int64: %TEdgeHeaderKeyLengthExceededCodeEdgeHeaderValLengthExceededCodeEdgeOAuthEmailDomainTooLongCodeEdgeOAuthExactlyOneProviderCodeEdgeOAuthGoogleGroupTooLongCodeEdgeOAuthInvalidEmailDomainCodeEdgeOIDCCheckIntervalTooLowCodeEdgeOIDCClientSecretTooLongCodeEdgeOIDCCookiePrefixTooLongCodeEdgeSAMLIdPMetadataRequiredCodeEventDestinationMissingAuthCodeEventDestinationTooMuchAuthCodeEventSubscriptionNotAllowedCodeFeatureRequestLengthInvalidCodeMembershipsCreateDisallowedCodeMembershipsRemoveDisallowedCodeMountain Standard Time (Mexico)Mozilla/5.0 (compatible; ngrok)MwCompileBackendAddrInvalidCodeMwCompileHTTPMuxPathTooLongCodeMwCompileHandlerTypeInvalidCodeMwCompileIPFilterNoIPPolicyCodeMwRuntimeHTTPBackendTimeoutCodeMwRuntimeNoBackendAvailableCodeNetwork Authentication RequiredNgrok Connectivity - Region: %sPRIORITY frame with stream ID 0Public key is missing or empty.Request Header Fields Too LargeRequested Range Not SatisfiableReservedAddrDescrCharsLimitCodeReservedCustomExistingCNAMECodeReservedDomainCNAMENotFoundCodeReservedDomainInvalidPrefixCodeReservedDomainInvalidRegionCodeReservedDomainInvalidSuffixCodeReservedDomainWildcardLimitCodeResolver state updated: %s (%v)SERVER_HANDSHAKE_TRAFFIC_SECRETSSHTunnelNoMultipleForwardsCodeSSHTunnelPortForwardTimeoutCodeSSHTunnelPublicKeysNotFoundCodeSSHTunnelUpdateNotSupportedCodeSetupDiGetDeviceInfoListDetailWShellCompDirectiveFilterFileExtTLS: sequence number wraparoundTLS_RSA_WITH_AES_128_CBC_SHA256TLS_RSA_WITH_AES_128_GCM_SHA256TLS_RSA_WITH_AES_256_GCM_SHA384TunnelV2RestartNotSupportedCodeUsersDeleteBannedDisallowedCodeValid configuration file at %s
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: ; EDNS: version asn1: Unmarshal recipient value is nil bad value in StructValue for key %q: %vbuild line missing '=' after quoted keycan't unmarshal Any nested proto %v: %vcannot assign all values from BoolArraycannot assign all values from CIDRArraycannot assign all values from DateArraycannot assign all values from InetArraycannot assign all values from Int2Arraycannot assign all values from Int4Arraycannot assign all values from Int8Arraycannot assign all values from TextArraycannot assign all values from UUIDArraycannot convert all values to ByteaArraycannot convert all values to JSONBArraycannot decode node with unknown kind %dcannot encode node with unknown kind %dcannot marshal invalid UTF-8 data as %scertificate-management-policy.authoritychain is not signed by an acceptable CAcipher: incorrect tag size given to GCMcobra_annotation_bash_completion_customcobra_annotation_required_if_others_setcomment length insufficient for parsingconfigured to dial out via SOCKS5 Proxycould not establish any TCP connectionscould not establish any TLS connectionscrypto/rsa: invalid options for Decryptcsv: invalid field or comment delimiterdid not find expected hexdecimal numberdns: TXT record %v missing %v attributedriver.Valuer Value() method failed: %wexpected space in input to match formatextraneous or missing " in quoted-fieldfailed to deserialize request parameterfailed to fetch http entries from storefailed to parse filepath pattern %q: %wfailed to write postgres handshake bytefdw_inconsistent_descriptor_informationfdw_invalid_descriptor_field_identifierfound an incorrect trailing UTF-8 octetgoogle.golang.org/genproto/protobuf/apigoogle.golang.org/protobuf/types/known/heapBitsSetTypeGCProg: small allocationhttp: putIdleConn: keep alives disabledinvalid indexed representation index %dinvalid value: merging into nil messageinvalid_argument_for_nth_value_functionmartini handler must be a callable funcmath/big: buffer too small to fit valuemismatched count during itab table copymismatched message type: got %q want %qmissing argument to repetition operatormissing verb: % at end of format stringmodule.provider.microsoft.client-secretmodule.provider.microsoft.email-domainsmspan.sweep: bad span state after sweepmultipart: can't write to finished partnegative minwidth, tabwidth, or paddingngrok is not yet ready to start tunnelsno mutually supported protocol versionsoauth.provider.facebook.email-addressesout of memory allocating heap arena mappq: only text format supported for COPYprevious message not read to completionprints author and licensing informationproxyproto: can't read version 1 headerreflect.MakeMapWithSize of non-map typeresolver returned an empty address listruntime: blocked write on free polldescruntime: casfrom_Gscanstatus failed gp=runtime: duplicatehandle failed; errno=session closed, starting reconnect loopsigns of seconds and nanos do not matchstack growth not allowed in system callstatic/assets/82b1212e45a2bc35dd73.woffstatic/css/app.6adde
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: ngrok is a command line application, try typing 'ngrok.exe http 80'big: invalid 2nd argument to Int.Jacobi: need odd integer but got %scan not look up shorthand which is more than one ASCII character: %qcannot assign %v, needed to assign %d elements, but only assigned %dconfig contains tab characters, YAML must use spaces for indentationcrypto/hmac: hash generation function does not produce unique valuesembedded IPv4 address must replace the final 2 fields of the addressexpected SCALAR, SEQUENCE-START, MAPPING-START, or ALIAS, but got %vextension %v does not implement protoreflect.ExtensionTypeDescriptorheap profile: *(\d+): *(\d+) *\[ *(\d+): *(\d+) *\] @ fragmentationzhttp2: Transport conn %p received error from processing frame %v: %vhttp2: Transport received unsolicited DATA frame; closing connectionhttp: message cannot contain multiple Content-Length headers; got %qinvalid proto.Message(%T) type, expected a protoreflect.Message typeinvalid retry throttling config: tokenRatio (%v) may not be negativengrok gateway timeout
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: ngrok tcp --remote-addr=1.tcp.ngrok.io:27210 3389The time when this host certificate becomes invalid, in RFC 3339 format. If unspecified, a default value of 24 hours will be used. The OpenSSH certificates RFC calls this valid_before.Only Enterprise plans can use tunnel ACL rules.
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: Install your authoken: https://dashboard.ngrok.com/get-started/your-authtokenduplicate registration of %q
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: Your authtoken is available on your dashboard: https://dashboard.ngrok.com/get-started/your-authtokenthe list of principals included in the ssh host certificate. This is the list of hostnames and/or IP addresses that are authorized to serve SSH traffic with this certificate. Dangerously, if no principals are specified, this certificate is considered valid for all hosts.Labeled tunnels are only available after you sign up.
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: Your authtoken is available on your dashboard: https://dashboard.ngrok.com/get-started/your-authtokenTunnel Credentials are ngrok agent authtokens. They authorize the ngrok
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: Your authtoken is available on your dashboard: https://dashboard.ngrok.com/get-started/your-authtokenUpdates a TCP Edge by ID. If a module is not specified in the update, it will not be modified. However, each module configuration that is specified will completely replace the existing value. There is no way to delete an existing module via this API, instead use the delete module API.Updates a TLS Edge by ID. If a module is not specified in the update, it will not be modified. However, each module configuration that is specified will completely replace the existing value. There is no way to delete an existing module via this API, instead use the delete module API.Updates an HTTPS Edge by ID. If a module is not specified in the update, it will not be modified. However, each module configuration that is specified will completely replace the existing value. There is no way to delete an existing module via this API, instead use the delete module API.Defines the name identifier format the SP expects the IdP to use in its assertions to identify subjects. If unspecified, a default value of urn:oasis:names:tc:SAML:2.0:nameid-format:persistent will be used. A subset of the allowed values enumerated by the SAML specification are supported.the list of principals included in the ssh user certificate. This is the list of usernames that the certificate holder may sign in as on a machine authorizing the signing certificate authority. Dangerously, if no principals are specified, this certificate may be used to log in as any user.A map of critical options included in the certificate. Only two critical options are currently defined by OpenSSH: force-command and source-address. See (https://github.com/openssh/openssh-portable/blob/master/PROTOCOL.certkeys)the OpenSSH certificate protocol spec for additional details.Forwarding to a local file:/// URL is only available after you sign up.
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: Your authtoken is available on your dashboard: https://dashboard.ngrok.com/get-started/your-authtokenUpdates a TCP Edge by ID. If a module is not specified in the update, it will not be modified. However, each module configuration that is specified will completely replace the existing value. There is no way to delete an existing module via this API, instead use the delete module API.Updates a TLS Edge by ID. If a module is not specified in the update, it will not be modified. However, each module configuration that is specified will completely replace the existing value. There is no way to delete an existing module via this API, instead use the delete module API.Updates an HTTPS Edge by ID. If a module is not specified in the update, it will not be modified. However, each module configuration that is specified will completely replace the existing value. There is no way to delete an existing module via this API, instead use the delete module API.Defines the name identifier format the SP expects the IdP to use in its assertions to identify subjects. If unspecified, a default value of urn:oasis:names:tc:SAML:2.0:nameid-format:persistent will be used. A subset of the allowed values enumerated by the SAML specification are supported.the list of principals included in the ssh user certificate. This is the list of usernames that the certificate holder may sign in as on a machine authorizing the signing certificate authority. Dangerously, if no principals are specified, this certificate may be used to log in as any user.A map of critical options included in the certificate. Only two critical options are currently defined by OpenSSH: force-command and source-address. See (https://github.com/openssh/openssh-portable/blob/master/PROTOCOL.certkeys)the OpenSSH certificate protocol spec for additional details.Forwarding to a local file:/// URL is only available after you sign up.
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: Your authtoken is available on your dashboard: https://dashboard.ngrok.com/get-started/your-authtokenUpdates an HTTPS Edge Route by ID. If a module is not specified in the update, it will not be modified. However, each module configuration that is specified will completely replace the existing value. There is no way to delete an existing module via this API, instead use the delete module API.stateTextstateTagstateAttrNamestateAfterNamestateBeforeValuestateHTMLCmtstateRCDATAstateAttrstateURLstateSrcsetstateJSstateJSDqStrstateJSSqStrstateJSRegexpstateJSBlockCmtstateJSLineCmtstateCSSstateCSSDqStrstateCSSSqStrstateCSSDqURLstateCSSSqURLstateCSSURLstateCSSBlockCmtstateCSSLineCmtstateErrorIf true, the IdP may initiate a login directly (e.g. the user does not need to visit the endpoint first and then be redirected). The IdP should set the RelayState parameter to the target URL of the resource they want the user to be redirected to after the SAML login assertion has been processed.API Keys are used to authenticate to the (https://ngrok.com/docs/api#authentication)ngrok
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: Your authtoken is available on your dashboard: https://dashboard.ngrok.com/get-started/your-authtokenStatusNormalClosureStatusGoingAwayStatusProtocolErrorStatusUnsupportedDatastatusReservedStatusNoStatusRcvdStatusAbnormalClosureStatusInvalidFramePayloadDataStatusPolicyViolationStatusMessageTooBigStatusMandatoryExtensionStatusInternalErrorStatusServiceRestartStatusTryAgainLaterStatusBadGatewayStatusTLSHandshakethe OAuth app client ID. retrieve it from the identity provider's dashboard where you created your own OAuth app. optional. if unspecified, ngrok will use its own managed oauth application which has additional restrictions. see the OAuth module docs for more details. if present, client_secret must be present as well.
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: Your authtoken is available on your dashboard: https://dashboard.ngrok.com/get-started/your-authtokenCertificate Authorities are x509 certificates that are used to sign other
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: --remote-addr option. ngrok requires that you reserve a TCP tunnel
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: Use "{{.CommandPath}} [command] --help" for more information about a command.{{end}}
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: Use "{{.CommandPath}} [command] --help" for more information about a command.{{end}}
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: set -l directive (string sub --start 2 $results[-1])
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: github.com/pires/go-proxyproto@v0.6.1/addr_proto.go
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: google.golang.org/grpc@v1.47.0/internal/balancerload/load.go
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: go.ngrok.com/cmd/ngrok/config/load.go
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: go.ngrok.com/cmd/ngrok/config/load_common.go
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: go.ngrok.com/cmd/ngrok/config/load_no.go
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: go.ngrok.com/cmd/ngrok/config/load_v1.go
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: go.ngrok.com/cmd/ngrok/config/load_v2.go
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: go.ngrok.com/lib/web/manifest/loader.go
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeString found in binary or memory: golang.org/x/sys@v0.0.0-20220722155257-8c9f86f7a55f/windows/svc/eventlog/install.go
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeFile read: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe "C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe"
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /K
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /KJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeSection loaded: samlib.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeSection loaded: powrprof.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeSection loaded: umpdc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeSection loaded: samcli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeSection loaded: samlib.dllJump to behavior
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeStatic file information: File size 19297280 > 1048576
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x7fd400
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x9d7a00
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeStatic PE information: section name: .symtab
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe, 00000000.00000002.3376226974.000001DBC3B47000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe, 00000003.00000002.2139689030.00000198C2D98000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeProcess information queried: ProcessInformationJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeProcess created: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /KJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
11
Process Injection
11
Process Injection
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
DLL Side-Loading
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager12
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1437706 Sample: SecuriteInfo.com.PUA.RiskWa... Startdate: 07/05/2024 Architecture: WINDOWS Score: 22 14 Sigma detected: Cmd.EXE Missing Space Characters Execution Anomaly 2->14 6 SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe 1 2->6         started        process3 process4 8 SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe 1 6->8         started        10 conhost.exe 6->10         started        12 cmd.exe 1 6->12         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe3%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://api.ngrok.comhttps://ngrok.com/tosin0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://dashboard.ngrok.com/tunnels/ssh-keysaSecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
    high
    https://ngrok.com/tosSecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
      high
      https://ngrok.com/docs/ngrok-link#service-api-content-typeOnlySecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
        high
        https://dashboard.ngrok.com/billing/subscriptionunableSecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
          high
          https://dns.google.com/resolve?https://update.equinox.io/checkillegalSecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
            high
            https://dashboard.ngrok.com/billing/subscriptiontls:SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
              high
              https://github.com/spf13/cobra/issues/1508SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                high
                https://ngrok.com/docs/errors/err_ngrok_8012SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe, 00000003.00000002.2132016154.000000C0000E6000.00000004.00001000.00020000.00000000.sdmpfalse
                  high
                  https://dashboard.ngrok.com/billing/subscriptionThisSecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                    high
                    https://dashboard.ngrok.com/billing/subscriptionaSecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                      high
                      https://dashboard.ngrok.com/billing/subscriptionEmptySecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                        high
                        https://dashboard.ngrok.com/billing/subscriptionAnSecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                          high
                          https://dashboard.ngrok.com/security/ip-restrictionsTheSecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                            high
                            https://dashboard.ngrok.com/get-started/your-authtokenduplicateSecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                              high
                              https://status.ngrok.com/SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                                high
                                https://ngrok.com/docs/ngrok-link#tls-certificates-key)PrivateSecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                                  high
                                  https://ngrok.com/docs/cloud-edge#compatible-clientsYourSecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                                    high
                                    https://ngrok.com/docs/api#authentication)ngrokSecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                                      high
                                      https://ngrok.com/docs/api#tls-certificates-pem)CertificateSecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                                        high
                                        https://dashboard.ngrok.com/tunnels/ssh-keysSecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                                          high
                                          https://dashboard.ngrok.com/apiSecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                                            high
                                            https://dashboard.ngrok.com/billing/subscriptionEndpointsSecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                                              high
                                              https://dashboard.ngrok.com/get-started/your-authtokentheSecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                                                high
                                                https://dashboard.ngrok.com/get-started/your-authtokenCertificateSecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                                                  high
                                                  https://dashboard.ngrok.com/billing/subscription-----BEGINSecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                                                    high
                                                    https://dashboard.ngrok.com/billing/subscriptionSecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                                                      high
                                                      https://dashboard.ngrok.com/get-started/your-authtokenUpdatesSecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                                                        high
                                                        https://dashboard.ngrok.com/billing/subscriptionInvalidSecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                                                          high
                                                          https://dashboard.ngrok.com/get-started/your-authtokenStatusNormalClosureStatusGoingAwayStatusProtocSecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                                                            high
                                                            https://dashboard.ngrok.com/billing/subscriptionCPUSecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                                                              high
                                                              https://dashboard.ngrok.com/billing/subscriptionCreatesSecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                                                                high
                                                                https://www.ngrok.comSecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe, 00000000.00000002.3373030981.000000C0000A6000.00000004.00001000.00020000.00000000.sdmp, SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe, 00000003.00000002.2132016154.000000C0000EA000.00000004.00001000.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://dashboard.ngrok.com/api/keys.SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                                                                    high
                                                                    https://dashboard.ngrok.com/billing/subscription0001020304050607080910111213141516171819202122232425SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                                                                      high
                                                                      https://dashboard.ngrok.com/billing/subscriptionIDSecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                                                                        high
                                                                        https://dashboard.ngrok.com/billing/subscriptionGenerateSecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                                                                          high
                                                                          https://dashboard.ngrok.com/billing/subscriptionifSecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                                                                            high
                                                                            https://dashboard.ngrok.com/get-started/your-authtokenTunnelSecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                                                                              high
                                                                              https://dashboard.ngrok.com/billing/subscriptionCreateSecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                                                                                high
                                                                                https://ngrok.com/docs/a...AbuseSecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                                                                                  high
                                                                                  https://github.com/openssh/openssh-portable/blob/master/PROTOCOL.certkeys)theSecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                                                                                    high
                                                                                    https://dashboard.ngrok.com/billing/subscriptionHTTP/1.1SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                                                                                      high
                                                                                      https://dashboard.ngrok.com/billing/subscriptionSSHSecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                                                                                        high
                                                                                        https://dashboard.ngrok.com/billing/subscriptionOnlySecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                                                                                          high
                                                                                          https://dashboard.ngrok.com/api/keys)APISecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                                                                                            high
                                                                                            https://dashboard.ngrok.com/billing/subscriptionIfSecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                                                                                              high
                                                                                              https://dashboard.ngrok.com/signupSecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                                                                                                high
                                                                                                https://dashboard.ngrok.com/billing/subscriptionASecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                                                                                                  high
                                                                                                  https://dashboard.ngrok.com/billing/subscriptionYouSecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                                                                                                    high
                                                                                                    https://dashboard.ngrok.com/billing/subscriptionYourSecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                                                                                                      high
                                                                                                      https://github.com/spf13/cobra/issues/1279SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                                                                                                        high
                                                                                                        https://api.ngrok.comhttps://ngrok.com/tosinSecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exefalse
                                                                                                        • Avira URL Cloud: safe
                                                                                                        unknown
                                                                                                        No contacted IP infos
                                                                                                        Joe Sandbox version:40.0.0 Tourmaline
                                                                                                        Analysis ID:1437706
                                                                                                        Start date and time:2024-05-07 20:26:23 +02:00
                                                                                                        Joe Sandbox product:CloudBasic
                                                                                                        Overall analysis duration:0h 6m 4s
                                                                                                        Hypervisor based Inspection enabled:false
                                                                                                        Report type:full
                                                                                                        Cookbook file name:default.jbs
                                                                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                        Number of analysed new started processes analysed:9
                                                                                                        Number of new started drivers analysed:0
                                                                                                        Number of existing processes analysed:0
                                                                                                        Number of existing drivers analysed:0
                                                                                                        Number of injected processes analysed:0
                                                                                                        Technologies:
                                                                                                        • HCA enabled
                                                                                                        • EGA enabled
                                                                                                        • AMSI enabled
                                                                                                        Analysis Mode:default
                                                                                                        Analysis stop reason:Timeout
                                                                                                        Sample name:SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe
                                                                                                        Detection:SUS
                                                                                                        Classification:sus22.winEXE@6/2@0/0
                                                                                                        EGA Information:Failed
                                                                                                        HCA Information:Failed
                                                                                                        Cookbook Comments:
                                                                                                        • Found application associated with file extension: .exe
                                                                                                        • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                                                                        • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                                        • Execution Graph export aborted for target SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe, PID 5352 because there are no executed function
                                                                                                        • Not all processes where analyzed, report is missing behavior information
                                                                                                        • VT rate limit hit for: SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe
                                                                                                        No simulations
                                                                                                        No context
                                                                                                        No context
                                                                                                        No context
                                                                                                        No context
                                                                                                        No context
                                                                                                        Process:C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe
                                                                                                        File Type:GLS_BINARY_LSB_FIRST
                                                                                                        Category:dropped
                                                                                                        Size (bytes):160
                                                                                                        Entropy (8bit):4.438743916256937
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:3:rmHfvtH//STGlA1yqGlYUGk+ldyHGlgZty:rmHcKtGFlqty
                                                                                                        MD5:E467C82627F5E1524FDB4415AF19FC73
                                                                                                        SHA1:B86E3AA40E9FBED0494375A702EABAF1F2E56F8E
                                                                                                        SHA-256:116CD35961A2345CE210751D677600AADA539A66F046811FA70E1093E01F2540
                                                                                                        SHA-512:2A969893CC713D6388FDC768C009055BE1B35301A811A7E313D1AEEC1F75C88CCDDCD8308017A852093B1310811E90B9DA76B6330AACCF5982437D84F553183A
                                                                                                        Malicious:false
                                                                                                        Reputation:moderate, very likely benign file
                                                                                                        Preview:................................xW4.4.....#Eg.......]..........+.H`........xW4.4.....#Eg......3.qq..7I......6........xW4.4.....#Eg......,..l..@E............
                                                                                                        File type:PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
                                                                                                        Entropy (8bit):6.453129077883107
                                                                                                        TrID:
                                                                                                        • Win64 Executable (generic) (12005/4) 74.95%
                                                                                                        • Generic Win/DOS Executable (2004/3) 12.51%
                                                                                                        • DOS Executable Generic (2002/1) 12.50%
                                                                                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
                                                                                                        File name:SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe
                                                                                                        File size:19'297'280 bytes
                                                                                                        MD5:f886615860dbbcd3fe966cf1c79203f9
                                                                                                        SHA1:cdcce183c817b5a291dd2a3d6ef6dca93ce3f01d
                                                                                                        SHA256:5a0ae314a3ccfcd8e2a77585fb96f650574aac0d5dcb48a85f2f4e0be698845f
                                                                                                        SHA512:4f133875662db65313897586d4ab748be5ed386f31ba3ee6d54e7cc4e4da44cf54392bb16f6f1832ba74f4be55ec3aeae5d3632b73bab2a49dbe37ff7d8edcca
                                                                                                        SSDEEP:196608:trwkQhsWhgXuPx0WQywOlNF4Rd9HScIxuJKW:OHOoPmtywnIx8K
                                                                                                        TLSH:92174943F89181E8C4EDD174CA26D656BB703C890B3067D33B60FAB92B76BD46A79350
                                                                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d........r&.......".................@.........@...............................-...........`... ............................
                                                                                                        Icon Hash:00928e8e8686b000
                                                                                                        Entrypoint:0x46b440
                                                                                                        Entrypoint Section:.text
                                                                                                        Digitally signed:false
                                                                                                        Imagebase:0x400000
                                                                                                        Subsystem:windows cui
                                                                                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
                                                                                                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                                                                        Time Stamp:0x0 [Thu Jan 1 00:00:00 1970 UTC]
                                                                                                        TLS Callbacks:
                                                                                                        CLR (.Net) Version:
                                                                                                        OS Version Major:6
                                                                                                        OS Version Minor:1
                                                                                                        File Version Major:6
                                                                                                        File Version Minor:1
                                                                                                        Subsystem Version Major:6
                                                                                                        Subsystem Version Minor:1
                                                                                                        Import Hash:ff9f3a86709796c17211f9df12aae74d
                                                                                                        Instruction
                                                                                                        jmp 00007F6A44E929B0h
                                                                                                        int3
                                                                                                        int3
                                                                                                        int3
                                                                                                        int3
                                                                                                        int3
                                                                                                        int3
                                                                                                        int3
                                                                                                        int3
                                                                                                        int3
                                                                                                        int3
                                                                                                        int3
                                                                                                        int3
                                                                                                        int3
                                                                                                        int3
                                                                                                        int3
                                                                                                        int3
                                                                                                        int3
                                                                                                        int3
                                                                                                        int3
                                                                                                        int3
                                                                                                        int3
                                                                                                        int3
                                                                                                        int3
                                                                                                        int3
                                                                                                        int3
                                                                                                        int3
                                                                                                        int3
                                                                                                        pushfd
                                                                                                        cld
                                                                                                        dec eax
                                                                                                        sub esp, 000000E0h
                                                                                                        dec eax
                                                                                                        mov dword ptr [esp], edi
                                                                                                        dec eax
                                                                                                        mov dword ptr [esp+08h], esi
                                                                                                        dec eax
                                                                                                        mov dword ptr [esp+10h], ebp
                                                                                                        dec eax
                                                                                                        mov dword ptr [esp+18h], ebx
                                                                                                        dec esp
                                                                                                        mov dword ptr [esp+20h], esp
                                                                                                        dec esp
                                                                                                        mov dword ptr [esp+28h], ebp
                                                                                                        dec esp
                                                                                                        mov dword ptr [esp+30h], esi
                                                                                                        dec esp
                                                                                                        mov dword ptr [esp+38h], edi
                                                                                                        movups dqword ptr [esp+40h], xmm6
                                                                                                        movups dqword ptr [esp+50h], xmm7
                                                                                                        inc esp
                                                                                                        movups dqword ptr [esp+60h], xmm0
                                                                                                        inc esp
                                                                                                        movups dqword ptr [esp+70h], xmm1
                                                                                                        inc esp
                                                                                                        movups dqword ptr [esp+00000080h], xmm2
                                                                                                        inc esp
                                                                                                        movups dqword ptr [esp+00000090h], xmm3
                                                                                                        inc esp
                                                                                                        movups dqword ptr [esp+000000A0h], xmm4
                                                                                                        inc esp
                                                                                                        movups dqword ptr [esp+000000B0h], xmm5
                                                                                                        inc esp
                                                                                                        movups dqword ptr [esp+000000C0h], xmm6
                                                                                                        inc esp
                                                                                                        movups dqword ptr [esp+000000D0h], xmm7
                                                                                                        dec eax
                                                                                                        sub esp, 30h
                                                                                                        dec ecx
                                                                                                        mov edi, eax
                                                                                                        dec eax
                                                                                                        mov edx, dword ptr [00000028h]
                                                                                                        dec eax
                                                                                                        cmp edx, 00000000h
                                                                                                        jne 00007F6A44E9669Eh
                                                                                                        dec eax
                                                                                                        mov eax, 00000000h
                                                                                                        jmp 00007F6A44E96715h
                                                                                                        dec eax
                                                                                                        mov edx, dword ptr [edx+00000000h]
                                                                                                        dec eax
                                                                                                        cmp edx, 00000000h
                                                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x12af0000x4b8.idata
                                                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x12b00000x27472.reloc
                                                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x11d84c00x150.data
                                                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                        .text0x10000x7fd20d0x7fd400246feaf8bc585cd54c01429f881f5540unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                        .rdata0x7ff0000x9d79c80x9d7a0014a73eb7c259fc79e1776b1888d9514aunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                        .data0x11d70000xd7ef00x6a2007e94b061923a5e47d4f1ae2a322b3642False0.33458710615429915data4.86010103981288IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                        .idata0x12af0000x4b80x600665ad138e3907bd7b248f18ecc2feaf1False0.3424479166666667data3.880935332975287IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                        .reloc0x12b00000x274720x27600a76e7172ceb3451b4f2b236efbe9ca02False0.16515376984126984data5.454523136404931IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                        .symtab0x12d80000x40x20007b5472d347d42780469fb2654b7fc54False0.02734375data0.020393135236084953IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                        DLLImport
                                                                                                        kernel32.dllWriteFile, WriteConsoleW, WaitForMultipleObjects, WaitForSingleObject, VirtualQuery, VirtualFree, VirtualAlloc, SwitchToThread, SuspendThread, SetWaitableTimer, SetUnhandledExceptionFilter, SetThreadPriority, SetProcessPriorityBoost, SetEvent, SetErrorMode, SetConsoleCtrlHandler, ResumeThread, PostQueuedCompletionStatus, LoadLibraryA, LoadLibraryW, SetThreadContext, GetThreadContext, GetSystemInfo, GetSystemDirectoryA, GetStdHandle, GetQueuedCompletionStatusEx, GetProcessAffinityMask, GetProcAddress, GetEnvironmentStringsW, GetConsoleMode, FreeEnvironmentStringsW, ExitProcess, DuplicateHandle, CreateWaitableTimerExW, CreateWaitableTimerA, CreateThread, CreateIoCompletionPort, CreateFileA, CreateEventA, CloseHandle, AddVectoredExceptionHandler
                                                                                                        No network behavior found

                                                                                                        Click to jump to process

                                                                                                        Click to jump to process

                                                                                                        Click to jump to process

                                                                                                        Target ID:0
                                                                                                        Start time:20:27:17
                                                                                                        Start date:07/05/2024
                                                                                                        Path:C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe"
                                                                                                        Imagebase:0x290000
                                                                                                        File size:19'297'280 bytes
                                                                                                        MD5 hash:F886615860DBBCD3FE966CF1C79203F9
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:Go lang
                                                                                                        Reputation:low
                                                                                                        Has exited:false

                                                                                                        Target ID:2
                                                                                                        Start time:20:27:17
                                                                                                        Start date:07/05/2024
                                                                                                        Path:C:\Windows\System32\conhost.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                        Imagebase:0x7ff66e660000
                                                                                                        File size:862'208 bytes
                                                                                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:high
                                                                                                        Has exited:false

                                                                                                        Target ID:3
                                                                                                        Start time:20:27:17
                                                                                                        Start date:07/05/2024
                                                                                                        Path:C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:C:\Users\user\Desktop\SecuriteInfo.com.PUA.RiskWare.Frp.3859.2083.exe
                                                                                                        Imagebase:0x290000
                                                                                                        File size:19'297'280 bytes
                                                                                                        MD5 hash:F886615860DBBCD3FE966CF1C79203F9
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:Go lang
                                                                                                        Reputation:low
                                                                                                        Has exited:true

                                                                                                        Target ID:4
                                                                                                        Start time:20:27:19
                                                                                                        Start date:07/05/2024
                                                                                                        Path:C:\Windows\System32\cmd.exe
                                                                                                        Wow64 process (32bit):false
                                                                                                        Commandline:cmd.exe /K
                                                                                                        Imagebase:0x7ff7b2e10000
                                                                                                        File size:289'792 bytes
                                                                                                        MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Reputation:high
                                                                                                        Has exited:false

                                                                                                        No disassembly