URL:

https://software.vfo.digital/ZoomText/2024/2024.2411.15.400/720B1851-91E1-444D-B053-AFBB99139386/ZT2024.2411.15.400.exe

Full analysis: https://app.any.run/tasks/3d938ce9-05bf-4dfb-bbc8-ae61061e5a79
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: April 04, 2025, 13:17:26
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
loader
Indicators:
MD5:

835B6C4D03CD696A7E7644D8B55F132B

SHA1:

474AF01DFF7824626A564111B87579517B892C15

SHA256:

AFAD1574636294104C543C4F2259D0BF145D0D61DC6C3EAD38B8F82EF507EF7B

SSDEEP:

3:N8HjyENTGTUBMV9FLzHVUVhYQW9KWsbXnLzWdA:2puUGnFPHVInznPWdA

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • ZoomTextSetupPackage.exe (PID: 7000)
      • VC_redist.x86.exe (PID: 3012)
      • VC_redist.x64.exe (PID: 7084)
      • windowsdesktop-runtime-8.0.8-win-x86.exe (PID: 7912)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • ZT2024.2411.15.400.exe (PID: 7896)
      • ZT2024.2411.15.400.exe (PID: 8152)
      • ZoomTextSetupPackage.exe (PID: 7000)
      • vcredist2022_x86.exe (PID: 4896)
      • vcredist2022_x86.exe (PID: 4408)
      • VC_redist.x86.exe (PID: 3012)
      • VC_redist.x86.exe (PID: 4884)
      • vcredist2022_x64.exe (PID: 4228)
      • VC_redist.x86.exe (PID: 4784)
      • vcredist2022_x64.exe (PID: 3800)
      • VC_redist.x64.exe (PID: 7084)
      • VC_redist.x64.exe (PID: 7936)
      • VC_redist.x64.exe (PID: 5600)
      • windowsdesktop-runtime-8.0.8-win-x86.exe (PID: 7532)
      • windowsdesktop-runtime-8.0.8-win-x86.exe (PID: 7864)
      • windowsdesktop-runtime-8.0.8-win-x86.exe (PID: 7912)
    • The process creates files with name similar to system file names

      • ZT2024.2411.15.400.exe (PID: 8152)
      • msiexec.exe (PID: 6816)
    • Starts itself from another location

      • ZT2024.2411.15.400.exe (PID: 7896)
      • ZT2024.2411.15.400.exe (PID: 8152)
      • vcredist2022_x86.exe (PID: 4408)
      • vcredist2022_x64.exe (PID: 3800)
      • windowsdesktop-runtime-8.0.8-win-x86.exe (PID: 7532)
    • The process drops C-runtime libraries

      • ZT2024.2411.15.400.exe (PID: 8152)
      • msiexec.exe (PID: 6816)
    • Process drops legitimate windows executable

      • ZT2024.2411.15.400.exe (PID: 8152)
      • vcredist2022_x86.exe (PID: 4896)
      • ZoomTextSetupPackage.exe (PID: 7000)
      • vcredist2022_x86.exe (PID: 4408)
      • VC_redist.x86.exe (PID: 3012)
      • msiexec.exe (PID: 6816)
      • vcredist2022_x64.exe (PID: 4228)
      • VC_redist.x86.exe (PID: 4784)
      • vcredist2022_x64.exe (PID: 3800)
      • VC_redist.x64.exe (PID: 7084)
      • VC_redist.x64.exe (PID: 7936)
      • windowsdesktop-runtime-8.0.8-win-x86.exe (PID: 7864)
      • windowsdesktop-runtime-8.0.8-win-x86.exe (PID: 7532)
      • windowsdesktop-runtime-8.0.8-win-x86.exe (PID: 7912)
    • Searches for installed software

      • ZT2024.2411.15.400.exe (PID: 8152)
      • vcredist2022_x86.exe (PID: 4408)
      • VC_redist.x86.exe (PID: 3012)
      • dllhost.exe (PID: 536)
      • VC_redist.x86.exe (PID: 4884)
      • VC_redist.x86.exe (PID: 4784)
      • vcredist2022_x64.exe (PID: 3800)
      • VC_redist.x64.exe (PID: 7084)
      • VC_redist.x64.exe (PID: 5600)
      • VC_redist.x64.exe (PID: 7936)
      • windowsdesktop-runtime-8.0.8-win-x86.exe (PID: 7532)
      • windowsdesktop-runtime-8.0.8-win-x86.exe (PID: 7912)
    • Reads security settings of Internet Explorer

      • ZT2024.2411.15.400.exe (PID: 8152)
      • ZoomTextSetupPackage.exe (PID: 7000)
      • vcredist2022_x86.exe (PID: 4408)
      • VC_redist.x86.exe (PID: 4884)
      • vcredist2022_x64.exe (PID: 3800)
      • VC_redist.x64.exe (PID: 5600)
      • windowsdesktop-runtime-8.0.8-win-x86.exe (PID: 7532)
    • There is functionality for taking screenshot (YARA)

      • ZT2024.2411.15.400.exe (PID: 8152)
    • Executes as Windows Service

      • VSSVC.exe (PID: 5588)
    • Creates a software uninstall entry

      • ZoomTextSetupPackage.exe (PID: 7000)
      • VC_redist.x86.exe (PID: 3012)
      • VC_redist.x64.exe (PID: 7084)
      • windowsdesktop-runtime-8.0.8-win-x86.exe (PID: 7912)
    • Adds/modifies Windows certificates

      • ZoomTextSetupPackage.exe (PID: 7000)
    • Potential Corporate Privacy Violation

      • ZT2024.2411.15.400.exe (PID: 8152)
    • Process requests binary or script from the Internet

      • ZT2024.2411.15.400.exe (PID: 8152)
    • Starts a Microsoft application from unusual location

      • vcredist2022_x86.exe (PID: 4408)
      • VC_redist.x86.exe (PID: 3012)
      • vcredist2022_x64.exe (PID: 3800)
      • VC_redist.x64.exe (PID: 7084)
      • windowsdesktop-runtime-8.0.8-win-x86.exe (PID: 7532)
      • windowsdesktop-runtime-8.0.8-win-x86.exe (PID: 7912)
    • Reads the Windows owner or organization settings

      • msiexec.exe (PID: 6816)
    • Application launched itself

      • VC_redist.x86.exe (PID: 6708)
      • VC_redist.x86.exe (PID: 4884)
      • VC_redist.x64.exe (PID: 232)
      • VC_redist.x64.exe (PID: 5600)
    • The process checks if it is being run in the virtual environment

      • msiexec.exe (PID: 6816)
  • INFO

    • The sample compiled with english language support

      • chrome.exe (PID: 5280)
      • ZT2024.2411.15.400.exe (PID: 7896)
      • ZT2024.2411.15.400.exe (PID: 8152)
      • chrome.exe (PID: 5640)
      • ZoomTextSetupPackage.exe (PID: 7000)
      • vcredist2022_x86.exe (PID: 4896)
      • vcredist2022_x86.exe (PID: 4408)
      • VC_redist.x86.exe (PID: 3012)
      • msiexec.exe (PID: 6816)
      • VC_redist.x86.exe (PID: 4884)
      • VC_redist.x86.exe (PID: 4784)
      • vcredist2022_x64.exe (PID: 4228)
      • vcredist2022_x64.exe (PID: 3800)
      • VC_redist.x64.exe (PID: 7084)
      • VC_redist.x64.exe (PID: 7936)
      • VC_redist.x64.exe (PID: 5600)
      • windowsdesktop-runtime-8.0.8-win-x86.exe (PID: 7532)
      • windowsdesktop-runtime-8.0.8-win-x86.exe (PID: 7864)
      • windowsdesktop-runtime-8.0.8-win-x86.exe (PID: 7912)
    • Executable content was dropped or overwritten

      • chrome.exe (PID: 5280)
      • chrome.exe (PID: 5640)
      • msiexec.exe (PID: 6816)
    • Autorun file from Downloads

      • chrome.exe (PID: 5280)
      • chrome.exe (PID: 8040)
    • Manual execution by a user

      • ZT2024.2411.15.400.exe (PID: 8124)
      • ZT2024.2411.15.400.exe (PID: 7896)
    • Checks supported languages

      • ZT2024.2411.15.400.exe (PID: 7896)
      • ZT2024.2411.15.400.exe (PID: 8152)
      • ZoomTextSetupPackage.exe (PID: 7000)
      • vcredist2022_x86.exe (PID: 4896)
      • vcredist2022_x86.exe (PID: 4408)
      • VC_redist.x86.exe (PID: 3012)
      • msiexec.exe (PID: 6816)
      • VC_redist.x86.exe (PID: 6708)
      • VC_redist.x86.exe (PID: 4884)
      • vcredist2022_x64.exe (PID: 4228)
      • VC_redist.x86.exe (PID: 4784)
      • vcredist2022_x64.exe (PID: 3800)
      • VC_redist.x64.exe (PID: 232)
      • VC_redist.x64.exe (PID: 7084)
      • VC_redist.x64.exe (PID: 5600)
      • VC_redist.x64.exe (PID: 7936)
      • windowsdesktop-runtime-8.0.8-win-x86.exe (PID: 7532)
      • windowsdesktop-runtime-8.0.8-win-x86.exe (PID: 7864)
      • msiexec.exe (PID: 6156)
      • msiexec.exe (PID: 7768)
      • msiexec.exe (PID: 3008)
      • windowsdesktop-runtime-8.0.8-win-x86.exe (PID: 7912)
    • Reads the computer name

      • ZT2024.2411.15.400.exe (PID: 7896)
      • ZT2024.2411.15.400.exe (PID: 8152)
      • ZoomTextSetupPackage.exe (PID: 7000)
      • vcredist2022_x86.exe (PID: 4408)
      • VC_redist.x86.exe (PID: 3012)
      • msiexec.exe (PID: 6816)
      • VC_redist.x86.exe (PID: 4884)
      • VC_redist.x86.exe (PID: 4784)
      • vcredist2022_x64.exe (PID: 3800)
      • VC_redist.x64.exe (PID: 7084)
      • VC_redist.x64.exe (PID: 7936)
      • VC_redist.x64.exe (PID: 5600)
      • windowsdesktop-runtime-8.0.8-win-x86.exe (PID: 7864)
      • windowsdesktop-runtime-8.0.8-win-x86.exe (PID: 7532)
      • msiexec.exe (PID: 7768)
      • msiexec.exe (PID: 6156)
      • msiexec.exe (PID: 3008)
      • windowsdesktop-runtime-8.0.8-win-x86.exe (PID: 7912)
    • Create files in a temporary directory

      • ZT2024.2411.15.400.exe (PID: 8152)
      • vcredist2022_x86.exe (PID: 4408)
      • VC_redist.x86.exe (PID: 3012)
      • VC_redist.x86.exe (PID: 4884)
      • vcredist2022_x64.exe (PID: 3800)
      • VC_redist.x64.exe (PID: 7084)
      • ZoomTextSetupPackage.exe (PID: 7000)
      • VC_redist.x64.exe (PID: 5600)
      • windowsdesktop-runtime-8.0.8-win-x86.exe (PID: 7532)
      • windowsdesktop-runtime-8.0.8-win-x86.exe (PID: 7912)
    • Creates files or folders in the user directory

      • ZT2024.2411.15.400.exe (PID: 8152)
      • ZoomTextSetupPackage.exe (PID: 7000)
    • Process checks computer location settings

      • ZT2024.2411.15.400.exe (PID: 8152)
      • vcredist2022_x86.exe (PID: 4408)
      • VC_redist.x86.exe (PID: 4884)
      • vcredist2022_x64.exe (PID: 3800)
      • VC_redist.x64.exe (PID: 5600)
      • windowsdesktop-runtime-8.0.8-win-x86.exe (PID: 7532)
    • Reads the software policy settings

      • slui.exe (PID: 7760)
      • slui.exe (PID: 1660)
      • ZT2024.2411.15.400.exe (PID: 8152)
      • ZoomTextSetupPackage.exe (PID: 7000)
      • msiexec.exe (PID: 6816)
    • Creates files in the program directory

      • ZoomTextSetupPackage.exe (PID: 7000)
      • VC_redist.x86.exe (PID: 3012)
      • VC_redist.x64.exe (PID: 7084)
      • windowsdesktop-runtime-8.0.8-win-x86.exe (PID: 7912)
    • Manages system restore points

      • SrTasks.exe (PID: 2332)
    • Application launched itself

      • chrome.exe (PID: 5280)
    • Reads the machine GUID from the registry

      • ZT2024.2411.15.400.exe (PID: 8152)
      • ZoomTextSetupPackage.exe (PID: 7000)
      • VC_redist.x86.exe (PID: 3012)
      • msiexec.exe (PID: 6816)
      • VC_redist.x64.exe (PID: 7084)
      • windowsdesktop-runtime-8.0.8-win-x86.exe (PID: 7912)
    • Checks proxy server information

      • ZT2024.2411.15.400.exe (PID: 8152)
      • ZoomTextSetupPackage.exe (PID: 7000)
      • slui.exe (PID: 1660)
    • Creates a software uninstall entry

      • msiexec.exe (PID: 6816)
    • The sample compiled with spanish language support

      • msiexec.exe (PID: 6816)
    • The sample compiled with german language support

      • msiexec.exe (PID: 6816)
    • The sample compiled with russian language support

      • msiexec.exe (PID: 6816)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
197
Monitored processes
58
Malicious processes
18
Suspicious processes
0

Behavior graph

Click at the process to see the details
start chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs sppextcomobj.exe no specs slui.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs rundll32.exe no specs zt2024.2411.15.400.exe no specs zt2024.2411.15.400.exe zt2024.2411.15.400.exe slui.exe zoomtextsetuppackage.exe chrome.exe SPPSurrogate no specs vssvc.exe no specs srtasks.exe no specs conhost.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs vcredist2022_x86.exe vcredist2022_x86.exe vc_redist.x86.exe SPPSurrogate no specs msiexec.exe vc_redist.x86.exe no specs vc_redist.x86.exe vc_redist.x86.exe vcredist2022_x64.exe vcredist2022_x64.exe vc_redist.x64.exe SPPSurrogate no specs chrome.exe no specs vc_redist.x64.exe no specs vc_redist.x64.exe vc_redist.x64.exe windowsdesktop-runtime-8.0.8-win-x86.exe windowsdesktop-runtime-8.0.8-win-x86.exe windowsdesktop-runtime-8.0.8-win-x86.exe msiexec.exe no specs msiexec.exe no specs msiexec.exe no specs chrome.exe no specs chrome.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
232"C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe" -uninstall -quiet -burn.related.upgrade -burn.ancestors={5af95fd8-a22e-458f-acee-c61bd787178e} -burn.filehandle.self=940 -burn.embedded BurnPipe.{03B8FB61-D6F2-4098-8FF0-5980E0D54815} {77B40EE1-C45E-4AE1-967D-2400E3B18422} 7084C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exeVC_redist.x64.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft Visual C++ 2015-2022 Redistributable (x64) - 14.36.32532
Exit code:
0
Version:
14.36.32532.0
Modules
Images
c:\programdata\package cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\vc_redist.x64.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\advapi32.dll
536"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=5868 --field-trial-handle=1852,i,14164101368646934523,13369139897560978212,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
536C:\WINDOWS\system32\DllHost.exe /Processid:{F32D97DF-E3E5-4CB9-9E3E-0EB5B4E49801}C:\Windows\System32\dllhost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\msvcrt.dll
776"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=3448 --field-trial-handle=1852,i,14164101368646934523,13369139897560978212,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1004"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=3552 --field-trial-handle=1852,i,14164101368646934523,13369139897560978212,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1660C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2096C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
2332C:\WINDOWS\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:11C:\Windows\System32\SrTasks.exedllhost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Microsoft® Windows System Protection background tasks.
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\srtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2780"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.3636 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoABAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAABEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=5176 --field-trial-handle=1852,i,14164101368646934523,13369139897560978212,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
122.0.6261.70
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
3008C:\Windows\syswow64\MsiExec.exe -Embedding F6DFB51958E0C3D67EE11887E2E811DFC:\Windows\SysWOW64\msiexec.exemsiexec.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows® installer
Exit code:
0
Version:
5.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\msiexec.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
Total events
46 661
Read events
43 839
Write events
2 155
Delete events
667

Modification events

(PID) Process:(5280) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(5280) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(5280) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(5280) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(5280) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(8040) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
Operation:writeName:{2781761E-28E0-4109-99FE-B9D127C57AFE} {56FFCC30-D398-11D0-B2AE-00A0C908FA49} 0xFFFF
Value:
0100000000000000008258F263A5DB01
(PID) Process:(8152) ZT2024.2411.15.400.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Speech_OneCore\Isolated\j8j0Vo2ncbvBLLGyjPUHmzSfI8BrMdnFl_EeuDu-9cI\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech_OneCore\AudioInput
Operation:writeName:DefaultDefaultTokenId
Value:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech_OneCore\AudioInput\TokenEnums\MMAudioIn\
(PID) Process:(8152) ZT2024.2411.15.400.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Speech_OneCore\Isolated\j8j0Vo2ncbvBLLGyjPUHmzSfI8BrMdnFl_EeuDu-9cI\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech_OneCore\AudioInput\TokenEnums\MMAudioIn
Operation:writeName:CLSID
Value:
{14E74C62-DC97-43B0-8F2F-581496A65D60}
(PID) Process:(8152) ZT2024.2411.15.400.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Speech_OneCore\Isolated\j8j0Vo2ncbvBLLGyjPUHmzSfI8BrMdnFl_EeuDu-9cI\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech_OneCore\AudioOutput
Operation:writeName:DefaultDefaultTokenId
Value:
HKEY_LOCAL_MACHINE/SOFTWARE\Microsoft\Speech_OneCore\AudioOutput\TokenEnums\MMAudioOut\
(PID) Process:(8152) ZT2024.2411.15.400.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Speech_OneCore\Isolated\j8j0Vo2ncbvBLLGyjPUHmzSfI8BrMdnFl_EeuDu-9cI\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Speech_OneCore\AudioOutput\TokenEnums\MMAudioOut
Operation:writeName:CLSID
Value:
{14E74C62-DC97-43B0-8F2F-581496A65D60}
Executable files
643
Suspicious files
758
Text files
203
Unknown types
2

Dropped files

PID
Process
Filename
Type
5280chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\LOG.old~RF10bfc7.TMP
MD5:
SHA256:
5280chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
5280chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\discounts_db\LOG.old~RF10bfc7.TMP
MD5:
SHA256:
5280chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\discounts_db\LOG.old
MD5:
SHA256:
5280chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old~RF10bfc7.TMP
MD5:
SHA256:
5280chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\coupon_db\LOG.old
MD5:
SHA256:
5280chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\chrome_cart_db\LOG.old~RF10bfd7.TMP
MD5:
SHA256:
5280chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\parcel_tracking_db\LOG.old~RF10bfd7.TMP
MD5:
SHA256:
5280chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\chrome_cart_db\LOG.old
MD5:
SHA256:
5280chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\parcel_tracking_db\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
104
TCP/UDP connections
60
DNS requests
58
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
2432
svchost.exe
HEAD
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/imoffpf67hel7kbknqflao2oo4_1.0.2738.0/neifaoindggfcjicffkgpmnlppeffabd_1.0.2738.0_win64_kj4dp5kifwxbdodqls7e5nzhtm.crx3
unknown
whitelisted
7976
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7976
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
2432
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/imoffpf67hel7kbknqflao2oo4_1.0.2738.0/neifaoindggfcjicffkgpmnlppeffabd_1.0.2738.0_win64_kj4dp5kifwxbdodqls7e5nzhtm.crx3
unknown
whitelisted
2432
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/imoffpf67hel7kbknqflao2oo4_1.0.2738.0/neifaoindggfcjicffkgpmnlppeffabd_1.0.2738.0_win64_kj4dp5kifwxbdodqls7e5nzhtm.crx3
unknown
whitelisted
2432
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/imoffpf67hel7kbknqflao2oo4_1.0.2738.0/neifaoindggfcjicffkgpmnlppeffabd_1.0.2738.0_win64_kj4dp5kifwxbdodqls7e5nzhtm.crx3
unknown
whitelisted
2432
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/imoffpf67hel7kbknqflao2oo4_1.0.2738.0/neifaoindggfcjicffkgpmnlppeffabd_1.0.2738.0_win64_kj4dp5kifwxbdodqls7e5nzhtm.crx3
unknown
whitelisted
2432
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/imoffpf67hel7kbknqflao2oo4_1.0.2738.0/neifaoindggfcjicffkgpmnlppeffabd_1.0.2738.0_win64_kj4dp5kifwxbdodqls7e5nzhtm.crx3
unknown
whitelisted
2432
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/imoffpf67hel7kbknqflao2oo4_1.0.2738.0/neifaoindggfcjicffkgpmnlppeffabd_1.0.2738.0_win64_kj4dp5kifwxbdodqls7e5nzhtm.crx3
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
5280
chrome.exe
239.255.255.250:1900
whitelisted
7272
chrome.exe
2.16.241.5:443
software.vfo.digital
Akamai International B.V.
DE
whitelisted
7272
chrome.exe
173.194.69.84:443
accounts.google.com
GOOGLE
US
whitelisted
3216
svchost.exe
172.172.255.218:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
7272
chrome.exe
172.217.18.4:443
www.google.com
GOOGLE
US
whitelisted
7272
chrome.exe
142.250.185.206:443
sb-ssl.google.com
GOOGLE
US
whitelisted
6544
svchost.exe
20.190.160.65:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted

DNS requests

Domain
IP
Reputation
software.vfo.digital
  • 2.16.241.5
  • 2.16.241.17
unknown
accounts.google.com
  • 173.194.69.84
whitelisted
client.wns.windows.com
  • 172.172.255.218
  • 172.172.255.217
whitelisted
www.google.com
  • 172.217.18.4
  • 142.250.184.196
whitelisted
sb-ssl.google.com
  • 142.250.185.206
whitelisted
login.live.com
  • 20.190.160.65
  • 20.190.160.5
  • 20.190.160.66
  • 40.126.32.68
  • 40.126.32.140
  • 20.190.160.2
  • 40.126.32.134
  • 40.126.32.74
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 95.101.149.131
whitelisted

Threats

PID
Process
Class
Message
8152
ZT2024.2411.15.400.exe
Potential Corporate Privacy Violation
ET INFO PE EXE or DLL Windows file download HTTP
8152
ZT2024.2411.15.400.exe
Misc activity
ET INFO Packed Executable Download
Process
Message
msiexec.exe
Failed to release Service