URL:

https://ninite.com/zoom/ninite.exe

Full analysis: https://app.any.run/tasks/85c8128b-488e-44f9-9086-9aaa8a367c7b
Verdict: Malicious activity
Analysis date: September 21, 2020, 23:14:58
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

1D53A2144F48485C1AB9F5CDF610E627

SHA1:

30ED7730291A38092BE00E18A0A9D05F0AB9B490

SHA256:

223460F428BC9C8EE2BA9F455933CC0116735AE9B1B31773FDEC19A1C383D002

SSDEEP:

3:N8DAyIuQMLV0dA:2DAyjZLV0dA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Ninite Zoom Installer.exe (PID: 2900)
      • Ninite.exe (PID: 1700)
      • Ninite.exe (PID: 2336)
      • ZoomOutlookIMPlugin.exe (PID: 3780)
      • CptService.exe (PID: 3060)
      • CptInstall.exe (PID: 3432)
      • Zoom.exe (PID: 2428)
      • Zoom.exe (PID: 3324)
    • Changes settings of System certificates

      • Ninite.exe (PID: 2336)
    • Loads dropped or rewritten executable

      • ZoomOutlookIMPlugin.exe (PID: 3780)
      • regsvr32.exe (PID: 4008)
      • Zoom.exe (PID: 2428)
      • Zoom.exe (PID: 3324)
    • Registers / Runs the DLL via REGSVR32.EXE

      • ZoomOutlookIMPlugin.exe (PID: 3780)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • chrome.exe (PID: 936)
      • chrome.exe (PID: 1716)
      • Ninite Zoom Installer.exe (PID: 2900)
    • Reads Internet Cache Settings

      • Ninite Zoom Installer.exe (PID: 2900)
      • Ninite.exe (PID: 2336)
    • Application launched itself

      • Ninite.exe (PID: 1700)
      • Zoom.exe (PID: 2428)
    • Cleans NTFS data-stream (Zone Identifier)

      • Ninite.exe (PID: 2336)
    • Adds / modifies Windows certificates

      • Ninite.exe (PID: 2336)
    • Creates files in the user directory

      • MsiExec.exe (PID: 2148)
      • ZoomOutlookIMPlugin.exe (PID: 3780)
      • Zoom.exe (PID: 2428)
      • Zoom.exe (PID: 3324)
    • Changes the autorun value in the registry

      • MsiExec.exe (PID: 2148)
    • Starts Microsoft Installer

      • Ninite.exe (PID: 2336)
    • Executed as Windows Service

      • CptService.exe (PID: 3060)
    • Modifies the open verb of a shell class

      • MsiExec.exe (PID: 2148)
    • Changes IE settings (feature browser emulation)

      • MsiExec.exe (PID: 2148)
      • AcroRd32.exe (PID: 2084)
    • Creates files in the program directory

      • CptInstall.exe (PID: 3432)
      • AdobeARM.exe (PID: 1676)
    • Searches for installed software

      • Ninite.exe (PID: 2336)
    • Modifies files in Chrome extension folder

      • chrome.exe (PID: 936)
  • INFO

    • Application launched itself

      • chrome.exe (PID: 936)
      • RdrCEF.exe (PID: 256)
      • AcroRd32.exe (PID: 2084)
      • iexplore.exe (PID: 2864)
    • Reads settings of System Certificates

      • chrome.exe (PID: 936)
      • chrome.exe (PID: 1716)
      • AcroRd32.exe (PID: 2084)
    • Reads the hosts file

      • chrome.exe (PID: 936)
      • chrome.exe (PID: 1716)
      • RdrCEF.exe (PID: 256)
    • Reads Internet Cache Settings

      • chrome.exe (PID: 936)
      • AcroRd32.exe (PID: 3768)
      • AcroRd32.exe (PID: 2084)
      • iexplore.exe (PID: 2864)
      • iexplore.exe (PID: 972)
    • Manual execution by user

      • osk.exe (PID: 2508)
      • osk.exe (PID: 2424)
      • osk.exe (PID: 1724)
      • Zoom.exe (PID: 2428)
      • osk.exe (PID: 3788)
      • AcroRd32.exe (PID: 2084)
      • explorer.exe (PID: 972)
      • iexplore.exe (PID: 2864)
    • Loads dropped or rewritten executable

      • MsiExec.exe (PID: 2148)
    • Changes internet zones settings

      • iexplore.exe (PID: 2864)
    • Reads internet explorer settings

      • iexplore.exe (PID: 972)
    • Creates files in the program directory

      • MsiExec.exe (PID: 2148)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
103
Monitored processes
43
Malicious processes
9
Suspicious processes
1

Behavior graph

Click at the process to see the details
drop and start start drop and start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs ninite zoom installer.exe ninite.exe no specs chrome.exe no specs ninite.exe osk.exe no specs osk.exe chrome.exe no specs chrome.exe no specs msiexec.exe no specs osk.exe no specs osk.exe msiexec.exe cptinstall.exe no specs cptservice.exe no specs zoomoutlookimplugin.exe no specs regsvr32.exe no specs zoom.exe zoom.exe acrord32.exe acrord32.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs rdrcef.exe no specs rdrcef.exe no specs rdrcef.exe no specs adobearm.exe no specs reader_sl.exe no specs rdrcef.exe no specs explorer.exe no specs iexplore.exe no specs iexplore.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
256"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=16448250C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeAcroRd32.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe RdrCEF
Exit code:
0
Version:
15.23.20053.211670
Modules
Images
c:\program files\adobe\acrobat reader dc\reader\acrocef\rdrcef.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
480"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1064,15907956112672543579,13523605682409828816,131072 --enable-features=PasswordImport --lang=en-US --enable-offline-auto-reload --enable-offline-auto-reload-visible-only --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --service-request-channel-token=12519076206560706877 --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2244 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
564"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=464 --on-initialized-event-handle=324 --parent-handle=328 /prefetch:6C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
660"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=75.0.3770.100 --initial-client-data=0x7c,0x80,0x84,0x78,0x88,0x6cbca9d0,0x6cbca9e0,0x6cbca9ecC:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
936"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://ninite.com/zoom/ninite.exe"C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
972"C:\Windows\explorer.exe" C:\Windows\explorer.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Explorer
Exit code:
1
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\explorer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
972"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2864 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exeiexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\windows\system32\rpcrtremote.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\sspicli.dll
c:\windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\gdiplus.dll
c:\windows\system32\dwmapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\powrprof.dll
c:\windows\system32\msctf.dll
1480"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1064,15907956112672543579,13523605682409828816,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=10998418696620404418 --mojo-platform-channel-handle=2592 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
1676"C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" /PRODUCT:Reader /VERSION:15.0 /MODE:3C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exeAcroRd32.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe Reader and Acrobat Manager
Exit code:
0
Version:
1.824.27.2646
Modules
Images
c:\program files\common files\adobe\arm\1.0\adobearm.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
1688"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --field-trial-handle=1064,15907956112672543579,13523605682409828816,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --service-request-channel-token=11964877893557809337 --mojo-platform-channel-handle=2040 --ignored=" --type=renderer " /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
75.0.3770.100
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\75.0.3770.100\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
Total events
6 180
Read events
3 945
Write events
2 218
Delete events
17

Modification events

(PID) Process:(936) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(936) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(936) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(936) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(564) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:writeName:936-13245203712370875
Value:
259
(PID) Process:(936) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(936) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Update\ClientState\{8A69D345-D564-463c-AFF1-A69D9E530F96}
Operation:writeName:dr
Value:
1
(PID) Process:(936) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome
Operation:writeName:UsageStatsInSample
Value:
0
(PID) Process:(936) chrome.exeKey:HKEY_CURRENT_USER\Software\Google\Chrome\BrowserExitCodes
Operation:delete valueName:2832-13239195546717773
Value:
0
(PID) Process:(936) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
Executable files
8
Suspicious files
51
Text files
2 842
Unknown types
42

Dropped files

PID
Process
Filename
Type
936chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\38047619-e86c-4dec-907d-6b138bb2f33f.tmp
MD5:
SHA256:
936chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\000032.dbtmp
MD5:
SHA256:
936chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\data_reduction_proxy_leveldb\LOG.oldtext
MD5:
SHA256:
936chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Sync Data\LevelDB\LOG.old~RFed695.TMPtext
MD5:
SHA256:
936chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\EventDB\LOG.old~RFed712.TMPtext
MD5:
SHA256:
936chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Feature Engagement Tracker\AvailabilityDB\LOG.old~RFed760.TMPtext
MD5:
SHA256:
936chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Session Storage\LOG.oldtext
MD5:
SHA256:
936chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old
MD5:
SHA256:
936chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\shared_proto_db\LOG.old~RFed82b.TMP
MD5:
SHA256:
936chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Site Characteristics Database\LOG.oldtext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
22
TCP/UDP connections
46
DNS requests
35
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2900
Ninite Zoom Installer.exe
GET
304
67.27.159.126:80
http://www.download.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
US
whitelisted
2084
AcroRd32.exe
GET
304
2.16.177.123:80
http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/281_15_23_20070.zip
unknown
whitelisted
2084
AcroRd32.exe
GET
304
2.16.177.123:80
http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/279_15_23_20070.zip
unknown
whitelisted
2084
AcroRd32.exe
GET
304
2.16.177.123:80
http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/280_15_23_20070.zip
unknown
whitelisted
2084
AcroRd32.exe
GET
304
2.16.177.123:80
http://acroipm2.adobe.com/15/rdr/ENU/win/nooem/none/consumer/277_15_23_20070.zip
unknown
whitelisted
2900
Ninite Zoom Installer.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAGC%2BAmOouYmuRo7J4Qfua8%3D
US
der
1.47 Kb
whitelisted
2900
Ninite Zoom Installer.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTuqL92L3tjkN67RNFF%2FEdvT6NEzAQUwBKyKHRoRmfpcCV0GgBFWwZ9XEQCEAgt9o7pxpMVvr9yB5s4EP0%3D
US
der
471 b
whitelisted
1716
chrome.exe
GET
302
172.217.22.78:80
http://redirector.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOWFjQUFXV2lsMkZVdjR5Vk5VZHJTM3E1dw/7919.1028.0.0_pkedcjkdefgpdelpbcmbmeomcjbeemfm.crx
US
html
525 b
whitelisted
1716
chrome.exe
GET
200
173.194.188.198:80
http://r1---sn-4g5ednsd.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvOWFjQUFXV2lsMkZVdjR5Vk5VZHJTM3E1dw/7919.1028.0.0_pkedcjkdefgpdelpbcmbmeomcjbeemfm.crx?cms_redirect=yes&mh=sX&mip=45.135.187.30&mm=28&mn=sn-4g5ednsd&ms=nvh&mt=1600730174&mv=m&mvi=1&pl=25&shardbypass=yes
US
crx
834 Kb
whitelisted
2336
Ninite.exe
GET
200
23.37.43.27:80
http://s.symcd.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS56bKHAoUD%2BOyl%2B0LhPg9JxyQm4gQUf9Nlp8Ld7LvwMAnzQzn6Aq8zMTMCEGMYDTj7gJd4qdA1oxYY%2BEA%3D
NL
der
1.71 Kb
shared
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1716
chrome.exe
172.217.22.99:443
clientservices.googleapis.com
Google Inc.
US
whitelisted
1716
chrome.exe
52.7.124.208:443
ninite.com
Amazon.com, Inc.
US
unknown
1716
chrome.exe
142.250.74.205:443
accounts.google.com
Google Inc.
US
whitelisted
1716
chrome.exe
172.217.22.68:443
www.google.com
Google Inc.
US
whitelisted
1716
chrome.exe
172.217.21.206:443
sb-ssl.google.com
Google Inc.
US
whitelisted
1716
chrome.exe
172.217.22.67:443
ssl.gstatic.com
Google Inc.
US
whitelisted
2900
Ninite Zoom Installer.exe
99.84.158.126:80
o.ss2.us
AT&T Services, Inc.
US
unknown
2900
Ninite Zoom Installer.exe
107.20.104.77:443
ninite.com
Amazon.com, Inc.
US
unknown
2900
Ninite Zoom Installer.exe
99.84.158.104:80
ocsp.rootg2.amazontrust.com
AT&T Services, Inc.
US
whitelisted
2900
Ninite Zoom Installer.exe
99.84.158.42:80
ocsp.sca1b.amazontrust.com
AT&T Services, Inc.
US
whitelisted

DNS requests

Domain
IP
Reputation
ninite.com
  • 52.7.124.208
  • 107.20.104.77
whitelisted
clientservices.googleapis.com
  • 172.217.22.99
whitelisted
accounts.google.com
  • 142.250.74.205
shared
sb-ssl.google.com
  • 172.217.21.206
whitelisted
www.google.com
  • 172.217.22.68
malicious
www.download.windowsupdate.com
  • 67.27.159.126
  • 8.253.204.249
  • 8.248.115.254
  • 8.248.131.254
  • 67.27.158.126
whitelisted
ssl.gstatic.com
  • 172.217.22.67
whitelisted
o.ss2.us
  • 99.84.158.126
  • 99.84.158.193
  • 99.84.158.175
  • 99.84.158.62
whitelisted
ocsp.rootg2.amazontrust.com
  • 99.84.158.104
  • 99.84.158.217
  • 99.84.158.205
  • 99.84.158.162
whitelisted
ocsp.rootca1.amazontrust.com
  • 99.84.158.217
  • 99.84.158.205
  • 99.84.158.104
  • 99.84.158.162
shared

Threats

No threats detected
Process
Message
MsiExec.exe
[CZoomProductPathHelper::RecursiveRemoveDirA] Path is:
MsiExec.exe
C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Zoom
MsiExec.exe
[CZoomProductPathHelper::RecursiveRemoveDirA] Path is:
MsiExec.exe
C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Zoom
MsiExec.exe
C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Zoom
MsiExec.exe
C:\Users\Administrator\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Zoom
Zoom.exe
Parse Text. Load file success! String counts:4687.
Zoom.exe
Menu Item: ID:10014, Value:P??????
Zoom.exe
Menu Item: ID:-1, Value:Sign in
Zoom.exe
Menu Item: ID:-1, Value: