analyze malware
  • Huge database of samples and IOCs
  • Custom VM setup
  • Unlimited submissions
  • Interactive approach
Sign up, it’s free
URL:

https://dell.zoom.us/j/94866370300?pwd=WEtNQWVzVzF2aU5OMHFVMEdpRmRCdz09

Full analysis: https://app.any.run/tasks/51ccab72-d22e-41fb-b5a1-1ea5ec4c7955
Verdict: Malicious activity
Analysis date: April 01, 2023, 16:05:27
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

41D2ED077103298719117AE99A52D09D

SHA1:

7B301C765383C433D9E445084DD325A2225C0A82

SHA256:

BA1FC1627C918ABA95E73DF9F7B4D7EAEAED170F109CD1C184304CD9902A5DFB

SSDEEP:

3:N8YIQNzTTWhVVNBfnazfryj9cn:2YD/TOTazfuj+n

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Zoom_cm_fbk88Z9vvrZo4_mjjqFJosOppE+b-FJbwzEvk+xyYhbhJO3d7lE@kA8rmE+0xZEUPkaG_k152805ddd477a952_.exe (PID: 3504)
      • Installer.exe (PID: 2964)
      • Installer.exe (PID: 1704)
      • Zoom.exe (PID: 1020)
      • zm2C47.tmp (PID: 2416)
      • Zoom.exe (PID: 2624)
  • SUSPICIOUS

    • Reads the Internet Settings

      • Zoom_cm_fbk88Z9vvrZo4_mjjqFJosOppE+b-FJbwzEvk+xyYhbhJO3d7lE@kA8rmE+0xZEUPkaG_k152805ddd477a952_.exe (PID: 3504)
      • Installer.exe (PID: 2964)
      • Zoom.exe (PID: 2624)
      • Zoom.exe (PID: 1020)
    • Executable content was dropped or overwritten

      • Zoom_cm_fbk88Z9vvrZo4_mjjqFJosOppE+b-FJbwzEvk+xyYhbhJO3d7lE@kA8rmE+0xZEUPkaG_k152805ddd477a952_.exe (PID: 3504)
      • Installer.exe (PID: 2964)
      • Zoom.exe (PID: 1020)
    • Checks Windows Trust Settings

      • Zoom_cm_fbk88Z9vvrZo4_mjjqFJosOppE+b-FJbwzEvk+xyYhbhJO3d7lE@kA8rmE+0xZEUPkaG_k152805ddd477a952_.exe (PID: 3504)
      • Zoom.exe (PID: 1020)
      • Installer.exe (PID: 2964)
      • Zoom.exe (PID: 2624)
    • Reads security settings of Internet Explorer

      • Zoom_cm_fbk88Z9vvrZo4_mjjqFJosOppE+b-FJbwzEvk+xyYhbhJO3d7lE@kA8rmE+0xZEUPkaG_k152805ddd477a952_.exe (PID: 3504)
      • Zoom.exe (PID: 1020)
      • Installer.exe (PID: 2964)
      • Zoom.exe (PID: 2624)
    • Reads settings of System Certificates

      • Zoom_cm_fbk88Z9vvrZo4_mjjqFJosOppE+b-FJbwzEvk+xyYhbhJO3d7lE@kA8rmE+0xZEUPkaG_k152805ddd477a952_.exe (PID: 3504)
      • Installer.exe (PID: 2964)
      • Zoom.exe (PID: 1020)
      • Zoom.exe (PID: 2624)
    • Adds/modifies Windows certificates

      • iexplore.exe (PID: 2824)
    • The process creates files with name similar to system file names

      • Installer.exe (PID: 2964)
    • Application launched itself

      • Installer.exe (PID: 2964)
      • Zoom.exe (PID: 1020)
    • Starts itself from another location

      • Zoom_cm_fbk88Z9vvrZo4_mjjqFJosOppE+b-FJbwzEvk+xyYhbhJO3d7lE@kA8rmE+0xZEUPkaG_k152805ddd477a952_.exe (PID: 3504)
    • Starts application with an unusual extension

      • Zoom_cm_fbk88Z9vvrZo4_mjjqFJosOppE+b-FJbwzEvk+xyYhbhJO3d7lE@kA8rmE+0xZEUPkaG_k152805ddd477a952_.exe (PID: 3504)
  • INFO

    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 3220)
      • iexplore.exe (PID: 2824)
    • Create files in a temporary directory

      • iexplore.exe (PID: 2824)
      • Zoom_cm_fbk88Z9vvrZo4_mjjqFJosOppE+b-FJbwzEvk+xyYhbhJO3d7lE@kA8rmE+0xZEUPkaG_k152805ddd477a952_.exe (PID: 3504)
      • Zoom.exe (PID: 1020)
    • The process uses the downloaded file

      • iexplore.exe (PID: 2824)
      • Zoom_cm_fbk88Z9vvrZo4_mjjqFJosOppE+b-FJbwzEvk+xyYhbhJO3d7lE@kA8rmE+0xZEUPkaG_k152805ddd477a952_.exe (PID: 3504)
    • Application launched itself

      • iexplore.exe (PID: 2824)
    • Reads the computer name

      • Zoom_cm_fbk88Z9vvrZo4_mjjqFJosOppE+b-FJbwzEvk+xyYhbhJO3d7lE@kA8rmE+0xZEUPkaG_k152805ddd477a952_.exe (PID: 3504)
      • Installer.exe (PID: 2964)
      • Installer.exe (PID: 1704)
      • Zoom.exe (PID: 1020)
      • Zoom.exe (PID: 2624)
      • wmpnscfg.exe (PID: 3840)
    • Checks supported languages

      • Zoom_cm_fbk88Z9vvrZo4_mjjqFJosOppE+b-FJbwzEvk+xyYhbhJO3d7lE@kA8rmE+0xZEUPkaG_k152805ddd477a952_.exe (PID: 3504)
      • Installer.exe (PID: 2964)
      • Installer.exe (PID: 1704)
      • Zoom.exe (PID: 1020)
      • zm2C47.tmp (PID: 2416)
      • Zoom.exe (PID: 2624)
      • wmpnscfg.exe (PID: 3840)
    • Creates files or folders in the user directory

      • Zoom_cm_fbk88Z9vvrZo4_mjjqFJosOppE+b-FJbwzEvk+xyYhbhJO3d7lE@kA8rmE+0xZEUPkaG_k152805ddd477a952_.exe (PID: 3504)
      • Installer.exe (PID: 2964)
      • Zoom.exe (PID: 2624)
      • Zoom.exe (PID: 1020)
    • Checks proxy server information

      • Zoom_cm_fbk88Z9vvrZo4_mjjqFJosOppE+b-FJbwzEvk+xyYhbhJO3d7lE@kA8rmE+0xZEUPkaG_k152805ddd477a952_.exe (PID: 3504)
    • Reads the machine GUID from the registry

      • Zoom_cm_fbk88Z9vvrZo4_mjjqFJosOppE+b-FJbwzEvk+xyYhbhJO3d7lE@kA8rmE+0xZEUPkaG_k152805ddd477a952_.exe (PID: 3504)
      • Installer.exe (PID: 2964)
      • Zoom.exe (PID: 1020)
      • Zoom.exe (PID: 2624)
      • wmpnscfg.exe (PID: 3840)
    • The process checks LSA protection

      • Zoom_cm_fbk88Z9vvrZo4_mjjqFJosOppE+b-FJbwzEvk+xyYhbhJO3d7lE@kA8rmE+0xZEUPkaG_k152805ddd477a952_.exe (PID: 3504)
      • Installer.exe (PID: 2964)
      • Zoom.exe (PID: 1020)
      • Zoom.exe (PID: 2624)
      • wmpnscfg.exe (PID: 3840)
    • Process checks computer location settings

      • Zoom.exe (PID: 1020)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 3840)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
48
Monitored processes
9
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start drop and start iexplore.exe iexplore.exe zoom_cm_fbk88z9vvrzo4_mjjqfjosoppe+b-fjbwzevk+xyyhbhjo3d7le@ka8rme+0xzeupkag_k152805ddd477a952_.exe installer.exe installer.exe zoom.exe zm2c47.tmp no specs zoom.exe wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2824"C:\Program Files\Internet Explorer\iexplore.exe" "https://dell.zoom.us/j/94866370300?pwd=WEtNQWVzVzF2aU5OMHFVMEdpRmRCdz09"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3220"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2824 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\sechost.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\version.dll
3504"C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\Zoom_cm_fbk88Z9vvrZo4_mjjqFJosOppE+b-FJbwzEvk+xyYhbhJO3d7lE@kA8rmE+0xZEUPkaG_k152805ddd477a952_.exe" C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\Zoom_cm_fbk88Z9vvrZo4_mjjqFJosOppE+b-FJbwzEvk+xyYhbhJO3d7lE@kA8rmE+0xZEUPkaG_k152805ddd477a952_.exe
iexplore.exe
User:
admin
Company:
Zoom Video Communications, Inc.
Integrity Level:
MEDIUM
Description:
Zoom Opener
Exit code:
0
Version:
5,10,3,4851
Modules
Images
c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\b6qgx7lp\zoom_cm_fbk88z9vvrzo4_mjjqfjosoppe+b-fjbwzevk+xyyhbhjo3d7le@ka8rme+0xzeupkag_k152805ddd477a952_.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\msvcrt.dll
2964"C:\Users\admin\AppData\Roaming\Zoom\ZoomDownload\Installer.exe" ZInstaller --conf.mode=silent --ipc_wnd=66066C:\Users\admin\AppData\Roaming\Zoom\ZoomDownload\Installer.exe
Zoom_cm_fbk88Z9vvrZo4_mjjqFJosOppE+b-FJbwzEvk+xyYhbhJO3d7lE@kA8rmE+0xZEUPkaG_k152805ddd477a952_.exe
User:
admin
Company:
Zoom Video Communications, Inc.
Integrity Level:
MEDIUM
Description:
Zoom Installer
Exit code:
0
Version:
5,14,0,13888
Modules
Images
c:\users\admin\appdata\roaming\zoom\zoomdownload\installer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\psapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
1704"C:\Users\admin\AppData\Roaming\Zoom\ZoomDownload\Installer.exe" /addfwexception --bin_home="C:\Users\admin\AppData\Roaming\Zoom\bin"C:\Users\admin\AppData\Roaming\Zoom\ZoomDownload\Installer.exe
Installer.exe
User:
admin
Company:
Zoom Video Communications, Inc.
Integrity Level:
HIGH
Description:
Zoom Installer
Exit code:
0
Version:
5,14,0,13888
Modules
Images
c:\users\admin\appdata\roaming\zoom\zoomdownload\installer.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\psapi.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
1020"C:\Users\admin\AppData\Roaming\Zoom\bin\Zoom.exe" "--url=zoommtg://win.launch?h.domain=dell.zoom.us&h.path=join&confid=dXNzPTdGUG8tRjUyR2tKeTh5Ym82aWZEYU8tV2ZfaEF6VE9seklpeUp5WDAyUGRNWk5BRTFXMTFadXVHQkhVSjFSRGR6SWVxSjc5VmRIOXVFYV90UElWZmhGaGcubllqalZqd0V6TWRYSkx4cyZ0aWQ9YWQ1ZDBhNjc2YWY1NDEwZDk3YTEyMzFjNWE2ZGQ3ZjQ%3D&mcv=0.92.11227.0929&stype=0&zc=0&browser=msie&action=join&confno=94866370300&pwd=WEtNQWVzVzF2aU5OMHFVMEdpRmRCdz09"C:\Users\admin\AppData\Roaming\Zoom\bin\Zoom.exe
Zoom_cm_fbk88Z9vvrZo4_mjjqFJosOppE+b-FJbwzEvk+xyYhbhJO3d7lE@kA8rmE+0xZEUPkaG_k152805ddd477a952_.exe
User:
admin
Company:
Zoom Video Communications, Inc.
Integrity Level:
MEDIUM
Description:
Zoom Meetings
Version:
5,14,0,13888
Modules
Images
c:\users\admin\appdata\roaming\zoom\bin\zoom.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\psapi.dll
c:\users\admin\appdata\roaming\zoom\bin\zcrashreport.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2416"C:\Users\admin\AppData\Local\Temp\zm2C47.tmp" -DAF8C715436E44649F1312698287E6A5=C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\Zoom_cm_fbk88Z9vvrZo4_mjjqFJosOppE+b-FJbwzEvk+xyYhbhJO3d7lE@kA8rmE+0xZEUPkaG_k152805ddd477a952_.exeC:\Users\admin\AppData\Local\Temp\zm2C47.tmpZoom_cm_fbk88Z9vvrZo4_mjjqFJosOppE+b-FJbwzEvk+xyYhbhJO3d7lE@kA8rmE+0xZEUPkaG_k152805ddd477a952_.exe
User:
admin
Company:
Zoom Video Communications, Inc.
Integrity Level:
MEDIUM
Description:
Zoom Opener
Exit code:
0
Version:
5,10,3,4851
Modules
Images
c:\users\admin\appdata\local\temp\zm2c47.tmp
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\sechost.dll
c:\windows\system32\advapi32.dll
2624"C:\Users\admin\AppData\Roaming\Zoom\bin\Zoom.exe" --action=join --runaszvideo=TRUE C:\Users\admin\AppData\Roaming\Zoom\bin\Zoom.exe
Zoom.exe
User:
admin
Company:
Zoom Video Communications, Inc.
Integrity Level:
MEDIUM
Description:
Zoom Meetings
Version:
5,14,0,13888
Modules
Images
c:\users\admin\appdata\roaming\zoom\bin\zoom.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\psapi.dll
c:\users\admin\appdata\roaming\zoom\bin\zcrashreport.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
3840"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\gdi32.dll
Total events
92 192
Read events
91 740
Write events
426
Delete events
26

Modification events

(PID) Process:(2824) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
0
(PID) Process:(2824) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30847387
(PID) Process:(2824) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30847437
(PID) Process:(2824) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2824) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2824) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2824) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2824) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2824) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2824) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
390
Suspicious files
294
Text files
132
Unknown types
20

Dropped files

PID
Process
Filename
Type
3220iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\SR1HV4GN.txttext
MD5:3E49A6B833697EC4C6E0973C93A1FFAC
SHA256:D2A716CF2957AA92B8E6C93FE1ABD539FC5D84C36DDAD4BF35F4A6BCF6107995
3220iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\2JKI8PXD.txttext
MD5:7B5D45BDEBB879BD60879C4A97F93D6D
SHA256:1AE3C910FB035374B7472160602AE6512506619AB2B8EF397826D548CD1C1AED
3220iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04der
MD5:21ED9CA0F4579A63723066FAB3CDB1E9
SHA256:818A6653F6011A83D251998208826644FE68D228A739C87EC14E470E10817889
3220iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\BF776OK6.txttext
MD5:D6E0F796260331E829B543FE5AE664AD
SHA256:36C25DBA4AA0BCDCB8027C9309F4E15233C910A5E0BD9A37019B1F9DB61CE003
3220iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\V68BFH8T.txttext
MD5:ADE0F8953267695AB393C5BE636E3568
SHA256:6A80CE01B669A6C4B7C26B1969022B6D2C3C7035EC46A47EDF6267EBE36DF6E4
3220iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04binary
MD5:909C96AB9C7F8E679665615664820014
SHA256:759FCFAD5D5E41FD07A4B365F25C33B1FBD164654E8566B150FD61FC11F7C947
3220iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\D9TPDK0Q.txttext
MD5:E9C880A14851DE444378737B94BB00A8
SHA256:CC1CE5E3C256E55A5E5504603BF00B105196FF8D39234800A923BC422D4AB4AB
3220iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_FB287BEB63DB9E8D59A799779773B97Cder
MD5:380B19758247C856A0993E6336CE5A2B
SHA256:5FDFF5277E3BECE529517157C53854D2EE27B39EE2D881A9BDA0E4E6B7E2E887
3220iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\DY534W2X\94866370300[1].htmhtml
MD5:0DC944DC87ED80E2367C5861EBDAAD77
SHA256:3FE1A7B942331867282C32424FBE966DB866CB519AE92162CB6EB0739627234C
3220iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\8DOR32H2.txttext
MD5:5C3AFF104B030C035D124DE0D5C9736D
SHA256:2AC60408529FBD0B26DBD1D9EB1BFB0FF7CB00BF02C30CB72E85F6E2064F1F34
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
9
TCP/UDP connections
53
DNS requests
25
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3220
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSnxLiz3Fu1WB6n1%2FE6xWn1b0jXiQQUdIWAwGbH3zfez70pN6oDHb7tzRcCEAbCsehAv%2FkAxBfkV5KvfLI%3D
US
der
471 b
whitelisted
2824
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
US
der
471 b
whitelisted
3220
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAbY2QTVWENG9oovp1QifsQ%3D
US
der
471 b
whitelisted
2824
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA%2BnRyLFPYjID1ie%2Bx%2BdSjo%3D
US
der
1.47 Kb
whitelisted
3220
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAhflMAthXvozBT%2FU%2B2iPio%3D
US
der
471 b
whitelisted
3220
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAo3h2ReX7SMIk79G%2B0UDDw%3D
US
der
1.47 Kb
whitelisted
3220
iexplore.exe
GET
200
209.197.3.8:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?884ff7ffd71a194f
US
compressed
4.70 Kb
whitelisted
2824
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D
US
der
1.47 Kb
whitelisted
2824
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEALnkXH7gCHpP%2BLZg4NMUMA%3D
US
der
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
3220
iexplore.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
3220
iexplore.exe
170.114.52.2:443
dell.zoom.us
US
suspicious
2824
iexplore.exe
204.79.197.200:443
www.bing.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
3220
iexplore.exe
209.197.3.8:80
ctldl.windowsupdate.com
STACKPATH-CDN
US
whitelisted
3220
iexplore.exe
18.66.147.121:443
static.ada.support
AMAZON-02
US
suspicious
3220
iexplore.exe
34.98.108.207:443
cdn.solvvy.com
GOOGLE
US
unknown
3220
iexplore.exe
18.66.130.242:443
st3.zoom.us
AMAZON-02
US
unknown
3220
iexplore.exe
54.235.192.240:443
log-gateway.zoom.us
AMAZON-AES
US
unknown
3220
iexplore.exe
104.19.187.97:443
cdn.cookielaw.org
CLOUDFLARENET
unknown
2824
iexplore.exe
13.107.21.200:443
www.bing.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
dell.zoom.us
  • 170.114.52.2
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
ctldl.windowsupdate.com
  • 209.197.3.8
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
static.ada.support
  • 18.66.147.121
  • 18.66.147.60
  • 18.66.147.113
  • 18.66.147.95
whitelisted
cdn.solvvy.com
  • 34.98.108.207
shared
st3.zoom.us
  • 18.66.130.242
whitelisted
st1.zoom.us
  • 18.66.130.242
whitelisted
log-gateway.zoom.us
  • 54.235.192.240
  • 54.227.249.145
unknown

Threats

No threats detected
Process
Message
Installer.exe
[ProductPathHelper::RecursiveRemoveDirA] Path is:
Installer.exe
C:\Users\admin\AppData\Roaming\Zoom\zoom_install_src
Installer.exe
Installer.exe
[ProductPathHelper::RecursiveRemoveDirA] Path is:
Installer.exe
C:\Users\admin\AppData\Roaming\Zoom\zoom_install_src
Installer.exe
Installer.exe
[ProductPathHelper::RecursiveRemoveDirA] Path is:
Installer.exe
C:\Users\admin\AppData\Roaming\Zoom\tmp_uninstall
Installer.exe
Installer.exe
[ProductPathHelper::RecursiveRemoveDirA] Path is: