download:

zp1410max.exe

Full analysis: https://app.any.run/tasks/ea88aa11-7dd9-4e4a-8706-41e77585d106
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: May 28, 2018, 11:47:48
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
installer
loader
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

FDC41D98250F1841BC68F20F677A6F0F

SHA1:

F92CAC041D856E94B2A65F073FE4F2A70FEE68CB

SHA256:

726F58DEE0C214A385FA408D6405D90C1F08559D7570EDC1C57FA2BBB2413FE7

SSDEEP:

786432:8LYoQOpTBYGcRlUZR6hDkhDt6LXjegKbg:8LYjET2GLZUXr

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • zp1410max.exe (PID: 2912)
      • Zoom Player Install Center.exe (PID: 3392)
      • dcbasssource152.exe (PID: 3112)
      • regsvr32.exe (PID: 3004)
      • regsvr32.exe (PID: 3748)
      • regsvr32.exe (PID: 2032)
      • regsvr32.exe (PID: 1348)
      • regsvr32.exe (PID: 2588)
      • regsvr32.exe (PID: 3000)
      • zplayer.exe (PID: 1736)
    • Application was dropped or rewritten from another process

      • LAVFilters-0.70.2.exe (PID: 3412)
      • dcbasssource152.exe (PID: 3112)
      • Zoom Player Install Center.exe (PID: 3392)
      • Zoom Player Install Center.exe (PID: 2836)
      • LAVFilters-0.71-Installer.exe (PID: 2808)
      • zplayer.exe (PID: 1736)
    • Registers / Runs the DLL via REGSVR32.EXE

      • LAVFilters-0.70.2.tmp (PID: 4080)
      • LAVFilters-0.71-Installer.tmp (PID: 3832)
    • Downloads executable files from the Internet

      • Zoom Player Install Center.exe (PID: 3392)
  • SUSPICIOUS

    • Creates a software uninstall entry

      • zp1410max.exe (PID: 2912)
      • dcbasssource152.exe (PID: 3112)
    • Creates COM task schedule object

      • zp1410max.exe (PID: 2912)
    • Executable content was dropped or overwritten

      • zp1410max.exe (PID: 2912)
      • LAVFilters-0.70.2.exe (PID: 3412)
      • LAVFilters-0.70.2.tmp (PID: 4080)
      • dcbasssource152.exe (PID: 3112)
      • Zoom Player Install Center.exe (PID: 3392)
      • LAVFilters-0.71-Installer.tmp (PID: 3832)
      • LAVFilters-0.71-Installer.exe (PID: 2808)
    • Modifies the open verb of a shell class

      • zp1410max.exe (PID: 2912)
    • Reads Windows owner settings

      • LAVFilters-0.70.2.tmp (PID: 4080)
    • Reads the Windows organization settings

      • LAVFilters-0.70.2.tmp (PID: 4080)
    • Creates files in the program directory

      • dcbasssource152.exe (PID: 3112)
      • Zoom Player Install Center.exe (PID: 3392)
      • zp1410max.exe (PID: 2912)
      • zplayer.exe (PID: 1736)
    • Starts Internet Explorer

      • zp1410max.exe (PID: 2912)
    • Creates files in the user directory

      • zplayer.exe (PID: 1736)
    • Changes IE settings (feature browser emulation)

      • zplayer.exe (PID: 1736)
  • INFO

    • Creates files in the program directory

      • LAVFilters-0.70.2.tmp (PID: 4080)
      • LAVFilters-0.71-Installer.tmp (PID: 3832)
    • Dropped object may contain URL's

      • LAVFilters-0.70.2.tmp (PID: 4080)
      • zp1410max.exe (PID: 2912)
      • dcbasssource152.exe (PID: 3112)
      • LAVFilters-0.71-Installer.exe (PID: 2808)
      • Zoom Player Install Center.exe (PID: 3392)
      • zplayer.exe (PID: 1736)
      • LAVFilters-0.71-Installer.tmp (PID: 3832)
    • Loads dropped or rewritten executable

      • LAVFilters-0.70.2.tmp (PID: 4080)
      • LAVFilters-0.71-Installer.tmp (PID: 3832)
    • Application was dropped or rewritten from another process

      • LAVFilters-0.70.2.tmp (PID: 4080)
      • LAVFilters-0.71-Installer.tmp (PID: 3832)
    • Creates a software uninstall entry

      • LAVFilters-0.70.2.tmp (PID: 4080)
      • LAVFilters-0.71-Installer.tmp (PID: 3832)
    • Changes internet zones settings

      • iexplore.exe (PID: 544)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | NSIS - Nullsoft Scriptable Install System (99)
.exe | Win32 Executable (generic) (0.5)
.exe | Generic Win/DOS Executable (0.2)
.exe | DOS Executable Generic (0.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2009:12:05 23:50:46+01:00
PEType: PE32
LinkerVersion: 6
CodeSize: 23552
InitializedDataSize: 119808
UninitializedDataSize: 1024
EntryPoint: 0x323c
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 05-Dec-2009 22:50:46
Detected languages:
  • English - United States

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000D8

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 5
Time date stamp: 05-Dec-2009 22:50:46
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x00005A5A
0x00005C00
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.4177
.rdata
0x00007000
0x00001190
0x00001200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.18163
.data
0x00009000
0x0001AF98
0x00000400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.70903
.ndata
0x00024000
0x00016000
0x00000000
IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
.rsrc
0x0003A000
0x00004B98
0x00004C00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.78933

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.21482
958
UNKNOWN
English - United States
RT_MANIFEST
2
5.9993
3752
UNKNOWN
English - United States
RT_ICON
3
6.24459
2216
UNKNOWN
English - United States
RT_ICON
4
5.01502
1384
UNKNOWN
English - United States
RT_ICON
5
6.16057
1128
UNKNOWN
English - United States
RT_ICON
6
3.34146
744
UNKNOWN
English - United States
RT_ICON
7
3.04232
296
UNKNOWN
English - United States
RT_ICON
102
2.71813
180
UNKNOWN
English - United States
RT_DIALOG
103
2.6691
104
UNKNOWN
English - United States
RT_GROUP_ICON
104
2.6666
280
UNKNOWN
English - United States
RT_DIALOG

Imports

ADVAPI32.dll
COMCTL32.dll
GDI32.dll
KERNEL32.dll
SHELL32.dll
USER32.dll
VERSION.dll
ole32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
55
Monitored processes
18
Malicious processes
10
Suspicious processes
5

Behavior graph

Click at the process to see the details
drop and start drop and start drop and start drop and start start drop and start drop and start drop and start zp1410max.exe lavfilters-0.70.2.exe lavfilters-0.70.2.tmp regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs dcbasssource152.exe zoom player install center.exe zoom player install center.exe no specs lavfilters-0.71-installer.exe lavfilters-0.71-installer.tmp regsvr32.exe no specs regsvr32.exe no specs regsvr32.exe no specs iexplore.exe iexplore.exe zplayer.exe no specs zp1410max.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
544"C:\Program Files\Internet Explorer\iexplore.exe" -nohomeC:\Program Files\Internet Explorer\iexplore.exe
zp1410max.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Internet Explorer
Exit code:
1
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
964"C:\Users\admin\AppData\Local\Temp\zp1410max.exe" C:\Users\admin\AppData\Local\Temp\zp1410max.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\appdata\local\temp\zp1410max.exe
c:\systemroot\system32\ntdll.dll
1348"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\LAV Filters\x86\LAVAudio.ax"C:\Windows\system32\regsvr32.exeLAVFilters-0.71-Installer.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\user32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
1408"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:544 CREDAT:79873C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Internet Explorer
Exit code:
0
Version:
8.00.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1736"C:\Program Files\Zoom Player\zplayer.exe" C:\Program Files\Zoom Player\zplayer.exeexplorer.exe
User:
admin
Company:
Inmatrix LTD
Integrity Level:
MEDIUM
Description:
Zoom Player
Exit code:
1073807364
Version:
14.1.0.1410
Modules
Images
c:\program files\zoom player\zplayer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2032"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\LAV Filters\x86\LAVSplitter.ax"C:\Windows\system32\regsvr32.exeLAVFilters-0.70.2.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2588"C:\Windows\system32\regsvr32.exe" /s "C:\Program Files\LAV Filters\x86\LAVVideo.ax"C:\Windows\system32\regsvr32.exeLAVFilters-0.71-Installer.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft(C) Register Server
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\regsvr32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
2808"C:\ProgramData\Zoom Player\Cache\LAVFilters-0.71-Installer.exe" /silentC:\ProgramData\Zoom Player\Cache\LAVFilters-0.71-Installer.exe
Zoom Player Install Center.exe
User:
admin
Company:
1f0.de
Integrity Level:
HIGH
Description:
LAV Filters Setup
Exit code:
0
Version:
0.71.0.0
Modules
Images
c:\programdata\zoom player\cache\lavfilters-0.71-installer.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ole32.dll
2836"C:\Program Files\Zoom Player\Zoom Player Install Center.exe" C:\Program Files\Zoom Player\Zoom Player Install Center.exezp1410max.exe
User:
admin
Company:
Inmatrix LTD
Integrity Level:
HIGH
Description:
Zoom Player Install Center
Exit code:
0
Version:
13.0.0.1311
Modules
Images
c:\program files\zoom player\zoom player install center.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2912"C:\Users\admin\AppData\Local\Temp\zp1410max.exe" C:\Users\admin\AppData\Local\Temp\zp1410max.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\zp1410max.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
Total events
4 023
Read events
1 478
Write events
2 522
Delete events
23

Modification events

(PID) Process:(2912) zp1410max.exeKey:HKEY_CURRENT_USER\Software\VirtuaMedia\ZoomPlayer
Operation:writeName:OPLegacy
Value:
0
(PID) Process:(2912) zp1410max.exeKey:HKEY_CURRENT_USER\Software\VirtuaMedia\ZoomPlayer
Operation:writeName:InstallDirectory
Value:
C:\Program Files\Zoom Player
(PID) Process:(2912) zp1410max.exeKey:HKEY_CURRENT_USER\Software\VirtuaMedia\ZoomPlayer
Operation:writeName:DataDirectory
Value:
C:\ProgramData\Zoom Player
(PID) Process:(2912) zp1410max.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ZoomPlayer
Operation:writeName:DisplayName
Value:
Zoom Player (remove only)
(PID) Process:(2912) zp1410max.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ZoomPlayer
Operation:writeName:Publisher
Value:
Inmatrix LTD
(PID) Process:(2912) zp1410max.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ZoomPlayer
Operation:writeName:DisplayVersion
Value:
14.1
(PID) Process:(2912) zp1410max.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ZoomPlayer
Operation:writeName:InstallLocation
Value:
C:\Program Files\Zoom Player
(PID) Process:(2912) zp1410max.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ZoomPlayer
Operation:writeName:UninstallString
Value:
"C:\Program Files\Zoom Player\uninstall.exe"
(PID) Process:(2912) zp1410max.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\ZoomPlayer
Operation:writeName:DisplayIcon
Value:
"C:\Program Files\Zoom Player\zplayer.exe"
(PID) Process:(2912) zp1410max.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\ZP.AssocFile
Operation:writeName:
Value:
Zoom Player File
Executable files
78
Suspicious files
2
Text files
713
Unknown types
29

Dropped files

PID
Process
Filename
Type
2912zp1410max.exeC:\Program Files\Zoom Player\zplayer.exeexecutable
MD5:
SHA256:
2912zp1410max.exeC:\Program Files\Zoom Player\whatsnew.txttext
MD5:
SHA256:
2912zp1410max.exeC:\Program Files\Zoom Player\default.keytext
MD5:
SHA256:
2912zp1410max.exeC:\Users\admin\AppData\Local\Temp\nsu39BE.tmp\nsDialogs.dllexecutable
MD5:C10E04DD4AD4277D5ADC951BB331C777
SHA256:E31AD6C6E82E603378CB6B80E67D0E0DCD9CF384E1199AC5A65CB4935680021A
2912zp1410max.exeC:\Users\admin\AppData\Local\Temp\nsu39BE.tmp\System.dllexecutable
MD5:C17103AE9072A06DA581DEC998343FC1
SHA256:DC58D8AD81CACB0C1ED72E33BFF8F23EA40B5252B5BB55D393A0903E6819AE2F
2912zp1410max.exeC:\Program Files\Zoom Player\zpaudiovis.dllexecutable
MD5:79A0FDCCD706EE657975BF564E77EA92
SHA256:80127B04BF182568A7F1D5E0A0D64CE3E2BE1A0AD28662173CAA2D5B54F97B1E
2912zp1410max.exeC:\Program Files\Zoom Player\zpresampler.dllexecutable
MD5:9451BC212D134D849686C1637AC9D13C
SHA256:29BC71EC38D424A4CECA33B37DCBA3DA505468A1ADF9178B6DFD97ED34C43D98
2912zp1410max.exeC:\Program Files\Zoom Player\zpiconlib.iclexecutable
MD5:A1BC76C7E1D42C8BFF84A07ABE6C46E9
SHA256:18A35903F6D5B39F4A55BDD965EEBA96E0A9DA8BDDD51214FA4F9C2387673AD3
2912zp1410max.exeC:\Users\admin\AppData\Local\Temp\nsu39BE.tmp\modern-header.bmpimage
MD5:2AB1A34EF6C8BAD67EA82B3731F87F43
SHA256:5F69F335E15D1CBD0BE22E01DDD69D38EFEE5B8D634856A5992EC0870937BB39
2912zp1410max.exeC:\Program Files\Zoom Player\zpupdate.exeexecutable
MD5:DBECE86D115510C10D5A7D6B99DA0B79
SHA256:8C1CD86EBBA336D3F520EA9F7140F45C17AF656EEADAD5B08123E804EF242DE8
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
16
TCP/UDP connections
15
DNS requests
5
Threats
11

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3392
Zoom Player Install Center.exe
GET
206.217.192.234:80
http://dl.zoomplayer.com/madvr.0.92.12_32bit.exe
US
suspicious
3392
Zoom Player Install Center.exe
GET
216.227.223.106:80
http://www.zptechnology.com/download/madvr.0.92.12_32bit.exe
US
suspicious
3392
Zoom Player Install Center.exe
GET
69.56.182.222:80
http://download.inmatrix.com/madvr.0.92.12_32bit.exe
US
suspicious
3392
Zoom Player Install Center.exe
GET
69.56.182.222:80
http://download.inmatrix.com/madvr.0.92.12_32bit.exe
US
suspicious
3392
Zoom Player Install Center.exe
GET
206.217.192.234:80
http://dl.zoomplayer.com/madvr.0.92.12_32bit.exe
US
suspicious
3392
Zoom Player Install Center.exe
GET
206.217.192.234:80
http://dl.zoomplayer.com/madvr.0.92.12_32bit.exe
US
suspicious
3392
Zoom Player Install Center.exe
GET
206.217.192.234:80
http://dl.zoomplayer.com/madvr.0.92.12_32bit.exe
US
suspicious
3392
Zoom Player Install Center.exe
GET
206.217.192.234:80
http://dl.zoomplayer.com/madvr.0.92.12_32bit.exe
US
suspicious
1408
iexplore.exe
GET
302
69.56.182.222:80
http://www.inmatrix.com/install_success/max_installed.shtml
US
html
183 b
suspicious
3392
Zoom Player Install Center.exe
GET
200
206.217.192.234:80
http://dl.zoomplayer.com/1300filters.xml
US
text
101 Kb
suspicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3392
Zoom Player Install Center.exe
206.217.192.234:80
dl.zoomplayer.com
SoftLayer Technologies Inc.
US
suspicious
3392
Zoom Player Install Center.exe
216.227.223.106:80
www.zptechnology.com
US
suspicious
3392
Zoom Player Install Center.exe
69.56.182.222:80
download.inmatrix.com
SoftLayer Technologies Inc.
US
suspicious
1408
iexplore.exe
69.56.182.222:80
download.inmatrix.com
SoftLayer Technologies Inc.
US
suspicious
544
iexplore.exe
204.79.197.200:80
www.bing.com
Microsoft Corporation
US
whitelisted
1408
iexplore.exe
69.56.182.222:443
download.inmatrix.com
SoftLayer Technologies Inc.
US
suspicious

DNS requests

Domain
IP
Reputation
dl.zoomplayer.com
  • 206.217.192.234
suspicious
www.zptechnology.com
  • 216.227.223.106
suspicious
download.inmatrix.com
  • 69.56.182.222
suspicious
www.inmatrix.com
  • 69.56.182.222
suspicious
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted

Threats

PID
Process
Class
Message
3392
Zoom Player Install Center.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3392
Zoom Player Install Center.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3392
Zoom Player Install Center.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3392
Zoom Player Install Center.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3392
Zoom Player Install Center.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3392
Zoom Player Install Center.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3392
Zoom Player Install Center.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3392
Zoom Player Install Center.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3392
Zoom Player Install Center.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3392
Zoom Player Install Center.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
No debug info