IOC Report
OojqjHGE0W.exe

loading gif

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\OojqjHGE0W.exe
"C:\Users\user\Desktop\OojqjHGE0W.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
malicious

URLs

Name
IP
Malicious
https://mem.gfx.ms/meversion/?partner=msn&market=de-ch"
unknown
https://www.msn.com/de-ch/news/other/weniger-verbindungen-zwischen-z%c3%bcrich-und-bern-daf%c3%bcr-m
unknown
https://www.msn.com/de-ch/news/other/fremdes-b%c3%bcsi-gef%c3%bcttert-frau-soll-1250-franken-strafe-
unknown
https://outlook.com/
unknown
https://www.msn.com/de-ch/shopping
unknown
http://www.msn.com/de-ch/
13.107.40.203
http://ogp.me/ns#
unknown
https://i.geistm.com/l/HFCH_DTS_LP?bcid=61c4707a19d27603f32a58ba&bhid=6203eb0e7db0ad17f44b22d8&a
unknown
https://browser.events.data.msn.com/OneCollector/1.0/t.js?qsp=true&anoncknm=%22%22&name=%22M
unknown
https://cdn.hoergeraete.hoeren-heute.ch/horizon_reveal/?act=ACT0000040013ACT&utm_source=mcrs&amp
unknown
https://www.msn.com/de-ch/sport/other/der-fcz-verabschiedet-sich-von-doumbia-und-ceesay/ar-AAXsezM?o
unknown
https://www.msn.com/de-ch/news/other/stadtrat-handelt-in-z%c3%bcrich-west-mehr-preisg%c3%bcnstige-wo
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
https://www.msn.com/de-ch/news/other/autofahrer-38-rast-mit-94-km-h-durch-30er-zone/ar-AAXsnwd?ocid=
unknown
http://ogp.me/ns/fb#
unknown
https://www.msn.com/de-ch/news/other/olivia-und-noah-sind-die-beliebtesten-baby-vornamen-in-z%c3%bcr
unknown
https://www.msn.com/de-ch/news/other/z%c3%bcrcher-kantonsrat-pr%c3%bcft-nach-igelkot-vorfall-sicherh
unknown
http://www.msn.com/de-ch
unknown
https://i.geistm.com/l/HFCH_DTS_LP?bcid=61c4707a19d27603f32a58b8&bhid=62470ee6adad76040858398f&a
unknown
http://www.msn.com/
13.107.40.203
There are 10 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
a-0003.fbs2-a-msedge.net
13.107.40.203
anm.msn.com
unknown
www.msn.com
unknown

IPs

IP
Domain
Country
Malicious
13.107.40.203
a-0003.fbs2-a-msedge.net
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
20C8000
heap
page read and write
malicious
20C8000
heap
page read and write
malicious
20C8000
heap
page read and write
malicious
20C8000
heap
page read and write
malicious
20C8000
heap
page read and write
malicious
20C8000
heap
page read and write
malicious
1B69000
heap
page read and write
malicious
20C8000
heap
page read and write
malicious
20C8000
heap
page read and write
malicious
20C8000
heap
page read and write
malicious
20C8000
heap
page read and write
malicious
888000
heap
page read and write
5109EFE000
stack
page read and write
A21000
heap
page read and write
20F9E013000
heap
page read and write
1140000
remote allocation
page read and write
1A97AC40000
heap
page read and write
1F061103000
heap
page read and write
36630FC000
stack
page read and write
712D97F000
stack
page read and write
D5F000
stack
page read and write
1F0610DE000
heap
page read and write
1F05BA58000
heap
page read and write
1F05C313000
heap
page read and write
B1F927F000
stack
page read and write
712DE7F000
stack
page read and write
712E07E000
stack
page read and write
1F061270000
trusted library allocation
page read and write
11BE000
stack
page read and write
7A4000
heap
page read and write
2310DD00000
heap
page read and write
370000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
1349000
unclassified section
page readonly
1F05CD90000
trusted library allocation
page read and write
63BEFFE000
stack
page read and write
A21000
heap
page read and write
A21000
heap
page read and write
AFA2F7B000
stack
page read and write
1A97AD00000
heap
page read and write
A21000
heap
page read and write
2310D4BB000
heap
page read and write
139A000
heap
page read and write
712DB7E000
stack
page read and write
1F060DB0000
trusted library allocation
page read and write
19F55A6B000
heap
page read and write
A21000
heap
page read and write
4300000
trusted library allocation
page read and write
A21000
heap
page read and write
712D87B000
stack
page read and write
1350000
heap
page read and write
7A4000
heap
page read and write
2310D502000
heap
page read and write
A21000
heap
page read and write
2580000
trusted library allocation
page read and write
B1F90FE000
stack
page read and write
1F05BA91000
heap
page read and write
7A4000
heap
page read and write
712DD7F000
stack
page read and write
1140000
remote allocation
page read and write
85A000
heap
page read and write
229DDC70000
heap
page read and write
1F05B9F0000
trusted library section
page read and write
229DDE40000
heap
page read and write
19F55A5F000
heap
page read and write
1F061100000
heap
page read and write
11FD000
stack
page read and write
229DDC80000
heap
page read and write
510A3FE000
stack
page read and write
19F55A7D000
heap
page read and write
2310D4CC000
heap
page read and write
19F55A3E000
heap
page read and write
20F9E075000
heap
page read and write
370000
trusted library allocation
page read and write
1F05BAB5000
heap
page read and write
E83D000
stack
page read and write
13A8000
heap
page read and write
7A4000
heap
page read and write
712E17F000
stack
page read and write
1F05BB13000
heap
page read and write
229DDE5C000
heap
page read and write
A21000
heap
page read and write
AFA2AFE000
stack
page read and write
1C7E000
stack
page read and write
2310D513000
heap
page read and write
AFA2BFF000
stack
page read and write
20F9DF00000
heap
page read and write
7A4000
heap
page read and write
7A4000
heap
page read and write
1F060F70000
trusted library allocation
page read and write
1F060F4E000
trusted library allocation
page read and write
1F05B870000
heap
page read and write
19F55A69000
heap
page read and write
19F55A00000
heap
page read and write
1A97AC64000
heap
page read and write
AFA257F000
stack
page read and write
229DE470000
remote allocation
page read and write
2310D413000
heap
page read and write
1F060F40000
trusted library allocation
page read and write
1F05BAAC000
heap
page read and write
19F55A4F000
heap
page read and write
1F05CA20000
trusted library section
page readonly
19F55A62000
heap
page read and write
7A4000
heap
page read and write
7A4000
heap
page read and write
7A4000
heap
page read and write
E97F000
stack
page read and write
A21000
heap
page read and write
A21000
heap
page read and write
36631FE000
stack
page read and write
3662AFF000
stack
page read and write
7A4000
heap
page read and write
19F55A46000
heap
page read and write
1F05CA00000
trusted library section
page readonly
A21000
heap
page read and write
AFA327F000
stack
page read and write
7A4000
heap
page read and write
A21000
heap
page read and write
1F061250000
trusted library allocation
page read and write
712DF7F000
stack
page read and write
A21000
heap
page read and write
154E000
stack
page read and write
229DE470000
remote allocation
page read and write
888000
heap
page read and write
1A97AC02000
heap
page read and write
1210000
direct allocation
page read and write
7A4000
heap
page read and write
7A4000
heap
page read and write
7A4000
heap
page read and write
20F9E000000
heap
page read and write
B21000
unkown
page execute read
7A4000
heap
page read and write
19F55A7C000
heap
page read and write
7A4000
heap
page read and write
2310DC02000
heap
page read and write
1F05C318000
heap
page read and write
A21000
heap
page read and write
AFA2DFF000
stack
page read and write
19F55A42000
heap
page read and write
1210000
direct allocation
page read and write
1A97AC13000
heap
page read and write
6FA000
stack
page read and write
2310D2E0000
heap
page read and write
AFA297E000
stack
page read and write
AFA2D7F000
stack
page read and write
19F55A5A000
heap
page read and write
370000
trusted library allocation
page read and write
30A000
stack
page read and write
1F0610B6000
heap
page read and write
4280000
trusted library allocation
page read and write
2730000
heap
page read and write
1A97AC7C000
heap
page read and write
2580000
trusted library allocation
page execute and read and write
1F05BA8B000
heap
page read and write
229DDE02000
heap
page read and write
1340000
unclassified section
page read and write
B48000
unkown
page execute and read and write
19F55B02000
heap
page read and write
C33000
unkown
page read and write
3662FFF000
stack
page read and write
B1F91FD000
stack
page read and write
7A4000
heap
page read and write
7A4000
heap
page read and write
1F061210000
trusted library allocation
page read and write
7A4000
heap
page read and write
A21000
heap
page read and write
20F9DF70000
heap
page read and write
7A4000
heap
page read and write
1A97ABF0000
trusted library allocation
page read and write
360000
trusted library allocation
page read and write
A21000
heap
page read and write
6E7000
stack
page read and write
19F559B0000
heap
page read and write
B1F8FFF000
stack
page read and write
878000
heap
page read and write
19F55A64000
heap
page read and write
1F060F48000
trusted library allocation
page read and write
366251B000
stack
page read and write
3662BFF000
stack
page read and write
1210000
direct allocation
page read and write
7A4000
heap
page read and write
1F05C318000
heap
page read and write
1A97AD13000
heap
page read and write
1F05B8E0000
heap
page read and write
19F55A3C000
heap
page read and write
1F061049000
heap
page read and write
5109F7E000
stack
page read and write
1F05C9D0000
trusted library section
page readonly
A21000
heap
page read and write
1F05C9E0000
trusted library section
page readonly
A21000
heap
page read and write
3DE000
stack
page read and write
2310D3E0000
trusted library allocation
page read and write
19F55A6D000
heap
page read and write
1F05C300000
heap
page read and write
5109E7C000
stack
page read and write
2310D487000
heap
page read and write
1F061090000
trusted library allocation
page read and write
1F05BA74000
heap
page read and write
A21000
heap
page read and write
1F05C359000
heap
page read and write
7A4000
heap
page read and write
1A97B202000
trusted library allocation
page read and write
1F05C9F0000
trusted library section
page readonly
A21000
heap
page read and write
1F061088000
heap
page read and write
103D000
stack
page read and write
20F9E068000
heap
page read and write
19F55A29000
heap
page read and write
7A0000
heap
page read and write
A21000
heap
page read and write
AFA277A000
stack
page read and write
19F55A45000
heap
page read and write
20F9E102000
heap
page read and write
7A4000
heap
page read and write
AFA2B7E000
stack
page read and write
B21000
unkown
page execute read
404000
remote allocation
page execute and read and write
3662EFC000
stack
page read and write
19F55A26000
heap
page read and write
253E000
stack
page read and write
17DD000
stack
page read and write
133C000
stack
page read and write
A21000
heap
page read and write
A21000
heap
page read and write
1F0610F9000
heap
page read and write
1F05C215000
heap
page read and write
1A97AD02000
heap
page read and write
19F55A6F000
heap
page read and write
7A4000
heap
page read and write
4396000
trusted library allocation
page read and write
AFA2677000
stack
page read and write
1F05BA9C000
heap
page read and write
1F06102B000
heap
page read and write
1225000
heap
page read and write
1F0610B5000
heap
page read and write
EA24000
heap
page read and write
404000
remote allocation
page execute and read and write
740000
trusted library allocation
page read and write
1BE8000
heap
page read and write
25B0000
heap
page read and write
1F05BA54000
heap
page read and write
1F061061000
heap
page read and write
890000
heap
page read and write
1F060F84000
trusted library allocation
page read and write
1F05BA00000
heap
page read and write
DB0000
heap
page read and write
3662D7C000
stack
page read and write
C36000
unkown
page readonly
7A4000
heap
page read and write
A21000
heap
page read and write
1F05B880000
heap
page read and write
A20000
heap
page read and write
1C90000
heap
page read and write
1F05BA9E000
heap
page read and write
B20000
unkown
page readonly
A21000
heap
page read and write
19F55A76000
heap
page read and write
510A1FE000
stack
page read and write
2586000
trusted library allocation
page execute and read and write
A21000
heap
page read and write
3DBD000
stack
page read and write
423F000
stack
page read and write
2310D280000
heap
page read and write
1790000
heap
page read and write
164E000
stack
page read and write
A21000
heap
page read and write
750000
trusted library allocation
page read and write
366297C000
stack
page read and write
1A97AA20000
heap
page read and write
A21000
heap
page read and write
E87E000
stack
page read and write
A21000
heap
page read and write
1F05C302000
heap
page read and write
19F55A59000
heap
page read and write
73E000
stack
page read and write
229DDF02000
heap
page read and write
1F0610DE000
heap
page read and write
AFA2CFD000
stack
page read and write
1A97AC28000
heap
page read and write
113C000
stack
page read and write
1140000
remote allocation
page read and write
2584000
trusted library allocation
page execute and read and write
1358000
heap
page read and write
1A97AC00000
heap
page read and write
A21000
heap
page read and write
7A4000
heap
page read and write
229DE470000
remote allocation
page read and write
7A4000
heap
page read and write
1C3D000
stack
page read and write
19F55A47000
heap
page read and write
1F060F60000
trusted library allocation
page read and write
7A4000
heap
page read and write
AFA307A000
stack
page read and write
A21000
heap
page read and write
1A97A9B0000
heap
page read and write
19F55A65000
heap
page read and write
19F55A5E000
heap
page read and write
A21000
heap
page read and write
A21000
heap
page read and write
AFA287A000
stack
page read and write
A21000
heap
page read and write
134C000
unclassified section
page readonly
1F06103C000
heap
page read and write
400000
remote allocation
page execute and read and write
20F9E802000
trusted library allocation
page read and write
63BEDFB000
stack
page read and write
1F05B9E0000
trusted library allocation
page read and write
63BE89B000
stack
page read and write
712DC7D000
stack
page read and write
A21000
heap
page read and write
1F05BA3F000
heap
page read and write
406000
remote allocation
page execute and read and write
E7FF000
stack
page read and write
7A4000
heap
page read and write
19F55950000
heap
page read and write
2310DD32000
heap
page read and write
3FFF000
stack
page read and write
4301000
trusted library allocation
page read and write
E47F000
stack
page read and write
A21000
heap
page read and write
7A4000
heap
page read and write
229DDE29000
heap
page read and write
229DDE00000
heap
page read and write
A21000
heap
page read and write
1F05BB02000
heap
page read and write
E57E000
stack
page read and write
19F55A5B000
heap
page read and write
7A4000
heap
page read and write
2310D400000
heap
page read and write
1210000
direct allocation
page read and write
1A97A9C0000
heap
page read and write
3EFE000
stack
page read and write
4400000
trusted library allocation
page read and write
1F05BA77000
heap
page read and write
A21000
heap
page read and write
885000
heap
page read and write
1F0610F5000
heap
page read and write
1F0612A0000
remote allocation
page read and write
750000
trusted library allocation
page read and write
A21000
heap
page read and write
1F060F64000
trusted library allocation
page read and write
FF3F000
stack
page read and write
1F0610A9000
heap
page read and write
A21000
heap
page read and write
2744000
trusted library allocation
page read and write
20F9E113000
heap
page read and write
7A4000
heap
page read and write
1CA0000
heap
page read and write
1F061280000
trusted library allocation
page read and write
7A4000
heap
page read and write
1F05CD71000
trusted library allocation
page read and write
2884000
trusted library allocation
page read and write
889000
heap
page read and write
2310D4C3000
heap
page read and write
7A4000
heap
page read and write
7A4000
heap
page read and write
1140000
remote allocation
page read and write
229DE602000
trusted library allocation
page read and write
A21000
heap
page read and write
1F05C202000
heap
page read and write
B1F8AFB000
stack
page read and write
7A4000
heap
page read and write
19F55A7F000
heap
page read and write
400000
remote allocation
page execute and read and write
2A0000
heap
page read and write
1F0610A0000
trusted library allocation
page read and write
1F05BA29000
heap
page read and write
AFA2A7B000
stack
page read and write
1F05BAFD000
heap
page read and write
19F56202000
trusted library allocation
page read and write
229DDDE0000
trusted library allocation
page read and write
7A4000
heap
page read and write
257E000
stack
page read and write
1CD0000
heap
page read and write
19F55A41000
heap
page read and write
E5BE000
stack
page read and write
2580000
trusted library allocation
page read and write
20F9DFA0000
trusted library allocation
page read and write
A21000
heap
page read and write
20F9E05A000
heap
page read and write
7A4000
heap
page read and write
1F05C8F0000
trusted library allocation
page read and write
1F05CA10000
trusted library section
page readonly
1F0610A6000
heap
page read and write
1140000
remote allocation
page read and write
1F05C359000
heap
page read and write
413E000
stack
page read and write
B1F937D000
stack
page read and write
A21000
heap
page read and write
A21000
heap
page read and write
370000
trusted library allocation
page read and write
7A4000
heap
page read and write
A21000
heap
page read and write
1F060F61000
trusted library allocation
page read and write
7A4000
heap
page read and write
7A4000
heap
page read and write
B1F947D000
stack
page read and write
510A0FF000
stack
page read and write
1210000
direct allocation
page read and write
2310D429000
heap
page read and write
19F55A77000
heap
page read and write
AFA247B000
stack
page read and write
2310D470000
heap
page read and write
134A000
unclassified section
page read and write
850000
heap
page read and write
19F55A66000
heap
page read and write
229DDE13000
heap
page read and write
830000
heap
page read and write
FF40000
trusted library allocation
page execute and read and write
1F05CDA0000
trusted library allocation
page read and write
1F06101D000
heap
page read and write
17F0000
heap
page read and write
A21000
heap
page read and write
888000
heap
page read and write
20F9E029000
heap
page read and write
406000
remote allocation
page execute and read and write
19F55A5D000
heap
page read and write
1F060F40000
trusted library allocation
page read and write
C32000
unkown
page execute read
7A4000
heap
page read and write
1A97AC77000
heap
page read and write
A21000
heap
page read and write
A21000
heap
page read and write
A21000
heap
page read and write
19F55A13000
heap
page read and write
EA20000
heap
page read and write
1F060E20000
trusted library allocation
page read and write
2049000
heap
page read and write
19F559E0000
trusted library allocation
page read and write
19F55A48000
heap
page read and write
1F060DA0000
trusted library allocation
page read and write
7B0000
trusted library allocation
page read and write
1F061000000
heap
page read and write
7A4000
heap
page read and write
E6BF000
stack
page read and write
2310D4E1000
heap
page read and write
B20000
unkown
page readonly
1220000
heap
page read and write
510A2FE000
stack
page read and write
13B8000
heap
page read and write
4010000
heap
page read and write
19F55A58000
heap
page read and write
1F061260000
trusted library allocation
page read and write
229DDCE0000
heap
page read and write
19F55A61000
heap
page read and write
4000000
heap
page read and write
B1F8F7E000
stack
page read and write
406000
remote allocation
page execute and read and write
20F9E041000
heap
page read and write
3CBA000
stack
page read and write
C33000
unkown
page write copy
1F05C200000
heap
page read and write
7A4000
heap
page read and write
1F060F80000
trusted library allocation
page read and write
3662DFB000
stack
page read and write
1F0612A0000
remote allocation
page read and write
13D1000
heap
page read and write
19F55A63000
heap
page read and write
2310D270000
heap
page read and write
1F05BA6F000
heap
page read and write
1200000
trusted library allocation
page read and write
404000
remote allocation
page execute and read and write
25CB000
trusted library allocation
page execute and read and write
A21000
heap
page read and write
E6FE000
stack
page read and write
20F9E002000
heap
page read and write
3662C7C000
stack
page read and write
7A4000
heap
page read and write
1F0612A0000
remote allocation
page read and write
1F061012000
heap
page read and write
1A97AC56000
heap
page read and write
1F05CD93000
trusted library allocation
page read and write
1A97AC79000
heap
page read and write
370000
trusted library allocation
page read and write
7A4000
heap
page read and write
1F05BA13000
heap
page read and write
63BEEFE000
stack
page read and write
1F060F70000
trusted library allocation
page read and write
FE3D000
stack
page read and write
712D67B000
stack
page read and write
AFA2E7F000
stack
page read and write
19F55940000
heap
page read and write
1F05BA79000
heap
page read and write
174C000
stack
page read and write
A21000
heap
page read and write
7A4000
heap
page read and write
1F0610E4000
heap
page read and write
19F55A79000
heap
page read and write
3EBF000
stack
page read and write
20F9DF10000
heap
page read and write
1F060E30000
trusted library allocation
page read and write
1210000
direct allocation
page read and write
1F0610EE000
heap
page read and write
19F55A86000
heap
page read and write
C36000
unkown
page readonly
63BF0FF000
stack
page read and write
19F55A43000
heap
page read and write
A21000
heap
page read and write
19F55A33000
heap
page read and write
1341000
unclassified section
page execute read
2310D443000
heap
page read and write
874000
heap
page read and write
712DA7D000
stack
page read and write
There are 494 hidden memdumps, click here to show them.