IOC Report
https://ofu.blob.core.windows.net/ofu/f.html?f_pp=esosolutions

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\Downloads\2717b024-f983-4a41-b4b1-eda0a7b69cd8.tmp
ASCII text, with no line terminators
dropped
C:\Users\user\Downloads\kb641812-filter-pack-2024-1.dat (copy)
ASCII text, with no line terminators
dropped
C:\Users\user\Downloads\kb641812-filter-pack-2024-1.dat.crdownload (copy)
ASCII text, with no line terminators
dropped
Chrome Cache Entry: 48
HTML document, ASCII text, with very long lines (21826)
downloaded
Chrome Cache Entry: 49
XML 1.0 document, Unicode text, UTF-8 (with BOM) text
downloaded

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2572 --field-trial-handle=2204,i,23263598249044838,12302988858141818051,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://ofu.blob.core.windows.net/ofu/f.html?f_pp=esosolutions"
C:\Windows\System32\OpenWith.exe
C:\Windows\system32\OpenWith.exe -Embedding

URLs

Name
IP
Malicious
https://ofu.blob.core.windows.net/ofu/f.html?f_pp=esosolutions
https://outlook.office.com/
unknown

Domains

Name
IP
Malicious
www.google.com
142.250.185.228

IPs

IP
Domain
Country
Malicious
142.250.185.228
www.google.com
United States
239.255.255.250
unknown
Reserved
192.168.2.7
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Adobe\Acrobat DC\Acrobat\Acrobat.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Mozilla Firefox\firefox.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Mozilla Firefox\firefox.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Internet Explorer\iexplore.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Internet Explorer\iexplore.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\Root\VFS\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\mspaint.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\mspaint.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\NOTEPAD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\NOTEPAD.EXE.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Microsoft Office\root\Office16\Winword.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files (x86)\Windows Media Player\wmplayer.exe.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Program Files\Windows NT\Accessories\WORDPAD.EXE.ApplicationCompany
There are 8 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2DC0D790000
heap
page read and write
2DC0F80D000
heap
page read and write
2DC12034000
heap
page read and write
2DC0F812000
heap
page read and write
2DC0F91D000
heap
page read and write
2DC142E0000
heap
page read and write
2DC0F979000
heap
page read and write
2DC0F81A000
heap
page read and write
2DC0F7FF000
heap
page read and write
2DC0D8AE000
heap
page read and write
2DC0F804000
heap
page read and write
2DC0D8B6000
heap
page read and write
2DC0F81A000
heap
page read and write
F4086FF000
stack
page read and write
F408277000
stack
page read and write
2DC0F81E000
heap
page read and write
2DC0F81E000
heap
page read and write
2DC11A20000
trusted library allocation
page read and write
2DC0F9CA000
heap
page read and write
2DC1203E000
heap
page read and write
2DC0F82A000
heap
page read and write
2DC0F8EA000
heap
page read and write
2DC0F822000
heap
page read and write
2DC0F80D000
heap
page read and write
2DC0F904000
heap
page read and write
2DC0D7D0000
heap
page read and write
2DC0D91D000
heap
page read and write
2DC0F8DD000
heap
page read and write
2DC0F822000
heap
page read and write
2DC0F81F000
heap
page read and write
2DC0F925000
heap
page read and write
2DC0F812000
heap
page read and write
2DC0F8F2000
heap
page read and write
2DC1206E000
heap
page read and write
2DC0F9AA000
heap
page read and write
2DC0F80E000
heap
page read and write
2DC0F81E000
heap
page read and write
2DC0F804000
heap
page read and write
2DC0F1E0000
heap
page read and write
F40877B000
stack
page read and write
2DC12010000
heap
page read and write
2DC0D8AB000
heap
page read and write
2DC0F822000
heap
page read and write
2DC0F8D0000
heap
page read and write
2DC12450000
heap
page read and write
2DC0F80E000
heap
page read and write
2DC0F822000
heap
page read and write
2DC0F82A000
heap
page read and write
2DC12032000
heap
page read and write
F4083FF000
stack
page read and write
2DC0F81A000
heap
page read and write
2DC0F97D000
heap
page read and write
2DC0F816000
heap
page read and write
2DC0F816000
heap
page read and write
F40867D000
stack
page read and write
2DC0F816000
heap
page read and write
2DC0F7FF000
heap
page read and write
2DC0F804000
heap
page read and write
2DC0F8FC000
heap
page read and write
2DC0F822000
heap
page read and write
2DC0F816000
heap
page read and write
2DC0F81E000
heap
page read and write
2DC0F8F0000
heap
page read and write
2DC0F8E0000
heap
page read and write
2DC0F801000
heap
page read and write
2DC0F8F4000
heap
page read and write
2DC0D820000
heap
page read and write
F4082FF000
stack
page read and write
2DC0F81E000
heap
page read and write
2DC0F81A000
heap
page read and write
2DC0D828000
heap
page read and write
2DC0F8FE000
heap
page read and write
2DC0F7FB000
heap
page read and write
2DC0F82A000
heap
page read and write
2DC0F7D0000
heap
page read and write
2DC0F98A000
heap
page read and write
2DC0F801000
heap
page read and write
2DC0F92E000
heap
page read and write
2DC0F225000
heap
page read and write
2DC12460000
trusted library section
page readonly
F4085FE000
stack
page read and write
2DC0F996000
heap
page read and write
2DC0F7E0000
heap
page read and write
2DC0D830000
heap
page read and write
2DC0F8E8000
heap
page read and write
2DC0F980000
heap
page read and write
2DC0F816000
heap
page read and write
F40837E000
stack
page read and write
F40847B000
stack
page read and write
2DC0F804000
heap
page read and write
2DC0F812000
heap
page read and write
2DC0D890000
heap
page read and write
F4084FE000
stack
page read and write
2DC0F81A000
heap
page read and write
2DC0F812000
heap
page read and write
2DC0F220000
heap
page read and write
2DC0F82A000
heap
page read and write
2DC0F812000
heap
page read and write
F40857B000
stack
page read and write
2DC0D780000
heap
page read and write
2DC0F80E000
heap
page read and write
F4087FF000
stack
page read and write
There are 92 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://ofu.blob.core.windows.net/ofu/f.html?f_pp=esosolutions