SUSP_INDICATOR_RTF_MalVer_Objects - Detects RTF documents with non-standard version and embedding one of the object mostly observed in exploit (e.g. CVE-2017-11882) documents.
Rich_Text_Format_Zero - Rich Text Format Signature Zero
MS_RTF_Suspicious_documents - Suspicious documents using RTF document OLE object
GET http://www.vaultedjewelry.com/qbnf/?i09Z8uP_=rgPWpHOmxKlSe7EHONYdVBrmOnLu4eF6eOSzvd7TZo3R3Fo4Dd2XRg3DbQYqSiNd5R8WYW2HfYo1oy4LJvVB6tvZDWfBfjfjeCKWam8=&pq4=B_bUHOuV
request
GET http://www.sqlite.org/2020/sqlite-dll-win32-x86-3310000.zip
request
POST http://www.mr-u-taste.com/qbnf/
request
GET http://www.mr-u-taste.com/qbnf/?i09Z8uP_=mGR7ZmLmEt9yNzhj107em99ZnYgpgTedSLqstOtysWtmmDPutWYGQHPP7A/bNBdhcJI+eHBY4GrszbL+CPnGOgwl8ziMxMmXJyanig0=&pq4=B_bUHOuV
request
POST http://www.brightpathtechgroups.top/qbnf/
request
GET http://www.brightpathtechgroups.top/qbnf/?i09Z8uP_=/XY8b2QuaMdFC0XpCgsh4GNYF4+K1Jee0ur1wuthWP34gEpbfUtO61S+Wmzh4wGYwfcaHPs6UkqbWuaiX2goUA52btrwqIRWjk6Aczs=&pq4=B_bUHOuV
request
POST http://www.saudiarabia-invest.com/qbnf/
request
GET http://www.saudiarabia-invest.com/qbnf/?i09Z8uP_=TQw86TlhZOZGhyrotGnGA9O38tw4CjcNLRp/p2VP3ufYpIvUmIv9kKzVdrLDClRgTF6URTvKEK1oO5gHY3jB8uOZGTzekB90rbc1k/w=&pq4=B_bUHOuV
request
POST http://www.luciengeorge.com/qbnf/
request
GET http://www.luciengeorge.com/qbnf/?i09Z8uP_=0c7pTBUgqi7uIFOYjbT3SYstx1V9f1GJj9bVxgDbtFRASgICtVyP8zh8VQdSKB3ZTDJ9NwSYp2xAsrB2eli3KEKVX/ICehpktcwDvSA=&pq4=B_bUHOuV
request
POST http://www.brucesalyers.com/qbnf/
request
GET http://www.brucesalyers.com/qbnf/?i09Z8uP_=pOaW0U2I6Oim8KKUbDqJDQhYI0+jOGca0ZkB2ClPUoj3GtGVG9J/gqWS9Mz6XkgBxNiuWxxBos74OtAK1fVYBccuSwjN1UL6AWuKPcU=&pq4=B_bUHOuV
request
POST http://www.54c7pv.top/qbnf/
request
GET http://www.54c7pv.top/qbnf/?i09Z8uP_=R40TEU5sRsOQoxxitOES9+hMTVh8b1wg2WgWpjzQt3scLF2RQpMS0y827zix4QRv7SCVfpbDXNdzS1tGlHHYZLiaPpoCE6jYgQr1YbY=&pq4=B_bUHOuV
request
POST http://www.infinite-7.com/qbnf/
request
GET http://www.infinite-7.com/qbnf/?i09Z8uP_=+6BF5kLU84F0bZC4snN7O//5RGhAAZcl02SXjZ/C8WDlleVZNjPdMeMs0Bth8cY5eBWoVtOkuOGyDcUeP7JOiDQXP7lXIFXFwa8Se1E=&pq4=B_bUHOuV