IOC Report
QUOTATION.exe

loading gif

Files

File Path
Type
Category
Malicious
QUOTATION.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Ghetto\Industrialization\Snoldets\Embrocates\Utaalmodiges.Taa169
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Ghetto\hamotzi\System.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Ghetto\Alswith\Peroxidisement\Foresprges87\SolutionExplorerCLI.dll
PE32 executable (DLL) (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Ghetto\Wept\libpkcs11-helper-1.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Ghetto\Wept\maintenanceservice2.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Ghetto\Wept\percentile.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Ghetto\hamotzi\Dampning.Dub
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Ghetto\hamotzi\System.Security.Cryptography.X509Certificates.dll
PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\Ghetto\hamotzi\libdatrie-1.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsc344B.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\QUOTATION.exe
C:\Users\user\Desktop\QUOTATION.exe
malicious

URLs

Name
IP
Malicious
http://nsis.sf.net/NSIS_Error
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://aka.ms/dotnet-warnings/
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
http://www.symauth.com/cps0(
unknown
http://www.symauth.com/rpa00
unknown
https://mozilla.org0
unknown
http://ocsp.thawte.com0
unknown
http://www.nero.com
unknown
https://github.com/dotnet/runtime
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\anarkisterne\Thanages
Festival

Memdumps

Base Address
Regiontype
Protect
Malicious
2888000
heap
page read and write
malicious
53F7000
direct allocation
page execute and read and write
malicious
52F0000
direct allocation
page execute and read and write
malicious
9D8D37C000
stack
page read and write
15A83D13000
heap
page read and write
1CBD0EC0000
heap
page read and write
194931A0000
trusted library allocation
page read and write
30000
heap
page read and write
167BE24F000
heap
page read and write
28A0C254000
heap
page read and write
19A000
stack
page read and write
89286CC000
stack
page read and write
E96AAFB000
stack
page read and write
1CBD1032000
heap
page read and write
21C91BE0000
trusted library allocation
page read and write
22279CF0000
heap
page read and write
748000
heap
page read and write
1FFEAA02000
heap
page read and write
751000
heap
page read and write
1FFEAA13000
heap
page read and write
6462C7F000
stack
page read and write
1CBD1055000
heap
page read and write
2A9FFE2A000
heap
page read and write
2227A602000
trusted library allocation
page read and write
335A677000
stack
page read and write
19491800000
heap
page read and write
167BEA02000
trusted library allocation
page read and write
21C92860000
trusted library allocation
page read and write
1CBD105C000
heap
page read and write
18DB4802000
heap
page read and write
1CBD106C000
heap
page read and write
22279F02000
heap
page read and write
28A0C22C000
heap
page read and write
19491864000
heap
page read and write
28A0C3B9000
heap
page read and write
21C928E0000
trusted library allocation
page read and write
1CBD103B000
heap
page read and write
1CBD1075000
heap
page read and write
73C000
heap
page read and write
22279E40000
heap
page read and write
1FFEA800000
heap
page read and write
21C92870000
trusted library allocation
page read and write
717000
heap
page read and write
F1D207E000
stack
page read and write
194DFE00000
heap
page read and write
3D0187D000
stack
page read and write
18351413000
heap
page read and write
21C91E70000
heap
page read and write
167BE255000
heap
page read and write
28D06A25000
heap
page read and write
409000
unkown
page write copy
28A0CC23000
heap
page read and write
183511B0000
heap
page read and write
167BE270000
heap
page read and write
28A0C130000
heap
page read and write
73C000
heap
page read and write
6462A77000
stack
page read and write
74D000
heap
page read and write
3D0177F000
stack
page read and write
21C91C78000
heap
page read and write
748000
heap
page read and write
1FFEAA29000
heap
page read and write
28A0CBBC000
heap
page read and write
28D06A36000
heap
page read and write
2E568FB000
stack
page read and write
748000
heap
page read and write
167BE308000
heap
page read and write
3D013FC000
stack
page read and write
167BE23C000
heap
page read and write
1CBD1035000
heap
page read and write
550000
heap
page read and write
28D07202000
trusted library allocation
page read and write
167BE302000
heap
page read and write
74D000
heap
page read and write
1CBD105A000
heap
page read and write
F1D1F7F000
stack
page read and write
1835143C000
heap
page read and write
751000
heap
page read and write
751000
heap
page read and write
1A543FC000
stack
page read and write
6A8E7F000
stack
page read and write
370D000
stack
page read and write
1CBD0EB0000
heap
page read and write
8928B7C000
stack
page read and write
1CBD0F20000
heap
page read and write
A423479000
stack
page read and write
1CBD1068000
heap
page read and write
2885000
heap
page read and write
19491610000
heap
page read and write
18351455000
heap
page read and write
28A0C243000
heap
page read and write
765000
heap
page read and write
28A0C258000
heap
page read and write
22279E68000
heap
page read and write
18DB4882000
heap
page read and write
9D8D6FE000
stack
page read and write
6A947D000
stack
page read and write
748000
heap
page read and write
2A9FFE67000
heap
page read and write
1CBD1040000
heap
page read and write
28A0CA02000
heap
page read and write
28D06A51000
heap
page read and write
1CBD1058000
heap
page read and write
19491859000
heap
page read and write
167BE170000
heap
page read and write
15A84500000
heap
page read and write
18351508000
heap
page read and write
237E000
stack
page read and write
194DFE82000
heap
page read and write
28A0CC27000
heap
page read and write
194DFF08000
heap
page read and write
18351480000
heap
page read and write
28D06A3C000
heap
page read and write
400000
unkown
page readonly
2A9FFE76000
heap
page read and write
22279D00000
heap
page read and write
194931E0000
remote allocation
page read and write
8928BFE000
stack
page read and write
18DB4900000
heap
page read and write
401000
unkown
page execute read
28A0C3E5000
heap
page read and write
18351400000
heap
page read and write
28A0C140000
heap
page read and write
18351A02000
trusted library allocation
page read and write
335A6FF000
stack
page read and write
3D0137F000
stack
page read and write
194DFE3C000
heap
page read and write
28A0C1A0000
heap
page read and write
2881000
heap
page read and write
28D068F0000
heap
page read and write
1CBD1802000
trusted library allocation
page read and write
2A9FFE70000
heap
page read and write
74D000
heap
page read and write
1A53F9B000
stack
page read and write
194E03A0000
trusted library allocation
page read and write
28D06A2E000
heap
page read and write
335A57B000
stack
page read and write
28D06A02000
heap
page read and write
9D8D4FA000
stack
page read and write
A42357E000
stack
page read and write
167BE1D0000
heap
page read and write
F1D1D7F000
stack
page read and write
18351220000
heap
page read and write
19491802000
heap
page read and write
28D06B02000
heap
page read and write
73C000
heap
page read and write
28A0CB00000
heap
page read and write
28A0CB43000
heap
page read and write
1CBD1056000
heap
page read and write
28A0C23C000
heap
page read and write
6A917C000
stack
page read and write
1FFEAF90000
remote allocation
page read and write
28D06950000
heap
page read and write
19491670000
heap
page read and write
288A000
heap
page read and write
18351402000
heap
page read and write
1A542FE000
stack
page read and write
8928F7D000
stack
page read and write
183513F0000
trusted library allocation
page read and write
28A0C229000
heap
page read and write
28A0C930000
trusted library allocation
page read and write
1949186F000
heap
page read and write
409000
unkown
page read and write
89290FE000
stack
page read and write
765000
heap
page read and write
21C91E79000
heap
page read and write
64627FB000
stack
page read and write
28A0CC02000
heap
page read and write
10134EC000
stack
page read and write
1A5447F000
stack
page read and write
15A83C13000
heap
page read and write
64623FB000
stack
page read and write
22279E64000
heap
page read and write
762000
heap
page read and write
18DB4826000
heap
page read and write
15A83D02000
heap
page read and write
18351452000
heap
page read and write
751000
heap
page read and write
21C92B50000
trusted library allocation
page read and write
73515000
unkown
page readonly
21C91BD0000
heap
page read and write
F1D187B000
stack
page read and write
765000
heap
page read and write
21C91CB4000
heap
page read and write
2E5707C000
stack
page read and write
400000
unkown
page readonly
21C91CC4000
heap
page read and write
28A0C213000
heap
page read and write
2E56F77000
stack
page read and write
28A0C28F000
heap
page read and write
6A8F7F000
stack
page read and write
21C91CC5000
heap
page read and write
2A9FFF13000
heap
page read and write
1835144B000
heap
page read and write
21C91E40000
heap
page read and write
28A0C38E000
heap
page read and write
1CBD1025000
heap
page read and write
18DB45B0000
heap
page read and write
748000
heap
page read and write
2A9FFE5B000
heap
page read and write
A42337C000
stack
page read and write
15A83C3E000
heap
page read and write
15A83C23000
heap
page read and write
1FFEAA40000
heap
page read and write
167BE27D000
heap
page read and write
1FFEAA5C000
heap
page read and write
765000
heap
page read and write
748000
heap
page read and write
18DB4913000
heap
page read and write
8928E7E000
stack
page read and write
2A9FFE02000
heap
page read and write
15A83CE0000
heap
page read and write
18DB484D000
heap
page read and write
9D8D27E000
stack
page read and write
1CBD1029000
heap
page read and write
1949182A000
heap
page read and write
748000
heap
page read and write
18DB487E000
heap
page read and write
18DB4620000
heap
page read and write
18DB47F0000
trusted library allocation
page read and write
45A987E000
stack
page read and write
2A9FFC90000
heap
page read and write
167BE300000
heap
page read and write
45A93FC000
stack
page read and write
15A83C85000
heap
page read and write
407000
unkown
page readonly
22279E7B000
heap
page read and write
2886000
heap
page read and write
1835144E000
heap
page read and write
28A0CC13000
heap
page read and write
1CBD107A000
heap
page read and write
E96A9FB000
stack
page read and write
19491858000
heap
page read and write
18DB4883000
heap
page read and write
751000
heap
page read and write
28A0CB54000
heap
page read and write
15A839F0000
heap
page read and write
99000
stack
page read and write
6A8CFC000
stack
page read and write
18351502000
heap
page read and write
3D0197F000
stack
page read and write
28A0C1D0000
trusted library allocation
page read and write
21C92BA0000
trusted library allocation
page read and write
6A927C000
stack
page read and write
2E56D7F000
stack
page read and write
F1D217E000
stack
page read and write
436000
unkown
page readonly
1CBD104D000
heap
page read and write
22FF000
stack
page read and write
21C91CC4000
heap
page read and write
18DB45C0000
heap
page read and write
18DB4829000
heap
page read and write
194DFF00000
heap
page read and write
28A0C243000
heap
page read and write
167BE27E000
heap
page read and write
18351500000
heap
page read and write
1CBD1057000
heap
page read and write
335A8FE000
stack
page read and write
751000
heap
page read and write
21C91CBB000
heap
page read and write
247F000
stack
page read and write
9D8D5FF000
stack
page read and write
7A4000
heap
page read and write
194DFE77000
heap
page read and write
19491849000
heap
page read and write
15A83CC3000
heap
page read and write
28D06A58000
heap
page read and write
18DB4857000
heap
page read and write
28D06A4E000
heap
page read and write
28A0CB90000
heap
page read and write
2E56E7B000
stack
page read and write
194DFE51000
heap
page read and write
9D8CD1C000
stack
page read and write
A42327E000
stack
page read and write
19491813000
heap
page read and write
194DFF13000
heap
page read and write
1CBD1013000
heap
page read and write
194DFF02000
heap
page read and write
22279F00000
heap
page read and write
335A2FE000
stack
page read and write
28A0C313000
heap
page read and write
646267F000
stack
page read and write
1CBD1083000
heap
page read and write
21C91C70000
heap
page read and write
101397E000
stack
page read and write
751000
heap
page read and write
2A980602000
trusted library allocation
page read and write
15A8453B000
heap
page read and write
1FFEAF90000
remote allocation
page read and write
2530000
heap
page read and write
429000
unkown
page read and write
45A97F9000
stack
page read and write
167BE160000
heap
page read and write
1CBD106D000
heap
page read and write
73510000
unkown
page readonly
21C91CB4000
heap
page read and write
73513000
unkown
page readonly
18DB4850000
heap
page read and write
3D0127F000
stack
page read and write
73C000
heap
page read and write
1CBD103D000
heap
page read and write
2A9FFE13000
heap
page read and write
F1D1E7E000
stack
page read and write
45A99F9000
stack
page read and write
765000
heap
page read and write
433000
unkown
page read and write
28A0CB02000
heap
page read and write
748000
heap
page read and write
28A0CB22000
heap
page read and write
64626FD000
stack
page read and write
1A5487D000
stack
page read and write
19491849000
heap
page read and write
15A83B50000
trusted library allocation
page read and write
2E569FE000
stack
page read and write
3D014FD000
stack
page read and write
19491900000
heap
page read and write
18DB4813000
heap
page read and write
765000
heap
page read and write
751000
heap
page read and write
1CBD1074000
heap
page read and write
167BE313000
heap
page read and write
2A9FFE69000
heap
page read and write
74D000
heap
page read and write
22279E55000
heap
page read and write
19491902000
heap
page read and write
18DB4E02000
trusted library allocation
page read and write
15A839E0000
heap
page read and write
1949185E000
heap
page read and write
28A0C28B000
heap
page read and write
194DFE29000
heap
page read and write
9D8D3F9000
stack
page read and write
9D8D77F000
stack
page read and write
1FFEA7A0000
heap
page read and write
10135EE000
stack
page read and write
167BE213000
heap
page read and write
1CBD1077000
heap
page read and write
28D06A00000
heap
page read and write
28A0CB13000
heap
page read and write
288C000
heap
page read and write
1FFEAA00000
heap
page read and write
E96ACFE000
stack
page read and write
19491790000
trusted library allocation
page read and write
28A0CB6D000
heap
page read and write
19491848000
heap
page read and write
21C92B40000
trusted library allocation
page read and write
19493202000
trusted library allocation
page read and write
22279E13000
heap
page read and write
748000
heap
page read and write
21C91E80000
trusted library allocation
page read and write
1CBD1065000
heap
page read and write
1835144F000
heap
page read and write
45A9779000
stack
page read and write
18DB4902000
heap
page read and write
2336000
heap
page read and write
710000
heap
page read and write
19491600000
heap
page read and write
2A9FFE41000
heap
page read and write
21C91CBB000
heap
page read and write
4AEF000
heap
page read and write
751000
heap
page read and write
F1D167B000
stack
page read and write
1CBD1102000
heap
page read and write
67F7000
direct allocation
page execute and read and write
74D000
heap
page read and write
194E0402000
trusted library allocation
page read and write
751000
heap
page read and write
28D06980000
trusted library allocation
page read and write
21C91CB4000
heap
page read and write
380B000
stack
page read and write
1A5457B000
stack
page read and write
28A0C276000
heap
page read and write
1949183D000
heap
page read and write
74D000
heap
page read and write
3D00CFC000
stack
page read and write
45A997C000
stack
page read and write
3D0157B000
stack
page read and write
73511000
unkown
page execute read
2A980490000
trusted library allocation
page read and write
194DFBD0000
heap
page read and write
22279E00000
heap
page read and write
24F0000
heap
page read and write
2A9FFE79000
heap
page read and write
15A83A50000
heap
page read and write
28D06A54000
heap
page read and write
28A0C26D000
heap
page read and write
194DFE57000
heap
page read and write
22279D60000
heap
page read and write
183511C0000
heap
page read and write
167BE930000
trusted library allocation
page read and write
167BE229000
heap
page read and write
21FE000
stack
page read and write
24D0000
heap
page read and write
28D06A29000
heap
page read and write
21C92B30000
heap
page readonly
4AEF000
heap
page read and write
15A84402000
heap
page read and write
2A9FFE00000
heap
page read and write
24D4000
heap
page read and write
751000
heap
page read and write
335A27C000
stack
page read and write
73C000
heap
page read and write
73C000
heap
page read and write
E96A48C000
stack
page read and write
1835146F000
heap
page read and write
28A0C271000
heap
page read and write
767000
heap
page read and write
15A83C00000
heap
page read and write
E96ABFE000
stack
page read and write
19491825000
heap
page read and write
765000
heap
page read and write
21C928D0000
trusted library allocation
page read and write
21C92B20000
trusted library allocation
page read and write
1FFEA9D0000
trusted library allocation
page read and write
748000
heap
page read and write
2A9FFE66000
heap
page read and write
2330000
heap
page read and write
18351429000
heap
page read and write
28A0CC00000
heap
page read and write
2A9FFF02000
heap
page read and write
22279E02000
heap
page read and write
167BE200000
heap
page read and write
28A0CC30000
heap
page read and write
73C000
heap
page read and write
1CBD105D000
heap
page read and write
2A980000000
heap
page read and write
1835148B000
heap
page read and write
2500000
heap
page read and write
646287F000
stack
page read and write
1FFEAB02000
heap
page read and write
28A0C267000
heap
page read and write
194917C0000
trusted library allocation
page read and write
19491918000
heap
page read and write
765000
heap
page read and write
421000
unkown
page read and write
401000
unkown
page execute read
F1D1C7D000
stack
page read and write
1CBD1042000
heap
page read and write
1A54677000
stack
page read and write
21C91CB7000
heap
page read and write
194DFC40000
heap
page read and write
18DB4800000
heap
page read and write
18DB4890000
heap
page read and write
407000
unkown
page readonly
6462B7F000
stack
page read and write
3D0167E000
stack
page read and write
1CBD106F000
heap
page read and write
194931E0000
remote allocation
page read and write
1CBD1047000
heap
page read and write
22279E28000
heap
page read and write
19491859000
heap
page read and write
22279F13000
heap
page read and write
335A37F000
stack
page read and write
1A5477E000
stack
page read and write
15A83CB9000
heap
page read and write
28A0C200000
heap
page read and write
194931E0000
remote allocation
page read and write
15A84512000
heap
page read and write
1013A7E000
stack
page read and write
21C91C80000
heap
page read and write
18DB4908000
heap
page read and write
74D000
heap
page read and write
A42307B000
stack
page read and write
1CBD1680000
trusted library allocation
page read and write
18DB4871000
heap
page read and write
28A0C287000
heap
page read and write
748000
heap
page read and write
1013B7E000
stack
page read and write
6A88BB000
stack
page read and write
9D8D7FF000
stack
page read and write
288B000
heap
page read and write
74D000
heap
page read and write
436000
unkown
page readonly
19491913000
heap
page read and write
194DFE71000
heap
page read and write
167BE249000
heap
page read and write
A42367F000
stack
page read and write
1CBD107E000
heap
page read and write
194DFE13000
heap
page read and write
74D000
heap
page read and write
1FFEA790000
heap
page read and write
194DFBE0000
heap
page read and write
28A0CB08000
heap
page read and write
21C91E75000
heap
page read and write
101356E000
stack
page read and write
1CBD1061000
heap
page read and write
28A0CBAE000
heap
page read and write
15A83CBE000
heap
page read and write
18351513000
heap
page read and write
2E5717F000
stack
page read and write
F1D1A7D000
stack
page read and write
1013C7E000
stack
page read and write
73C000
heap
page read and write
2A9FFE74000
heap
page read and write
1FFEB002000
trusted library allocation
page read and write
21C91C40000
heap
page read and write
21C91CBB000
heap
page read and write
335A47C000
stack
page read and write
28D06900000
heap
page read and write
28A0CB22000
heap
page read and write
74D000
heap
page read and write
6A907F000
stack
page read and write
167BE288000
heap
page read and write
431000
unkown
page read and write
765000
heap
page read and write
18DB4852000
heap
page read and write
18DB483C000
heap
page read and write
765000
heap
page read and write
1CBD105E000
heap
page read and write
4AE9000
heap
page read and write
73C000
heap
page read and write
580000
heap
page read and write
5DF7000
direct allocation
page execute and read and write
2E5697E000
stack
page read and write
3D010FC000
stack
page read and write
9D8D17B000
stack
page read and write
19491770000
trusted library allocation
page read and write
F1D197D000
stack
page read and write
425000
unkown
page read and write
1CBD1079000
heap
page read and write
15A83C6C000
heap
page read and write
1CBD1063000
heap
page read and write
28D06A45000
heap
page read and write
1FFEAF90000
remote allocation
page read and write
288B000
heap
page read and write
74D000
heap
page read and write
73C000
heap
page read and write
15A83CCA000
heap
page read and write
28D06A13000
heap
page read and write
28A0C28F000
heap
page read and write
765000
heap
page read and write
8928DFD000
stack
page read and write
2A9FFD00000
heap
page read and write
22279D90000
trusted library allocation
page read and write
1CBD107B000
heap
page read and write
646297B000
stack
page read and write
335A7FF000
stack
page read and write
15A83C29000
heap
page read and write
1A5427E000
stack
page read and write
1CBD1000000
heap
page read and write
194DFE26000
heap
page read and write
There are 530 hidden memdumps, click here to show them.