IOC Report
RFQ pdf.exe

loading gif

Files

File Path
Type
Category
Malicious
RFQ pdf.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_RFQ pdf.exe_5ece828fd8a15294e4f5abc1119a13c828c91fd_89bec156_0c768749\Report.wer
Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\RFQ pdf.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7306.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Sep 23 15:12:36 2022, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7912.tmp.WERInternalMetadata.xml
XML 1.0 document, Little-endian UTF-16 Unicode text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7A6A.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\RFQ pdf.exe
"C:\Users\user\Desktop\RFQ pdf.exe"
malicious
C:\Users\user\Desktop\RFQ pdf.exe
C:\Users\user\Desktop\RFQ pdf.exe
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3672 -s 1516

URLs

Name
IP
Malicious
http://checkip.dyndns.org/
193.122.6.168
malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://api.telegram.org/bot
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://checkip.dyndns.org
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://checkip.dyndns.org4
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://fontfabrik.com
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-jones.html
unknown
http://checkip.dyndns.org/q
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://checkip.dyndns.com
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
There are 23 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
checkip.dyndns.com
193.122.6.168
malicious
checkip.dyndns.org
unknown
malicious

IPs

IP
Domain
Country
Malicious
193.122.6.168
checkip.dyndns.com
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ pdf_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ pdf_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ pdf_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ pdf_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ pdf_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ pdf_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ pdf_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ pdf_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ pdf_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ pdf_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ pdf_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ pdf_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ pdf_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RFQ pdf_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHivePermissionsCorrect
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\AppCompatFlags
AmiHiveOwnerCorrect
\REGISTRY\A\{2526cb0a-4c96-e685-e034-a9aee4c09a31}\Root\InventoryApplicationFile\rfq pdf.exe|9e170ebf
ProgramId
\REGISTRY\A\{2526cb0a-4c96-e685-e034-a9aee4c09a31}\Root\InventoryApplicationFile\rfq pdf.exe|9e170ebf
FileId
\REGISTRY\A\{2526cb0a-4c96-e685-e034-a9aee4c09a31}\Root\InventoryApplicationFile\rfq pdf.exe|9e170ebf
LowerCaseLongPath
\REGISTRY\A\{2526cb0a-4c96-e685-e034-a9aee4c09a31}\Root\InventoryApplicationFile\rfq pdf.exe|9e170ebf
LongPathHash
\REGISTRY\A\{2526cb0a-4c96-e685-e034-a9aee4c09a31}\Root\InventoryApplicationFile\rfq pdf.exe|9e170ebf
Name
\REGISTRY\A\{2526cb0a-4c96-e685-e034-a9aee4c09a31}\Root\InventoryApplicationFile\rfq pdf.exe|9e170ebf
Publisher
\REGISTRY\A\{2526cb0a-4c96-e685-e034-a9aee4c09a31}\Root\InventoryApplicationFile\rfq pdf.exe|9e170ebf
Version
\REGISTRY\A\{2526cb0a-4c96-e685-e034-a9aee4c09a31}\Root\InventoryApplicationFile\rfq pdf.exe|9e170ebf
BinFileVersion
\REGISTRY\A\{2526cb0a-4c96-e685-e034-a9aee4c09a31}\Root\InventoryApplicationFile\rfq pdf.exe|9e170ebf
BinaryType
\REGISTRY\A\{2526cb0a-4c96-e685-e034-a9aee4c09a31}\Root\InventoryApplicationFile\rfq pdf.exe|9e170ebf
ProductName
\REGISTRY\A\{2526cb0a-4c96-e685-e034-a9aee4c09a31}\Root\InventoryApplicationFile\rfq pdf.exe|9e170ebf
ProductVersion
\REGISTRY\A\{2526cb0a-4c96-e685-e034-a9aee4c09a31}\Root\InventoryApplicationFile\rfq pdf.exe|9e170ebf
LinkDate
\REGISTRY\A\{2526cb0a-4c96-e685-e034-a9aee4c09a31}\Root\InventoryApplicationFile\rfq pdf.exe|9e170ebf
BinProductVersion
\REGISTRY\A\{2526cb0a-4c96-e685-e034-a9aee4c09a31}\Root\InventoryApplicationFile\rfq pdf.exe|9e170ebf
Size
\REGISTRY\A\{2526cb0a-4c96-e685-e034-a9aee4c09a31}\Root\InventoryApplicationFile\rfq pdf.exe|9e170ebf
Language
\REGISTRY\A\{2526cb0a-4c96-e685-e034-a9aee4c09a31}\Root\InventoryApplicationFile\rfq pdf.exe|9e170ebf
IsPeFile
\REGISTRY\A\{2526cb0a-4c96-e685-e034-a9aee4c09a31}\Root\InventoryApplicationFile\rfq pdf.exe|9e170ebf
IsOsComponent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\Windows Error Reporting\Debug
ExceptionRecord
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\Immersive\production\Property
001840064172BCE4
There are 29 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3AD5000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
293F000
trusted library allocation
page read and write
malicious