Analysis
-
max time kernel
108s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2023 05:13
Static task
static1
Behavioral task
behavioral1
Sample
ZoomInstallerFull.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ZoomInstallerFull.exe
Resource
win10v2004-20220812-en
General
-
Target
ZoomInstallerFull.exe
-
Size
76.4MB
-
MD5
aeb04e767a408e5ac643cd467751afff
-
SHA1
cc2b84718bcec1fe34b3e9189762149f4a91fc23
-
SHA256
9108e1d22d74bc5397b8886edc4f0a84b8906436a648ef8a86f30cf7e08978dd
-
SHA512
d7e4e4c523290ac5afec1382c275dacc8a1657d7a75c2298c3bbf1fe7881253a3b5005895b72954f5062f6cd25a52df6f72c4d0022335f2349c6ede2d0e66114
-
SSDEEP
1572864:jpDrQefrQSB+gTC4GB3RA9MLhWG7VYlSGTbANByfGajuTgIrPJGsF:9DLfrQQ/FA3RAicfUjByfFIDJ
Malware Config
Extracted
icedid
3280585787
trbiriumpa.com
Signatures
-
Blocklisted process makes network request 3 IoCs
Processes:
rundll32.exemsiexec.exeflow pid process 6 2436 rundll32.exe 18 3600 msiexec.exe 49 2436 rundll32.exe -
Executes dropped EXE 3 IoCs
Processes:
ZoomOutlookIMPlugin.exeCptInstall.exeCptService.exepid process 2712 ZoomOutlookIMPlugin.exe 1324 CptInstall.exe 1352 CptService.exe -
Loads dropped DLL 15 IoCs
Processes:
rundll32.exeMsiExec.exeZoomOutlookIMPlugin.exepid process 2436 rundll32.exe 3584 MsiExec.exe 2712 ZoomOutlookIMPlugin.exe 2712 ZoomOutlookIMPlugin.exe 2712 ZoomOutlookIMPlugin.exe 2712 ZoomOutlookIMPlugin.exe 2712 ZoomOutlookIMPlugin.exe 2712 ZoomOutlookIMPlugin.exe 3584 MsiExec.exe 3584 MsiExec.exe 3584 MsiExec.exe 3584 MsiExec.exe 3584 MsiExec.exe 3584 MsiExec.exe 3584 MsiExec.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
MsiExec.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\zoommsirepair = "\"C:\\Program Files (x86)\\Zoom\\bin\\installer.exe\" /repair" MsiExec.exe -
Enumerates connected drives 3 TTPs 48 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exemsiexec.exedescription ioc process File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\I: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\F: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\X: msiexec.exe -
Drops file in Program Files directory 64 IoCs
Processes:
MsiExec.exedescription ioc process File created C:\Program Files (x86)\Zoom\resources\Emojis\1f462.svg MsiExec.exe File opened for modification C:\Program Files (x86)\Zoom\resources\Emojis\1f469-1f3ff-2764-1f48b-1f469-1f3fe.svg MsiExec.exe File opened for modification C:\Program Files (x86)\Zoom\resources\Emojis\1f4a1.svg MsiExec.exe File created C:\Program Files (x86)\Zoom\resources\Emojis\1f6b6-1f3fb.png MsiExec.exe File opened for modification C:\Program Files (x86)\Zoom\resources\Emojis\23fa.svg MsiExec.exe File opened for modification C:\Program Files (x86)\Zoom\resources\Emojis\1f1f2-1f1ff.svg MsiExec.exe File opened for modification C:\Program Files (x86)\Zoom\resources\Emojis\1f90f-1f3fd.png MsiExec.exe File opened for modification C:\Program Files (x86)\Zoom\resources\Emojis\1f972.svg MsiExec.exe File created C:\Program Files (x86)\Zoom\resources\Emojis\26c5.png MsiExec.exe File created C:\Program Files (x86)\Zoom\resources\Emojis\1f469-1f3ff-1f9b3.png MsiExec.exe File created C:\Program Files (x86)\Zoom\resources\Emojis\1f5a5.png MsiExec.exe File created C:\Program Files (x86)\Zoom\resources\Emojis\1f93d-2642.svg MsiExec.exe File opened for modification C:\Program Files (x86)\Zoom\resources\Emojis\1f1f3-1f1ee.png MsiExec.exe File created C:\Program Files (x86)\Zoom\resources\Emojis\1f1f8-1f1ed.svg MsiExec.exe File opened for modification C:\Program Files (x86)\Zoom\resources\Emojis\1f1e8-1f1ee.png MsiExec.exe File opened for modification C:\Program Files (x86)\Zoom\resources\Emojis\1f332.png MsiExec.exe File created C:\Program Files (x86)\Zoom\resources\Emojis\1f9d1-1f3fc-1f91d-1f9d1-1f3ff.svg MsiExec.exe File created C:\Program Files (x86)\Zoom\resources\Emojis\1f477-1f3fe-2640.png MsiExec.exe File opened for modification C:\Program Files (x86)\Zoom\resources\Emojis\1f22f.png MsiExec.exe File created C:\Program Files (x86)\Zoom\resources\Emojis\1f516.svg MsiExec.exe File opened for modification C:\Program Files (x86)\Zoom\resources\Emojis\26f9-1f3fb-2640.svg MsiExec.exe File opened for modification C:\Program Files (x86)\Zoom\resources\Emojis\1f3bc.png MsiExec.exe File created C:\Program Files (x86)\Zoom\resources\Emojis\1fa84.svg MsiExec.exe File created C:\Program Files (x86)\Zoom\resources\Emojis\1fac1.svg MsiExec.exe File created C:\Program Files (x86)\Zoom\resources\Emojis\2744.png MsiExec.exe File created C:\Program Files (x86)\Zoom\resources\Emojis\1f1f8-1f1f3.png MsiExec.exe File opened for modification C:\Program Files (x86)\Zoom\resources\Emojis\1f352.svg MsiExec.exe File opened for modification C:\Program Files (x86)\Zoom\resources\Emojis\1f468-1f3fc-1f9b0.png MsiExec.exe File opened for modification C:\Program Files (x86)\Zoom\resources\Emojis\1f471-2640.png MsiExec.exe File created C:\Program Files (x86)\Zoom\resources\Emojis\1f476-1f3fb.svg MsiExec.exe File opened for modification C:\Program Files (x86)\Zoom\resources\Emojis\1f932-1f3fe.svg MsiExec.exe File opened for modification C:\Program Files (x86)\Zoom\resources\Emojis\1f468-1f3fe-1f527.png MsiExec.exe File opened for modification C:\Program Files (x86)\Zoom\resources\Emojis\1f477-1f3fd-2640.svg MsiExec.exe File created C:\Program Files (x86)\Zoom\resources\Emojis\1f9dc-1f3fd-2640.svg MsiExec.exe File created C:\Program Files (x86)\Zoom\resources\Emojis\1fad2.png MsiExec.exe File opened for modification C:\Program Files (x86)\Zoom\resources\Emojis\1fad4.svg MsiExec.exe File created C:\Program Files (x86)\Zoom\resources\Emojis\25fd.svg MsiExec.exe File created C:\Program Files (x86)\Zoom\resources\Emojis\1f5fc.svg MsiExec.exe File opened for modification C:\Program Files (x86)\Zoom\resources\Emojis\1f6d7.svg MsiExec.exe File opened for modification C:\Program Files (x86)\Zoom\resources\Emojis\1f1ed-1f1fa.svg MsiExec.exe File created C:\Program Files (x86)\Zoom\resources\Emojis\1f448-1f3fe.png MsiExec.exe File opened for modification C:\Program Files (x86)\Zoom\resources\Emojis\1f64c-1f3fb.png MsiExec.exe File created C:\Program Files (x86)\Zoom\resources\Emojis\1fa9d.png MsiExec.exe File opened for modification C:\Program Files (x86)\Zoom\resources\Emojis\26d4.svg MsiExec.exe File created C:\Program Files (x86)\Zoom\resources\Emojis\1f311.svg MsiExec.exe File opened for modification C:\Program Files (x86)\Zoom\resources\Emojis\1f9d1-1f3fb-1f680.svg MsiExec.exe File created C:\Program Files (x86)\Zoom\resources\Emojis\1f487-1f3fd-2642.svg MsiExec.exe File created C:\Program Files (x86)\Zoom\resources\Emojis\1f4fc.png MsiExec.exe File opened for modification C:\Program Files (x86)\Zoom\resources\Emojis\1f468-1f3ff-2764-1f468-1f3fc.svg MsiExec.exe File created C:\Program Files (x86)\Zoom\resources\Emojis\1f471-2642.svg MsiExec.exe File opened for modification C:\Program Files (x86)\Zoom\resources\Emojis\1f478.png MsiExec.exe File opened for modification C:\Program Files (x86)\Zoom\resources\Emojis\1f531.svg MsiExec.exe File opened for modification C:\Program Files (x86)\Zoom\resources\Emojis\1f9d8-1f3ff-2640.png MsiExec.exe File opened for modification C:\Program Files (x86)\Zoom\resources\Emojis\1f403.svg MsiExec.exe File created C:\Program Files (x86)\Zoom\resources\Emojis\1f468-1f468-1f466-1f466.svg MsiExec.exe File opened for modification C:\Program Files (x86)\Zoom\resources\Emojis\1f9d1-1f3ff.png MsiExec.exe File opened for modification C:\Program Files (x86)\Zoom\resources\Emojis\1f1ec-1f1e9.png MsiExec.exe File created C:\Program Files (x86)\Zoom\resources\Emojis\1f1f5-1f1f1.png MsiExec.exe File opened for modification C:\Program Files (x86)\Zoom\resources\Emojis\2744.png MsiExec.exe File opened for modification C:\Program Files (x86)\Zoom\resources\Emojis\1f44a-1f3fc.svg MsiExec.exe File opened for modification C:\Program Files (x86)\Zoom\resources\Emojis\1f469-1f3fe-1f3a4.svg MsiExec.exe File created C:\Program Files (x86)\Zoom\resources\Emojis\1f64b-1f3fd-2642.png MsiExec.exe File opened for modification C:\Program Files (x86)\Zoom\resources\Emojis\1f6c3.png MsiExec.exe File opened for modification C:\Program Files (x86)\Zoom\resources\Emojis\1f932-1f3fd.svg MsiExec.exe -
Drops file in Windows directory 10 IoCs
Processes:
msiexec.exedescription ioc process File opened for modification C:\Windows\Installer\MSI12C8.tmp msiexec.exe File opened for modification C:\Windows\Installer\{D2D52E89-6EC4-456C-ACDB-874925BDE05A}\_6FEFF9B68218417F98F549.exe msiexec.exe File opened for modification C:\Windows\Installer\e58073e.msi msiexec.exe File opened for modification C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log msiexec.exe File created C:\Windows\Installer\inprogressinstallinfo.ipi msiexec.exe File created C:\Windows\Installer\SourceHash{D2D52E89-6EC4-456C-ACDB-874925BDE05A} msiexec.exe File created C:\Windows\Installer\{D2D52E89-6EC4-456C-ACDB-874925BDE05A}\_6FEFF9B68218417F98F549.exe msiexec.exe File created C:\Windows\Installer\e580741.msi msiexec.exe File created C:\Windows\Installer\e58073e.msi msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe -
Checks SCSI registry key(s) 3 TTPs 5 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
vssvc.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters vssvc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\PartitionTableCache = 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 vssvc.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Device Parameters\Partmgr\SnapshotDataCache = 534e41505041525401000000700000008ec7416a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 vssvc.exe -
Processes:
MsiExec.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Internet Explorer\ProtocolExecute\zoommtg\WarnOnOpen = "0" MsiExec.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{AFDA28A5-1B5F-4635-9877-73DF0D710C9A} MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{AFDA28A5-1B5F-4635-9877-73DF0D710C9A}\AppName = "Zoom.exe" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{AFDA28A5-1B5F-4635-9877-73DF0D710C9A}\AppPath = "C:\\Program Files (x86)\\Zoom\\bin" MsiExec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Low Rights\ElevationPolicy\{AFDA28A5-1B5F-4635-9877-73DF0D710C9A}\Policy = "3" MsiExec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION\Zoom.exe = "11000" MsiExec.exe Key created \REGISTRY\MACHINE\Software\Microsoft\Internet Explorer\ProtocolExecute\zoommtg MsiExec.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
MsiExec.exeZoomOutlookIMPlugin.exeCptInstall.exemsiexec.exedescription ioc process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing ZoomOutlookIMPlugin.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E CptInstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs CptInstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs CptInstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople MsiExec.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\IntranetName = "1" MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA ZoomOutlookIMPlugin.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed CptInstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs ZoomOutlookIMPlugin.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates ZoomOutlookIMPlugin.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs ZoomOutlookIMPlugin.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates ZoomOutlookIMPlugin.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs ZoomOutlookIMPlugin.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs CptInstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs ZoomOutlookIMPlugin.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople ZoomOutlookIMPlugin.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs CptInstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates CptInstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs CptInstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs ZoomOutlookIMPlugin.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates ZoomOutlookIMPlugin.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust ZoomOutlookIMPlugin.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA CptInstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs CptInstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs ZoomOutlookIMPlugin.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\52C64B7E\@%SystemRoot%\system32\dnsapi.dll,-103 = "Domain Name System (DNS) Server Trust" CptInstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs ZoomOutlookIMPlugin.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates CptInstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs ZoomOutlookIMPlugin.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs CptInstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs CptInstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople CptInstall.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "1" MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs CptInstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates CptInstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed ZoomOutlookIMPlugin.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs CptInstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA ZoomOutlookIMPlugin.exe Key deleted \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\1e msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople CptInstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople ZoomOutlookIMPlugin.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates ZoomOutlookIMPlugin.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing CptInstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates CptInstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates ZoomOutlookIMPlugin.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates ZoomOutlookIMPlugin.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs ZoomOutlookIMPlugin.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates ZoomOutlookIMPlugin.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs CptInstall.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs MsiExec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot MsiExec.exe -
Modifies registry class 64 IoCs
Processes:
MsiExec.exemsiexec.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\callto MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ZoomPbx.zoomphonecall\URL Protocol MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ZoomPhoneCall\URL Protocol MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ZoomPhoneCall\DefaultIcon MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ZoomPhoneCall\shell\open MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ZoomLauncher\shell\open MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\zoommtg\DefaultIcon\ = "\"C:\\Program Files (x86)\\Zoom\\bin\\Zoom.exe\",1" MsiExec.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ZoomPhoneCall MsiExec.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ZoomPbx.callto MsiExec.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ZoomPbx.zoomphonecall\shell\open MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ZoomPbx.zoomphonecall\shell MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\98E25D2D4CE6C654CABD789452DB0EA5\ProductName = "Zoom(32bit)" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\98E25D2D4CE6C654CABD789452DB0EA5\ProductIcon = "C:\\Windows\\Installer\\{D2D52E89-6EC4-456C-ACDB-874925BDE05A}\\_6FEFF9B68218417F98F549.exe" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\98E25D2D4CE6C654CABD789452DB0EA5\SourceList msiexec.exe Key deleted \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ZoomPbx.zoomphonecall MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-zoommtg-launcher MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ZoomRecording\DefaultIcon MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ZoomPhoneCall\URL Protocol MsiExec.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ZoomPhoneCall\DefaultIcon MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Content Type\application/x-zoommtg-launcher\Extension = ".zoommtg" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ZoomPhoneCall MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ZoomPbx.zoomphonecall\shell\open MsiExec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\98E25D2D4CE6C654CABD789452DB0EA5\Language = "1033" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\98E25D2D4CE6C654CABD789452DB0EA5\SourceList\Media\1 = ";" msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ZoomPbx.im MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ZoomLauncher\shell\open\command\ = "\"C:\\Program Files (x86)\\Zoom\\bin\\Zoom.exe\" \"--url=%1\"" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ZoomRecording MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ZoomPhoneCall\DefaultIcon\ = "\"C:\\Program Files (x86)\\Zoom\\bin\\Zoom.exe\",1" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ZoomPbx.zoomphonecall MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\98E25D2D4CE6C654CABD789452DB0EA5\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\" msiexec.exe Key deleted \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ZoomPbx.callto MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ZoomLauncher\ = "Zoom Launcher - 3.0.1" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\zoommtg\ = "URL:Zoom Launcher" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\zoommtg\DefaultIcon MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\zoommtg\shell MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\zoommtg\shell\open MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ZoomRecording\DefaultIcon\ = "\"C:\\Program Files (x86)\\Zoom\\bin\\Zoom.exe\",0" MsiExec.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ZoomPbx.zoomphonecall\shell\open\command MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ZoomPbx.zoomphonecall\shell\open\command\ = "\"C:\\Program Files (x86)\\Zoom\\bin\\Zoom.exe\" --url=\"%l\"" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\98E25D2D4CE6C654CABD789452DB0EA5 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\497B918CC54A72F48906C06894A225CC\98E25D2D4CE6C654CABD789452DB0EA5 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\98E25D2D4CE6C654CABD789452DB0EA5\SourceList\PackageName = "ikm.msi" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\98E25D2D4CE6C654CABD789452DB0EA5\SourceList\Media msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.zoommtg MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ZoomLauncher\shell MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ZoomRecording\shell\open MsiExec.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ZoomPhoneCall\shell MsiExec.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ZoomPbx.zoomphonecall\ = "URL:ZoomPhoneCall Protocol" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ZoomPhoneCall\shell\open\command\ = "\"C:\\Program Files (x86)\\Zoom\\bin\\Zoom.exe\" --url=\"%l\"" MsiExec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\98E25D2D4CE6C654CABD789452DB0EA5\AdvertiseFlags = "388" msiexec.exe Key deleted \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ZoomPbx.tel MsiExec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\zoommtg\UseOriginalUrlEncoding = "1" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ZoomRecording\ = "Zoom Recording File" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ZoomRecording\shell\open\command MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.zoom\ = "ZoomRecording" MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ZoomPbx.zoomphonecall\ = "URL:ZoomPhoneCall Protocol" MsiExec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\98E25D2D4CE6C654CABD789452DB0EA5\Clients = 3a0000000000 msiexec.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ZoomPbx.zoomphonecall MsiExec.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\tel MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.zoom MsiExec.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ZoomPbx.zoomphonecall\shell MsiExec.exe Key deleted \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000_Classes\ZoomPbx.im MsiExec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.zoommtg\Content Type = "application/x-zoommtg-launcher" MsiExec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ZoomLauncher\shell\open\command MsiExec.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
rundll32.exemsiexec.exeMsiExec.exeZoomOutlookIMPlugin.exeCptInstall.exepid process 2436 rundll32.exe 2436 rundll32.exe 1780 msiexec.exe 1780 msiexec.exe 3584 MsiExec.exe 3584 MsiExec.exe 3584 MsiExec.exe 3584 MsiExec.exe 3584 MsiExec.exe 3584 MsiExec.exe 2712 ZoomOutlookIMPlugin.exe 2712 ZoomOutlookIMPlugin.exe 1324 CptInstall.exe 1324 CptInstall.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exemsiexec.exevssvc.exeMsiExec.exesrtasks.exedescription pid process Token: SeShutdownPrivilege 3600 msiexec.exe Token: SeIncreaseQuotaPrivilege 3600 msiexec.exe Token: SeSecurityPrivilege 1780 msiexec.exe Token: SeCreateTokenPrivilege 3600 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 3600 msiexec.exe Token: SeLockMemoryPrivilege 3600 msiexec.exe Token: SeIncreaseQuotaPrivilege 3600 msiexec.exe Token: SeMachineAccountPrivilege 3600 msiexec.exe Token: SeTcbPrivilege 3600 msiexec.exe Token: SeSecurityPrivilege 3600 msiexec.exe Token: SeTakeOwnershipPrivilege 3600 msiexec.exe Token: SeLoadDriverPrivilege 3600 msiexec.exe Token: SeSystemProfilePrivilege 3600 msiexec.exe Token: SeSystemtimePrivilege 3600 msiexec.exe Token: SeProfSingleProcessPrivilege 3600 msiexec.exe Token: SeIncBasePriorityPrivilege 3600 msiexec.exe Token: SeCreatePagefilePrivilege 3600 msiexec.exe Token: SeCreatePermanentPrivilege 3600 msiexec.exe Token: SeBackupPrivilege 3600 msiexec.exe Token: SeRestorePrivilege 3600 msiexec.exe Token: SeShutdownPrivilege 3600 msiexec.exe Token: SeDebugPrivilege 3600 msiexec.exe Token: SeAuditPrivilege 3600 msiexec.exe Token: SeSystemEnvironmentPrivilege 3600 msiexec.exe Token: SeChangeNotifyPrivilege 3600 msiexec.exe Token: SeRemoteShutdownPrivilege 3600 msiexec.exe Token: SeUndockPrivilege 3600 msiexec.exe Token: SeSyncAgentPrivilege 3600 msiexec.exe Token: SeEnableDelegationPrivilege 3600 msiexec.exe Token: SeManageVolumePrivilege 3600 msiexec.exe Token: SeImpersonatePrivilege 3600 msiexec.exe Token: SeCreateGlobalPrivilege 3600 msiexec.exe Token: SeBackupPrivilege 2136 vssvc.exe Token: SeRestorePrivilege 2136 vssvc.exe Token: SeAuditPrivilege 2136 vssvc.exe Token: SeBackupPrivilege 1780 msiexec.exe Token: SeRestorePrivilege 1780 msiexec.exe Token: SeRestorePrivilege 1780 msiexec.exe Token: SeTakeOwnershipPrivilege 1780 msiexec.exe Token: SeRestorePrivilege 1780 msiexec.exe Token: SeTakeOwnershipPrivilege 1780 msiexec.exe Token: SeDebugPrivilege 3584 MsiExec.exe Token: SeRestorePrivilege 3584 MsiExec.exe Token: SeBackupPrivilege 3584 MsiExec.exe Token: SeBackupPrivilege 4424 srtasks.exe Token: SeRestorePrivilege 4424 srtasks.exe Token: SeSecurityPrivilege 4424 srtasks.exe Token: SeTakeOwnershipPrivilege 4424 srtasks.exe Token: SeRestorePrivilege 1780 msiexec.exe Token: SeTakeOwnershipPrivilege 1780 msiexec.exe Token: SeRestorePrivilege 1780 msiexec.exe Token: SeTakeOwnershipPrivilege 1780 msiexec.exe Token: SeRestorePrivilege 1780 msiexec.exe Token: SeTakeOwnershipPrivilege 1780 msiexec.exe Token: SeRestorePrivilege 1780 msiexec.exe Token: SeTakeOwnershipPrivilege 1780 msiexec.exe Token: SeRestorePrivilege 1780 msiexec.exe Token: SeTakeOwnershipPrivilege 1780 msiexec.exe Token: SeRestorePrivilege 1780 msiexec.exe Token: SeTakeOwnershipPrivilege 1780 msiexec.exe Token: SeRestorePrivilege 1780 msiexec.exe Token: SeTakeOwnershipPrivilege 1780 msiexec.exe Token: SeRestorePrivilege 1780 msiexec.exe Token: SeTakeOwnershipPrivilege 1780 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
msiexec.exepid process 3600 msiexec.exe 3600 msiexec.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
ZoomInstallerFull.exemsiexec.exeMsiExec.exedescription pid process target process PID 1232 wrote to memory of 2436 1232 ZoomInstallerFull.exe rundll32.exe PID 1232 wrote to memory of 2436 1232 ZoomInstallerFull.exe rundll32.exe PID 1232 wrote to memory of 3600 1232 ZoomInstallerFull.exe msiexec.exe PID 1232 wrote to memory of 3600 1232 ZoomInstallerFull.exe msiexec.exe PID 1780 wrote to memory of 4424 1780 msiexec.exe srtasks.exe PID 1780 wrote to memory of 4424 1780 msiexec.exe srtasks.exe PID 1780 wrote to memory of 3584 1780 msiexec.exe MsiExec.exe PID 1780 wrote to memory of 3584 1780 msiexec.exe MsiExec.exe PID 1780 wrote to memory of 3584 1780 msiexec.exe MsiExec.exe PID 3584 wrote to memory of 2712 3584 MsiExec.exe ZoomOutlookIMPlugin.exe PID 3584 wrote to memory of 2712 3584 MsiExec.exe ZoomOutlookIMPlugin.exe PID 3584 wrote to memory of 2712 3584 MsiExec.exe ZoomOutlookIMPlugin.exe PID 3584 wrote to memory of 1324 3584 MsiExec.exe CptInstall.exe PID 3584 wrote to memory of 1324 3584 MsiExec.exe CptInstall.exe PID 3584 wrote to memory of 1324 3584 MsiExec.exe CptInstall.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ZoomInstallerFull.exe"C:\Users\Admin\AppData\Local\Temp\ZoomInstallerFull.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\WINDOWS\SYSTEM32\rundll32.exeC:\WINDOWS\SYSTEM32\rundll32.exe C:\Users\Admin\AppData\Local\Temp\maker.dll, init2⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2436 -
C:\Windows\SYSTEM32\msiexec.exemsiexec.exe /i C:\Users\Admin\AppData\Local\Temp\ikm.msi2⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:3600
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Enumerates connected drives
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\system32\srtasks.exeC:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:22⤵
- Suspicious use of AdjustPrivilegeToken
PID:4424 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding 3F3A8C68B523E85CF7D0E3C538847969 E Global\MSI00002⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Program Files (x86)\Zoom\bin\ZoomOutlookIMPlugin.exe"C:\Program Files (x86)\Zoom\bin\ZoomOutlookIMPlugin.exe" /Check3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2712 -
C:\Program Files (x86)\Zoom\bin\CptInstall.exe"C:\Program Files (x86)\Zoom\bin\CptInstall.exe" -install -unelevate -product Zoom3⤵
- Executes dropped EXE
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:1324
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Checks SCSI registry key(s)
- Suspicious use of AdjustPrivilegeToken
PID:2136
-
C:\Program Files (x86)\Common Files\Zoom\Support\CptService.exe"C:\Program Files (x86)\Common Files\Zoom\Support\CptService.exe" -user_path "C:\Users\Admin\AppData\Roaming\Zoom"1⤵
- Executes dropped EXE
PID:1352
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Common Files\Zoom\Support\CptService.exeFilesize
225KB
MD59e5451ac860085c00d10e6e02ace93cd
SHA1df62392329cd02d9a8b1b6b7fa694aee6ad8d7a7
SHA2560580a8af804708ed9a86d9958eecdb84845455d285fc25e5a8f618ae46f7ffab
SHA512e84589fdb855cee28000e51d5be922f9cfc8901dd3099838c1d92796fdf917c24e26afc01122b9379be2f753062ccdfdc395c012d6b91d319c8b0cbc82cc5686
-
C:\Program Files (x86)\Common Files\Zoom\Support\CptService.exeFilesize
225KB
MD59e5451ac860085c00d10e6e02ace93cd
SHA1df62392329cd02d9a8b1b6b7fa694aee6ad8d7a7
SHA2560580a8af804708ed9a86d9958eecdb84845455d285fc25e5a8f618ae46f7ffab
SHA512e84589fdb855cee28000e51d5be922f9cfc8901dd3099838c1d92796fdf917c24e26afc01122b9379be2f753062ccdfdc395c012d6b91d319c8b0cbc82cc5686
-
C:\Program Files (x86)\Zoom\Zoom(32bit)\CustomAction.dllFilesize
463KB
MD5cd93acb0b47d809d49de75b5e62098b9
SHA16cf726521daff980823667e6cb659c7ccf67085b
SHA256b4786fcaa00af8739df2b73922ad750d5799538448712e5933470211c230068c
SHA512832cf816d2e2713d9f1b4a805cb25b608eb02bb2fa3c001f980c70c4281c4b6456c7a5c4e492a0c3d1df106a70efe15250a8993e6c1af1c53359860082cce174
-
C:\Program Files (x86)\Zoom\Zoom(32bit)\CustomAction.dllFilesize
463KB
MD5cd93acb0b47d809d49de75b5e62098b9
SHA16cf726521daff980823667e6cb659c7ccf67085b
SHA256b4786fcaa00af8739df2b73922ad750d5799538448712e5933470211c230068c
SHA512832cf816d2e2713d9f1b4a805cb25b608eb02bb2fa3c001f980c70c4281c4b6456c7a5c4e492a0c3d1df106a70efe15250a8993e6c1af1c53359860082cce174
-
C:\Program Files (x86)\Zoom\Zoom(32bit)\CustomAction.dllFilesize
463KB
MD5cd93acb0b47d809d49de75b5e62098b9
SHA16cf726521daff980823667e6cb659c7ccf67085b
SHA256b4786fcaa00af8739df2b73922ad750d5799538448712e5933470211c230068c
SHA512832cf816d2e2713d9f1b4a805cb25b608eb02bb2fa3c001f980c70c4281c4b6456c7a5c4e492a0c3d1df106a70efe15250a8993e6c1af1c53359860082cce174
-
C:\Program Files (x86)\Zoom\bin\Cmmlib.dllFilesize
1.6MB
MD54fda1fc1054dab4cd2a8c61a9b98b7dc
SHA1f52dae000279e4b30a28f3aca23b5f04654ac7c5
SHA256894905b29f5ca31dd0c696333fcc7e23bd3c7ba8fb758b2293df7a7f2268acf8
SHA51209531c83673fb6a458978158016ec4daadbd6606780be7f47daa4f4b48c5a68affb63dd35797d825647c237bd218ddd50131bc4961ca59fe26318123fdd52dee
-
C:\Program Files (x86)\Zoom\bin\Cmmlib.dllFilesize
1.6MB
MD54fda1fc1054dab4cd2a8c61a9b98b7dc
SHA1f52dae000279e4b30a28f3aca23b5f04654ac7c5
SHA256894905b29f5ca31dd0c696333fcc7e23bd3c7ba8fb758b2293df7a7f2268acf8
SHA51209531c83673fb6a458978158016ec4daadbd6606780be7f47daa4f4b48c5a68affb63dd35797d825647c237bd218ddd50131bc4961ca59fe26318123fdd52dee
-
C:\Program Files (x86)\Zoom\bin\CptControl.exeFilesize
96KB
MD5d7e39303a4d41e8f27310c2601cdb34c
SHA1595b000756f2f6483ccaaf751f5ae3309f10e4f6
SHA2568f9db23d84f8c3cfe3365a64d4aa4c87d4fa02fffa64dcc00d17c66307fc0c82
SHA512a0088fd79630780dea041abf89e78af48ed5bd8a3976e72e89043c8a604c4d1146eb4cb35ff8206829fd2da66675652ca4bc7953301a8865a4066572f9ce2552
-
C:\Program Files (x86)\Zoom\bin\CptInstall.exeFilesize
226KB
MD5c380b703ef0cb2e5bca13004a242ae65
SHA1b52a1a3ad31688244124769f02351effc3952248
SHA2561159dfd3f1a2a87efa7ed0d6fa16001695c3a0f7b21473bbf94d133ca1c41e25
SHA512de096b58b55f69294d68497686a76a5fca10b1fb27f087dc3216036d2a829605d6ee738eb7e346fc98e327f1398954851a4db33b71357443e657ae61e87ecc91
-
C:\Program Files (x86)\Zoom\bin\CptInstall.exeFilesize
226KB
MD5c380b703ef0cb2e5bca13004a242ae65
SHA1b52a1a3ad31688244124769f02351effc3952248
SHA2561159dfd3f1a2a87efa7ed0d6fa16001695c3a0f7b21473bbf94d133ca1c41e25
SHA512de096b58b55f69294d68497686a76a5fca10b1fb27f087dc3216036d2a829605d6ee738eb7e346fc98e327f1398954851a4db33b71357443e657ae61e87ecc91
-
C:\Program Files (x86)\Zoom\bin\CptService.exeFilesize
225KB
MD59e5451ac860085c00d10e6e02ace93cd
SHA1df62392329cd02d9a8b1b6b7fa694aee6ad8d7a7
SHA2560580a8af804708ed9a86d9958eecdb84845455d285fc25e5a8f618ae46f7ffab
SHA512e84589fdb855cee28000e51d5be922f9cfc8901dd3099838c1d92796fdf917c24e26afc01122b9379be2f753062ccdfdc395c012d6b91d319c8b0cbc82cc5686
-
C:\Program Files (x86)\Zoom\bin\CptShare.dllFilesize
280KB
MD503c0ad10f2e76ac88586a8093111a545
SHA12bd73faa30fc09d1b1d036c43075da5a18f712a9
SHA256817d66e6ce83acf907ebf7952e72ab17e384c698998dc93d836ee7f1bd94d6e3
SHA512a77d36ef13e5910d7b1e8b2a0abff97371cd1d16b7cb8818d3da1ebd5d1aa6d4b4d63b4919c2f721d42e16d8b25dab25da3b72639bae3f59a457892167ca2b5e
-
C:\Program Files (x86)\Zoom\bin\CptShare.dllFilesize
280KB
MD503c0ad10f2e76ac88586a8093111a545
SHA12bd73faa30fc09d1b1d036c43075da5a18f712a9
SHA256817d66e6ce83acf907ebf7952e72ab17e384c698998dc93d836ee7f1bd94d6e3
SHA512a77d36ef13e5910d7b1e8b2a0abff97371cd1d16b7cb8818d3da1ebd5d1aa6d4b4d63b4919c2f721d42e16d8b25dab25da3b72639bae3f59a457892167ca2b5e
-
C:\Program Files (x86)\Zoom\bin\MSVCP140.dllFilesize
440KB
MD5e0dd94aada0b034b212de071c33054da
SHA16c4f1b3f66d07bbcdcf41eb39b1480bb335efcc8
SHA25608442853f19ce4ff3acae37d87eab33ef81c4c6da62a3432d43253ba79842b64
SHA51276c877056f448e5dab820e990cc186ba886b2d331d689a99295aaff31a63aadb941c2693b0be98d53bd06cd8041a270eb82ddedfbde305cd9a85bcbe42fcf5a2
-
C:\Program Files (x86)\Zoom\bin\VCRUNTIME140.dllFilesize
74KB
MD587dd91c56be82866bf96ef1666f30a99
SHA13b78cb150110166ded8ea51fbde8ea506f72aeaf
SHA25649b0fd1751342c253cac588dda82ec08e4ef43cebc5a9d80deb7928109b90c4f
SHA51258c3ec6761624d14c7c897d8d0842dbeab200d445b4339905dac8a3635d174cdfb7b237d338d2829bc6c602c47503120af5be0c7de6abf2e71c81726285e44d6
-
C:\Program Files (x86)\Zoom\bin\Zoom.exeFilesize
336KB
MD5260c0125fe9cae11da4cef073b077f68
SHA1869b78d539340ba055e6810b24217021debf0fae
SHA256306aa18dcb46b14c1d76f9c7cf78a49c88ef564b54cd4a523a1a4b5076a3ef36
SHA512d3a78b209e0cef40d35d552e32540a3a2b4d0e4683c5443a74cb1528ae5997d6c17c5413a65fd2d3b1b13c4e1c27d81c5e2bce5ce4ccc3cdb2725330607767ec
-
C:\Program Files (x86)\Zoom\bin\ZoomOutlookIMPlugin.exeFilesize
581KB
MD58ec8a4e243853dea877d12266a88cfbf
SHA14f6129129c0cdda57d8232a2a10d7124d06d6762
SHA256cf8638536dd901843119c0b56cd4a61a46c3461b2d374658a713763e18389474
SHA51254e50dded7c661c854a86a2b65899accc923c51e4fa44d463abdfc94e7e7412e6765b7feda81dc82fbf0eee49a08288defc56723da4ce3768f2187b887232eb1
-
C:\Program Files (x86)\Zoom\bin\ZoomOutlookIMPlugin.exeFilesize
581KB
MD58ec8a4e243853dea877d12266a88cfbf
SHA14f6129129c0cdda57d8232a2a10d7124d06d6762
SHA256cf8638536dd901843119c0b56cd4a61a46c3461b2d374658a713763e18389474
SHA51254e50dded7c661c854a86a2b65899accc923c51e4fa44d463abdfc94e7e7412e6765b7feda81dc82fbf0eee49a08288defc56723da4ce3768f2187b887232eb1
-
C:\Program Files (x86)\Zoom\bin\crashrpt_lang.iniFilesize
7KB
MD5fcf61aed8f093bfcf571cdd8f8162a05
SHA18de8177798aae82d5bcc0870c1ca5365f5d9966d
SHA2561f5b45a5411f7fc71b9da789d6d1ead8ad30551fbea7bbb40fc7ea576d581abb
SHA5128a5d252d115f868a4e20fce10f9f9ec5f3948f0ad5680d656e0eba1fd167d36889e54c6e59bcde756945f93685401b825ba9dd7243d907d74b58a1d826609d72
-
C:\Program Files (x86)\Zoom\bin\libcrypto-1_1.dllFilesize
2.5MB
MD5a97d2029f96df8bb27b22c00d84f7900
SHA1cdbb1c2fa62f8c9ee9027335cb64a527a79b46ca
SHA256606bea4c0de0ad49486774990e3590de06d8bc6da366d6d0cb74aebf8573ffca
SHA512b5353b73cb9279e62aaafa4a5912a9fe127e039bd2f07a5e23100462445e74112f40f7aa157aa6593e970dab2e85000eff386cf25f4ee84449517ca8eaa2305e
-
C:\Program Files (x86)\Zoom\bin\libcrypto-1_1.dllFilesize
2.5MB
MD5a97d2029f96df8bb27b22c00d84f7900
SHA1cdbb1c2fa62f8c9ee9027335cb64a527a79b46ca
SHA256606bea4c0de0ad49486774990e3590de06d8bc6da366d6d0cb74aebf8573ffca
SHA512b5353b73cb9279e62aaafa4a5912a9fe127e039bd2f07a5e23100462445e74112f40f7aa157aa6593e970dab2e85000eff386cf25f4ee84449517ca8eaa2305e
-
C:\Program Files (x86)\Zoom\bin\msvcp140.dllFilesize
440KB
MD5e0dd94aada0b034b212de071c33054da
SHA16c4f1b3f66d07bbcdcf41eb39b1480bb335efcc8
SHA25608442853f19ce4ff3acae37d87eab33ef81c4c6da62a3432d43253ba79842b64
SHA51276c877056f448e5dab820e990cc186ba886b2d331d689a99295aaff31a63aadb941c2693b0be98d53bd06cd8041a270eb82ddedfbde305cd9a85bcbe42fcf5a2
-
C:\Program Files (x86)\Zoom\bin\msvcp140.dllFilesize
440KB
MD5e0dd94aada0b034b212de071c33054da
SHA16c4f1b3f66d07bbcdcf41eb39b1480bb335efcc8
SHA25608442853f19ce4ff3acae37d87eab33ef81c4c6da62a3432d43253ba79842b64
SHA51276c877056f448e5dab820e990cc186ba886b2d331d689a99295aaff31a63aadb941c2693b0be98d53bd06cd8041a270eb82ddedfbde305cd9a85bcbe42fcf5a2
-
C:\Program Files (x86)\Zoom\bin\msvcp140.dllFilesize
440KB
MD5e0dd94aada0b034b212de071c33054da
SHA16c4f1b3f66d07bbcdcf41eb39b1480bb335efcc8
SHA25608442853f19ce4ff3acae37d87eab33ef81c4c6da62a3432d43253ba79842b64
SHA51276c877056f448e5dab820e990cc186ba886b2d331d689a99295aaff31a63aadb941c2693b0be98d53bd06cd8041a270eb82ddedfbde305cd9a85bcbe42fcf5a2
-
C:\Program Files (x86)\Zoom\bin\ucrtbase.dllFilesize
1.1MB
MD52040cdcd779bbebad36d36035c675d99
SHA1918bc19f55e656f6d6b1e4713604483eb997ea15
SHA2562ad9a105a9caa24f41e7b1a6f303c07e6faeceaf3aaf43ebd644d9d5746a4359
SHA51283dc3c7e35f0f83e1224505d04cdbaee12b7ea37a2c3367cb4fccc4fff3e5923cf8a79dd513c33a667d8231b1cc6cfb1e33f957d92e195892060a22f53c7532f
-
C:\Program Files (x86)\Zoom\bin\ucrtbase.dllFilesize
1.1MB
MD52040cdcd779bbebad36d36035c675d99
SHA1918bc19f55e656f6d6b1e4713604483eb997ea15
SHA2562ad9a105a9caa24f41e7b1a6f303c07e6faeceaf3aaf43ebd644d9d5746a4359
SHA51283dc3c7e35f0f83e1224505d04cdbaee12b7ea37a2c3367cb4fccc4fff3e5923cf8a79dd513c33a667d8231b1cc6cfb1e33f957d92e195892060a22f53c7532f
-
C:\Program Files (x86)\Zoom\bin\vcruntime140.dllFilesize
74KB
MD587dd91c56be82866bf96ef1666f30a99
SHA13b78cb150110166ded8ea51fbde8ea506f72aeaf
SHA25649b0fd1751342c253cac588dda82ec08e4ef43cebc5a9d80deb7928109b90c4f
SHA51258c3ec6761624d14c7c897d8d0842dbeab200d445b4339905dac8a3635d174cdfb7b237d338d2829bc6c602c47503120af5be0c7de6abf2e71c81726285e44d6
-
C:\Program Files (x86)\Zoom\bin\vcruntime140.dllFilesize
74KB
MD587dd91c56be82866bf96ef1666f30a99
SHA13b78cb150110166ded8ea51fbde8ea506f72aeaf
SHA25649b0fd1751342c253cac588dda82ec08e4ef43cebc5a9d80deb7928109b90c4f
SHA51258c3ec6761624d14c7c897d8d0842dbeab200d445b4339905dac8a3635d174cdfb7b237d338d2829bc6c602c47503120af5be0c7de6abf2e71c81726285e44d6
-
C:\Program Files (x86)\Zoom\bin\vcruntime140.dllFilesize
74KB
MD587dd91c56be82866bf96ef1666f30a99
SHA13b78cb150110166ded8ea51fbde8ea506f72aeaf
SHA25649b0fd1751342c253cac588dda82ec08e4ef43cebc5a9d80deb7928109b90c4f
SHA51258c3ec6761624d14c7c897d8d0842dbeab200d445b4339905dac8a3635d174cdfb7b237d338d2829bc6c602c47503120af5be0c7de6abf2e71c81726285e44d6
-
C:\Program Files (x86)\Zoom\bin\zCrashReport.dllFilesize
97KB
MD5f82f0a3932e73d4f6973632d42c0f296
SHA19a59389cc938121a5941a589fc4b66a7d65af7e3
SHA256aab43f8a9ab37b205e651ac629404ee8dbbc9bf0b4fee85b422275406a1c2572
SHA51297a098112f448362bd677f2991243b8b024d37f03adf7facdb0601639bc0fb9ca99945bc08d8eca580903120c0a6de7a35106984500207a3c5562a34dbc37ea9
-
C:\Program Files (x86)\Zoom\bin\zCrashReport.dllFilesize
97KB
MD5f82f0a3932e73d4f6973632d42c0f296
SHA19a59389cc938121a5941a589fc4b66a7d65af7e3
SHA256aab43f8a9ab37b205e651ac629404ee8dbbc9bf0b4fee85b422275406a1c2572
SHA51297a098112f448362bd677f2991243b8b024d37f03adf7facdb0601639bc0fb9ca99945bc08d8eca580903120c0a6de7a35106984500207a3c5562a34dbc37ea9
-
C:\Program Files (x86)\Zoom\bin\zCrashReport.dllFilesize
97KB
MD5f82f0a3932e73d4f6973632d42c0f296
SHA19a59389cc938121a5941a589fc4b66a7d65af7e3
SHA256aab43f8a9ab37b205e651ac629404ee8dbbc9bf0b4fee85b422275406a1c2572
SHA51297a098112f448362bd677f2991243b8b024d37f03adf7facdb0601639bc0fb9ca99945bc08d8eca580903120c0a6de7a35106984500207a3c5562a34dbc37ea9
-
C:\Program Files (x86)\Zoom\bin\zCrashReport.exeFilesize
219KB
MD597042fb62a7ef502dcd1bc96bc490e28
SHA11d1f822fe6095660c9bcae225d110298ab3be32e
SHA25652089b799c309f023b8d58b703302c3165bc4c680ea8135cb18d7fabc0d42c1c
SHA512916a1f34871aec9433605bb8a3b208018df30d0e5fdbb935566793523b5b9281d7ac4c1a94932541267a0b4bdb3b71a1f389ce48f7e5a90838d58fd351921bd1
-
C:\Program Files (x86)\Zoom\bin\zOutlookIMUtil.dllFilesize
474KB
MD56934de614ca4dd452966e086bea3ead0
SHA17c5ca8e69cd685dffa4537285ec601bc760e11c9
SHA256a81057faa8bd295d0708a34c1879ad5abd4a46ac82a322b7027c027de0439451
SHA5122ddee6238212d190ccfe4cd06c5a77c9c5c956e6a8f733a1781ace2f4db3457a2e38295aba6469a2e8e12957fb435fcb514de5f4516fb2dcbd005f58bd4d9d60
-
C:\Program Files (x86)\Zoom\resources\emojione_low.7zFilesize
7.4MB
MD54d4920bf542c67be8e85249faf9bb89e
SHA13ae7e5ae51179056c61487902534336c1996a807
SHA256ed3419d21d69fd71d2133bfcf83732215f4c65eb547ef73107cb98d03e86cd2f
SHA512402e878f8976cc4c59264ad5ece9bd8a6c6d371103626d6d0f65b55a0d6139eaa1f0a74c1f63149d158de267467b3cd124038d9447808646a8350736a5e9bc9d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\2A7611428D62805A3E4E5BC4103D82E4_5DFDB51029B86E246C6BBA4B4F208E9AFilesize
471B
MD5f0f7cd911d7e7c3dc915351bc06edef0
SHA11729adad82ab85b25dce032aea7bb4e93efa53e8
SHA2564775cbed5bbe53134bda096b85b581e9485489d02812584d9debfb216f953753
SHA5122a382572f51e9eb95c28aa54b22f8155faf4412093318973d2b6ee02a285408b46c1cacb6a60d4c261f977130fb452990f1f3d657c12bf76c7ec12dce0c1a11f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEBFilesize
471B
MD5da5a9f149955d936a31dc5e456666aac
SHA1195238d41c1e13448f349f43bb295ef2d55cb47a
SHA25679ac574c7c45144bb35b59ff79c78dc59b66592715dea01b389e3620db663224
SHA51260d7d1f5405470ba1e6b80066af2e78240acbea8db58b5a03660874605178aebaa9ce342ca97f17798109e7411e82466db5af064e39eaddc05410f2abe672f77
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_8DBAD5A433D1F9275321E076E8B744D4Filesize
727B
MD5122b90328c94726c5fe68b7001a35138
SHA10175b4bcf5cfc168533679893b33fe9b2cc2fff6
SHA2560961b792fd8f901f4d06078177e1dd647e9185841039ded27c9c07b925423e92
SHA512ae26da520cb9569e82cd4ac9c0d0a71ad525f4f6be7a23c9b9859708c7d24836fc188ddd27eaf84a548252911303d5a5951ea714d725d98b5713105eb153979e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D9CB7DFFEEA63BAB482BD2705E7E24AB_C5076ACD41E9D9741BBEE5F165E53636Filesize
727B
MD5c80785cd4724e77f0d6e17d78594661d
SHA165fa773b69ed87a66601bfe723e35ab7bd8c468c
SHA2566f3ea41ed01bd887de0f143079db4f4c072cd70601b607df9fd5ca8b487c5118
SHA512bffd04aa86c8088e40d462997c1d6964f7b6bf80084f0a76dd133850f15a44f13f241f9dedfd41b2ae2c19e82a1c58a7dea073e19bae66238147644574c2adc4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\2A7611428D62805A3E4E5BC4103D82E4_5DFDB51029B86E246C6BBA4B4F208E9AFilesize
430B
MD5c00e899f5f821ed0a191e95e3f4acf10
SHA1c2d20478eadae0e99048e2e98ef004f58ea54e04
SHA256ea258dcc4dc89732adc8fd6800566aa4a965c11c65f314b33d3b704be35faf1e
SHA512ab226e11e4609d71eb4f640904827a752602f021d42891f4bb0460effd57259608a3daef49902bd2ed6bea864a99f6af423d5b23a392d4bf926f709758e05809
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEBFilesize
400B
MD5689fa17706b88f0402a809acf30bb170
SHA1b593edf5eb3d72fce25fafd8e677a574e080329e
SHA2569cf601d33d8f178bace5de0fa16a69e3edfdde98e566907933e8a9c5cc1699e8
SHA512bf6355bec83fcbdd2a8fd20654acfbcca4b0933afd9b49c1c35d5427c05798ee48b18cee78997eafe82d98e7ce9e0656b2cdc4926a468e86d7b5fafd1e196936
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_8DBAD5A433D1F9275321E076E8B744D4Filesize
446B
MD547d60d6b36032e31a99f7891eccbd41c
SHA1ed2b16a8111446ecb4a5f77b41494908e4c0298b
SHA256ebd27fe53cb57aed1e88736bbe8a44c543b6b707da85b7d67799dce711703ce9
SHA512501a18cf3e8758adef471d32e6eeb515c9d13ccab29d1965d5c8c653aa464cfa0c8526bbcb1f2186689dd1aca79ea9d969ec535ad971440d01a3392bc7d04f75
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\D9CB7DFFEEA63BAB482BD2705E7E24AB_C5076ACD41E9D9741BBEE5F165E53636Filesize
408B
MD5df93ee75baed74363ea99fc9265fba22
SHA1f2b3a8f34ee69ae3ea60159df688ee356604fe66
SHA256aeb2073caffb95abb306d4ffbef15c5a3597b592f685c7ac0c24c6645a9a2668
SHA5126d586e674fed76f41caff05af4645b8a671645456575b8a6c12ba0b1c7455837d142edded2081d3c41f66cfa4c42362e98707bfdc1b43354f013431c671575d3
-
C:\Users\Admin\AppData\Local\Temp\ikm.msiFilesize
75.1MB
MD5f7f764ed7be9356b85c73462542b36c3
SHA1e0a67fa1d899d464ec6a268dcfb1b14de172c582
SHA256839c1a8a906bd0bce47262a904708ed58eb832a1acae917ecd758ab5a01f3234
SHA512fafa807291c19bac4da510edc5ccea607b77b0220c5c9090d1eb5a7c3a022f67c113bdf51ef13bc6af830ae3843ca4ea53d96a033fc5aae9714a8708e068b45c
-
C:\Users\Admin\AppData\Local\Temp\maker.dllFilesize
1.3MB
MD5c97d41e563c07d771cd661533ad4ede7
SHA1739ec4cca4ca4204848798c39092d507f0902895
SHA2563c9cd4cf008ed70df41cc270c77055f6edac139ec7ec2a9c3de1b21c1a294ca7
SHA512f3f764be1e1080de02f443c17ddfa1c90750b77e2852dee9dc0dac35bf8a53dd13576a02dc8d0abb0eed04c0fd4702b8e62be4dc214ba2e58dbc55b25f72351d
-
C:\Users\Admin\AppData\Local\Temp\maker.dllFilesize
1.3MB
MD5c97d41e563c07d771cd661533ad4ede7
SHA1739ec4cca4ca4204848798c39092d507f0902895
SHA2563c9cd4cf008ed70df41cc270c77055f6edac139ec7ec2a9c3de1b21c1a294ca7
SHA512f3f764be1e1080de02f443c17ddfa1c90750b77e2852dee9dc0dac35bf8a53dd13576a02dc8d0abb0eed04c0fd4702b8e62be4dc214ba2e58dbc55b25f72351d
-
\??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2Filesize
23.0MB
MD5ef010151a4773a56d5d948c05f0493eb
SHA1d8dbf334a42dd4455c36ecbe63a49bd59f6171dc
SHA256851dbf004318796d7cbe8ae6a73674737e90b9d41ddb5d810e3d1a3d4e38bc0c
SHA512b096faa6a2b10f58665e2f1f3ebdbc0237bbe80e81c2c75fdfcb8cb6637aa1cc9717043a54ee881420e7a64927c62638471bca502dc63028fccfcc1d887be10c
-
\??\Volume{5d2b4a7c-0000-0000-0000-d01200000000}\System Volume Information\SPP\OnlineMetadataCache\{0d06c181-922a-4fde-a1ce-69c14223e546}_OnDiskSnapshotPropFilesize
5KB
MD5fec45fcb996c0535aa16867f3d0d8254
SHA1e0d6c65205a20dd59c2c9d047e4dcc03480a853c
SHA256cd1ba633e668ffe291e85de13bca69ec243d6fd35940b253f0d17e6f4157ab45
SHA512d04e00c93871afc22227e8c9bfa1dae8475b41a58e0cf4d1509bdd3b25c06d1d0d5bba684eb7ee84c09917938ede9ec821561518d31156dfa66a89c5a4af36e4
-
memory/1324-187-0x0000000000000000-mapping.dmp
-
memory/2436-132-0x0000000000000000-mapping.dmp
-
memory/2436-135-0x0000000180000000-0x0000000180009000-memory.dmpFilesize
36KB
-
memory/2712-156-0x0000000000000000-mapping.dmp
-
memory/3584-152-0x0000000000000000-mapping.dmp
-
memory/3600-141-0x0000000000000000-mapping.dmp
-
memory/4424-143-0x0000000000000000-mapping.dmp