IOC Report
Quotation.exe

loading gif

Files

File Path
Type
Category
Malicious
Quotation.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Ghetto\Delforliget\Melotragedy\Lindhardt\System.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Ghetto\Blegnbbetheden\Telegrammers.Non
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Ghetto\Cohesion\Quakily\Privileger.Fla
ASCII text, with very long lines (55032), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Ghetto\Cohesion\Quakily\SolutionExplorerCLI.dll
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Ghetto\Cohesion\Quakily\System.Security.Cryptography.X509Certificates.dll
PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Ghetto\Delforliget\Melotragedy\Lindhardt\libdatrie-1.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Ghetto\Forureningsforebygget\Pegboard\libpkcs11-helper-1.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Ghetto\Forureningsforebygget\Pegboard\maintenanceservice2.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Ghetto\Forureningsforebygget\Pegboard\percentile.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nst891E.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Quotation.exe
C:\Users\user\Desktop\Quotation.exe
malicious

URLs

Name
IP
Malicious
http://nsis.sf.net/NSIS_Error
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://aka.ms/dotnet-warnings/
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://www.symauth.com/cps0(
unknown
http://www.symauth.com/rpa00
unknown
https://mozilla.org0
unknown
http://ocsp.thawte.com0
unknown
http://www.nero.com
unknown
https://github.com/dotnet/runtime
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\anarkisterne\Thanages
Festival

Memdumps

Base Address
Regiontype
Protect
Malicious
5789000
direct allocation
page execute and read and write
malicious
1B795C00000
heap
page read and write
709B67B000
stack
page read and write
1B795C02000
heap
page read and write
1D9AF4E1000
heap
page read and write
1B795C2A000
heap
page read and write
21831430000
heap
page read and write
7FE000
heap
page read and write
1B795BF0000
remote allocation
page read and write
21830BE5000
heap
page read and write
27A3000
heap
page read and write
5BA1DFD000
stack
page read and write
218309C0000
trusted library allocation
page read and write
1D9AF513000
heap
page read and write
21831322000
heap
page read and write
28B93E96000
heap
page read and write
6189000
direct allocation
page execute and read and write
78E000
stack
page read and write
DBB5FD000
stack
page read and write
28B93E5E000
heap
page read and write
218313AF000
heap
page read and write
7FE000
heap
page read and write
7F9000
heap
page read and write
80C000
heap
page read and write
4536DFF000
stack
page read and write
550000
heap
page read and write
21251FD0000
remote allocation
page read and write
279F000
stack
page read and write
27A4000
heap
page read and write
21831302000
heap
page read and write
218313BD000
heap
page read and write
7F9000
heap
page read and write
21251FD0000
remote allocation
page read and write
28B93B90000
heap
page read and write
1EEAF2B000
stack
page read and write
28B93E62000
heap
page read and write
24481C5A000
heap
page read and write
80C000
heap
page read and write
431000
unkown
page read and write
DBB6FC000
stack
page read and write
21831400000
heap
page read and write
7FE000
heap
page read and write
5650000
direct allocation
page execute and read and write
7FE000
heap
page read and write
802000
heap
page read and write
19F40602000
heap
page read and write
6D015000
unkown
page readonly
400000
unkown
page readonly
19F40613000
heap
page read and write
A8049FE000
stack
page read and write
19F40600000
heap
page read and write
1B795C65000
heap
page read and write
DBAD1B000
stack
page read and write
1EEB47E000
stack
page read and write
7F9000
heap
page read and write
1D9AF440000
heap
page read and write
21830BB9000
heap
page read and write
1EEBA7F000
stack
page read and write
1B795C59000
heap
page read and write
27C0000
heap
page read and write
244819F0000
heap
page read and write
1D9AF466000
heap
page read and write
2264000
heap
page read and write
21830A67000
heap
page read and write
28B93E67000
heap
page read and write
80C000
heap
page read and write
21252A02000
trusted library allocation
page read and write
1D9AF1B0000
heap
page read and write
1B795B30000
heap
page read and write
6D010000
unkown
page readonly
1B795D18000
heap
page read and write
7ED000
heap
page read and write
A804C7A000
stack
page read and write
1D9AF502000
heap
page read and write
709B57F000
stack
page read and write
802000
heap
page read and write
1D9AF320000
trusted library allocation
page read and write
1D9AF1C0000
heap
page read and write
1B797802000
trusted library allocation
page read and write
24481C68000
heap
page read and write
225F000
stack
page read and write
1D9AF488000
heap
page read and write
218309A0000
trusted library allocation
page read and write
453647C000
stack
page read and write
45367FF000
stack
page read and write
27AA000
heap
page read and write
7C0000
heap
page read and write
1B795D02000
heap
page read and write
425000
unkown
page read and write
27D0000
heap
page read and write
1B795BB0000
trusted library allocation
page read and write
815000
heap
page read and write
28B93E4C000
heap
page read and write
802000
heap
page read and write
1D9AF400000
heap
page read and write
21830A6E000
heap
page read and write
1EEB57C000
stack
page read and write
19A000
stack
page read and write
453667B000
stack
page read and write
A8044FB000
stack
page read and write
21830A3C000
heap
page read and write
7ED000
heap
page read and write
27A4000
heap
page read and write
21830A76000
heap
page read and write
A804E7E000
stack
page read and write
21251F10000
heap
page read and write
1D466EB0000
heap
page read and write
1B795C8A000
heap
page read and write
407000
unkown
page readonly
80C000
heap
page read and write
7ED000
heap
page read and write
1B795BF0000
remote allocation
page read and write
2350000
heap
page read and write
27A3000
heap
page read and write
A8048FA000
stack
page read and write
21830830000
heap
page read and write
1D9AF220000
heap
page read and write
7F9000
heap
page read and write
45368FE000
stack
page read and write
7F9000
heap
page read and write
9300D9B000
stack
page read and write
4536AFB000
stack
page read and write
1D9AF464000
heap
page read and write
4536CFE000
stack
page read and write
7F9000
heap
page read and write
1B795C48000
heap
page read and write
28B93E46000
heap
page read and write
24481C35000
heap
page read and write
1D467049000
heap
page read and write
433000
unkown
page read and write
436000
unkown
page readonly
28B93E45000
heap
page read and write
21830A2C000
heap
page read and write
7ED000
heap
page read and write
32AB000
stack
page read and write
19F41002000
trusted library allocation
page read and write
19F40629000
heap
page read and write
7F9000
heap
page read and write
24481C28000
heap
page read and write
27B2000
heap
page read and write
7B6000
heap
page read and write
409000
unkown
page read and write
93012FE000
stack
page read and write
A804B79000
stack
page read and write
21830B13000
heap
page read and write
28B93E53000
heap
page read and write
21252023000
heap
page read and write
80C000
heap
page read and write
24481C79000
heap
page read and write
28B93E13000
heap
page read and write
859000
heap
page read and write
1D9AF413000
heap
page read and write
401000
unkown
page execute read
409000
unkown
page write copy
19F4065B000
heap
page read and write
9557C79000
stack
page read and write
21831343000
heap
page read and write
21831423000
heap
page read and write
21252002000
heap
page read and write
9557B7F000
stack
page read and write
21831427000
heap
page read and write
5BA1F7D000
stack
page read and write
7FE000
heap
page read and write
21830A43000
heap
page read and write
1D9AF423000
heap
page read and write
DBB2FF000
stack
page read and write
1D9AF4CA000
heap
page read and write
436000
unkown
page readonly
7ED000
heap
page read and write
6D011000
unkown
page execute read
1D9AF429000
heap
page read and write
24481D02000
heap
page read and write
31AD000
stack
page read and write
453697C000
stack
page read and write
1EEBD7E000
stack
page read and write
21252000000
heap
page read and write
1D467802000
trusted library allocation
page read and write
7F9000
heap
page read and write
21252040000
heap
page read and write
1D467013000
heap
page read and write
28B93E64000
heap
page read and write
5BA1E7F000
stack
page read and write
955775C000
stack
page read and write
802000
heap
page read and write
24481D00000
heap
page read and write
709B37B000
stack
page read and write
1D467023000
heap
page read and write
28B93E5F000
heap
page read and write
1D467000000
heap
page read and write
1EEB37A000
stack
page read and write
28B93E00000
heap
page read and write
19F405B0000
heap
page read and write
28B93F02000
heap
page read and write
21831402000
heap
page read and write
1D9AF46D000
heap
page read and write
24481C00000
heap
page read and write
28B93E48000
heap
page read and write
28B93E7C000
heap
page read and write
28B93E78000
heap
page read and write
A804D7F000
stack
page read and write
1B795C58000
heap
page read and write
429000
unkown
page read and write
21831354000
heap
page read and write
4E4F000
heap
page read and write
21830A26000
heap
page read and write
28B93E6B000
heap
page read and write
2320000
heap
page read and write
21251F70000
heap
page read and write
1D46704E000
heap
page read and write
1D467040000
heap
page read and write
28B93E82000
heap
page read and write
24481C13000
heap
page read and write
28B93BA0000
heap
page read and write
5BA1B7C000
stack
page read and write
93014FF000
stack
page read and write
1D46702E000
heap
page read and write
1B795C13000
heap
page read and write
28B93E73000
heap
page read and write
1B795C59000
heap
page read and write
28B93E40000
heap
page read and write
7FE000
heap
page read and write
21831300000
heap
page read and write
6D013000
unkown
page readonly
1D467002000
heap
page read and write
28B93E76000
heap
page read and write
7FE000
heap
page read and write
2310000
heap
page read and write
19F40637000
heap
page read and write
709B07B000
stack
page read and write
401000
unkown
page execute read
7FE000
heap
page read and write
930107E000
stack
page read and write
80C000
heap
page read and write
1B795B80000
trusted library allocation
page read and write
28B93E60000
heap
page read and write
28B93E4B000
heap
page read and write
28B93E7A000
heap
page read and write
28B93C00000
heap
page read and write
1D9AFD13000
heap
page read and write
1EEBC7F000
stack
page read and write
802000
heap
page read and write
7ED000
heap
page read and write
7B0000
heap
page read and write
1D467029000
heap
page read and write
815000
heap
page read and write
1D466EC0000
heap
page read and write
802000
heap
page read and write
28B93E44000
heap
page read and write
7ED000
heap
page read and write
99000
stack
page read and write
1B795D13000
heap
page read and write
28B93E47000
heap
page read and write
709B47B000
stack
page read and write
802000
heap
page read and write
1B795C3D000
heap
page read and write
802000
heap
page read and write
5BA16BC000
stack
page read and write
2260000
heap
page read and write
21252029000
heap
page read and write
28B93E74000
heap
page read and write
7F9000
heap
page read and write
24481B60000
trusted library allocation
page read and write
21830A6C000
heap
page read and write
815000
heap
page read and write
1B795AD0000
heap
page read and write
80C000
heap
page read and write
27AD000
heap
page read and write
28B93D00000
trusted library allocation
page read and write
21251FA0000
trusted library allocation
page read and write
21830A8F000
heap
page read and write
DBB3FF000
stack
page read and write
21251FD0000
remote allocation
page read and write
21831392000
heap
page read and write
1D9AF4C8000
heap
page read and write
9557E7E000
stack
page read and write
A804EFE000
stack
page read and write
1D46703C000
heap
page read and write
28B93E41000
heap
page read and write
9557D7C000
stack
page read and write
93013FE000
stack
page read and write
24481D13000
heap
page read and write
21830A13000
heap
page read and write
218313C9000
heap
page read and write
1B795BF0000
remote allocation
page read and write
19F40540000
heap
page read and write
21251F00000
heap
page read and write
19F40713000
heap
page read and write
84F000
heap
page read and write
1D9AFD00000
heap
page read and write
5BA1BFC000
stack
page read and write
407000
unkown
page readonly
28B93E5C000
heap
page read and write
28B93E49000
heap
page read and write
802000
heap
page read and write
19F40677000
heap
page read and write
1D466F10000
heap
page read and write
28B93E7D000
heap
page read and write
24481A60000
heap
page read and write
21831413000
heap
page read and write
24481C63000
heap
page read and write
24481A00000
heap
page read and write
21252102000
heap
page read and write
1B795B60000
trusted library allocation
page read and write
21252013000
heap
page read and write
21830A00000
heap
page read and write
7FE000
heap
page read and write
7ED000
heap
page read and write
7F9000
heap
page read and write
218308A0000
heap
page read and write
21830A91000
heap
page read and write
28B93E39000
heap
page read and write
30000
heap
page read and write
27AA000
heap
page read and write
19F40702000
heap
page read and write
6E0000
heap
page read and write
864000
heap
page read and write
1EEB97F000
stack
page read and write
28B93E42000
heap
page read and write
1B795C49000
heap
page read and write
80C000
heap
page read and write
7ED000
heap
page read and write
5C0000
heap
page read and write
A804AFB000
stack
page read and write
1B795C49000
heap
page read and write
830000
heap
page read and write
802000
heap
page read and write
1B795AC0000
heap
page read and write
1EEB77E000
stack
page read and write
812000
heap
page read and write
2125205C000
heap
page read and write
21830A43000
heap
page read and write
19F40640000
heap
page read and write
21830A73000
heap
page read and write
1B795D00000
heap
page read and write
85A000
heap
page read and write
DBB8FC000
stack
page read and write
80C000
heap
page read and write
19F40550000
heap
page read and write
24482402000
trusted library allocation
page read and write
21830A89000
heap
page read and write
19F405E0000
trusted library allocation
page read and write
28B94602000
trusted library allocation
page read and write
28B93E3C000
heap
page read and write
7FE000
heap
page read and write
73E000
stack
page read and write
421000
unkown
page read and write
28B93E79000
heap
page read and write
6B89000
direct allocation
page execute and read and write
21830A86000
heap
page read and write
1D9AFC02000
heap
page read and write
2183136F000
heap
page read and write
4536A7C000
stack
page read and write
7FE000
heap
page read and write
4E43000
heap
page read and write
A804F7F000
stack
page read and write
21830840000
heap
page read and write
802000
heap
page read and write
85F000
heap
page read and write
21830A58000
heap
page read and write
21830B8E000
heap
page read and write
815000
heap
page read and write
21830A29000
heap
page read and write
21831322000
heap
page read and write
1EEB87D000
stack
page read and write
1D4677B0000
trusted library allocation
page read and write
27AB000
heap
page read and write
5C5000
heap
page read and write
80C000
heap
page read and write
5BA1FFE000
stack
page read and write
24481C02000
heap
page read and write
28B93E31000
heap
page read and write
93010FE000
stack
page read and write
19F40675000
heap
page read and write
80C000
heap
page read and write
218313D1000
heap
page read and write
4536BFC000
stack
page read and write
1D467102000
heap
page read and write
1B797670000
trusted library allocation
page read and write
1B795C7E000
heap
page read and write
28B93E30000
heap
page read and write
1EEBB7F000
stack
page read and write
7C7000
heap
page read and write
21831202000
heap
page read and write
7ED000
heap
page read and write
28B93E29000
heap
page read and write
7F9000
heap
page read and write
24481C40000
heap
page read and write
1D467056000
heap
page read and write
400000
unkown
page readonly
DBB4FF000
stack
page read and write
1D9AF4B9000
heap
page read and write
There are 381 hidden memdumps, click here to show them.