IOC Report
https://books.zoho.com/api/v3/settings/templates/invoicelogo/2-9f5f6126fb9f5927bb890a052eb3e49c534d130e54c0d7eb3f0166cd0041c6789a3b840ec167bdeab503b1141cf436f4

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 25 12:36:03 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 25 12:36:03 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 25 12:36:03 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 25 12:36:03 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 25 12:36:03 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\Downloads\0ef71b6e-a980-4dd6-9f83-df83f6561ba1.tmp
PNG image data, 340 x 122, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\Downloads\Invoicelogo_2023-06-20_Logo_Assek_ZohoBooks240px.png (copy)
PNG image data, 340 x 122, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\Downloads\Invoicelogo_2023-06-20_Logo_Assek_ZohoBooks240px.png.crdownload
PNG image data, 340 x 122, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\debug\WIA\wiatrace.log
ASCII text, with CRLF, LF line terminators
dropped
Chrome Cache Entry: 124
PNG image data, 340 x 122, 8-bit/color RGBA, non-interlaced
downloaded
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2128 --field-trial-handle=1996,i,13365789237839253957,2226731636364892514,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://books.zoho.com/api/v3/settings/templates/invoicelogo/2-9f5f6126fb9f5927bb890a052eb3e49c534d130e54c0d7eb3f0166cd0041c6789a3b840ec167bdeab503b1141cf436f4"
C:\Windows\SysWOW64\mspaint.exe
mspaint.exe "C:\Users\user\Desktop\"

URLs

Name
IP
Malicious
https://books.zoho.com/api/v3/settings/templates/invoicelogo/2-9f5f6126fb9f5927bb890a052eb3e49c534d130e54c0d7eb3f0166cd0041c6789a3b840ec167bdeab503b1141cf436f4
https://books.zoho.com/api/v3/settings/templates/invoicelogo/2-9f5f6126fb9f5927bb890a052eb3e49c534d130e54c0d7eb3f0166cd0041c6789a3b840ec167bdeab503b1141cf436f4
204.141.42.145
http://www.gimp.org/xmp/
unknown

Domains

Name
IP
Malicious
books.zoho.com
204.141.42.145
www.google.com
142.250.186.164

IPs

IP
Domain
Country
Malicious
239.255.255.250
unknown
Reserved
204.141.42.145
books.zoho.com
United States
142.250.186.164
www.google.com
United States
192.168.2.5
unknown
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4B73000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4CE0000
trusted library allocation
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
4FE0000
heap
page read and write
4BD0000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
522E000
stack
page read and write
501A000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
5100000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
3155000
heap
page read and write
4BE1000
heap
page read and write
4FF0000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
5A90000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
30B8000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
30C8000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2F20000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FAE000
stack
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2E75000
stack
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
526F000
stack
page read and write
4B70000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
334D000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
3340000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
51AD000
stack
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
52EF000
stack
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
5160000
trusted library allocation
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
315B000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB0000
heap
page read and write
3090000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BBD000
stack
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
51EE000
stack
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
322E000
stack
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
5000000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4B6B000
stack
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
32AE000
stack
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
534E000
stack
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2EB9000
stack
page read and write
2F6D000
stack
page read and write
30B0000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
52AE000
stack
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
326E000
stack
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
3142000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
4BE0000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
31ED000
stack
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
4BE1000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
334A000
heap
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
538E000
stack
page read and write
2FB4000
heap
page read and write
2FB4000
heap
page read and write
There are 418 hidden memdumps, click here to show them.