Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
RFQ pdf.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_RFQ pdf.exe_5ece828fd8a15294e4f5abc1119a13c828c91fd_89bec156_0c768749\Report.wer
|
Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RFQ pdf.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7306.tmp.dmp
|
Mini DuMP crash report, 15 streams, Fri Sep 23 15:12:36 2022, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7912.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7A6A.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\RFQ pdf.exe
|
"C:\Users\user\Desktop\RFQ pdf.exe"
|
||
C:\Users\user\Desktop\RFQ pdf.exe
|
C:\Users\user\Desktop\RFQ pdf.exe
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 1516
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://checkip.dyndns.org/
|
193.122.6.168
|
||
http://www.apache.org/licenses/LICENSE-2.0
|
unknown
|
||
http://www.fontbureau.com
|
unknown
|
||
http://www.fontbureau.com/designersG
|
unknown
|
||
http://www.fontbureau.com/designers/?
|
unknown
|
||
http://www.founder.com.cn/cn/bThe
|
unknown
|
||
https://api.telegram.org/bot
|
unknown
|
||
http://www.fontbureau.com/designers?
|
unknown
|
||
http://www.tiro.com
|
unknown
|
||
http://checkip.dyndns.org
|
unknown
|
||
http://www.fontbureau.com/designers
|
unknown
|
||
http://www.goodfont.co.kr
|
unknown
|
||
http://www.carterandcone.coml
|
unknown
|
||
http://www.sajatypeworks.com
|
unknown
|
||
http://checkip.dyndns.org4
|
unknown
|
||
http://www.typography.netD
|
unknown
|
||
http://www.fontbureau.com/designers/cabarga.htmlN
|
unknown
|
||
http://www.founder.com.cn/cn/cThe
|
unknown
|
||
http://www.galapagosdesign.com/staff/dennis.htm
|
unknown
|
||
http://fontfabrik.com
|
unknown
|
||
http://www.founder.com.cn/cn
|
unknown
|
||
http://www.fontbureau.com/designers/frere-jones.html
|
unknown
|
||
http://checkip.dyndns.org/q
|
unknown
|
||
http://www.jiyu-kobo.co.jp/
|
unknown
|
||
http://www.galapagosdesign.com/DPlease
|
unknown
|
||
http://www.fontbureau.com/designers8
|
unknown
|
||
http://www.fonts.com
|
unknown
|
||
http://www.sandoll.co.kr
|
unknown
|
||
http://checkip.dyndns.com
|
unknown
|
||
http://www.urwpp.deDPlease
|
unknown
|
||
http://www.zhongyicts.com.cn
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://www.sakkal.com
|
unknown
|
There are 23 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
checkip.dyndns.com
|
193.122.6.168
|
||
checkip.dyndns.org
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
193.122.6.168
|
checkip.dyndns.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ pdf_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ pdf_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ pdf_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ pdf_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ pdf_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ pdf_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ pdf_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ pdf_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ pdf_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ pdf_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ pdf_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ pdf_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ pdf_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ pdf_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHivePermissionsCorrect
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
|
AmiHiveOwnerCorrect
|
||
\REGISTRY\A\{2526cb0a-4c96-e685-e034-a9aee4c09a31}\Root\InventoryApplicationFile\rfq pdf.exe|9e170ebf
|
ProgramId
|
||
\REGISTRY\A\{2526cb0a-4c96-e685-e034-a9aee4c09a31}\Root\InventoryApplicationFile\rfq pdf.exe|9e170ebf
|
FileId
|
||
\REGISTRY\A\{2526cb0a-4c96-e685-e034-a9aee4c09a31}\Root\InventoryApplicationFile\rfq pdf.exe|9e170ebf
|
LowerCaseLongPath
|
||
\REGISTRY\A\{2526cb0a-4c96-e685-e034-a9aee4c09a31}\Root\InventoryApplicationFile\rfq pdf.exe|9e170ebf
|
LongPathHash
|
||
\REGISTRY\A\{2526cb0a-4c96-e685-e034-a9aee4c09a31}\Root\InventoryApplicationFile\rfq pdf.exe|9e170ebf
|
Name
|
||
\REGISTRY\A\{2526cb0a-4c96-e685-e034-a9aee4c09a31}\Root\InventoryApplicationFile\rfq pdf.exe|9e170ebf
|
Publisher
|
||
\REGISTRY\A\{2526cb0a-4c96-e685-e034-a9aee4c09a31}\Root\InventoryApplicationFile\rfq pdf.exe|9e170ebf
|
Version
|
||
\REGISTRY\A\{2526cb0a-4c96-e685-e034-a9aee4c09a31}\Root\InventoryApplicationFile\rfq pdf.exe|9e170ebf
|
BinFileVersion
|
||
\REGISTRY\A\{2526cb0a-4c96-e685-e034-a9aee4c09a31}\Root\InventoryApplicationFile\rfq pdf.exe|9e170ebf
|
BinaryType
|
||
\REGISTRY\A\{2526cb0a-4c96-e685-e034-a9aee4c09a31}\Root\InventoryApplicationFile\rfq pdf.exe|9e170ebf
|
ProductName
|
||
\REGISTRY\A\{2526cb0a-4c96-e685-e034-a9aee4c09a31}\Root\InventoryApplicationFile\rfq pdf.exe|9e170ebf
|
ProductVersion
|
||
\REGISTRY\A\{2526cb0a-4c96-e685-e034-a9aee4c09a31}\Root\InventoryApplicationFile\rfq pdf.exe|9e170ebf
|
LinkDate
|
||
\REGISTRY\A\{2526cb0a-4c96-e685-e034-a9aee4c09a31}\Root\InventoryApplicationFile\rfq pdf.exe|9e170ebf
|
BinProductVersion
|
||
\REGISTRY\A\{2526cb0a-4c96-e685-e034-a9aee4c09a31}\Root\InventoryApplicationFile\rfq pdf.exe|9e170ebf
|
Size
|
||
\REGISTRY\A\{2526cb0a-4c96-e685-e034-a9aee4c09a31}\Root\InventoryApplicationFile\rfq pdf.exe|9e170ebf
|
Language
|
||
\REGISTRY\A\{2526cb0a-4c96-e685-e034-a9aee4c09a31}\Root\InventoryApplicationFile\rfq pdf.exe|9e170ebf
|
IsPeFile
|
||
\REGISTRY\A\{2526cb0a-4c96-e685-e034-a9aee4c09a31}\Root\InventoryApplicationFile\rfq pdf.exe|9e170ebf
|
IsOsComponent
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
|
ExceptionRecord
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
|
001840064172BCE4
|
There are 29 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
3AD5000
|
trusted library allocation
|
page read and write
|
||
402000
|
remote allocation
|
page execute and read and write
|
||
293F000
|
trusted library allocation
|
page read and write
|