Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
RFQ pdf.exe

Overview

General Information

Sample Name:RFQ pdf.exe
Analysis ID:708249
MD5:2186990b3fc8fb51de0d235276613505
SHA1:5e8223137622466c1eca35271586dd6824fb5b1c
SHA256:e2d1f7e5fe7da6323d2b8105d8aabfbcaf21603059a05c263e14cc079b371718
Tags:exeSnakeKeylogger
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Snake Keylogger
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Yara detected AntiVM3
Snort IDS alert for network traffic
.NET source code references suspicious native API functions
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
May check the online IP address of the machine
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Yara detected Generic Downloader
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
One or more processes crash
May sleep (evasive loops) to hinder dynamic analysis
Internet Provider seen in connection with other malware
Detected potential crypto function
Yara detected Credential Stealer
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Sample file is different than original file name gathered from version info
PE file contains strange resources
Uses a known web browser user agent for HTTP communication
Checks if the current process is being debugged
Binary contains a suspicious time stamp
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • RFQ pdf.exe (PID: 3868 cmdline: "C:\Users\user\Desktop\RFQ pdf.exe" MD5: 2186990B3FC8FB51DE0D235276613505)
    • RFQ pdf.exe (PID: 3672 cmdline: C:\Users\user\Desktop\RFQ pdf.exe MD5: 2186990B3FC8FB51DE0D235276613505)
      • WerFault.exe (PID: 3096 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 1516 MD5: 9E2B8ACAD48ECCA55C0230D63623661B)
  • cleanup
{"Exfil Mode": "Telegram", "Telegram Token": "5149109129:AAGFSJSlChXwgqfifOahBX2gfNaVHTpF5Mk", "Telegram ID": "2014219704"}
SourceRuleDescriptionAuthorStrings
00000002.00000000.276779694.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
    00000002.00000000.276779694.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
      00000002.00000000.276779694.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000002.00000000.276779694.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
        • 0x18584:$x1: $%SMTPDV$
        • 0x1724a:$x2: $#TheHashHere%&
        • 0x1852c:$x3: %FTPDV$
        • 0x1722c:$x4: $%TelegramDv$
        • 0x14b41:$x5: KeyLoggerEventArgs
        • 0x14ed7:$x5: KeyLoggerEventArgs
        • 0x185b0:$m1: | Snake Keylogger
        • 0x18656:$m1: | Snake Keylogger
        • 0x187aa:$m1: | Snake Keylogger
        • 0x188d0:$m1: | Snake Keylogger
        • 0x18a2a:$m1: | Snake Keylogger
        • 0x18550:$m2: Clipboard Logs ID
        • 0x18760:$m2: Screenshot Logs ID
        • 0x18874:$m2: keystroke Logs ID
        • 0x18a60:$m3: SnakePW
        • 0x18738:$m4: \SnakeKeylogger\
        00000002.00000000.276779694.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0x13948:$a1: get_encryptedPassword
        • 0x13c34:$a2: get_encryptedUsername
        • 0x13754:$a3: get_timePasswordChanged
        • 0x1384f:$a4: get_passwordField
        • 0x1395e:$a5: set_encryptedPassword
        • 0x14f74:$a7: get_logins
        • 0x14ed7:$a10: KeyLoggerEventArgs
        • 0x14b41:$a11: KeyLoggerEventArgsEventHandler
        Click to see the 17 entries
        SourceRuleDescriptionAuthorStrings
        2.0.RFQ pdf.exe.400000.0.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
        • 0x1b084:$a2: \Comodo\Dragon\User Data\Default\Login Data
        • 0x1a26d:$a3: \Google\Chrome\User Data\Default\Login Data
        • 0x1a6b4:$a4: \Orbitum\User Data\Default\Login Data
        • 0x1b835:$a5: \Kometa\User Data\Default\Login Data
        2.0.RFQ pdf.exe.400000.0.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
          2.0.RFQ pdf.exe.400000.0.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
            2.0.RFQ pdf.exe.400000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
              2.0.RFQ pdf.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                Click to see the 32 entries
                No Sigma rule has matched
                Timestamp:192.168.2.6193.122.6.16849721802842536 09/23/22-08:12:30.599509
                SID:2842536
                Source Port:49721
                Destination Port:80
                Protocol:TCP
                Classtype:A Network Trojan was detected

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: RFQ pdf.exeVirustotal: Detection: 40%Perma Link
                Source: RFQ pdf.exeReversingLabs: Detection: 20%
                Source: RFQ pdf.exeJoe Sandbox ML: detected
                Source: 2.0.RFQ pdf.exe.400000.0.unpackAvira: Label: TR/ATRAPS.Gen
                Source: 2.0.RFQ pdf.exe.400000.0.unpackMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "Telegram", "Telegram Token": "5149109129:AAGFSJSlChXwgqfifOahBX2gfNaVHTpF5Mk", "Telegram ID": "2014219704"}
                Source: RFQ pdf.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: RFQ pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: System.Windows.Forms.pdb source: WER7306.tmp.dmp.13.dr
                Source: Binary string: System.Core.ni.pdbRSDSD source: WER7306.tmp.dmp.13.dr
                Source: Binary string: System.Xml.ni.pdb source: WER7306.tmp.dmp.13.dr
                Source: Binary string: mscorlib.pdb source: WER7306.tmp.dmp.13.dr
                Source: Binary string: System.ni.pdbRSDS source: WER7306.tmp.dmp.13.dr
                Source: Binary string: C:\Users\user\Desktop\RFQ pdf.PDB source: RFQ pdf.exe, 00000002.00000000.294251297.0000000000977000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: RFQ pdf.PDB05 source: RFQ pdf.exe, 00000002.00000000.294251297.0000000000977000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: mscorlib.ni.pdb source: WER7306.tmp.dmp.13.dr
                Source: Binary string: System.Configuration.ni.pdbRSDSO* source: WER7306.tmp.dmp.13.dr
                Source: Binary string: System.Configuration.pdbj source: WER7306.tmp.dmp.13.dr
                Source: Binary string: System.Core.pdb source: WER7306.tmp.dmp.13.dr
                Source: Binary string: System.Configuration.ni.pdb source: WER7306.tmp.dmp.13.dr
                Source: Binary string: (Pij0C:\Windows\mscorlib.pdb source: RFQ pdf.exe, 00000002.00000000.294251297.0000000000977000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: mscorlib.ni.pdbRSDS source: WER7306.tmp.dmp.13.dr
                Source: Binary string: System.Core.pdb% source: WER7306.tmp.dmp.13.dr
                Source: Binary string: System.Configuration.pdb source: WER7306.tmp.dmp.13.dr
                Source: Binary string: MC:\Users\user\Desktop\RFQ pdf.PDB@ source: RFQ pdf.exe, 00000002.00000000.294251297.0000000000977000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: System.Xml.ni.pdbRSDS source: WER7306.tmp.dmp.13.dr
                Source: Binary string: System.Xml.pdb source: WER7306.tmp.dmp.13.dr
                Source: Binary string: System.ni.pdb source: WER7306.tmp.dmp.13.dr
                Source: Binary string: System.pdb source: WER7306.tmp.dmp.13.dr
                Source: Binary string: Microsoft.VisualBasic.pdb source: WER7306.tmp.dmp.13.dr
                Source: Binary string: System.Core.ni.pdb source: WER7306.tmp.dmp.13.dr

                Networking

                barindex
                Source: TrafficSnort IDS: 2842536 ETPRO TROJAN 404/Snake/Matiex Keylogger Style External IP Check 192.168.2.6:49721 -> 193.122.6.168:80
                Source: C:\Users\user\Desktop\RFQ pdf.exeDNS query: name: checkip.dyndns.org
                Source: C:\Users\user\Desktop\RFQ pdf.exeDNS query: name: checkip.dyndns.org
                Source: C:\Users\user\Desktop\RFQ pdf.exeDNS query: name: checkip.dyndns.org
                Source: C:\Users\user\Desktop\RFQ pdf.exeDNS query: name: checkip.dyndns.org
                Source: Yara matchFile source: 2.0.RFQ pdf.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.RFQ pdf.exe.3b91da0.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.RFQ pdf.exe.3af6a18.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.RFQ pdf.exe.3ad53f8.10.raw.unpack, type: UNPACKEDPE
                Source: Joe Sandbox ViewASN Name: ORACLE-BMC-31898US ORACLE-BMC-31898US
                Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: RFQ pdf.exe, 00000002.00000000.296286193.0000000002B41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                Source: RFQ pdf.exe, 00000002.00000000.295643828.0000000002AA1000.00000004.00000800.00020000.00000000.sdmp, RFQ pdf.exe, 00000002.00000000.296286193.0000000002B41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: RFQ pdf.exe, 00000002.00000000.295643828.0000000002AA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: RFQ pdf.exe, 00000000.00000002.285058685.0000000003AD5000.00000004.00000800.00020000.00000000.sdmp, RFQ pdf.exe, 00000002.00000000.276779694.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: RFQ pdf.exe, 00000002.00000000.295643828.0000000002AA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org4
                Source: RFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://fontfabrik.com
                Source: RFQ pdf.exe, 00000002.00000000.295643828.0000000002AA1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: RFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: RFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                Source: RFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                Source: RFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                Source: RFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                Source: RFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                Source: RFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-jones.html
                Source: RFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                Source: RFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                Source: RFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                Source: RFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                Source: RFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                Source: RFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                Source: RFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                Source: RFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                Source: RFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                Source: RFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                Source: RFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                Source: RFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                Source: RFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                Source: RFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                Source: RFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                Source: RFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                Source: RFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                Source: RFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                Source: RFQ pdf.exe, 00000000.00000002.285058685.0000000003AD5000.00000004.00000800.00020000.00000000.sdmp, RFQ pdf.exe, 00000002.00000000.276779694.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                Source: unknownDNS traffic detected: queries for: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive

                System Summary

                barindex
                Source: 2.0.RFQ pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 2.0.RFQ pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 2.0.RFQ pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 2.0.RFQ pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.RFQ pdf.exe.3af6a18.8.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.RFQ pdf.exe.3af6a18.8.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.RFQ pdf.exe.3af6a18.8.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.RFQ pdf.exe.3af6a18.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.RFQ pdf.exe.3b91da0.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.RFQ pdf.exe.3b91da0.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.RFQ pdf.exe.3b91da0.9.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.RFQ pdf.exe.3b91da0.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.RFQ pdf.exe.3af6a18.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.RFQ pdf.exe.3af6a18.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.RFQ pdf.exe.3af6a18.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.RFQ pdf.exe.3ad53f8.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
                Source: 0.2.RFQ pdf.exe.3ad53f8.10.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 0.2.RFQ pdf.exe.3ad53f8.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000002.00000000.276779694.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 00000002.00000000.276779694.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.285058685.0000000003AD5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: 00000000.00000002.285058685.0000000003AD5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: RFQ pdf.exe PID: 3868, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: Process Memory Space: RFQ pdf.exe PID: 3868, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: RFQ pdf.exe PID: 3672, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
                Source: Process Memory Space: RFQ pdf.exe PID: 3672, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: RFQ pdf.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 2.0.RFQ pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 2.0.RFQ pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 2.0.RFQ pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 2.0.RFQ pdf.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.RFQ pdf.exe.3af6a18.8.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 0.2.RFQ pdf.exe.3af6a18.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.RFQ pdf.exe.3af6a18.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.RFQ pdf.exe.3af6a18.8.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.RFQ pdf.exe.3b91da0.9.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: 0.2.RFQ pdf.exe.3b91da0.9.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.RFQ pdf.exe.3b91da0.9.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.RFQ pdf.exe.3b91da0.9.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.RFQ pdf.exe.3af6a18.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.RFQ pdf.exe.3af6a18.8.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.RFQ pdf.exe.3af6a18.8.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.RFQ pdf.exe.3ad53f8.10.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
                Source: 0.2.RFQ pdf.exe.3ad53f8.10.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 0.2.RFQ pdf.exe.3ad53f8.10.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000002.00000000.276779694.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 00000002.00000000.276779694.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.285058685.0000000003AD5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: 00000000.00000002.285058685.0000000003AD5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: RFQ pdf.exe PID: 3868, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: Process Memory Space: RFQ pdf.exe PID: 3868, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: RFQ pdf.exe PID: 3672, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
                Source: Process Memory Space: RFQ pdf.exe PID: 3672, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 1516
                Source: C:\Users\user\Desktop\RFQ pdf.exeCode function: 0_2_00E6C1740_2_00E6C174
                Source: C:\Users\user\Desktop\RFQ pdf.exeCode function: 0_2_00E6E76A0_2_00E6E76A
                Source: C:\Users\user\Desktop\RFQ pdf.exeCode function: 0_2_00E6E7780_2_00E6E778
                Source: RFQ pdf.exe, 00000000.00000002.289241472.0000000008190000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs RFQ pdf.exe
                Source: RFQ pdf.exe, 00000000.00000002.283489819.00000000038F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMetal.dllJ vs RFQ pdf.exe
                Source: RFQ pdf.exe, 00000000.00000002.282566547.00000000029AB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs RFQ pdf.exe
                Source: RFQ pdf.exe, 00000000.00000002.285058685.0000000003AD5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs RFQ pdf.exe
                Source: RFQ pdf.exe, 00000000.00000002.285058685.0000000003AD5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMetal.dllJ vs RFQ pdf.exe
                Source: RFQ pdf.exe, 00000000.00000002.282536796.00000000029A2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs RFQ pdf.exe
                Source: RFQ pdf.exe, 00000000.00000002.282064235.00000000028F1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameWebName.dll4 vs RFQ pdf.exe
                Source: RFQ pdf.exe, 00000000.00000002.282302542.000000000293F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs RFQ pdf.exe
                Source: RFQ pdf.exe, 00000000.00000002.289118066.0000000008120000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameTargetParameterCount.dll> vs RFQ pdf.exe
                Source: RFQ pdf.exe, 00000000.00000000.237367976.00000000004F2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDcCI.exeF vs RFQ pdf.exe
                Source: RFQ pdf.exe, 00000000.00000002.289308515.0000000008330000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMetal.dllJ vs RFQ pdf.exe
                Source: RFQ pdf.exe, 00000002.00000000.277130065.0000000000422000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameYFGGCVyufgtwfyuTGFWTVFAUYVF.exeX vs RFQ pdf.exe
                Source: RFQ pdf.exeBinary or memory string: OriginalFilenameDcCI.exeF vs RFQ pdf.exe
                Source: RFQ pdf.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: RFQ pdf.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: RFQ pdf.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
                Source: RFQ pdf.exeVirustotal: Detection: 40%
                Source: RFQ pdf.exeReversingLabs: Detection: 20%
                Source: C:\Users\user\Desktop\RFQ pdf.exeFile read: C:\Users\user\Desktop\RFQ pdf.exeJump to behavior
                Source: RFQ pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\RFQ pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\RFQ pdf.exe "C:\Users\user\Desktop\RFQ pdf.exe"
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess created: C:\Users\user\Desktop\RFQ pdf.exe C:\Users\user\Desktop\RFQ pdf.exe
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 1516
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess created: C:\Users\user\Desktop\RFQ pdf.exe C:\Users\user\Desktop\RFQ pdf.exeJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RFQ pdf.exe.logJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\WER7306.tmpJump to behavior
                Source: classification engineClassification label: mal100.troj.evad.winEXE@4/5@2/1
                Source: RFQ pdf.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                Source: C:\Users\user\Desktop\RFQ pdf.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess3672
                Source: 2.0.RFQ pdf.exe.400000.0.unpack, ?ufffd?Om/?????.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
                Source: 2.0.RFQ pdf.exe.400000.0.unpack, ufffd???ufffd/u2964ufffd?ufffd?.csCryptographic APIs: 'TransformFinalBlock'
                Source: C:\Users\user\Desktop\RFQ pdf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: RFQ pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: RFQ pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: RFQ pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: System.Windows.Forms.pdb source: WER7306.tmp.dmp.13.dr
                Source: Binary string: System.Core.ni.pdbRSDSD source: WER7306.tmp.dmp.13.dr
                Source: Binary string: System.Xml.ni.pdb source: WER7306.tmp.dmp.13.dr
                Source: Binary string: mscorlib.pdb source: WER7306.tmp.dmp.13.dr
                Source: Binary string: System.ni.pdbRSDS source: WER7306.tmp.dmp.13.dr
                Source: Binary string: C:\Users\user\Desktop\RFQ pdf.PDB source: RFQ pdf.exe, 00000002.00000000.294251297.0000000000977000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: RFQ pdf.PDB05 source: RFQ pdf.exe, 00000002.00000000.294251297.0000000000977000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: mscorlib.ni.pdb source: WER7306.tmp.dmp.13.dr
                Source: Binary string: System.Configuration.ni.pdbRSDSO* source: WER7306.tmp.dmp.13.dr
                Source: Binary string: System.Configuration.pdbj source: WER7306.tmp.dmp.13.dr
                Source: Binary string: System.Core.pdb source: WER7306.tmp.dmp.13.dr
                Source: Binary string: System.Configuration.ni.pdb source: WER7306.tmp.dmp.13.dr
                Source: Binary string: (Pij0C:\Windows\mscorlib.pdb source: RFQ pdf.exe, 00000002.00000000.294251297.0000000000977000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: mscorlib.ni.pdbRSDS source: WER7306.tmp.dmp.13.dr
                Source: Binary string: System.Core.pdb% source: WER7306.tmp.dmp.13.dr
                Source: Binary string: System.Configuration.pdb source: WER7306.tmp.dmp.13.dr
                Source: Binary string: MC:\Users\user\Desktop\RFQ pdf.PDB@ source: RFQ pdf.exe, 00000002.00000000.294251297.0000000000977000.00000004.00000010.00020000.00000000.sdmp
                Source: Binary string: System.Xml.ni.pdbRSDS source: WER7306.tmp.dmp.13.dr
                Source: Binary string: System.Xml.pdb source: WER7306.tmp.dmp.13.dr
                Source: Binary string: System.ni.pdb source: WER7306.tmp.dmp.13.dr
                Source: Binary string: System.pdb source: WER7306.tmp.dmp.13.dr
                Source: Binary string: Microsoft.VisualBasic.pdb source: WER7306.tmp.dmp.13.dr
                Source: Binary string: System.Core.ni.pdb source: WER7306.tmp.dmp.13.dr

                Data Obfuscation

                barindex
                Source: RFQ pdf.exe, order_management_system.cs.Net Code: ResourceTemplateDefine System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: 0.0.RFQ pdf.exe.4f0000.0.unpack, order_management_system.cs.Net Code: ResourceTemplateDefine System.Reflection.Assembly System.Reflection.Assembly::Load(System.Byte[])
                Source: RFQ pdf.exeStatic PE information: 0xD08A45BE [Wed Nov 13 11:25:50 2080 UTC]
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: 00000000.00000002.282302542.000000000293F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RFQ pdf.exe PID: 3868, type: MEMORYSTR
                Source: RFQ pdf.exe, 00000000.00000002.282302542.000000000293F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: RFQ pdf.exe, 00000000.00000002.282302542.000000000293F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME VIDEOBIOSVERSION
                Source: C:\Users\user\Desktop\RFQ pdf.exe TID: 3808Thread sleep time: -41226s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exe TID: 2044Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeThread delayed: delay time: 41226Jump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: RFQ pdf.exe, 00000000.00000002.282302542.000000000293F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
                Source: RFQ pdf.exe, 00000000.00000002.282302542.000000000293F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: QEMUTSOFTWARE\Oracle\VirtualBox Guest Additions
                Source: RFQ pdf.exe, 00000000.00000002.282302542.000000000293F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWARE
                Source: RFQ pdf.exe, 00000000.00000002.282302542.000000000293F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\NSYSTEM\ControlSet001\Services\Disk\Enum
                Source: RFQ pdf.exe, 00000000.00000002.282302542.000000000293F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
                Source: RFQ pdf.exe, 00000000.00000002.282302542.000000000293F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\Settings$Device DescriptionDSOFTWARE\VMware, Inc.\VMware Tools
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: 2.0.RFQ pdf.exe.400000.0.unpack, ufffd???ufffd/u2964ufffd?ufffd?.csReference to suspicious API methods: ('?K?U?', 'MapVirtualKey@user32.dll')
                Source: 2.0.RFQ pdf.exe.400000.0.unpack, m??ufffd?/A???ufffd.csReference to suspicious API methods: ('?K???', 'LoadLibrary@kernel32.dll'), ('?C???', 'GetProcAddress@kernel32')
                Source: C:\Users\user\Desktop\RFQ pdf.exeMemory written: C:\Users\user\Desktop\RFQ pdf.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeProcess created: C:\Users\user\Desktop\RFQ pdf.exe C:\Users\user\Desktop\RFQ pdf.exeJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Users\user\Desktop\RFQ pdf.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\BAUHS93.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\BELLB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSDB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\BROADW.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\CALIFR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\CHILLER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\COLONNA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\FTLTLT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\HARLOWSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\HTOWERT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\HTOWERTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\JOKERMAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\KUNSTLER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\LBRITE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\LBRITED.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\LFAX.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\LFAXD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\LFAXI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\MOD20.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\NIAGSOL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\OLDENGL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\PARCHM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\PLAYBILL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\RAVIE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\INFROMAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\SHOWG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\SNAP____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\STENCIL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\VINERITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\LATINWD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\TCM_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\TCMI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\TCBI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\TCCM____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\TCCEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\SCRIPTBL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\ROCK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\ROCKI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\ROCKEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\ROCKBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\ROCC____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\ROCCB___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\RAGE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\PER_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\PERI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\PERB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\PERBI___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\PALSCRI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\OCRAEXT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\MAIAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\LSANS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\LSANSDI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\GOUDYSTO.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\GOUDOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\GIL_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\GILBI___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\GILC____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\GLSNECB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\FRABK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\FELIXTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\ERASLGHT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\ENGR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\ELEPHNTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\ITCEDSCR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\CURLZ___.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\COPRGTL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\CASTELAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\CALISTI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\CALISTB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\ITCBLKAD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Users\user\Desktop\RFQ pdf.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 2.0.RFQ pdf.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.RFQ pdf.exe.3af6a18.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.RFQ pdf.exe.3b91da0.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.RFQ pdf.exe.3af6a18.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.RFQ pdf.exe.3ad53f8.10.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000000.276779694.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.285058685.0000000003AD5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RFQ pdf.exe PID: 3868, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RFQ pdf.exe PID: 3672, type: MEMORYSTR
                Source: Yara matchFile source: 2.0.RFQ pdf.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.RFQ pdf.exe.3af6a18.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.RFQ pdf.exe.3b91da0.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.RFQ pdf.exe.3af6a18.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.RFQ pdf.exe.3ad53f8.10.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000000.276779694.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.285058685.0000000003AD5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RFQ pdf.exe PID: 3868, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RFQ pdf.exe PID: 3672, type: MEMORYSTR
                Source: Yara matchFile source: 2.0.RFQ pdf.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.RFQ pdf.exe.3af6a18.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.RFQ pdf.exe.3b91da0.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.RFQ pdf.exe.3af6a18.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.RFQ pdf.exe.3ad53f8.10.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000000.276779694.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.285058685.0000000003AD5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RFQ pdf.exe PID: 3868, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RFQ pdf.exe PID: 3672, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 2.0.RFQ pdf.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.RFQ pdf.exe.3af6a18.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.RFQ pdf.exe.3b91da0.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.RFQ pdf.exe.3af6a18.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.RFQ pdf.exe.3ad53f8.10.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000000.276779694.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.285058685.0000000003AD5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RFQ pdf.exe PID: 3868, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RFQ pdf.exe PID: 3672, type: MEMORYSTR
                Source: Yara matchFile source: 2.0.RFQ pdf.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.RFQ pdf.exe.3af6a18.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.RFQ pdf.exe.3b91da0.9.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.RFQ pdf.exe.3af6a18.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.RFQ pdf.exe.3ad53f8.10.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000000.276779694.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.285058685.0000000003AD5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RFQ pdf.exe PID: 3868, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RFQ pdf.exe PID: 3672, type: MEMORYSTR
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid Accounts1
                Native API
                Path Interception111
                Process Injection
                1
                Masquerading
                OS Credential Dumping111
                Security Software Discovery
                Remote Services11
                Archive Collected Data
                Exfiltration Over Other Network Medium1
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                Disable or Modify Tools
                LSASS Memory1
                Process Discovery
                Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth1
                Ingress Tool Transfer
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)31
                Virtualization/Sandbox Evasion
                Security Account Manager31
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration2
                Non-Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
                Process Injection
                NTDS1
                Remote System Discovery
                Distributed Component Object ModelInput CaptureScheduled Transfer12
                Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA Secrets1
                System Network Configuration Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Replication Through Removable MediaLaunchdRc.commonRc.common11
                Software Packing
                Cached Domain Credentials12
                System Information Discovery
                VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                External Remote ServicesScheduled TaskStartup ItemsStartup Items1
                Timestomp
                DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                RFQ pdf.exe40%VirustotalBrowse
                RFQ pdf.exe21%ReversingLabsByteCode-MSIL.Spyware.SnakeLogger
                RFQ pdf.exe100%Joe Sandbox ML
                No Antivirus matches
                SourceDetectionScannerLabelLinkDownload
                2.0.RFQ pdf.exe.400000.0.unpack100%AviraTR/ATRAPS.GenDownload File
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://www.founder.com.cn/cn/bThe0%URL Reputationsafe
                http://www.tiro.com0%URL Reputationsafe
                http://checkip.dyndns.org0%URL Reputationsafe
                http://www.goodfont.co.kr0%URL Reputationsafe
                http://www.carterandcone.coml0%URL Reputationsafe
                http://www.sajatypeworks.com0%URL Reputationsafe
                http://checkip.dyndns.org40%URL Reputationsafe
                http://www.typography.netD0%URL Reputationsafe
                http://www.founder.com.cn/cn/cThe0%URL Reputationsafe
                http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
                http://fontfabrik.com0%URL Reputationsafe
                http://www.founder.com.cn/cn0%URL Reputationsafe
                http://checkip.dyndns.org/0%URL Reputationsafe
                http://checkip.dyndns.org/q0%URL Reputationsafe
                http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
                http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
                http://www.sandoll.co.kr0%URL Reputationsafe
                http://checkip.dyndns.com0%URL Reputationsafe
                http://www.urwpp.deDPlease0%URL Reputationsafe
                http://www.zhongyicts.com.cn0%URL Reputationsafe
                http://www.sakkal.com0%URL Reputationsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                checkip.dyndns.com
                193.122.6.168
                truetrue
                  unknown
                  checkip.dyndns.org
                  unknown
                  unknowntrue
                    unknown
                    NameMaliciousAntivirus DetectionReputation
                    http://checkip.dyndns.org/true
                    • URL Reputation: safe
                    unknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://www.apache.org/licenses/LICENSE-2.0RFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.fontbureau.comRFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.fontbureau.com/designersGRFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.fontbureau.com/designers/?RFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.founder.com.cn/cn/bTheRFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            https://api.telegram.org/botRFQ pdf.exe, 00000000.00000002.285058685.0000000003AD5000.00000004.00000800.00020000.00000000.sdmp, RFQ pdf.exe, 00000002.00000000.276779694.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                              high
                              http://www.fontbureau.com/designers?RFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.tiro.comRFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://checkip.dyndns.orgRFQ pdf.exe, 00000002.00000000.295643828.0000000002AA1000.00000004.00000800.00020000.00000000.sdmp, RFQ pdf.exe, 00000002.00000000.296286193.0000000002B41000.00000004.00000800.00020000.00000000.sdmpfalse
                                • URL Reputation: safe
                                unknown
                                http://www.fontbureau.com/designersRFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.goodfont.co.krRFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.carterandcone.comlRFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.sajatypeworks.comRFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://checkip.dyndns.org4RFQ pdf.exe, 00000002.00000000.295643828.0000000002AA1000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.typography.netDRFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.fontbureau.com/designers/cabarga.htmlNRFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.founder.com.cn/cn/cTheRFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.galapagosdesign.com/staff/dennis.htmRFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://fontfabrik.comRFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.founder.com.cn/cnRFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpfalse
                                    • URL Reputation: safe
                                    unknown
                                    http://www.fontbureau.com/designers/frere-jones.htmlRFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://checkip.dyndns.org/qRFQ pdf.exe, 00000000.00000002.285058685.0000000003AD5000.00000004.00000800.00020000.00000000.sdmp, RFQ pdf.exe, 00000002.00000000.276779694.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.jiyu-kobo.co.jp/RFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.galapagosdesign.com/DPleaseRFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpfalse
                                      • URL Reputation: safe
                                      unknown
                                      http://www.fontbureau.com/designers8RFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.fonts.comRFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://www.sandoll.co.krRFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://checkip.dyndns.comRFQ pdf.exe, 00000002.00000000.296286193.0000000002B41000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.urwpp.deDPleaseRFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://www.zhongyicts.com.cnRFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpfalse
                                          • URL Reputation: safe
                                          unknown
                                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRFQ pdf.exe, 00000002.00000000.295643828.0000000002AA1000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.sakkal.comRFQ pdf.exe, 00000000.00000002.287208764.0000000006952000.00000004.00000800.00020000.00000000.sdmpfalse
                                            • URL Reputation: safe
                                            unknown
                                            • No. of IPs < 25%
                                            • 25% < No. of IPs < 50%
                                            • 50% < No. of IPs < 75%
                                            • 75% < No. of IPs
                                            IPDomainCountryFlagASNASN NameMalicious
                                            193.122.6.168
                                            checkip.dyndns.comUnited States
                                            31898ORACLE-BMC-31898UStrue
                                            Joe Sandbox Version:36.0.0 Rainbow Opal
                                            Analysis ID:708249
                                            Start date and time:2022-09-23 08:11:14 +02:00
                                            Joe Sandbox Product:CloudBasic
                                            Overall analysis duration:0h 9m 23s
                                            Hypervisor based Inspection enabled:false
                                            Report type:full
                                            Sample file name:RFQ pdf.exe
                                            Cookbook file name:default.jbs
                                            Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                                            Number of analysed new started processes analysed:24
                                            Number of new started drivers analysed:0
                                            Number of existing processes analysed:0
                                            Number of existing drivers analysed:0
                                            Number of injected processes analysed:0
                                            Technologies:
                                            • HCA enabled
                                            • EGA enabled
                                            • HDC enabled
                                            • AMSI enabled
                                            Analysis Mode:default
                                            Analysis stop reason:Timeout
                                            Detection:MAL
                                            Classification:mal100.troj.evad.winEXE@4/5@2/1
                                            EGA Information:
                                            • Successful, ratio: 100%
                                            HDC Information:Failed
                                            HCA Information:
                                            • Successful, ratio: 100%
                                            • Number of executed functions: 9
                                            • Number of non-executed functions: 3
                                            Cookbook Comments:
                                            • Found application associated with file extension: .exe
                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, RuntimeBroker.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe, wuapihost.exe
                                            • Excluded IPs from analysis (whitelisted): 80.67.82.235, 80.67.82.211, 52.168.117.173
                                            • Excluded domains from analysis (whitelisted): onedsblobprdeus16.eastus.cloudapp.azure.com, fs.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, watson.telemetry.microsoft.com, a1449.dscg2.akamai.net, arc.msn.com
                                            • Not all processes where analyzed, report is missing behavior information
                                            • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                            • Report size getting too big, too many NtSetInformationFile calls found.
                                            TimeTypeDescription
                                            08:12:19API Interceptor1x Sleep call for process: RFQ pdf.exe modified
                                            08:12:40API Interceptor1x Sleep call for process: WerFault.exe modified
                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                            193.122.6.168Arrival_Percel No00929887355..exeGet hashmaliciousBrowse
                                            • checkip.dyndns.org/
                                            qwOpaDGcHJ.exeGet hashmaliciousBrowse
                                            • checkip.dyndns.org/
                                            4b9SFahCuA.exeGet hashmaliciousBrowse
                                            • checkip.dyndns.org/
                                            specification.docGet hashmaliciousBrowse
                                            • checkip.dyndns.org/
                                            Z9kN4mToxe.exeGet hashmaliciousBrowse
                                            • checkip.dyndns.org/
                                            e7waae4AKB.exeGet hashmaliciousBrowse
                                            • checkip.dyndns.org/
                                            Specification Accommodation Work Boats.exeGet hashmaliciousBrowse
                                            • checkip.dyndns.org/
                                            22-391-002458.jsGet hashmaliciousBrowse
                                            • checkip.dyndns.org/
                                            oQTCIEEZYa.exeGet hashmaliciousBrowse
                                            • checkip.dyndns.org/
                                            PO-0017pdf (2).exeGet hashmaliciousBrowse
                                            • checkip.dyndns.org/
                                            DHL Airwaybill.exeGet hashmaliciousBrowse
                                            • checkip.dyndns.org/
                                            NEW_SHEGHENG CRUSHER_PORT CALL.exeGet hashmaliciousBrowse
                                            • checkip.dyndns.org/
                                            fattura 007034866.vbsGet hashmaliciousBrowse
                                            • checkip.dyndns.org/
                                            AUG. & SEPT. SOA.exeGet hashmaliciousBrowse
                                            • checkip.dyndns.org/
                                            Prueba de pago.exeGet hashmaliciousBrowse
                                            • checkip.dyndns.org/
                                            DHL Airwaybill.exeGet hashmaliciousBrowse
                                            • checkip.dyndns.org/
                                            vbc.exeGet hashmaliciousBrowse
                                            • checkip.dyndns.org/
                                            PO33138.xlsxGet hashmaliciousBrowse
                                            • checkip.dyndns.org/
                                            Akibet.pdf.exeGet hashmaliciousBrowse
                                            • checkip.dyndns.org/
                                            sDPFvvS59Q.exeGet hashmaliciousBrowse
                                            • checkip.dyndns.org/
                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                            checkip.dyndns.com22588SANZI.exeGet hashmaliciousBrowse
                                            • 193.122.130.0
                                            Arrival_Percel No00929887355..exeGet hashmaliciousBrowse
                                            • 193.122.6.168
                                            IMG-1300466.exeGet hashmaliciousBrowse
                                            • 132.226.247.73
                                            Specifications_Details_RFQ.exeGet hashmaliciousBrowse
                                            • 132.226.247.73
                                            INV012000.exeGet hashmaliciousBrowse
                                            • 132.226.247.73
                                            Wtughrrlt.exeGet hashmaliciousBrowse
                                            • 132.226.247.73
                                            rWLEI3BVkx.exeGet hashmaliciousBrowse
                                            • 193.122.130.0
                                            qwOpaDGcHJ.exeGet hashmaliciousBrowse
                                            • 193.122.6.168
                                            4b9SFahCuA.exeGet hashmaliciousBrowse
                                            • 193.122.6.168
                                            specification.docGet hashmaliciousBrowse
                                            • 193.122.6.168
                                            Order#6875480.xlsxGet hashmaliciousBrowse
                                            • 158.101.44.242
                                            49HDD3uFb8.exeGet hashmaliciousBrowse
                                            • 158.101.44.242
                                            RFQ pdf.exeGet hashmaliciousBrowse
                                            • 193.122.130.0
                                            BBVA-Confirming Liquidaci#Ufffdn por Factorizaci#Ufffdn de Cr#Ufffdditos.vbsGet hashmaliciousBrowse
                                            • 132.226.247.73
                                            Specifications_Details_30200_RFQ.exeGet hashmaliciousBrowse
                                            • 158.101.44.242
                                            21092022_receipt.exeGet hashmaliciousBrowse
                                            • 132.226.8.169
                                            New Order.exeGet hashmaliciousBrowse
                                            • 132.226.8.169
                                            KREDI.exeGet hashmaliciousBrowse
                                            • 132.226.8.169
                                            4nz1Kr0NLW.exeGet hashmaliciousBrowse
                                            • 132.226.247.73
                                            JD22 SEPT0 7 Shipping documents.exeGet hashmaliciousBrowse
                                            • 132.226.247.73
                                            MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                                            ORACLE-BMC-31898UShttps://w50axrlbxmvawqtsharefile.evalandgo.com/form/449781/s/?id=JTk5ciU5MXAlOTklQUI=&a=JTk4bSU5QW8lOUUlQUE=Get hashmaliciousBrowse
                                            • 134.70.48.1
                                            22588SANZI.exeGet hashmaliciousBrowse
                                            • 193.122.130.0
                                            Arrival_Percel No00929887355..exeGet hashmaliciousBrowse
                                            • 193.122.6.168
                                            INV012000.exeGet hashmaliciousBrowse
                                            • 193.122.130.0
                                            rWLEI3BVkx.exeGet hashmaliciousBrowse
                                            • 193.122.130.0
                                            qwOpaDGcHJ.exeGet hashmaliciousBrowse
                                            • 193.122.6.168
                                            4b9SFahCuA.exeGet hashmaliciousBrowse
                                            • 193.122.6.168
                                            specification.docGet hashmaliciousBrowse
                                            • 193.122.6.168
                                            Order#6875480.xlsxGet hashmaliciousBrowse
                                            • 158.101.44.242
                                            49HDD3uFb8.exeGet hashmaliciousBrowse
                                            • 158.101.44.242
                                            RFQ pdf.exeGet hashmaliciousBrowse
                                            • 193.122.130.0
                                            Specifications_Details_30200_RFQ.exeGet hashmaliciousBrowse
                                            • 158.101.44.242
                                            Z9kN4mToxe.exeGet hashmaliciousBrowse
                                            • 193.122.6.168
                                            n9nfBAqVb5.exeGet hashmaliciousBrowse
                                            • 193.122.130.0
                                            draft BL.exeGet hashmaliciousBrowse
                                            • 193.122.130.0
                                            scan21092022_product_spec_AU9389990001.exeGet hashmaliciousBrowse
                                            • 158.101.44.242
                                            e7waae4AKB.exeGet hashmaliciousBrowse
                                            • 193.122.6.168
                                            l1stfq0J4k.rtfGet hashmaliciousBrowse
                                            • 158.101.44.242
                                            SecuriteInfo.com.Win32.Malware-gen.16408.exeGet hashmaliciousBrowse
                                            • 158.101.44.242
                                            Specification Accommodation Work Boats.exeGet hashmaliciousBrowse
                                            • 193.122.6.168
                                            No context
                                            No context
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:Little-endian UTF-16 Unicode text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):65536
                                            Entropy (8bit):1.0866289988917461
                                            Encrypted:false
                                            SSDEEP:192:eSYsR3iHHBUZMXyaPbqwiPZ/u7s5S274ItG:eBsR38BUZMXyaIPZ/u7s5X4ItG
                                            MD5:DCB523DDFDAAF1E34C7DAE8745AD4CEF
                                            SHA1:2482DE233400A04C84F6FE9CD8058A7447D4383E
                                            SHA-256:7A294EEF8ED96FA33B5C8AC6EA2A79372104F7227DE4DFC4D2CB0FA05C717EF9
                                            SHA-512:51421FF075BE4E26BBAF196DCDF5F7632A491D514E3B4E8CC7DB8D938AA5FE423D7AF269E9C6E7E51E802763069ABD0395A566AF929A1066FD2CAB80BB41D41B
                                            Malicious:true
                                            Reputation:low
                                            Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.0.8.4.1.9.5.5.6.0.7.8.3.5.9.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.0.8.4.1.9.5.5.8.2.6.5.8.7.8.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.8.3.e.7.8.1.4.4.-.0.c.1.3.-.4.d.4.9.-.9.d.d.5.-.6.d.e.7.c.b.8.d.5.f.1.3.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.4.d.5.6.9.b.3.-.3.4.b.0.-.4.8.e.3.-.9.5.f.5.-.0.e.f.f.c.0.1.8.1.4.7.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.R.F.Q. .p.d.f...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.D.c.C.I...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.e.5.8.-.0.0.0.1.-.0.0.1.a.-.2.9.f.3.-.9.3.e.2.5.e.c.f.d.8.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.1.1.2.c.e.b.a.b.6.2.9.b.5.d.3.2.d.6.b.8.a.f.1.c.9.c.e.e.2.2.6.7.0.0.0.0.0.0.0.0.!.0.0.0.0.5.e.8.2.2.3.1.3.7.6.2.2.4.6.6.c.1.e.c.a.3.5.2.7.1.5.8.6.d.d.6.8.2.4.f.b.5.b.1.c.!.R.
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:Mini DuMP crash report, 15 streams, Fri Sep 23 15:12:36 2022, 0x1205a4 type
                                            Category:dropped
                                            Size (bytes):273803
                                            Entropy (8bit):3.6283798461942802
                                            Encrypted:false
                                            SSDEEP:3072:uhXgpnyqXO9gIOgF5nk0gUCgU2v1Aqo2Jf70xjd+pf:zi9RpDkTTjyjZ702p
                                            MD5:E96E4B955D9023B01A66B4C014A59590
                                            SHA1:81218EE2DF1FCCB1A176F7152E08127528AD5428
                                            SHA-256:11C0AC3091446CDDCCD98E8782DF5A284D58A63D6C9C4632581AD1B3E3441D36
                                            SHA-512:D540F21E04B987F2C664A1C2B98B80150C24F3158CF55C286C6C59BEEAF558CBBA3D9460215D39482B06D0EE372B7D16E30A90085D905CA8A6ED9CBC717801DC
                                            Malicious:false
                                            Reputation:low
                                            Preview:MDMP....... .........-c............t.......................T...H#.......%...T..........`.......8...........T............;...............#...........%...................................................................U...........B...... &......GenuineIntelW...........T.......X.....-c.............................0..................P.a.c.i.f.i.c. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................P.a.c.i.f.i.c. .D.a.y.l.i.g.h.t. .T.i.m.e...........................................1.7.1.3.4...1...x.8.6.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):6298
                                            Entropy (8bit):3.7301307714363436
                                            Encrypted:false
                                            SSDEEP:192:Rrl7r3GLNi+E6bYT4x8SfZwCprb89bL7sfnZm:RrlsNiV6bYT42SCLAfU
                                            MD5:1402313EDD5D0D3A0CA4E4819DDF4FFE
                                            SHA1:6B9EDF6C565CACBE581498B24ED76CE1A4F745C4
                                            SHA-256:894AEC4730BF9D1502FEC888ADB7187E7DBE139FAD2B6484594AB05A42EBEC87
                                            SHA-512:2AE24A3E9DA21309E5BE557753568F37181DE773175C38F8B559BF78ED10E16642B7F61A3AED0D0B913937658B20FB31823380AB55871FBA37C46873AD4321AE
                                            Malicious:false
                                            Reputation:low
                                            Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.7.1.3.4.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.7.1.3.4...1...a.m.d.6.4.f.r.e...r.s.4._.r.e.l.e.a.s.e...1.8.0.4.1.0.-.1.8.0.4.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.1.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.1.0.3.3.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.3.6.7.2.<./.P.i.d.>.......
                                            Process:C:\Windows\SysWOW64\WerFault.exe
                                            File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):4617
                                            Entropy (8bit):4.4743660937111285
                                            Encrypted:false
                                            SSDEEP:48:cvIwSD8zsYJgtWI9nuzcWgc8sqYjN8fm8M4JfIZjFe+q8+UJOTOuYuVd:uITfexZgrsqYuJ3AIb1Vd
                                            MD5:8B2DB920BDFC019682B9D75E53A43275
                                            SHA1:9DAD2FD831A1455CB2B1B21BCA7B6828823F57E3
                                            SHA-256:B3D95A3DE4A274724730A642CC65FAC9E92B4E9CB4C68FFB5C75AB5D87B0C541
                                            SHA-512:5A351605674D359EEFB5A815B030E02D6C623C3CAD3B5A153658F2F3F834F94F906C7AEF94A5EC2F192C4D869C48CBBD88EBD04F01B448E6BD25F201758EAAE3
                                            Malicious:false
                                            Reputation:low
                                            Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="17134" />.. <arg nm="vercsdbld" val="1" />.. <arg nm="verqfe" val="1" />.. <arg nm="csdbld" val="1" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="1033" />.. <arg nm="geoid" val="244" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="1704983" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.1.17134.0-11.0.47" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="4096" />..
                                            Process:C:\Users\user\Desktop\RFQ pdf.exe
                                            File Type:ASCII text, with CRLF line terminators
                                            Category:dropped
                                            Size (bytes):1308
                                            Entropy (8bit):5.345811588615766
                                            Encrypted:false
                                            SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84FsXE8:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzu
                                            MD5:2E016B886BDB8389D2DD0867BE55F87B
                                            SHA1:25D28EF2ACBB41764571E06E11BF4C05DD0E2F8B
                                            SHA-256:1D037CF00A8849E6866603297F85D3DABE09535E72EDD2636FB7D0F6C7DA3427
                                            SHA-512:C100729153954328AA2A77EECB2A3CBD03CB7E8E23D736000F890B17AAA50BA87745E30FB9E2B0D61E16DCA45694C79B4CE09B9F4475220BEB38CAEA546CFC2A
                                            Malicious:true
                                            Reputation:high, very likely benign file
                                            Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                            Entropy (8bit):6.738270658804957
                                            TrID:
                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                            • Win32 Executable (generic) a (10002005/4) 49.75%
                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                            • Windows Screen Saver (13104/52) 0.07%
                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                            File name:RFQ pdf.exe
                                            File size:800768
                                            MD5:2186990b3fc8fb51de0d235276613505
                                            SHA1:5e8223137622466c1eca35271586dd6824fb5b1c
                                            SHA256:e2d1f7e5fe7da6323d2b8105d8aabfbcaf21603059a05c263e14cc079b371718
                                            SHA512:286be9e8f8d181db4a032f97a8973a482fbbe6a57248a7d9bea616b22c9610a47ab5c084ca38da387a354419da81edca909fcab8e1ab0a99a4654ba148ba7146
                                            SSDEEP:12288:Uw1SnEwn5B2aUNLTo9XUxIcZg47GV8Z9U:6nEwnr2JLT4X+yyGmZ
                                            TLSH:6005CF22A7EA0F07C01267B894D1C2B157AAEF55903EC2476EEA7C9FB0767D18251F13
                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....E................0......d......&.... ........@.. ....................................@................................
                                            Icon Hash:f99a99d898a999f8
                                            Entrypoint:0x4bf126
                                            Entrypoint Section:.text
                                            Digitally signed:false
                                            Imagebase:0x400000
                                            Subsystem:windows gui
                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                            Time Stamp:0xD08A45BE [Wed Nov 13 11:25:50 2080 UTC]
                                            TLS Callbacks:
                                            CLR (.Net) Version:
                                            OS Version Major:4
                                            OS Version Minor:0
                                            File Version Major:4
                                            File Version Minor:0
                                            Subsystem Version Major:4
                                            Subsystem Version Minor:0
                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                            Instruction
                                            jmp dword ptr [00402000h]
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            add byte ptr [eax], al
                                            NameVirtual AddressVirtual Size Is in Section
                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IMPORT0xbf0d40x4f.text
                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xc00000x6164.rsrc
                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xc80000xc.reloc
                                            IMAGE_DIRECTORY_ENTRY_DEBUG0xbf0b80x1c.text
                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                            NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                            .text0x20000xbd12c0xbd200False0.6633434711665566data6.764992841750805IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                            .rsrc0xc00000x61640x6200False0.45703125data5.751957149803205IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                            .reloc0xc80000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                            NameRVASizeTypeLanguageCountry
                                            RT_ICON0xc02380x2e8data
                                            RT_ICON0xc05200x128GLS_BINARY_LSB_FIRST
                                            RT_ICON0xc06480xea8data
                                            RT_ICON0xc14f00x8a8data
                                            RT_ICON0xc1d980x568GLS_BINARY_LSB_FIRST
                                            RT_ICON0xc23000x25a8data
                                            RT_ICON0xc48a80x10a8data
                                            RT_ICON0xc59500x468GLS_BINARY_LSB_FIRST
                                            RT_GROUP_ICON0xc5db80x76data
                                            RT_VERSION0xc5e300x334data
                                            DLLImport
                                            mscoree.dll_CorExeMain
                                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                            192.168.2.6193.122.6.16849721802842536 09/23/22-08:12:30.599509TCP2842536ETPRO TROJAN 404/Snake/Matiex Keylogger Style External IP Check4972180192.168.2.6193.122.6.168
                                            TimestampSource PortDest PortSource IPDest IP
                                            Sep 23, 2022 08:12:27.571508884 CEST4972180192.168.2.6193.122.6.168
                                            Sep 23, 2022 08:12:30.580404997 CEST4972180192.168.2.6193.122.6.168
                                            Sep 23, 2022 08:12:30.598292112 CEST8049721193.122.6.168192.168.2.6
                                            Sep 23, 2022 08:12:30.598417997 CEST4972180192.168.2.6193.122.6.168
                                            Sep 23, 2022 08:12:30.599509001 CEST4972180192.168.2.6193.122.6.168
                                            Sep 23, 2022 08:12:30.617305040 CEST8049721193.122.6.168192.168.2.6
                                            Sep 23, 2022 08:12:32.617840052 CEST8049721193.122.6.168192.168.2.6
                                            Sep 23, 2022 08:12:32.682867050 CEST4972180192.168.2.6193.122.6.168
                                            Sep 23, 2022 08:12:42.508495092 CEST4972180192.168.2.6193.122.6.168
                                            TimestampSource PortDest PortSource IPDest IP
                                            Sep 23, 2022 08:12:27.483222961 CEST5908253192.168.2.68.8.8.8
                                            Sep 23, 2022 08:12:27.502829075 CEST53590828.8.8.8192.168.2.6
                                            Sep 23, 2022 08:12:27.515578985 CEST5950453192.168.2.68.8.8.8
                                            Sep 23, 2022 08:12:27.532990932 CEST53595048.8.8.8192.168.2.6
                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                            Sep 23, 2022 08:12:27.483222961 CEST192.168.2.68.8.8.80x7878Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                            Sep 23, 2022 08:12:27.515578985 CEST192.168.2.68.8.8.80xd83aStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                            Sep 23, 2022 08:12:27.502829075 CEST8.8.8.8192.168.2.60x7878No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                            Sep 23, 2022 08:12:27.502829075 CEST8.8.8.8192.168.2.60x7878No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                            Sep 23, 2022 08:12:27.502829075 CEST8.8.8.8192.168.2.60x7878No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                            Sep 23, 2022 08:12:27.502829075 CEST8.8.8.8192.168.2.60x7878No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                            Sep 23, 2022 08:12:27.502829075 CEST8.8.8.8192.168.2.60x7878No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                            Sep 23, 2022 08:12:27.502829075 CEST8.8.8.8192.168.2.60x7878No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                            Sep 23, 2022 08:12:27.532990932 CEST8.8.8.8192.168.2.60xd83aNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                            Sep 23, 2022 08:12:27.532990932 CEST8.8.8.8192.168.2.60xd83aNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                            Sep 23, 2022 08:12:27.532990932 CEST8.8.8.8192.168.2.60xd83aNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                            Sep 23, 2022 08:12:27.532990932 CEST8.8.8.8192.168.2.60xd83aNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                            Sep 23, 2022 08:12:27.532990932 CEST8.8.8.8192.168.2.60xd83aNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                            Sep 23, 2022 08:12:27.532990932 CEST8.8.8.8192.168.2.60xd83aNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                            • checkip.dyndns.org
                                            Session IDSource IPSource PortDestination IPDestination PortProcess
                                            0192.168.2.649721193.122.6.16880C:\Users\user\Desktop\RFQ pdf.exe
                                            TimestampkBytes transferredDirectionData
                                            Sep 23, 2022 08:12:30.599509001 CEST453OUTGET / HTTP/1.1
                                            User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                            Host: checkip.dyndns.org
                                            Connection: Keep-Alive
                                            Sep 23, 2022 08:12:32.617840052 CEST453INHTTP/1.1 502 Bad Gateway
                                            Date: Fri, 23 Sep 2022 06:12:32 GMT
                                            Content-Type: text/html
                                            Content-Length: 547
                                            Connection: keep-alive
                                            Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a
                                            Data Ascii: <html><head><title>502 Bad Gateway</title></head><body><center><h1>502 Bad Gateway</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                            Click to jump to process

                                            Click to jump to process

                                            Click to dive into process behavior distribution

                                            Click to jump to process

                                            Target ID:0
                                            Start time:08:12:06
                                            Start date:23/09/2022
                                            Path:C:\Users\user\Desktop\RFQ pdf.exe
                                            Wow64 process (32bit):true
                                            Commandline:"C:\Users\user\Desktop\RFQ pdf.exe"
                                            Imagebase:0x4f0000
                                            File size:800768 bytes
                                            MD5 hash:2186990B3FC8FB51DE0D235276613505
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:.Net C# or VB.NET
                                            Yara matches:
                                            • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.282302542.000000000293F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.285058685.0000000003AD5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.285058685.0000000003AD5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.285058685.0000000003AD5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.285058685.0000000003AD5000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.285058685.0000000003AD5000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                            Reputation:low

                                            Target ID:2
                                            Start time:08:12:24
                                            Start date:23/09/2022
                                            Path:C:\Users\user\Desktop\RFQ pdf.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Users\user\Desktop\RFQ pdf.exe
                                            Imagebase:0x520000
                                            File size:800768 bytes
                                            MD5 hash:2186990B3FC8FB51DE0D235276613505
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:.Net C# or VB.NET
                                            Yara matches:
                                            • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000002.00000000.276779694.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000000.276779694.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000000.276779694.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                            • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000002.00000000.276779694.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                            • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000000.276779694.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                            Reputation:low

                                            Target ID:13
                                            Start time:08:12:35
                                            Start date:23/09/2022
                                            Path:C:\Windows\SysWOW64\WerFault.exe
                                            Wow64 process (32bit):true
                                            Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 1516
                                            Imagebase:0x160000
                                            File size:434592 bytes
                                            MD5 hash:9E2B8ACAD48ECCA55C0230D63623661B
                                            Has elevated privileges:true
                                            Has administrator privileges:true
                                            Programmed in:.Net C# or VB.NET
                                            Reputation:high

                                            Reset < >

                                              Execution Graph

                                              Execution Coverage:12.3%
                                              Dynamic/Decrypted Code Coverage:100%
                                              Signature Coverage:0%
                                              Total number of Nodes:103
                                              Total number of Limit Nodes:10
                                              execution_graph 10386 e640d0 10387 e640e2 10386->10387 10388 e640ee 10387->10388 10392 e641e0 10387->10392 10397 e63874 10388->10397 10390 e6410d 10393 e64205 10392->10393 10401 e642e0 10393->10401 10405 e642d0 10393->10405 10398 e6387f 10397->10398 10413 e65870 10398->10413 10400 e66a8a 10400->10390 10403 e64307 10401->10403 10402 e643e4 10402->10402 10403->10402 10409 e63cac 10403->10409 10406 e642e0 10405->10406 10407 e643e4 10406->10407 10408 e63cac CreateActCtxA 10406->10408 10408->10407 10410 e65370 CreateActCtxA 10409->10410 10412 e65433 10410->10412 10414 e6587b 10413->10414 10417 e658b0 10414->10417 10416 e66c5d 10416->10400 10418 e658bb 10417->10418 10421 e658e0 10418->10421 10420 e66d3a 10420->10416 10422 e658eb 10421->10422 10425 e65910 10422->10425 10424 e66e2a 10424->10420 10426 e6591b 10425->10426 10428 e672e9 10426->10428 10431 e67588 10426->10431 10427 e6757c 10427->10424 10428->10427 10436 e6b5b9 10428->10436 10432 e67515 10431->10432 10434 e6758b 10431->10434 10433 e6757c 10432->10433 10435 e6b5b9 3 API calls 10432->10435 10433->10428 10434->10428 10435->10433 10437 e6b5e9 10436->10437 10438 e6b60d 10437->10438 10442 e6b7d2 10437->10442 10447 e6b778 10437->10447 10451 e6b768 10437->10451 10438->10427 10443 e6b7da 10442->10443 10444 e6b77c 10442->10444 10443->10438 10445 e6b7bf 10444->10445 10455 e6a27c 10444->10455 10445->10438 10448 e6b77c 10447->10448 10449 e6a27c 3 API calls 10448->10449 10450 e6b7bf 10448->10450 10449->10450 10450->10438 10453 e6b778 10451->10453 10452 e6b7bf 10452->10438 10453->10452 10454 e6a27c 3 API calls 10453->10454 10454->10452 10456 e6a287 10455->10456 10458 e6c4b8 10456->10458 10459 e6bea4 10456->10459 10460 e6beaf 10459->10460 10461 e65910 3 API calls 10460->10461 10462 e6c527 10461->10462 10465 e6e2dc 10462->10465 10466 e6c560 10465->10466 10467 e6e2f5 10465->10467 10466->10458 10469 e6e730 LoadLibraryExW GetModuleHandleW GetModuleHandleW 10467->10469 10470 e6e72b LoadLibraryExW GetModuleHandleW GetModuleHandleW 10467->10470 10468 e6e32d 10469->10468 10470->10468 10471 e694b0 10472 e694bf 10471->10472 10475 e6959a 10471->10475 10483 e695a8 10471->10483 10476 e695bb 10475->10476 10478 e695d3 10476->10478 10491 e69822 10476->10491 10498 e69830 10476->10498 10477 e695cb 10477->10478 10479 e697d0 GetModuleHandleW 10477->10479 10478->10472 10480 e697fd 10479->10480 10480->10472 10484 e695bb 10483->10484 10486 e695d3 10484->10486 10489 e69822 2 API calls 10484->10489 10490 e69830 LoadLibraryExW 10484->10490 10485 e695cb 10485->10486 10487 e697d0 GetModuleHandleW 10485->10487 10486->10472 10488 e697fd 10487->10488 10488->10472 10489->10485 10490->10485 10492 e697ba GetModuleHandleW 10491->10492 10493 e6982a 10491->10493 10495 e697fd 10492->10495 10497 e69869 10493->10497 10502 e68900 10493->10502 10495->10477 10497->10477 10499 e69844 10498->10499 10500 e68900 LoadLibraryExW 10499->10500 10501 e69869 10499->10501 10500->10501 10501->10477 10503 e69a10 LoadLibraryExW 10502->10503 10505 e69a89 10503->10505 10505->10497 10506 e6b890 GetCurrentProcess 10507 e6b903 10506->10507 10508 e6b90a GetCurrentThread 10506->10508 10507->10508 10509 e6b947 GetCurrentProcess 10508->10509 10510 e6b940 10508->10510 10511 e6b97d 10509->10511 10510->10509 10512 e6b9a5 GetCurrentThreadId 10511->10512 10513 e6b9d6 10512->10513 10514 e6bab8 DuplicateHandle 10515 e6bb4e 10514->10515

                                              Control-flow Graph

                                              APIs
                                              • GetCurrentProcess.KERNEL32 ref: 00E6B8F0
                                              • GetCurrentThread.KERNEL32 ref: 00E6B92D
                                              • GetCurrentProcess.KERNEL32 ref: 00E6B96A
                                              • GetCurrentThreadId.KERNEL32 ref: 00E6B9C3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.281335610.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e60000_RFQ pdf.jbxd
                                              Similarity
                                              • API ID: Current$ProcessThread
                                              • String ID:
                                              • API String ID: 2063062207-0
                                              • Opcode ID: 4dde0a7f6fd96c4a92a560ba10417f017ad215d21c7f3777d5eed5a3e3ec29fc
                                              • Instruction ID: 02161fe70757248263b395e424a70f1e8837aff2d2998ec290797f0c19c63852
                                              • Opcode Fuzzy Hash: 4dde0a7f6fd96c4a92a560ba10417f017ad215d21c7f3777d5eed5a3e3ec29fc
                                              • Instruction Fuzzy Hash: A45165B4E006488FDB10CFA9D588BDEBBF5EF88314F24845AE109B7391C7745884CB66
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 22 e6b890-e6b901 GetCurrentProcess 23 e6b903-e6b909 22->23 24 e6b90a-e6b93e GetCurrentThread 22->24 23->24 25 e6b947-e6b97b GetCurrentProcess 24->25 26 e6b940-e6b946 24->26 28 e6b984-e6b99c 25->28 29 e6b97d-e6b983 25->29 26->25 40 e6b99f call e6ba40 28->40 41 e6b99f call e6be30 28->41 29->28 32 e6b9a5-e6b9d4 GetCurrentThreadId 33 e6b9d6-e6b9dc 32->33 34 e6b9dd-e6ba3f 32->34 33->34 40->32 41->32
                                              APIs
                                              • GetCurrentProcess.KERNEL32 ref: 00E6B8F0
                                              • GetCurrentThread.KERNEL32 ref: 00E6B92D
                                              • GetCurrentProcess.KERNEL32 ref: 00E6B96A
                                              • GetCurrentThreadId.KERNEL32 ref: 00E6B9C3
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.281335610.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e60000_RFQ pdf.jbxd
                                              Similarity
                                              • API ID: Current$ProcessThread
                                              • String ID:
                                              • API String ID: 2063062207-0
                                              • Opcode ID: 6fb2114009967e9efe1e8a070e6b2faa1a20b986688dcd44fdd89a68c1f573df
                                              • Instruction ID: 8350b762920826e36891a9d62f7f2f155de94a380aba1b0bfdebc62bad5bb828
                                              • Opcode Fuzzy Hash: 6fb2114009967e9efe1e8a070e6b2faa1a20b986688dcd44fdd89a68c1f573df
                                              • Instruction Fuzzy Hash: 295164B4E006488FDB10CFAAD588BDEBBF5EF88318F248459E119B7391C7745884CB66
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 42 e695a8-e695bd call e6889c 45 e695d3-e695d7 42->45 46 e695bf 42->46 47 e695eb-e6962c 45->47 48 e695d9-e695e3 45->48 97 e695c5 call e69822 46->97 98 e695c5 call e69830 46->98 53 e6962e-e69636 47->53 54 e69639-e69647 47->54 48->47 49 e695cb-e695cd 49->45 50 e69708-e69710 49->50 59 e69712-e69785 50->59 53->54 56 e6966b-e6966d 54->56 57 e69649-e6964e 54->57 58 e69670-e69677 56->58 60 e69650-e69657 call e688a8 57->60 61 e69659 57->61 63 e69684-e6968b 58->63 64 e69679-e69681 58->64 91 e69787-e697c8 59->91 62 e6965b-e69669 60->62 61->62 62->58 67 e6968d-e69695 63->67 68 e69698-e696a1 call e688b8 63->68 64->63 67->68 73 e696a3-e696ab 68->73 74 e696ae-e696b3 68->74 73->74 76 e696b5-e696bc 74->76 77 e696d1-e696de 74->77 76->77 78 e696be-e696ce call e688c8 call e688d8 76->78 83 e696e0-e696fe 77->83 84 e69701-e69707 77->84 78->77 83->84 92 e697d0-e697fb GetModuleHandleW 91->92 93 e697ca-e697cd 91->93 94 e69804-e69818 92->94 95 e697fd-e69803 92->95 93->92 95->94 97->49 98->49
                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 00E697EE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.281335610.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e60000_RFQ pdf.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: f1a8e6f4a83055d1dd81f8e744d8f5d3f3cca88fd3b0dcf8256fa3d703f0b4a0
                                              • Instruction ID: 2e1689ede00efe4b9019d1353e588ce7861fb750b13d11139d932cca9692697d
                                              • Opcode Fuzzy Hash: f1a8e6f4a83055d1dd81f8e744d8f5d3f3cca88fd3b0dcf8256fa3d703f0b4a0
                                              • Instruction Fuzzy Hash: 9D711570A00B058FDB24DF29D14575ABBF5FF88348F048A2AD48AE7A41DB75E849CB91
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 99 e63cac-e65431 CreateActCtxA 102 e65433-e65439 99->102 103 e6543a-e65494 99->103 102->103 110 e65496-e65499 103->110 111 e654a3-e654a7 103->111 110->111 112 e654b8 111->112 113 e654a9-e654b5 111->113 115 e654b9 112->115 113->112 115->115
                                              APIs
                                              • CreateActCtxA.KERNEL32(?), ref: 00E65421
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.281335610.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e60000_RFQ pdf.jbxd
                                              Similarity
                                              • API ID: Create
                                              • String ID:
                                              • API String ID: 2289755597-0
                                              • Opcode ID: 708d226518f3885907bbfb8f04b6d22a300d66374a81c74c7e9e9b55d30d7a05
                                              • Instruction ID: e0d4965215eb7bebd909847743ee4d6b486ba6fad60b35716741ccd6f3167a18
                                              • Opcode Fuzzy Hash: 708d226518f3885907bbfb8f04b6d22a300d66374a81c74c7e9e9b55d30d7a05
                                              • Instruction Fuzzy Hash: 4D411271D44628CBDB24CFA9C8447CEBBB5FF48308F2080A9D419BB251DB756989CF91
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 116 e6536b-e65431 CreateActCtxA 118 e65433-e65439 116->118 119 e6543a-e65494 116->119 118->119 126 e65496-e65499 119->126 127 e654a3-e654a7 119->127 126->127 128 e654b8 127->128 129 e654a9-e654b5 127->129 131 e654b9 128->131 129->128 131->131
                                              APIs
                                              • CreateActCtxA.KERNEL32(?), ref: 00E65421
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.281335610.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e60000_RFQ pdf.jbxd
                                              Similarity
                                              • API ID: Create
                                              • String ID:
                                              • API String ID: 2289755597-0
                                              • Opcode ID: c885800c8f0db5b930fd5c70fd727cd167edf07d8c974ec354bee74e2a1909c5
                                              • Instruction ID: 4fec5fcffa4d2d0fee2b6fe210dd0c5411d5dae108d2f50a97b1c7a387caf1ef
                                              • Opcode Fuzzy Hash: c885800c8f0db5b930fd5c70fd727cd167edf07d8c974ec354bee74e2a1909c5
                                              • Instruction Fuzzy Hash: 9341F271D44628CADB24CFA9C8447CEBBB5BF48308F2180A9D419BB251DB756986CF91
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 132 e69822-e69828 133 e697ba-e697c8 132->133 134 e6982a-e69846 call e6889c 132->134 135 e697d0-e697fb GetModuleHandleW 133->135 136 e697ca-e697cd 133->136 143 e69876-e6987b 134->143 144 e69848-e69859 call e688f4 134->144 139 e69804-e69818 135->139 140 e697fd-e69803 135->140 136->135 140->139 147 e6986d-e69874 call e6890c 144->147 148 e6985b-e69864 call e68900 144->148 147->143 152 e69869-e6986b 148->152 152->143
                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 00E697EE
                                                • Part of subcall function 00E68900: LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00E69869,00000800,00000000,00000000), ref: 00E69A7A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.281335610.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e60000_RFQ pdf.jbxd
                                              Similarity
                                              • API ID: HandleLibraryLoadModule
                                              • String ID:
                                              • API String ID: 4133054770-0
                                              • Opcode ID: 65feb4ddc3a0f1b0077b33ed40e006f36b378d985327c7023f9bdc6107eefe14
                                              • Instruction ID: de86df9e845ca3e53728f2d8c18e8cbac162fe3727af55f7a2588d818a5edee8
                                              • Opcode Fuzzy Hash: 65feb4ddc3a0f1b0077b33ed40e006f36b378d985327c7023f9bdc6107eefe14
                                              • Instruction Fuzzy Hash: B02108756443444FDB04DF6AE800A9ABBF9AFC6354F0490ABD454FB252C7709805CB61
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 153 e6bab8-e6bb4c DuplicateHandle 154 e6bb55-e6bb72 153->154 155 e6bb4e-e6bb54 153->155 155->154
                                              APIs
                                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00E6BB3F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.281335610.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e60000_RFQ pdf.jbxd
                                              Similarity
                                              • API ID: DuplicateHandle
                                              • String ID:
                                              • API String ID: 3793708945-0
                                              • Opcode ID: e481edf9d6b52c4bed5a488f792cd79e80e3423b590ceb50c7088290ad6a97ac
                                              • Instruction ID: 8264bf8eee4dc417fcda456bf81b1768cb317c81c80ba7c8d0335c9084a22130
                                              • Opcode Fuzzy Hash: e481edf9d6b52c4bed5a488f792cd79e80e3423b590ceb50c7088290ad6a97ac
                                              • Instruction Fuzzy Hash: 1121E0B59002189FDB10CFAAD884ADEBBF9EB48324F14801AE918B7310D374A954CFA5
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 158 e68900-e69a50 160 e69a52-e69a55 158->160 161 e69a58-e69a87 LoadLibraryExW 158->161 160->161 162 e69a90-e69aad 161->162 163 e69a89-e69a8f 161->163 163->162
                                              APIs
                                              • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00E69869,00000800,00000000,00000000), ref: 00E69A7A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.281335610.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e60000_RFQ pdf.jbxd
                                              Similarity
                                              • API ID: LibraryLoad
                                              • String ID:
                                              • API String ID: 1029625771-0
                                              • Opcode ID: b1543cae892ba12d5413ed03080450f74b2774906c7cc52088df53384d1873fd
                                              • Instruction ID: 327921279cbeb268bc7d28ca750deabd61d03fdba8d2cbd2e625837d2c48cde4
                                              • Opcode Fuzzy Hash: b1543cae892ba12d5413ed03080450f74b2774906c7cc52088df53384d1873fd
                                              • Instruction Fuzzy Hash: EE1103B69002598FCB10CF9AD444BDEFBF8EB88354F15842AE519B7301C375A945CFA5
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 166 e69788-e697c8 167 e697d0-e697fb GetModuleHandleW 166->167 168 e697ca-e697cd 166->168 169 e69804-e69818 167->169 170 e697fd-e69803 167->170 168->167 170->169
                                              APIs
                                              • GetModuleHandleW.KERNELBASE(00000000), ref: 00E697EE
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.281335610.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e60000_RFQ pdf.jbxd
                                              Similarity
                                              • API ID: HandleModule
                                              • String ID:
                                              • API String ID: 4139908857-0
                                              • Opcode ID: 0405d90a869c567c9cc0de82108bcd4b4d2acf9117cea1830cd8e4ac7a8e7ac3
                                              • Instruction ID: 857153b30338a309e4d0576e8cd8af2ea1fb36596844ab58db9d2bcbc7b123c5
                                              • Opcode Fuzzy Hash: 0405d90a869c567c9cc0de82108bcd4b4d2acf9117cea1830cd8e4ac7a8e7ac3
                                              • Instruction Fuzzy Hash: 671110B6C006498FCB10CFAAD444BDEFBF9EB88324F15842AD829B7600D374A545CFA1
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.281335610.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e60000_RFQ pdf.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 879405765afc6b1dcb01c415fbb7ee7c9473cf9623f0e16886ed141f00bcd0fe
                                              • Instruction ID: 900e4d94a8dc76e19a1c37f9f51eea828fe57d39a16db8064807340876ce358a
                                              • Opcode Fuzzy Hash: 879405765afc6b1dcb01c415fbb7ee7c9473cf9623f0e16886ed141f00bcd0fe
                                              • Instruction Fuzzy Hash: 8B12B3F9C917468BE710CF65E8981893BA1F749328BD04E08D2612BAD5D7BC117EEF84
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.281335610.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e60000_RFQ pdf.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 636d06614765590a03af9f59b2452a5c6eb219880b7984b6a3e30ece7ce7d999
                                              • Instruction ID: 0f8b0b11bb4f226db91890333363975a504e1affb7649a17325a3c77b08a1ab3
                                              • Opcode Fuzzy Hash: 636d06614765590a03af9f59b2452a5c6eb219880b7984b6a3e30ece7ce7d999
                                              • Instruction Fuzzy Hash: 1FA18D36E406098FCF05DFB5E8445EEBBF2FF84344B15956AE806BB261EB31A915CB40
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.281335610.0000000000E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E60000, based on PE: false
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_e60000_RFQ pdf.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: 623a85452754d18aca6dd6e49be1907a4368dc3cf577c19cbf569dae5a617ba8
                                              • Instruction ID: 36145924529980730a5c77c22feb4df27180e929080932708aa0129bf64771e5
                                              • Opcode Fuzzy Hash: 623a85452754d18aca6dd6e49be1907a4368dc3cf577c19cbf569dae5a617ba8
                                              • Instruction Fuzzy Hash: F0C118B9C917468BD710CF65E8981897BA1FB8D328F904E08D1616BAD0D7BC117AEF84
                                              Uniqueness

                                              Uniqueness Score: -1.00%