Analysis Report Request for Price Quotation.pdf.exe

Overview

General Information

Sample Name: Request for Price Quotation.pdf.exe
Analysis ID: 432812
MD5: 04ff13eb3759dbe4112b49738e9f5aee
SHA1: 460aa3f718ed5ce4c5d52a28fa2f275ebf076d30
SHA256: 836509e2435bbae2e7d695ff94a760a0aa3e3a362edd3e2f37e907bba48f6b72
Tags: AgentTeslaexe
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score: 100
Range: 0 - 100
Whitelisted: false
Confidence: 100%

Signatures

Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Suspicious Double Extension
Yara detected AgentTesla
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large array initializations
.NET source code contains very large strings
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Injects a PE file into a foreign processes
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses an obfuscated file name to hide its real file extension (double extension)
Uses schtasks.exe or at.exe to add and modify task schedules
Antivirus or Machine Learning detection for unpacked file
Contains capabilities to detect virtual machines
Contains functionality to call native functions
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May sleep (evasive loops) to hinder dynamic analysis
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer

Classification

AV Detection:

barindex
Found malware configuration
Source: 00000012.00000002.473375885.00000000032D1000.00000004.00000001.sdmp Malware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "SMTP Info": "mhd.nazri@vistakencana.com.mym33R3bus!mail.vistakencana.com.my"}
Multi AV Scanner detection for dropped file
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe ReversingLabs: Detection: 21%
Source: C:\Users\user\AppData\Roaming\vRURxcnYJm.exe ReversingLabs: Detection: 21%
Multi AV Scanner detection for submitted file
Source: Request for Price Quotation.pdf.exe ReversingLabs: Detection: 21%
Antivirus or Machine Learning detection for unpacked file
Source: 33.0.pGKuRU.exe.400000.1.unpack Avira: Label: TR/Spy.Gen8
Source: 37.2.pGKuRU.exe.400000.0.unpack Avira: Label: TR/Spy.Gen8
Source: 33.2.pGKuRU.exe.400000.0.unpack Avira: Label: TR/Spy.Gen8
Source: 37.0.pGKuRU.exe.400000.1.unpack Avira: Label: TR/Spy.Gen8
Source: 18.2.Request for Price Quotation.pdf.exe.400000.0.unpack Avira: Label: TR/Spy.Gen8
Source: 18.0.Request for Price Quotation.pdf.exe.400000.1.unpack Avira: Label: TR/Spy.Gen8

Compliance:

barindex
Uses 32bit PE files
Source: Request for Price Quotation.pdf.exe Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe File opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll Jump to behavior
Source: Request for Price Quotation.pdf.exe Static PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: mscorrc.pdb source: Request for Price Quotation.pdf.exe, 00000001.00000002.301723615.0000000006930000.00000002.00000001.sdmp, pGKuRU.exe, 00000018.00000002.435175637.0000000006D50000.00000002.00000001.sdmp, pGKuRU.exe, 0000001A.00000002.451550450.0000000006CA0000.00000002.00000001.sdmp
Source: Request for Price Quotation.pdf.exe, 00000012.00000002.473375885.00000000032D1000.00000004.00000001.sdmp, pGKuRU.exe, 00000021.00000002.447853207.00000000035A1000.00000004.00000001.sdmp, pGKuRU.exe, 00000025.00000002.473835627.00000000032E1000.00000004.00000001.sdmp String found in binary or memory: http://127.0.0.1:HTTP/1.1
Source: pGKuRU.exe, 00000025.00000002.473835627.00000000032E1000.00000004.00000001.sdmp String found in binary or memory: http://DynDns.comDynDNS
Source: Request for Price Quotation.pdf.exe, 00000001.00000002.298842775.00000000051F0000.00000002.00000001.sdmp, pGKuRU.exe, 00000018.00000002.433918370.0000000005C40000.00000002.00000001.sdmp, pGKuRU.exe, 0000001A.00000002.450841292.0000000005BA0000.00000002.00000001.sdmp String found in binary or memory: http://fontfabrik.com
Source: pGKuRU.exe, 00000025.00000002.473835627.00000000032E1000.00000004.00000001.sdmp String found in binary or memory: http://lgGOBE.com
Source: Request for Price Quotation.pdf.exe, 00000001.00000002.298842775.00000000051F0000.00000002.00000001.sdmp, pGKuRU.exe, 00000018.00000002.433918370.0000000005C40000.00000002.00000001.sdmp, pGKuRU.exe, 0000001A.00000002.450841292.0000000005BA0000.00000002.00000001.sdmp String found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
Source: Request for Price Quotation.pdf.exe, 00000001.00000003.205550305.0000000005090000.00000004.00000001.sdmp String found in binary or memory: http://www.carterandcone.com
Source: Request for Price Quotation.pdf.exe, 00000001.00000002.298842775.00000000051F0000.00000002.00000001.sdmp, pGKuRU.exe, 00000018.00000002.433918370.0000000005C40000.00000002.00000001.sdmp, pGKuRU.exe, 0000001A.00000002.450841292.0000000005BA0000.00000002.00000001.sdmp String found in binary or memory: http://www.carterandcone.coml
Source: Request for Price Quotation.pdf.exe, 00000001.00000002.298842775.00000000051F0000.00000002.00000001.sdmp, pGKuRU.exe, 00000018.00000002.433918370.0000000005C40000.00000002.00000001.sdmp, pGKuRU.exe, 0000001A.00000002.450841292.0000000005BA0000.00000002.00000001.sdmp String found in binary or memory: http://www.fontbureau.com
Source: pGKuRU.exe, 0000001A.00000002.450841292.0000000005BA0000.00000002.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers
Source: Request for Price Quotation.pdf.exe, 00000001.00000002.298842775.00000000051F0000.00000002.00000001.sdmp, pGKuRU.exe, 00000018.00000002.433918370.0000000005C40000.00000002.00000001.sdmp, pGKuRU.exe, 0000001A.00000002.450841292.0000000005BA0000.00000002.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers/?
Source: Request for Price Quotation.pdf.exe, 00000001.00000002.298842775.00000000051F0000.00000002.00000001.sdmp, pGKuRU.exe, 00000018.00000002.433918370.0000000005C40000.00000002.00000001.sdmp, pGKuRU.exe, 0000001A.00000002.450841292.0000000005BA0000.00000002.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
Source: Request for Price Quotation.pdf.exe, 00000001.00000002.298842775.00000000051F0000.00000002.00000001.sdmp, pGKuRU.exe, 00000018.00000002.433918370.0000000005C40000.00000002.00000001.sdmp, pGKuRU.exe, 0000001A.00000002.450841292.0000000005BA0000.00000002.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
Source: Request for Price Quotation.pdf.exe, 00000001.00000003.210317209.000000000508D000.00000004.00000001.sdmp, Request for Price Quotation.pdf.exe, 00000001.00000002.298842775.00000000051F0000.00000002.00000001.sdmp, pGKuRU.exe, 00000018.00000002.433918370.0000000005C40000.00000002.00000001.sdmp, pGKuRU.exe, 0000001A.00000002.450841292.0000000005BA0000.00000002.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers8
Source: Request for Price Quotation.pdf.exe, 00000001.00000002.298842775.00000000051F0000.00000002.00000001.sdmp, pGKuRU.exe, 00000018.00000002.433918370.0000000005C40000.00000002.00000001.sdmp, pGKuRU.exe, 0000001A.00000002.450841292.0000000005BA0000.00000002.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designers?
Source: Request for Price Quotation.pdf.exe, 00000001.00000002.298842775.00000000051F0000.00000002.00000001.sdmp, pGKuRU.exe, 00000018.00000002.433918370.0000000005C40000.00000002.00000001.sdmp, pGKuRU.exe, 0000001A.00000002.450841292.0000000005BA0000.00000002.00000001.sdmp String found in binary or memory: http://www.fontbureau.com/designersG
Source: Request for Price Quotation.pdf.exe, 00000001.00000003.292449495.0000000005080000.00000004.00000001.sdmp String found in binary or memory: http://www.fontbureau.coma
Source: Request for Price Quotation.pdf.exe, 00000001.00000003.292449495.0000000005080000.00000004.00000001.sdmp String found in binary or memory: http://www.fontbureau.comrsiv
Source: Request for Price Quotation.pdf.exe, 00000001.00000002.298842775.00000000051F0000.00000002.00000001.sdmp, pGKuRU.exe, 00000018.00000002.433918370.0000000005C40000.00000002.00000001.sdmp, pGKuRU.exe, 0000001A.00000002.450841292.0000000005BA0000.00000002.00000001.sdmp String found in binary or memory: http://www.fonts.com
Source: Request for Price Quotation.pdf.exe, 00000001.00000003.203281814.000000000509B000.00000004.00000001.sdmp String found in binary or memory: http://www.fonts.com;
Source: Request for Price Quotation.pdf.exe, 00000001.00000003.203308968.000000000509B000.00000004.00000001.sdmp String found in binary or memory: http://www.fonts.comc
Source: Request for Price Quotation.pdf.exe, 00000001.00000003.203281814.000000000509B000.00000004.00000001.sdmp String found in binary or memory: http://www.fonts.comx
Source: Request for Price Quotation.pdf.exe, 00000001.00000003.204968127.0000000005084000.00000004.00000001.sdmp String found in binary or memory: http://www.founder.com.c
Source: Request for Price Quotation.pdf.exe, 00000001.00000003.204968127.0000000005084000.00000004.00000001.sdmp, pGKuRU.exe, 00000018.00000002.433918370.0000000005C40000.00000002.00000001.sdmp, pGKuRU.exe, 0000001A.00000002.450841292.0000000005BA0000.00000002.00000001.sdmp String found in binary or memory: http://www.founder.com.cn/cn
Source: Request for Price Quotation.pdf.exe, 00000001.00000003.204952436.00000000050BD000.00000004.00000001.sdmp String found in binary or memory: http://www.founder.com.cn/cn/
Source: Request for Price Quotation.pdf.exe, 00000001.00000002.298842775.00000000051F0000.00000002.00000001.sdmp, pGKuRU.exe, 00000018.00000002.433918370.0000000005C40000.00000002.00000001.sdmp, pGKuRU.exe, 0000001A.00000002.450841292.0000000005BA0000.00000002.00000001.sdmp String found in binary or memory: http://www.founder.com.cn/cn/bThe
Source: Request for Price Quotation.pdf.exe, 00000001.00000002.298842775.00000000051F0000.00000002.00000001.sdmp, pGKuRU.exe, 00000018.00000002.433918370.0000000005C40000.00000002.00000001.sdmp, pGKuRU.exe, 0000001A.00000002.450841292.0000000005BA0000.00000002.00000001.sdmp String found in binary or memory: http://www.founder.com.cn/cn/cThe
Source: Request for Price Quotation.pdf.exe, 00000001.00000003.204968127.0000000005084000.00000004.00000001.sdmp String found in binary or memory: http://www.founder.com.cn/cnS
Source: Request for Price Quotation.pdf.exe, 00000001.00000002.298842775.00000000051F0000.00000002.00000001.sdmp, pGKuRU.exe, 00000018.00000002.433918370.0000000005C40000.00000002.00000001.sdmp, pGKuRU.exe, 0000001A.00000002.450841292.0000000005BA0000.00000002.00000001.sdmp String found in binary or memory: http://www.galapagosdesign.com/DPlease
Source: Request for Price Quotation.pdf.exe, 00000001.00000002.298842775.00000000051F0000.00000002.00000001.sdmp, pGKuRU.exe, 00000018.00000002.433918370.0000000005C40000.00000002.00000001.sdmp, pGKuRU.exe, 0000001A.00000002.450841292.0000000005BA0000.00000002.00000001.sdmp String found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
Source: Request for Price Quotation.pdf.exe, 00000001.00000002.298842775.00000000051F0000.00000002.00000001.sdmp, pGKuRU.exe, 00000018.00000002.433918370.0000000005C40000.00000002.00000001.sdmp, pGKuRU.exe, 0000001A.00000002.450841292.0000000005BA0000.00000002.00000001.sdmp String found in binary or memory: http://www.goodfont.co.kr
Source: Request for Price Quotation.pdf.exe, 00000001.00000003.206601961.0000000005084000.00000004.00000001.sdmp, pGKuRU.exe, 00000018.00000002.433918370.0000000005C40000.00000002.00000001.sdmp, pGKuRU.exe, 0000001A.00000002.450841292.0000000005BA0000.00000002.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/
Source: Request for Price Quotation.pdf.exe, 00000001.00000003.206601961.0000000005084000.00000004.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp///
Source: Request for Price Quotation.pdf.exe, 00000001.00000003.206601961.0000000005084000.00000004.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/3
Source: Request for Price Quotation.pdf.exe, 00000001.00000003.206601961.0000000005084000.00000004.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/E
Source: Request for Price Quotation.pdf.exe, 00000001.00000003.206601961.0000000005084000.00000004.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/NegrW
Source: Request for Price Quotation.pdf.exe, 00000001.00000003.206601961.0000000005084000.00000004.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/Y0
Source: Request for Price Quotation.pdf.exe, 00000001.00000003.206601961.0000000005084000.00000004.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/fet
Source: Request for Price Quotation.pdf.exe, 00000001.00000003.206601961.0000000005084000.00000004.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/jp/
Source: Request for Price Quotation.pdf.exe, 00000001.00000003.206601961.0000000005084000.00000004.00000001.sdmp String found in binary or memory: http://www.jiyu-kobo.co.jp/uche.
Source: Request for Price Quotation.pdf.exe, 00000001.00000003.203330941.00000000050A4000.00000004.00000001.sdmp, Request for Price Quotation.pdf.exe, 00000001.00000002.298842775.00000000051F0000.00000002.00000001.sdmp, pGKuRU.exe, 00000018.00000002.433918370.0000000005C40000.00000002.00000001.sdmp, pGKuRU.exe, 0000001A.00000002.450841292.0000000005BA0000.00000002.00000001.sdmp String found in binary or memory: http://www.sajatypeworks.com
Source: Request for Price Quotation.pdf.exe, 00000001.00000003.203281814.000000000509B000.00000004.00000001.sdmp String found in binary or memory: http://www.sajatypeworks.coma-do
Source: Request for Price Quotation.pdf.exe, 00000001.00000003.203281814.000000000509B000.00000004.00000001.sdmp String found in binary or memory: http://www.sajatypeworks.comd
Source: Request for Price Quotation.pdf.exe, 00000001.00000002.298842775.00000000051F0000.00000002.00000001.sdmp, pGKuRU.exe, 00000018.00000002.433918370.0000000005C40000.00000002.00000001.sdmp, pGKuRU.exe, 0000001A.00000002.450841292.0000000005BA0000.00000002.00000001.sdmp String found in binary or memory: http://www.sakkal.com
Source: Request for Price Quotation.pdf.exe, 00000001.00000003.204521592.0000000005086000.00000004.00000001.sdmp, pGKuRU.exe, 00000018.00000002.433918370.0000000005C40000.00000002.00000001.sdmp, pGKuRU.exe, 0000001A.00000002.450841292.0000000005BA0000.00000002.00000001.sdmp String found in binary or memory: http://www.sandoll.co.kr
Source: Request for Price Quotation.pdf.exe, 00000001.00000003.204521592.0000000005086000.00000004.00000001.sdmp String found in binary or memory: http://www.sandoll.co.kre
Source: pGKuRU.exe, 0000001A.00000002.450841292.0000000005BA0000.00000002.00000001.sdmp String found in binary or memory: http://www.tiro.com
Source: Request for Price Quotation.pdf.exe, 00000001.00000003.203564065.000000000509B000.00000004.00000001.sdmp String found in binary or memory: http://www.tiro.comc
Source: Request for Price Quotation.pdf.exe, 00000001.00000003.203537866.000000000509B000.00000004.00000001.sdmp String found in binary or memory: http://www.tiro.comtn
Source: Request for Price Quotation.pdf.exe, 00000001.00000002.298842775.00000000051F0000.00000002.00000001.sdmp, pGKuRU.exe, 00000018.00000002.433918370.0000000005C40000.00000002.00000001.sdmp, pGKuRU.exe, 0000001A.00000002.450841292.0000000005BA0000.00000002.00000001.sdmp String found in binary or memory: http://www.typography.netD
Source: Request for Price Quotation.pdf.exe, 00000001.00000002.298842775.00000000051F0000.00000002.00000001.sdmp, pGKuRU.exe, 00000018.00000002.433918370.0000000005C40000.00000002.00000001.sdmp, pGKuRU.exe, 0000001A.00000002.450841292.0000000005BA0000.00000002.00000001.sdmp String found in binary or memory: http://www.urwpp.deDPlease
Source: Request for Price Quotation.pdf.exe, 00000001.00000002.298842775.00000000051F0000.00000002.00000001.sdmp, pGKuRU.exe, 00000018.00000002.433918370.0000000005C40000.00000002.00000001.sdmp, pGKuRU.exe, 0000001A.00000002.450841292.0000000005BA0000.00000002.00000001.sdmp String found in binary or memory: http://www.zhongyicts.com.cn
Source: Request for Price Quotation.pdf.exe, 00000001.00000002.303244062.000000000BED1000.00000004.00000001.sdmp, Request for Price Quotation.pdf.exe, 00000012.00000000.291844857.0000000000402000.00000040.00000001.sdmp, pGKuRU.exe, 00000018.00000002.431644231.00000000046D1000.00000004.00000001.sdmp, pGKuRU.exe, 0000001A.00000002.447980592.0000000004561000.00000004.00000001.sdmp, pGKuRU.exe, 00000021.00000000.429160919.0000000000402000.00000040.00000001.sdmp, pGKuRU.exe, 00000025.00000000.445224986.0000000000402000.00000040.00000001.sdmp String found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
Source: pGKuRU.exe, 00000025.00000002.473835627.00000000032E1000.00000004.00000001.sdmp String found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha

System Summary:

barindex
.NET source code contains very large array initializations
Source: 18.2.Request for Price Quotation.pdf.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b5BC708AEu002dEE51u002d4E9Eu002d8C5Au002d29C17F478EFEu007d/u003446AB6DCu002dB12Au002d4788u002d854Eu002d45AA3F287DBE.cs Large array initialization: .cctor: array initializer size 11916
Source: 18.0.Request for Price Quotation.pdf.exe.400000.1.unpack, u003cPrivateImplementationDetailsu003eu007b5BC708AEu002dEE51u002d4E9Eu002d8C5Au002d29C17F478EFEu007d/u003446AB6DCu002dB12Au002d4788u002d854Eu002d45AA3F287DBE.cs Large array initialization: .cctor: array initializer size 11916
.NET source code contains very large strings
Source: Request for Price Quotation.pdf.exe, ContactManagement/ContactForm.cs Long String: Length: 11840
Source: vRURxcnYJm.exe.1.dr, ContactManagement/ContactForm.cs Long String: Length: 11840
Source: 1.0.Request for Price Quotation.pdf.exe.580000.0.unpack, ContactManagement/ContactForm.cs Long String: Length: 11840
Source: 1.2.Request for Price Quotation.pdf.exe.580000.0.unpack, ContactManagement/ContactForm.cs Long String: Length: 11840
Source: 16.0.Request for Price Quotation.pdf.exe.300000.0.unpack, ContactManagement/ContactForm.cs Long String: Length: 11840
Source: 16.2.Request for Price Quotation.pdf.exe.300000.0.unpack, ContactManagement/ContactForm.cs Long String: Length: 11840
Source: pGKuRU.exe.18.dr, ContactManagement/ContactForm.cs Long String: Length: 11840
Source: 18.2.Request for Price Quotation.pdf.exe.b70000.1.unpack, ContactManagement/ContactForm.cs Long String: Length: 11840
Source: 18.0.Request for Price Quotation.pdf.exe.b70000.0.unpack, ContactManagement/ContactForm.cs Long String: Length: 11840
Source: 18.0.Request for Price Quotation.pdf.exe.b70000.2.unpack, ContactManagement/ContactForm.cs Long String: Length: 11840
Source: 24.2.pGKuRU.exe.fd0000.0.unpack, ContactManagement/ContactForm.cs Long String: Length: 11840
Source: 24.0.pGKuRU.exe.fd0000.0.unpack, ContactManagement/ContactForm.cs Long String: Length: 11840
Source: 26.0.pGKuRU.exe.ee0000.0.unpack, ContactManagement/ContactForm.cs Long String: Length: 11840
Initial sample is a PE file and has a suspicious name
Source: initial sample Static PE information: Filename: Request for Price Quotation.pdf.exe
Source: initial sample Static PE information: Filename: Request for Price Quotation.pdf.exe
Contains functionality to call native functions
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_06282A0E NtQuerySystemInformation, 1_2_06282A0E
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_062829D4 NtQuerySystemInformation, 1_2_062829D4
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 18_2_013FB0BA NtQuerySystemInformation, 18_2_013FB0BA
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 18_2_013FB089 NtQuerySystemInformation, 18_2_013FB089
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_072527F2 NtQuerySystemInformation, 24_2_072527F2
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_072527BC NtQuerySystemInformation, 24_2_072527BC
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_058C26A6 NtQuerySystemInformation, 26_2_058C26A6
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_058C2675 NtQuerySystemInformation, 26_2_058C2675
Detected potential crypto function
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_0101F538 1_2_0101F538
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_01017958 1_2_01017958
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_01010180 1_2_01010180
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_010141D8 1_2_010141D8
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_01014828 1_2_01014828
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_010120B8 1_2_010120B8
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_0101B0E0 1_2_0101B0E0
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_0101273C 1_2_0101273C
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_0101E7D8 1_2_0101E7D8
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_010197D8 1_2_010197D8
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_01019BF0 1_2_01019BF0
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_01013E78 1_2_01013E78
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_01013678 1_2_01013678
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_0101AEA8 1_2_0101AEA8
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_010156B0 1_2_010156B0
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_0101DD00 1_2_0101DD00
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_0101DD10 1_2_0101DD10
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_01018960 1_2_01018960
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_0101F170 1_2_0101F170
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_01018980 1_2_01018980
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_01017580 1_2_01017580
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_01017590 1_2_01017590
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_01016408 1_2_01016408
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_010120A9 1_2_010120A9
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_010170C1 1_2_010170C1
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_01019F40 1_2_01019F40
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_01019F50 1_2_01019F50
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_01018F50 1_2_01018F50
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_01012B70 1_2_01012B70
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_01017788 1_2_01017788
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_01017798 1_2_01017798
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_0101E7C7 1_2_0101E7C7
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_010197C8 1_2_010197C8
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_01019BE0 1_2_01019BE0
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_010163F9 1_2_010163F9
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_01015669 1_2_01015669
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_0101AE99 1_2_0101AE99
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_0101CEC4 1_2_0101CEC4
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_0101CEC8 1_2_0101CEC8
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_010142F0 1_2_010142F0
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_0CC30070 1_2_0CC30070
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_03322733 24_2_03322733
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_0332E758 24_2_0332E758
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_03323678 24_2_03323678
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_03323E78 24_2_03323E78
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_033256B0 24_2_033256B0
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_0332AEA8 24_2_0332AEA8
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_03327958 24_2_03327958
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_03320180 24_2_03320180
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_033241D3 24_2_033241D3
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_03324823 24_2_03324823
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_03322421 24_2_03322421
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_033220B8 24_2_033220B8
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_0332B0E0 24_2_0332B0E0
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_03322B70 24_2_03322B70
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_03329F50 24_2_03329F50
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_03328F50 24_2_03328F50
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_03329F40 24_2_03329F40
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_0332E748 24_2_0332E748
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_03327798 24_2_03327798
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_03327788 24_2_03327788
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_03329BF0 24_2_03329BF0
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_033263F9 24_2_033263F9
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_03329BE0 24_2_03329BE0
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_033297D8 24_2_033297D8
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_033283DC 24_2_033283DC
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_033297C8 24_2_033297C8
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_03325667 24_2_03325667
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_0332AE99 24_2_0332AE99
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_033242F0 24_2_033242F0
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_0332CEC3 24_2_0332CEC3
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_0332CEC8 24_2_0332CEC8
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_0332DD10 24_2_0332DD10
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_0332DD00 24_2_0332DD00
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_03320170 24_2_03320170
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_0332ADBB 24_2_0332ADBB
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_03327590 24_2_03327590
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_03328980 24_2_03328980
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_03327580 24_2_03327580
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_033235D8 24_2_033235D8
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_03328426 24_2_03328426
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_03326408 24_2_03326408
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_033220A9 24_2_033220A9
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_0332A497 24_2_0332A497
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_033270C1 24_2_033270C1
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_07D519CD 24_2_07D519CD
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_07D50070 24_2_07D50070
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_07D51ABA 24_2_07D51ABA
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_07D50006 24_2_07D50006
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_05717958 26_2_05717958
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_057141D3 26_2_057141D3
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_05713DB8 26_2_05713DB8
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_05710180 26_2_05710180
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_05714823 26_2_05714823
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_0571B0E0 26_2_0571B0E0
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_057120B8 26_2_057120B8
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_0571E758 26_2_0571E758
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_05712733 26_2_05712733
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_05713678 26_2_05713678
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_057156B0 26_2_057156B0
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_0571AEA8 26_2_0571AEA8
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_05710170 26_2_05710170
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_0571555B 26_2_0571555B
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_0571895F 26_2_0571895F
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_0571894B 26_2_0571894B
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_0571DD10 26_2_0571DD10
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_05717919 26_2_05717919
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_0571DD00 26_2_0571DD00
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_05713DF8 26_2_05713DF8
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_05715DE0 26_2_05715DE0
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_057135D8 26_2_057135D8
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_05717590 26_2_05717590
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_05718980 26_2_05718980
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_05717580 26_2_05717580
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_05718427 26_2_05718427
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_05716408 26_2_05716408
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_057170C1 26_2_057170C1
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_057120A9 26_2_057120A9
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_057140A8 26_2_057140A8
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_05712B70 26_2_05712B70
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_05719F50 26_2_05719F50
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_05718F50 26_2_05718F50
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_05719BF0 26_2_05719BF0
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_057163F9 26_2_057163F9
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_05719BE0 26_2_05719BE0
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_057197D8 26_2_057197D8
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_057183DC 26_2_057183DC
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_057197C8 26_2_057197C8
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_05717798 26_2_05717798
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_05717788 26_2_05717788
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_05713E78 26_2_05713E78
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_05716660 26_2_05716660
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_0571363B 26_2_0571363B
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_057142F0 26_2_057142F0
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_0571CEC8 26_2_0571CEC8
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_057142A0 26_2_057142A0
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_0571AE9B 26_2_0571AE9B
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_07C60070 26_2_07C60070
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_07C60007 26_2_07C60007
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_07C6003C 26_2_07C6003C
Sample file is different than original file name gathered from version info
Source: Request for Price Quotation.pdf.exe, 00000001.00000002.303591199.000000000CA70000.00000002.00000001.sdmp Binary or memory string: originalfilename vs Request for Price Quotation.pdf.exe
Source: Request for Price Quotation.pdf.exe, 00000001.00000002.303591199.000000000CA70000.00000002.00000001.sdmp Binary or memory string: OriginalFilenamepropsys.dll.mui@ vs Request for Price Quotation.pdf.exe
Source: Request for Price Quotation.pdf.exe, 00000001.00000002.296240189.0000000002CD1000.00000004.00000001.sdmp Binary or memory string: OriginalFilenameMGJMJfWcOlHYGCsdlWbhHsPUysKpteyohndxgT.exe4 vs Request for Price Quotation.pdf.exe
Source: Request for Price Quotation.pdf.exe, 00000001.00000002.302366710.0000000006C80000.00000002.00000001.sdmp Binary or memory string: System.OriginalFileName vs Request for Price Quotation.pdf.exe
Source: Request for Price Quotation.pdf.exe, 00000001.00000002.299993869.0000000006290000.00000004.00000001.sdmp Binary or memory string: OriginalFilenameWindowsNetwork.dll> vs Request for Price Quotation.pdf.exe
Source: Request for Price Quotation.pdf.exe, 00000001.00000002.296955820.0000000002D13000.00000004.00000001.sdmp Binary or memory string: OriginalFilenameMajorRevision.exe< vs Request for Price Quotation.pdf.exe
Source: Request for Price Quotation.pdf.exe, 00000001.00000002.293718622.00000000005F8000.00000002.00020000.sdmp Binary or memory string: OriginalFilenamezRdH.exeF vs Request for Price Quotation.pdf.exe
Source: Request for Price Quotation.pdf.exe, 00000001.00000002.301723615.0000000006930000.00000002.00000001.sdmp Binary or memory string: OriginalFilenamemscorrc.dllT vs Request for Price Quotation.pdf.exe
Source: Request for Price Quotation.pdf.exe, 00000010.00000000.289699259.0000000000378000.00000002.00020000.sdmp Binary or memory string: OriginalFilenamezRdH.exeF vs Request for Price Quotation.pdf.exe
Source: Request for Price Quotation.pdf.exe, 00000012.00000002.476550547.0000000006300000.00000004.00000001.sdmp Binary or memory string: OriginalFilenamezRdH.exeF vs Request for Price Quotation.pdf.exe
Source: Request for Price Quotation.pdf.exe, 00000012.00000002.475378599.0000000005700000.00000002.00000001.sdmp Binary or memory string: OriginalFilenameKernelbase.dll.muij% vs Request for Price Quotation.pdf.exe
Source: Request for Price Quotation.pdf.exe, 00000012.00000002.468490022.0000000000402000.00000040.00000001.sdmp Binary or memory string: OriginalFilenameMGJMJfWcOlHYGCsdlWbhHsPUysKpteyohndxgT.exe4 vs Request for Price Quotation.pdf.exe
Source: Request for Price Quotation.pdf.exe, 00000012.00000002.476304225.0000000005C20000.00000002.00000001.sdmp Binary or memory string: OriginalFilenamewbemdisp.tlbj% vs Request for Price Quotation.pdf.exe
Source: Request for Price Quotation.pdf.exe Binary or memory string: OriginalFilenamezRdH.exeF vs Request for Price Quotation.pdf.exe
Uses 32bit PE files
Source: Request for Price Quotation.pdf.exe Static PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: Request for Price Quotation.pdf.exe Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: vRURxcnYJm.exe.1.dr Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: pGKuRU.exe.18.dr Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: Request for Price Quotation.pdf.exe, ContactManagement/ContactForm.cs Cryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: vRURxcnYJm.exe.1.dr, ContactManagement/ContactForm.cs Cryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: 1.0.Request for Price Quotation.pdf.exe.580000.0.unpack, ContactManagement/ContactForm.cs Cryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: 1.2.Request for Price Quotation.pdf.exe.580000.0.unpack, ContactManagement/ContactForm.cs Cryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: 16.0.Request for Price Quotation.pdf.exe.300000.0.unpack, ContactManagement/ContactForm.cs Cryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: 16.2.Request for Price Quotation.pdf.exe.300000.0.unpack, ContactManagement/ContactForm.cs Cryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
Source: classification engine Classification label: mal100.troj.evad.winEXE@20/8@0/0
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_0628253E AdjustTokenPrivileges, 1_2_0628253E
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_06282507 AdjustTokenPrivileges, 1_2_06282507
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 18_2_013FAF3E AdjustTokenPrivileges, 18_2_013FAF3E
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 18_2_013FAF07 AdjustTokenPrivileges, 18_2_013FAF07
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_0725252A AdjustTokenPrivileges, 24_2_0725252A
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_072524F3 AdjustTokenPrivileges, 24_2_072524F3
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_058C252A AdjustTokenPrivileges, 26_2_058C252A
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_058C24F3 AdjustTokenPrivileges, 26_2_058C24F3
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe File created: C:\Users\user\AppData\Roaming\vRURxcnYJm.exe Jump to behavior
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6636:120:WilError_01
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6012:120:WilError_01
Source: C:\Windows\System32\conhost.exe Mutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6048:120:WilError_01
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Mutant created: \Sessions\1\BaseNamedObjects\mFTSjiuFKGsZaFFdHZPfwAJpA
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe File created: C:\Users\user\AppData\Local\Temp\tmpD822.tmp Jump to behavior
Source: Request for Price Quotation.pdf.exe Static PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Section loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Section loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Section loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Section loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Section loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Section loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Section loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Section loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Section loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Section loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Section loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Section loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Section loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Section loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Section loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Section loaded: C:\Windows\assembly\NativeImages_v2.0.50727_32\mscorlib\9603718106bd57ecfbb18fefd769cab4\mscorlib.ni.dll
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Section loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlp
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Section loaded: C:\Windows\assembly\GAC_32\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlp
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe File read: C:\Users\user\Desktop\desktop.ini Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Key opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers Jump to behavior
Source: Request for Price Quotation.pdf.exe ReversingLabs: Detection: 21%
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe File read: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Jump to behavior
Source: unknown Process created: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe 'C:\Users\user\Desktop\Request for Price Quotation.pdf.exe'
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\vRURxcnYJm' /XML 'C:\Users\user\AppData\Local\Temp\tmpD822.tmp'
Source: C:\Windows\SysWOW64\schtasks.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process created: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe {path}
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process created: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe {path}
Source: unknown Process created: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe 'C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe'
Source: unknown Process created: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe 'C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe'
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\vRURxcnYJm' /XML 'C:\Users\user\AppData\Local\Temp\tmpD30D.tmp'
Source: C:\Windows\SysWOW64\schtasks.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process created: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe {path}
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\vRURxcnYJm' /XML 'C:\Users\user\AppData\Local\Temp\tmpF0F5.tmp'
Source: C:\Windows\SysWOW64\schtasks.exe Process created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process created: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe {path}
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\vRURxcnYJm' /XML 'C:\Users\user\AppData\Local\Temp\tmpD822.tmp' Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process created: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe {path} Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process created: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe {path} Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\vRURxcnYJm' /XML 'C:\Users\user\AppData\Local\Temp\tmpD30D.tmp' Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process created: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe {path} Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\vRURxcnYJm' /XML 'C:\Users\user\AppData\Local\Temp\tmpF0F5.tmp' Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process created: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe {path} Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32 Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe File opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dll Jump to behavior
Source: Request for Price Quotation.pdf.exe Static PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe File opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_d08c58b4442ba54f\MSVCR80.dll Jump to behavior
Source: Request for Price Quotation.pdf.exe Static PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: Binary string: mscorrc.pdb source: Request for Price Quotation.pdf.exe, 00000001.00000002.301723615.0000000006930000.00000002.00000001.sdmp, pGKuRU.exe, 00000018.00000002.435175637.0000000006D50000.00000002.00000001.sdmp, pGKuRU.exe, 0000001A.00000002.451550450.0000000006CA0000.00000002.00000001.sdmp

Data Obfuscation:

barindex
.NET source code contains method to dynamically call methods (often used by packers)
Source: Request for Price Quotation.pdf.exe, ContactManagement/ContactForm.cs .Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
Source: vRURxcnYJm.exe.1.dr, ContactManagement/ContactForm.cs .Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
Source: 1.0.Request for Price Quotation.pdf.exe.580000.0.unpack, ContactManagement/ContactForm.cs .Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
Source: 1.2.Request for Price Quotation.pdf.exe.580000.0.unpack, ContactManagement/ContactForm.cs .Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
Source: 16.0.Request for Price Quotation.pdf.exe.300000.0.unpack, ContactManagement/ContactForm.cs .Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
Source: 16.2.Request for Price Quotation.pdf.exe.300000.0.unpack, ContactManagement/ContactForm.cs .Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
Source: pGKuRU.exe.18.dr, ContactManagement/ContactForm.cs .Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
Source: 18.2.Request for Price Quotation.pdf.exe.b70000.1.unpack, ContactManagement/ContactForm.cs .Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
Source: 18.0.Request for Price Quotation.pdf.exe.b70000.0.unpack, ContactManagement/ContactForm.cs .Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
Source: 18.0.Request for Price Quotation.pdf.exe.b70000.2.unpack, ContactManagement/ContactForm.cs .Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
Source: 24.2.pGKuRU.exe.fd0000.0.unpack, ContactManagement/ContactForm.cs .Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
Source: 24.0.pGKuRU.exe.fd0000.0.unpack, ContactManagement/ContactForm.cs .Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
Source: 26.0.pGKuRU.exe.ee0000.0.unpack, ContactManagement/ContactForm.cs .Net Code: LateBinding.LateCall(V_1, null, "Invoke", new object[] { 0, V_0 }, null, null)
Uses code obfuscation techniques (call, push, ret)
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_00EF7807 push ds; ret 1_2_00EF7816
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_00EF7990 push ss; ret 1_2_00EF7996
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_00EF790A push ss; ret 1_2_00EF795A
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_00EF5E34 push ds; ret 1_2_00EF5E36
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_01012CCE push cs; ret 1_2_01012CEF
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_0CC31383 push es; ret 1_2_0CC3138A
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_0CC31397 push cs; ret 1_2_0CC3139E
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_0CC313A3 push cs; ret 1_2_0CC313A6
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_0CC313B3 push cs; ret 1_2_0CC313BA
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_0CC31355 push cs; ret 1_2_0CC3135A
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_0CC3135B push es; ret 1_2_0CC3136E
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_0CC31463 push es; ret 1_2_0CC3146E
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_0CC3146F push es; ret 1_2_0CC3147E
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_0CC3147F push cs; ret 1_2_0CC31482
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_0CC30007 push ds; ret 1_2_0CC3001E
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Code function: 1_2_0CC3142B push cs; ret 1_2_0CC3142E
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 24_2_03322CCE push cs; ret 24_2_03322CEF
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Code function: 26_2_05712CE8 push cs; ret 26_2_05712CEF
Source: initial sample Static PE information: section name: .text entropy: 7.68662347155
Source: initial sample Static PE information: section name: .text entropy: 7.68662347155
Source: initial sample Static PE information: section name: .text entropy: 7.68662347155

Persistence and Installation Behavior:

barindex
Drops PE files
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe File created: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Jump to dropped file
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe File created: C:\Users\user\AppData\Roaming\vRURxcnYJm.exe Jump to dropped file

Boot Survival:

barindex
Uses schtasks.exe or at.exe to add and modify task schedules
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\vRURxcnYJm' /XML 'C:\Users\user\AppData\Local\Temp\tmpD822.tmp'
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Registry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run pGKuRU Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Registry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run pGKuRU Jump to behavior

Hooking and other Techniques for Hiding and Protection:

barindex
Hides that the sample has been downloaded from the Internet (zone.identifier)
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe File opened: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe:Zone.Identifier read attributes | delete Jump to behavior
Uses an obfuscated file name to hide its real file extension (double extension)
Source: Possible double extension: pdf.exe Static PE information: Request for Price Quotation.pdf.exe
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion:

barindex
Yara detected AntiVM3
Source: Yara match File source: Process Memory Space: Request for Price Quotation.pdf.exe PID: 6496, type: MEMORY
Source: Yara match File source: Process Memory Space: pGKuRU.exe PID: 5644, type: MEMORY
Source: Yara match File source: Process Memory Space: pGKuRU.exe PID: 6744, type: MEMORY
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe WMI Queries: IWbemServices::ExecQuery - ROOT\cimv2 : SELECT * FROM Win32_VideoController
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe WMI Queries: IWbemServices::ExecQuery - ROOT\cimv2 : SELECT * FROM Win32_VideoController
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe WMI Queries: IWbemServices::ExecQuery - ROOT\cimv2 : SELECT * FROM Win32_VideoController
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Source: Request for Price Quotation.pdf.exe, 00000001.00000002.296240189.0000000002CD1000.00000004.00000001.sdmp, pGKuRU.exe, 00000018.00000002.431012049.0000000003702000.00000004.00000001.sdmp, pGKuRU.exe, 0000001A.00000002.447069014.0000000003592000.00000004.00000001.sdmp Binary or memory string: WINE_GET_UNIX_FILE_NAME
Source: Request for Price Quotation.pdf.exe, 00000001.00000002.296240189.0000000002CD1000.00000004.00000001.sdmp, pGKuRU.exe, 00000018.00000002.431012049.0000000003702000.00000004.00000001.sdmp, pGKuRU.exe, 0000001A.00000002.447069014.0000000003592000.00000004.00000001.sdmp Binary or memory string: SBIEDLL.DLL
Contains capabilities to detect virtual machines
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DEVICEMAP\Scsi\Scsi Port 0\Scsi Bus 0\Target Id 0\Logical Unit Id 0 name: Identifier Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: SystemBiosVersion Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Registry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\0000 name: DriverDesc Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe File opened / queried: SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#5&280b647&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b} Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Registry key queried: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum name: 0 Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Registry key queried: HKEY_LOCAL_MACHINE\HARDWARE\DESCRIPTION\System name: VideoBiosVersion Jump to behavior
Contains long sleeps (>= 3 min)
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Thread delayed: delay time: 922337203685477
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Window / User API: threadDelayed 428 Jump to behavior
May sleep (evasive loops) to hinder dynamic analysis
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe TID: 6552 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe TID: 4152 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe TID: 4152 Thread sleep count: 428 > 30 Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe TID: 4152 Thread sleep time: -12840000s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe TID: 7024 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe TID: 1936 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe TID: 3980 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe TID: 6188 Thread sleep time: -922337203685477s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe TID: 6188 Thread sleep time: -90000s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe TID: 6188 Thread sleep time: -30000s >= -30000s Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe TID: 3636 Thread sleep time: -922337203685477s >= -30000s
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe TID: 3636 Thread sleep time: -510000s >= -30000s
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe WMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
Sample execution stops while process was sleeping (likely an evasion)
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Last function: Thread delayed
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Last function: Thread delayed
Source: C:\Windows\System32\conhost.exe Last function: Thread delayed
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Last function: Thread delayed
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Thread delayed: delay time: 30000 Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Thread delayed: delay time: 922337203685477 Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Thread delayed: delay time: 30000 Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Thread delayed: delay time: 30000 Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Thread delayed: delay time: 922337203685477
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Thread delayed: delay time: 30000
Source: pGKuRU.exe, 0000001A.00000002.447069014.0000000003592000.00000004.00000001.sdmp Binary or memory string: kr#"SOFTWARE\VMware, Inc.\VMware Tools
Source: pGKuRU.exe, 0000001A.00000002.447069014.0000000003592000.00000004.00000001.sdmp Binary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
Source: Request for Price Quotation.pdf.exe, 00000012.00000002.475378599.0000000005700000.00000002.00000001.sdmp, pGKuRU.exe, 00000021.00000002.448452037.0000000005900000.00000002.00000001.sdmp, pGKuRU.exe, 00000025.00000002.476006527.0000000005680000.00000002.00000001.sdmp Binary or memory string: A Virtual Machine could not be started because Hyper-V is not installed.
Source: pGKuRU.exe, 0000001A.00000002.447069014.0000000003592000.00000004.00000001.sdmp Binary or memory string: vmware
Source: pGKuRU.exe, 0000001A.00000002.447069014.0000000003592000.00000004.00000001.sdmp Binary or memory string: krA"SOFTWARE\VMware, Inc.\VMware Tools
Source: pGKuRU.exe, 0000001A.00000002.447069014.0000000003592000.00000004.00000001.sdmp Binary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
Source: pGKuRU.exe, 0000001A.00000002.447069014.0000000003592000.00000004.00000001.sdmp Binary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
Source: pGKuRU.exe, 0000001A.00000002.447069014.0000000003592000.00000004.00000001.sdmp Binary or memory string: kr87HKEY_LOCAL_MACHINE\SOFTWARE\VMware, Inc.\VMware Tools\.
Source: pGKuRU.exe, 0000001A.00000002.447069014.0000000003592000.00000004.00000001.sdmp Binary or memory string: VMWARE
Source: pGKuRU.exe, 0000001A.00000002.447069014.0000000003592000.00000004.00000001.sdmp Binary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
Source: Request for Price Quotation.pdf.exe, 00000012.00000002.475378599.0000000005700000.00000002.00000001.sdmp, pGKuRU.exe, 00000021.00000002.448452037.0000000005900000.00000002.00000001.sdmp, pGKuRU.exe, 00000025.00000002.476006527.0000000005680000.00000002.00000001.sdmp Binary or memory string: A communication protocol error has occurred between the Hyper-V Host and Guest Compute Service.
Source: Request for Price Quotation.pdf.exe, 00000012.00000002.475378599.0000000005700000.00000002.00000001.sdmp, pGKuRU.exe, 00000021.00000002.448452037.0000000005900000.00000002.00000001.sdmp, pGKuRU.exe, 00000025.00000002.476006527.0000000005680000.00000002.00000001.sdmp Binary or memory string: The communication protocol version between the Hyper-V Host and Guest Compute Services is not supported.
Source: pGKuRU.exe, 0000001A.00000002.447069014.0000000003592000.00000004.00000001.sdmp Binary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
Source: pGKuRU.exe, 0000001A.00000002.447069014.0000000003592000.00000004.00000001.sdmp Binary or memory string: VMware SVGA II
Source: pGKuRU.exe, 0000001A.00000002.447069014.0000000003592000.00000004.00000001.sdmp Binary or memory string: kr&%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
Source: pGKuRU.exe, 0000001A.00000002.447069014.0000000003592000.00000004.00000001.sdmp Binary or memory string: kr#"SOFTWARE\VMware, Inc.\VMware ToolsH
Source: pGKuRU.exe, 0000001A.00000002.447069014.0000000003592000.00000004.00000001.sdmp Binary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
Source: Request for Price Quotation.pdf.exe, 00000012.00000002.475378599.0000000005700000.00000002.00000001.sdmp, pGKuRU.exe, 00000021.00000002.448452037.0000000005900000.00000002.00000001.sdmp, pGKuRU.exe, 00000025.00000002.476006527.0000000005680000.00000002.00000001.sdmp Binary or memory string: An unknown internal message was received by the Hyper-V Compute Service.
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process information queried: ProcessInformation Jump to behavior

Anti Debugging:

barindex
Enables debug privileges
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process token adjusted: Debug Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process token adjusted: Debug
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Memory allocated: page read and write | page guard Jump to behavior

HIPS / PFW / Operating System Protection Evasion:

barindex
Injects a PE file into a foreign processes
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Memory written: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe base: 400000 value starts with: 4D5A Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Memory written: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe base: 400000 value starts with: 4D5A Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Memory written: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe base: 400000 value starts with: 4D5A Jump to behavior
Creates a process in suspended mode (likely to inject code)
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\vRURxcnYJm' /XML 'C:\Users\user\AppData\Local\Temp\tmpD822.tmp' Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process created: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe {path} Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Process created: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe {path} Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\vRURxcnYJm' /XML 'C:\Users\user\AppData\Local\Temp\tmpD30D.tmp' Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process created: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe {path} Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process created: C:\Windows\SysWOW64\schtasks.exe 'C:\Windows\System32\schtasks.exe' /Create /TN 'Updates\vRURxcnYJm' /XML 'C:\Users\user\AppData\Local\Temp\tmpF0F5.tmp' Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Process created: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe {path} Jump to behavior
Source: Request for Price Quotation.pdf.exe, 00000012.00000002.471573774.0000000001A40000.00000002.00000001.sdmp, pGKuRU.exe, 00000025.00000002.471547458.0000000001990000.00000002.00000001.sdmp Binary or memory string: Program Manager
Source: Request for Price Quotation.pdf.exe, 00000012.00000002.471573774.0000000001A40000.00000002.00000001.sdmp, pGKuRU.exe, 00000025.00000002.471547458.0000000001990000.00000002.00000001.sdmp Binary or memory string: Shell_TrayWnd
Source: Request for Price Quotation.pdf.exe, 00000012.00000002.471573774.0000000001A40000.00000002.00000001.sdmp, pGKuRU.exe, 00000025.00000002.471547458.0000000001990000.00000002.00000001.sdmp Binary or memory string: Progman
Source: Request for Price Quotation.pdf.exe, 00000012.00000002.471573774.0000000001A40000.00000002.00000001.sdmp, pGKuRU.exe, 00000025.00000002.471547458.0000000001990000.00000002.00000001.sdmp Binary or memory string: Progmanlock

Language, Device and Operating System Detection:

barindex
Queries the volume information (name, serial number etc) of a device
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\arial.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\comic.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\comici.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\consola.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\constan.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\constani.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\cour.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\couri.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\framd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\impact.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\taile.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\pala.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\palai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\palab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\Fonts\micross.ttf VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation Jump to behavior
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Queries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Queries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Queries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation Jump to behavior
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Queries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
Source: C:\Users\user\AppData\Roaming\pGKuRU\pGKuRU.exe Queries volume information: C:\Windows\assembly\GAC_32\CustomMarshalers\2.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformation
Source: C:\Users\user\Desktop\Request for Price Quotation.pdf.exe Key value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid Jump to behavior

Stealing of Sensitive Information:

barindex
Yara detected AgentTesla
Source: Yara match File source: 00000021.00000000.429160919.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000025.00000000.445224986.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000025.00000002.468461465.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.303244062.000000000BED1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000012.00000000.291844857.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000012.00000002.468490022.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000018.00000002.431644231.00000000046D1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.297905164.0000000003CD1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000021.00000002.446501477.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000001A.00000002.447980592.0000000004561000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 33.0.pGKuRU.exe.400000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 37.2.pGKuRU.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 33.2.pGKuRU.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 24.2.pGKuRU.exe.47d45f0.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 26.2.pGKuRU.exe.46645f0.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 24.2.pGKuRU.exe.47d45f0.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 26.2.pGKuRU.exe.46645f0.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.Request for Price Quotation.pdf.exe.bf72ab8.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 37.0.pGKuRU.exe.400000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.Request for Price Quotation.pdf.exe.bf72ab8.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 18.2.Request for Price Quotation.pdf.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 18.0.Request for Price Quotation.pdf.exe.400000.1.unpack, type: UNPACKEDPE
Yara detected AgentTesla
Source: Yara match File source: 00000021.00000000.429160919.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000012.00000002.473375885.00000000032D1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000025.00000000.445224986.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000025.00000002.468461465.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.303244062.000000000BED1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000012.00000000.291844857.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000012.00000002.468490022.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000018.00000002.431644231.00000000046D1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000025.00000002.473835627.00000000032E1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.297905164.0000000003CD1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000021.00000002.446501477.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000021.00000002.447853207.00000000035A1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000001A.00000002.447980592.0000000004561000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: Request for Price Quotation.pdf.exe PID: 6748, type: MEMORY
Source: Yara match File source: Process Memory Space: Request for Price Quotation.pdf.exe PID: 6496, type: MEMORY
Source: Yara match File source: Process Memory Space: pGKuRU.exe PID: 6276, type: MEMORY
Source: Yara match File source: Process Memory Space: pGKuRU.exe PID: 5644, type: MEMORY
Source: Yara match File source: Process Memory Space: pGKuRU.exe PID: 808, type: MEMORY
Source: Yara match File source: Process Memory Space: pGKuRU.exe PID: 6744, type: MEMORY
Source: Yara match File source: 33.0.pGKuRU.exe.400000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 37.2.pGKuRU.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 33.2.pGKuRU.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 24.2.pGKuRU.exe.47d45f0.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 26.2.pGKuRU.exe.46645f0.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 24.2.pGKuRU.exe.47d45f0.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 26.2.pGKuRU.exe.46645f0.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.Request for Price Quotation.pdf.exe.bf72ab8.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 37.0.pGKuRU.exe.400000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.Request for Price Quotation.pdf.exe.bf72ab8.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 18.2.Request for Price Quotation.pdf.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 18.0.Request for Price Quotation.pdf.exe.400000.1.unpack, type: UNPACKEDPE
Yara detected Credential Stealer
Source: Yara match File source: 00000012.00000002.473375885.00000000032D1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000025.00000002.473835627.00000000032E1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000021.00000002.447853207.00000000035A1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: Request for Price Quotation.pdf.exe PID: 6748, type: MEMORY
Source: Yara match File source: Process Memory Space: pGKuRU.exe PID: 6276, type: MEMORY
Source: Yara match File source: Process Memory Space: pGKuRU.exe PID: 808, type: MEMORY

Remote Access Functionality:

barindex
Yara detected AgentTesla
Source: Yara match File source: 00000021.00000000.429160919.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000025.00000000.445224986.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000025.00000002.468461465.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.303244062.000000000BED1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000012.00000000.291844857.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000012.00000002.468490022.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000018.00000002.431644231.00000000046D1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.297905164.0000000003CD1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000021.00000002.446501477.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000001A.00000002.447980592.0000000004561000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 33.0.pGKuRU.exe.400000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 37.2.pGKuRU.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 33.2.pGKuRU.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 24.2.pGKuRU.exe.47d45f0.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 26.2.pGKuRU.exe.46645f0.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 24.2.pGKuRU.exe.47d45f0.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 26.2.pGKuRU.exe.46645f0.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.Request for Price Quotation.pdf.exe.bf72ab8.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 37.0.pGKuRU.exe.400000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.Request for Price Quotation.pdf.exe.bf72ab8.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 18.2.Request for Price Quotation.pdf.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 18.0.Request for Price Quotation.pdf.exe.400000.1.unpack, type: UNPACKEDPE
Yara detected AgentTesla
Source: Yara match File source: 00000021.00000000.429160919.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000012.00000002.473375885.00000000032D1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000025.00000000.445224986.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000025.00000002.468461465.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.303244062.000000000BED1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000012.00000000.291844857.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000012.00000002.468490022.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000018.00000002.431644231.00000000046D1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000025.00000002.473835627.00000000032E1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000001.00000002.297905164.0000000003CD1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000021.00000002.446501477.0000000000402000.00000040.00000001.sdmp, type: MEMORY
Source: Yara match File source: 00000021.00000002.447853207.00000000035A1000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: 0000001A.00000002.447980592.0000000004561000.00000004.00000001.sdmp, type: MEMORY
Source: Yara match File source: Process Memory Space: Request for Price Quotation.pdf.exe PID: 6748, type: MEMORY
Source: Yara match File source: Process Memory Space: Request for Price Quotation.pdf.exe PID: 6496, type: MEMORY
Source: Yara match File source: Process Memory Space: pGKuRU.exe PID: 6276, type: MEMORY
Source: Yara match File source: Process Memory Space: pGKuRU.exe PID: 5644, type: MEMORY
Source: Yara match File source: Process Memory Space: pGKuRU.exe PID: 808, type: MEMORY
Source: Yara match File source: Process Memory Space: pGKuRU.exe PID: 6744, type: MEMORY
Source: Yara match File source: 33.0.pGKuRU.exe.400000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 37.2.pGKuRU.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 33.2.pGKuRU.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 24.2.pGKuRU.exe.47d45f0.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 26.2.pGKuRU.exe.46645f0.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 24.2.pGKuRU.exe.47d45f0.2.unpack, type: UNPACKEDPE
Source: Yara match File source: 26.2.pGKuRU.exe.46645f0.2.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.Request for Price Quotation.pdf.exe.bf72ab8.8.unpack, type: UNPACKEDPE
Source: Yara match File source: 37.0.pGKuRU.exe.400000.1.unpack, type: UNPACKEDPE
Source: Yara match File source: 1.2.Request for Price Quotation.pdf.exe.bf72ab8.8.raw.unpack, type: UNPACKEDPE
Source: Yara match File source: 18.2.Request for Price Quotation.pdf.exe.400000.0.unpack, type: UNPACKEDPE
Source: Yara match File source: 18.0.Request for Price Quotation.pdf.exe.400000.1.unpack, type: UNPACKEDPE
No contacted IP infos