IOC Report
Quotation.exe

loading gif

Files

File Path
Type
Category
Malicious
Quotation.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\nsp1B2F.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\Music\antithetic.ini
ASCII text, with CRLF line terminators
dropped
C:\Users\user\overlays\besvangredes\Emmens.udk
data
dropped
C:\Users\user\overlays\besvangredes\Launeddas.Bag176
data
dropped
C:\Users\user\overlays\besvangredes\Phenomenalizing\gear.dra
data
dropped
C:\Users\user\overlays\besvangredes\Phenomenalizing\jagtfalk.ill
data
dropped
C:\Users\user\overlays\besvangredes\Phenomenalizing\regill.ful
data
dropped
C:\Users\user\overlays\besvangredes\Phenomenalizing\sortlistningens.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\overlays\besvangredes\Proprietrer.bet
data
dropped
C:\Users\user\overlays\besvangredes\Stridbar.Rek181
data
dropped
C:\Users\user\overlays\besvangredes\Trikstanks.pra
data
dropped
C:\Users\user\overlays\besvangredes\boyaus.rom
data
dropped
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Quotation.exe
"C:\Users\user\Desktop\Quotation.exe"
malicious
C:\Users\user\Desktop\Quotation.exe
"C:\Users\user\Desktop\Quotation.exe"
malicious

URLs

Name
IP
Malicious
http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
unknown
https://www.google.com
unknown
http://www.ftp.ftp://ftp.gopher.
unknown
https://drive.usercontent.google.com/
unknown
http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
unknown
https://apis.google.com
unknown
http://nsis.sf.net/NSIS_Error...
unknown
https://drive.google.com/
unknown
https://drive.google.com/r
unknown
https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
unknown

Domains

Name
IP
Malicious
18.31.95.13.in-addr.arpa
unknown
malicious
50.23.12.20.in-addr.arpa
unknown
malicious
drive.google.com
142.250.186.174
drive.usercontent.google.com
142.250.186.129

IPs

IP
Domain
Country
Malicious
142.250.186.129
drive.usercontent.google.com
United States
142.250.186.174
drive.google.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\Zoofulvin68\Uninstall\brevbrere
aircondition

Memdumps

Base Address
Regiontype
Protect
Malicious
35660000
direct allocation
page read and write
malicious
592C000
direct allocation
page execute and read and write
malicious
57AB000
heap
page read and write
356B0000
direct allocation
page read and write
E60000
heap
page read and write
57BD000
heap
page read and write
27D0000
heap
page read and write
59A0000
heap
page read and write
2DD0000
direct allocation
page read and write
56F7000
heap
page read and write
980000
heap
page read and write
39DC000
stack
page read and write
5794000
heap
page read and write
35C9D000
direct allocation
page execute and read and write
5F2000
unkown
page execute read
401000
unkown
page execute read
73400000
unkown
page readonly
57B8000
heap
page read and write
2C40000
heap
page read and write
649000
unkown
page execute read
53CC000
remote allocation
page execute and read and write
353EE000
stack
page read and write
400000
unkown
page readonly
E79000
heap
page read and write
34D50000
direct allocation
page read and write
71000
heap
page read and write
626000
unkown
page execute read
401000
unkown
page execute read
D0F000
stack
page read and write
3542E000
stack
page read and write
5940000
direct allocation
page read and write
35660000
direct allocation
page read and write
73404000
unkown
page readonly
ABF000
stack
page read and write
268E000
stack
page read and write
7A2000
unkown
page read and write
2C20000
direct allocation
page read and write
57B8000
heap
page read and write
350FE000
stack
page read and write
57AB000
heap
page read and write
356B0000
direct allocation
page read and write
5E6000
unkown
page execute read
4F2C000
direct allocation
page execute and read and write
57BA000
heap
page read and write
5E4000
unkown
page execute read
3550F000
stack
page read and write
579E000
heap
page read and write
56F0000
heap
page read and write
359D0000
direct allocation
page execute and read and write
3565D000
stack
page read and write
2D60000
direct allocation
page read and write
3581E000
heap
page read and write
57B8000
heap
page read and write
781000
unkown
page read and write
57BA000
heap
page read and write
57AB000
heap
page read and write
5803000
heap
page read and write
B18000
heap
page read and write
7AD000
unkown
page read and write
352FF000
stack
page read and write
820000
heap
page read and write
2D50000
direct allocation
page read and write
35947000
heap
page read and write
56D0000
heap
page read and write
2D90000
direct allocation
page read and write
3594B000
heap
page read and write
B60000
heap
page read and write
57B1000
heap
page read and write
3ADB000
stack
page read and write
55F0000
heap
page read and write
5740000
heap
page read and write
35660000
heap
page read and write
5930000
direct allocation
page read and write
351FD000
stack
page read and write
351BF000
stack
page read and write
5980000
direct allocation
page read and write
57A8000
heap
page read and write
5EA000
unkown
page execute read
57BD000
heap
page read and write
5920000
direct allocation
page read and write
19A000
stack
page read and write
772C000
direct allocation
page execute and read and write
7DB000
unkown
page readonly
21CC000
remote allocation
page execute and read and write
8B2C000
direct allocation
page execute and read and write
27D4000
heap
page read and write
6D2C000
direct allocation
page execute and read and write
35310000
heap
page read and write
2C50000
heap
page read and write
3110000
heap
page read and write
D4E000
stack
page read and write
356B0000
direct allocation
page read and write
57B8000
heap
page read and write
B10000
heap
page read and write
E70000
heap
page read and write
57B1000
heap
page read and write
789000
unkown
page read and write
57BD000
heap
page read and write
5960000
direct allocation
page read and write
2BCC000
remote allocation
page execute and read and write
5748000
heap
page read and write
400000
unkown
page readonly
2D40000
direct allocation
page read and write
56F5000
heap
page read and write
5EC000
unkown
page execute read
35CA1000
direct allocation
page execute and read and write
5794000
heap
page read and write
58FF000
stack
page read and write
40A000
unkown
page write copy
3FCC000
remote allocation
page execute and read and write
5F0000
unkown
page execute read
812C000
direct allocation
page execute and read and write
57BA000
heap
page read and write
77C000
unkown
page read and write
1660000
remote allocation
page execute and read and write
35490000
remote allocation
page read and write
579E000
heap
page read and write
2D80000
direct allocation
page read and write
57FF000
heap
page read and write
5900000
direct allocation
page read and write
5803000
heap
page read and write
352BE000
stack
page read and write
35490000
remote allocation
page read and write
57BD000
heap
page read and write
B4A000
heap
page read and write
3555E000
stack
page read and write
353AF000
stack
page read and write
400000
unkown
page readonly
2DC0000
direct allocation
page read and write
7AB000
unkown
page read and write
5950000
direct allocation
page read and write
34D60000
direct allocation
page read and write
57A6000
heap
page read and write
356B0000
direct allocation
page read and write
57FF000
heap
page read and write
58BE000
stack
page read and write
57FF000
heap
page read and write
35D12000
direct allocation
page execute and read and write
632C000
direct allocation
page execute and read and write
2D70000
direct allocation
page read and write
35CC000
remote allocation
page execute and read and write
9B0000
heap
page read and write
49CC000
remote allocation
page execute and read and write
5EE000
unkown
page execute read
408000
unkown
page readonly
5803000
heap
page read and write
31A0000
trusted library allocation
page read and write
27C0000
heap
page read and write
35AF9000
direct allocation
page execute and read and write
B66000
heap
page read and write
5803000
heap
page read and write
AD0000
heap
page read and write
40A000
unkown
page write copy
40A000
unkown
page read and write
97E000
stack
page read and write
93E000
stack
page read and write
4DC0000
direct allocation
page execute and read and write
7A6000
unkown
page read and write
5E8000
unkown
page execute read
2DE0000
direct allocation
page read and write
57A8000
heap
page read and write
7DB000
unkown
page readonly
5796000
heap
page read and write
B7F000
heap
page read and write
278F000
stack
page read and write
3517E000
stack
page read and write
73401000
unkown
page execute read
E4F000
stack
page read and write
57B1000
heap
page read and write
5803000
heap
page read and write
356B0000
direct allocation
page read and write
57FB000
heap
page read and write
57FF000
heap
page read and write
359BC000
heap
page read and write
57A6000
heap
page read and write
573E000
stack
page read and write
408000
unkown
page readonly
5990000
direct allocation
page read and write
7B4000
unkown
page read and write
401000
unkown
page execute read
579E000
heap
page read and write
57BA000
heap
page read and write
7DB000
unkown
page readonly
B46000
heap
page read and write
35490000
remote allocation
page read and write
354CE000
stack
page read and write
5970000
direct allocation
page read and write
35AFD000
direct allocation
page execute and read and write
5784000
heap
page read and write
356B0000
direct allocation
page read and write
57A8000
heap
page read and write
35B6E000
direct allocation
page execute and read and write
17CC000
remote allocation
page execute and read and write
3513F000
stack
page read and write
E75000
heap
page read and write
35783000
heap
page read and write
587F000
stack
page read and write
57A6000
heap
page read and write
401000
unkown
page execute read
2DA0000
direct allocation
page read and write
57FF000
heap
page read and write
57B8000
heap
page read and write
9B5000
heap
page read and write
98000
stack
page read and write
408000
unkown
page readonly
2DB0000
direct allocation
page read and write
57BD000
heap
page read and write
5910000
direct allocation
page read and write
786000
unkown
page read and write
3523D000
stack
page read and write
73406000
unkown
page readonly
3536E000
stack
page read and write
70000
heap
page read and write
There are 203 hidden memdumps, click here to show them.