URL:

https://bitbucket.org/ccleaners/ccleaner/downloads/CCleaner.zip

Full analysis: https://app.any.run/tasks/28ce629e-ed17-4535-8cb1-3a0af3741fe7
Verdict: Malicious activity
Analysis date: January 22, 2024, 18:37:24
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MD5:

371E3EBBF2628043FFFA1E69B4798738

SHA1:

B39561B646B3A81D10C1B0FBC6AB86633323FB05

SHA256:

0F8A9A8E4832700467095EE4F0B86F8A37248404B93631599EECC9856F8D1E34

SSDEEP:

3:N8J+RoCJUTaJLJ4KRF:2J+rFhf

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • CCleaner.exe (PID: 2508)
    • Steals credentials from Web Browsers

      • CCleaner.exe (PID: 2508)
      • taskhost.exe (PID: 4064)
    • Actions looks like stealing of personal data

      • CCleaner.exe (PID: 2508)
  • SUSPICIOUS

    • Application launched itself

      • CCleaner.exe (PID: 1812)
    • Reads the Internet Settings

      • CCleaner.exe (PID: 1812)
      • CCleaner.exe (PID: 2508)
      • taskhost.exe (PID: 4064)
    • Reads Internet Explorer settings

      • CCleaner.exe (PID: 2508)
    • Executable content was dropped or overwritten

      • CCleaner.exe (PID: 2508)
    • Checks Windows Trust Settings

      • CCleaner.exe (PID: 2508)
    • Reads security settings of Internet Explorer

      • CCleaner.exe (PID: 2508)
    • Reads settings of System Certificates

      • CCleaner.exe (PID: 2508)
    • Executes as Windows Service

      • taskhost.exe (PID: 4064)
    • Searches for installed software

      • CCleaner.exe (PID: 2508)
    • Reads browser cookies

      • CCleaner.exe (PID: 2508)
  • INFO

    • Manual execution by a user

      • chrome.exe (PID: 1316)
    • Application launched itself

      • iexplore.exe (PID: 2044)
      • chrome.exe (PID: 1316)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3804)
      • chrome.exe (PID: 3372)
    • Reads the computer name

      • CCleaner.exe (PID: 1812)
      • CCleaner.exe (PID: 2508)
      • CCleanerBugReport.exe (PID: 316)
    • The process uses the downloaded file

      • chrome.exe (PID: 3660)
      • WinRAR.exe (PID: 3804)
    • Reads Environment values

      • CCleaner.exe (PID: 1812)
      • CCleaner.exe (PID: 2508)
    • Checks supported languages

      • CCleaner.exe (PID: 1812)
      • CCleaner.exe (PID: 2508)
      • CCleanerBugReport.exe (PID: 316)
      • wa_3rd_party_host_32.exe (PID: 3448)
    • Create files in a temporary directory

      • CCleaner.exe (PID: 2508)
    • Reads product name

      • CCleaner.exe (PID: 2508)
    • Reads CPU info

      • CCleaner.exe (PID: 2508)
      • CCleanerBugReport.exe (PID: 316)
    • Creates files or folders in the user directory

      • CCleaner.exe (PID: 2508)
      • taskhost.exe (PID: 4064)
    • Reads the machine GUID from the registry

      • CCleaner.exe (PID: 2508)
      • CCleanerBugReport.exe (PID: 316)
    • Checks proxy server information

      • CCleaner.exe (PID: 2508)
    • Drops the executable file immediately after the start

      • chrome.exe (PID: 3372)
      • WinRAR.exe (PID: 3804)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
77
Monitored processes
34
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
start iexplore.exe iexplore.exe chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs winrar.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs ccleaner.exe no specs ccleaner.exe taskhost.exe ccleanerbugreport.exe no specs chrome.exe wa_3rd_party_host_32.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
296"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:2044 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
316"C:\Users\admin\AppData\Local\Temp\Rar$EXa3804.41028\x86\CCleanerBugReport.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3804.41028\x86\CCleanerBugReport.exeWinRAR.exe
User:
admin
Company:
Piriform Software
Integrity Level:
MEDIUM
Description:
CCleaner Bug Report
Exit code:
0
Version:
1.0.0.1
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa3804.41028\x86\ccleanerbugreport.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\wtsapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
900"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=13 --mojo-platform-channel-handle=3656 --field-trial-handle=1172,i,8636192914619069930,3958311286003204342,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1196"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --disable-quic --mojo-platform-channel-handle=3352 --field-trial-handle=1172,i,8636192914619069930,3958311286003204342,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1316"C:\Program Files\Google\Chrome\Application\chrome.exe" "--disable-features=OptimizationGuideModelDownloading,OptimizationHintsFetching,OptimizationTargetPrediction,OptimizationHints"C:\Program Files\Google\Chrome\Application\chrome.exe
explorer.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1812"C:\Users\admin\AppData\Local\Temp\Rar$EXa3804.36043\CCleaner.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa3804.36043\CCleaner.exeWinRAR.exe
User:
admin
Company:
Piriform Software Ltd
Integrity Level:
MEDIUM
Description:
CCleaner
Exit code:
0
Version:
6.20.0.10897
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa3804.36043\ccleaner.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\nsi.dll
c:\windows\system32\advapi32.dll
1880"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2108 --field-trial-handle=1172,i,8636192914619069930,3958311286003204342,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1972"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win32 --annotation=prod=Chrome --annotation=ver=109.0.5414.120 --initial-client-data=0xc8,0xcc,0xd0,0x9c,0xd4,0x6e298b38,0x6e298b48,0x6e298b54C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
2044"C:\Program Files\Internet Explorer\iexplore.exe" "https://bitbucket.org/ccleaners/ccleaner/downloads/CCleaner.zip"C:\Program Files\Internet Explorer\iexplore.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
2312"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1112 --field-trial-handle=1172,i,8636192914619069930,3958311286003204342,131072 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
109.0.5414.120
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\109.0.5414.120\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
Total events
30 154
Read events
29 766
Write events
331
Delete events
57

Modification events

(PID) Process:(2044) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
0
(PID) Process:(2044) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30847387
(PID) Process:(2044) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30847437
(PID) Process:(2044) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2044) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2044) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2044) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2044) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2044) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2044) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
Executable files
316
Suspicious files
141
Text files
74
Unknown types
3

Dropped files

PID
Process
Filename
Type
296iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157compressed
MD5:1BFE591A4FE3D91B03CDF26EAACD8F89
SHA256:9CF94355051BF0F4A45724CA20D1CC02F76371B963AB7D1E38BD8997737B13D8
1316chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old~RFe1de4.TMP
MD5:
SHA256:
1316chrome.exeC:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
296iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62binary
MD5:509DD68B3F1B9DE153B413A7DF9F92DD
SHA256:6FAAC50DA3A987AEA44F7DA55C01AC3AB245512C46DF4D88249A1195F9190E2D
296iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:520852A0DDF78D6B50F5445445DBCE8B
SHA256:7BA42A6E2892818F4941763020D8D95A3448495A766461F6827D40D5C58AA589
296iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619binary
MD5:E49F4B13A18A9A6DF573B66FE494C83B
SHA256:D02EC0A11003BE02D682FA1EBC3B90981721FA3A923422E52CC6F2E3789F19A1
296iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\EDC238BFF48A31D55A97E1E93892934B_C31B2498754E340573F1336DE607D619binary
MD5:B54F58D139201BB3A3909916DA6630C2
SHA256:0F74ECFDE363B2DB5A7A5291D76A7CE15DAC938EE55EDEADCB4254FBF5DA3C69
296iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\75CA58072B9926F763A91F0CC2798706_B5D3A17E5BEDD2EDA793611A0A74E1E8binary
MD5:BC62B7EF2A63881E6E61BCD98E02D200
SHA256:807FDCE9E42A1789265C9AE2FFCB97EE298413CA3B6BEB17216E6CA1CFDF8423
296iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\D03E46CD585BBE111C712E6577BC5F07_95A4562DEA3FE449C14A6BEBAD97C213binary
MD5:285A97A6CD3321DBB005FABA3C959E97
SHA256:BB9C6B34C08F26107CF1765F732E3CE3B34AC43749E73D40146C31E50770F6BB
296iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\CCleaner[1].zipcompressed
MD5:F8E266D72F0F766AC8B53AAF91483B8D
SHA256:A08221575BDA9BFDE220EAD59043D211CDF33BAD662FCB5DE151D9CBBD93C114
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
75
TCP/UDP connections
60
DNS requests
62
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
856
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/j2hxfei2occ5siitujtlwgp6xi_3/ojhpjlocmbogdgmfpkhlaaeamibhnphh_3_all_gplutbkdljxxbjolk3siq7kive.crx3
unknown
binary
80.3 Kb
unknown
856
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/j2hxfei2occ5siitujtlwgp6xi_3/ojhpjlocmbogdgmfpkhlaaeamibhnphh_3_all_gplutbkdljxxbjolk3siq7kive.crx3
unknown
binary
10.1 Kb
unknown
856
svchost.exe
GET
206
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/j2hxfei2occ5siitujtlwgp6xi_3/ojhpjlocmbogdgmfpkhlaaeamibhnphh_3_all_gplutbkdljxxbjolk3siq7kive.crx3
unknown
binary
45.1 Kb
unknown
296
iexplore.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?08963e2848236aa7
unknown
compressed
4.66 Kb
unknown
296
iexplore.exe
GET
200
93.184.221.240:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?16e53a13f7f2d96f
unknown
compressed
4.66 Kb
unknown
296
iexplore.exe
GET
200
18.239.15.192:80
http://o.ss2.us//MEowSDBGMEQwQjAJBgUrDgMCGgUABBSLwZ6EW5gdYc9UaSEaaLjjETNtkAQUv1%2B30c7dH4b0W1Ws3NcQwg6piOcCCQCnDkpMNIK3fw%3D%3D
unknown
binary
2.02 Kb
unknown
296
iexplore.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTfqhLjKLEJQZPin0KCzkdAQpVYowQUsT7DaQP4v0cB1JgmGggC72NkK8MCEAx5qUSwjBGVIJJhX%2BJrHYM%3D
unknown
binary
471 b
unknown
296
iexplore.exe
GET
200
52.84.193.90:80
http://ocsp.rootg2.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBSIfaREXmfqfJR3TkMYnD7O5MhzEgQUnF8A36oB1zArOIiiuG1KnPIRkYMCEwZ%2FlEoqJ83z%2BsKuKwH5CO65xMY%3D
unknown
binary
1.49 Kb
unknown
296
iexplore.exe
GET
200
52.84.193.90:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwdzEjgLnWaIozse2b%2BczaaODg8%3D
unknown
binary
1.37 Kb
unknown
296
iexplore.exe
GET
200
18.238.246.206:80
http://ocsp.r2m01.amazontrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBShdVEFnSEQ0gG5CBtzM48cPMe9XwQUgbgOY4qJEhjl%2Bjs7UJWf5uWQE4UCEAttUCKs5pZVb8wIJ%2BugwJo%3D
unknown
binary
471 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
296
iexplore.exe
104.192.141.1:443
bitbucket.org
AMAZON-02
US
unknown
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
296
iexplore.exe
93.184.221.240:80
ctldl.windowsupdate.com
EDGECAST
GB
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
296
iexplore.exe
192.229.221.95:80
ocsp.digicert.com
EDGECAST
US
whitelisted
296
iexplore.exe
52.216.179.235:443
bbuseruploads.s3.amazonaws.com
AMAZON-02
US
unknown
296
iexplore.exe
18.239.15.192:80
o.ss2.us
US
unknown
296
iexplore.exe
52.84.193.90:80
ocsp.rootg2.amazontrust.com
AMAZON-02
US
unknown
296
iexplore.exe
18.238.246.206:80
ocsp.r2m01.amazontrust.com
US
unknown

DNS requests

Domain
IP
Reputation
bitbucket.org
  • 104.192.141.1
shared
ctldl.windowsupdate.com
  • 93.184.221.240
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
bbuseruploads.s3.amazonaws.com
  • 52.216.179.235
  • 54.231.166.65
  • 52.217.65.116
  • 52.216.220.9
  • 3.5.8.146
  • 16.182.74.57
  • 52.217.199.25
  • 52.217.192.57
  • 52.216.240.132
  • 16.182.42.1
  • 3.5.28.27
  • 3.5.28.113
  • 54.231.198.249
  • 52.217.117.57
  • 52.216.53.57
  • 52.217.196.113
shared
o.ss2.us
  • 18.239.15.192
  • 18.239.15.174
  • 18.239.15.186
  • 18.239.15.14
whitelisted
ocsp.rootg2.amazontrust.com
  • 52.84.193.90
whitelisted
ocsp.rootca1.amazontrust.com
  • 52.84.193.90
shared
ocsp.r2m01.amazontrust.com
  • 18.238.246.206
whitelisted
clientservices.googleapis.com
  • 142.250.184.195
whitelisted
accounts.google.com
  • 173.194.76.84
shared

Threats

No threats detected
Process
Message
CCleaner.exe
[2024-01-22 18:41:22.260] [error ] [settings ] [ 2508: 2836] [000000: 0] Failed to get program directory Exception: Unable to determine program folder of product 'piriform-cc'! Code: 0x000000c0 (192)
CCleaner.exe
[2024-01-22 18:41:22.260] [error ] [ini_access ] [ 2508: 2836] [000000: 0] Incorrect ini_accessor configuration! Fixing relative input path to avoid recursion. Input was: Setup
CCleaner.exe
Failed to open log file 'C:\Users\admin\AppData\Local\Temp\Rar$EXa3804.36043'
CCleaner.exe
[2024-01-22 18:41:22.573] [error ] [lil ] [ 2508: 2836] [000000: 0] ~/ZIeepDOOIKB77M+twVIhby3C3qK2j6Oz+zmOa0CQcL9uBZwmdU5goHtryC7RQ==
CCleaner.exe
[2024-01-22 18:41:22.573] [error ] [LifBurger ] [ 2508: 2836] [000000: 0] Failed to send burger event Exception: Event Manager: Using of uninitialized Global event manager
CCleaner.exe
[2024-01-22 18:41:22.573] [error ] [lil ] [ 2508: 2836] [000000: 0] ~sroNZ9z+MoTE+7IlsQUVhZu1Fn+Z32qTzquhKapLScyxsV9kjtI+goH/ryG7Swjm54gqYJnJObvA76slsDdu1a2QHmed5waIwuqqEIoOQtWBhh5h2P4ShpKz9njwWBmV6ecjUL/XL4bP7rRisgJMgtf0XzPcm2rHgavmbP5LD4X99F8z3Jtqx4Gr5mz+Sw+F/fRfM9ybaseBq+Zs/ksPhf30XzPcm2rHgavmbP5LD4X9lxB3mYFq19m79nzuWx+V7/RXIdU=
CCleaner.exe
[2024-01-22 18:41:22.573] [error ] [LifBurger ] [ 2508: 2836] [000000: 0] Failed to send burger event Exception: Event Manager: Using of uninitialized Global event manager
CCleaner.exe
[2024-01-22 18:41:22.573] [error ] [lil ] [ 2508: 2836] [000000: 0] ~/ZEHcJnLPo7O5fxsmApGybiwX2eTmy2C1augJbIOD9KvvQt23M8jisSr4Q/kN3rWuKYMT53fJ47P14c8ri9O0byIM3yf2ia79e6rPII5Ttf5kSdyz4N604+48HzqWHPmnrgacpLeOMnN4qVr1EsPhf30XzPcm2rHgavmbP5LD4X99F8z3Jtqx4Gr5mz+Sw+F/fRfM9ybaseBq+Zs/ksPhf30XzPcm2rHgavmbP4oQMG47l8jhIt615G79nzsSweX9A==
CCleaner.exe
[2024-01-22 18:41:22.573] [error ] [lil ] [ 2508: 2836] [000000: 0] ~tbUNZdz+MoTE+7IlsQUVhZu1Fn+Z32qTzquhKapLScyxsV9kjtI+goH/ryG7Swjm54gqYJnJObvA76slsDdu1a2QHmed5waIwuqqEIoOQtWBhh5h2P4ShpKz9njwWBmV6ecjUL/XL4bP7rRisgJMgtf0XzPcm2rHgavmbP5LD4X99F8z3Jtqx4Gr5mz+Sw+F/fRfM9ybaseBq+Zs/ksPhf30XzPcm2rHgavmbP5LD4X9lxB3mYFq19m79nzuWx+V7/RXIdU=
CCleaner.exe
[2024-01-22 18:41:22.573] [error ] [lil ] [ 2508: 2836] [000000: 0] ~/ZEHcJnLPo7O5fxsmApGybiwX2eTmy2C1augJbIOD9KvvQt23M8jisSr4Q/kN3rWuKYMT53fJ47P14c8ri9O0byIM3yf2ia79e6rPII5Ttf5kSdyz4N604+48HzqWHPmnrgacpLeOMnN4qVr1EsPhf30XzPcm2rHgavmbP5LD4X99F8z3Jtqx4Gr5mz+Sw+F/fRfM9ybaseBq+Zs/ksPhf30XzPcm2rHgavmbP4oQMG47l8jhIt615G79nzsSweX9A==