File name:

Multiple_ROBLOX.exe

Full analysis: https://app.any.run/tasks/7b6193f0-43ea-48e6-8d74-bba3a7e604db
Verdict: Malicious activity
Analysis date: November 26, 2023, 09:47:03
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
MD5:

AED655395747A6602479F6032D3C099F

SHA1:

5FCBD5735ED0E4A013667652F4C1382ABB45203A

SHA256:

3D6123DC6FFBD1A11D73229988203052809BD17617B24A034C1122C8F4983DB4

SSDEEP:

6144:PIUUUFEiCVrw4RVJsp0oFP+dkM+i1g0UhCVrw4RuJsp0oFP+dkM+i1g0Uc:PB3gWCEBg5CE8

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • CCleaner.exe (PID: 3072)
    • Actions looks like stealing of personal data

      • CCleaner.exe (PID: 3072)
    • Steals credentials from Web Browsers

      • CCleaner.exe (PID: 3072)
  • SUSPICIOUS

    • Application launched itself

      • CCleaner.exe (PID: 2848)
    • Reads the Internet Settings

      • CCleaner.exe (PID: 2848)
      • CCleaner.exe (PID: 3072)
    • Checks Windows Trust Settings

      • CCleaner.exe (PID: 3072)
    • Reads Internet Explorer settings

      • CCleaner.exe (PID: 3072)
    • Reads security settings of Internet Explorer

      • CCleaner.exe (PID: 3072)
    • Reads settings of System Certificates

      • CCleaner.exe (PID: 3072)
    • Reads Microsoft Outlook installation path

      • CCleaner.exe (PID: 3072)
    • Searches for installed software

      • CCleaner.exe (PID: 3072)
  • INFO

    • Reads the machine GUID from the registry

      • Multiple_ROBLOX.exe (PID: 2876)
      • CCleaner.exe (PID: 3072)
      • wmpnscfg.exe (PID: 1380)
    • Reads the computer name

      • Multiple_ROBLOX.exe (PID: 2876)
      • CCleaner.exe (PID: 3072)
      • CCleaner.exe (PID: 2848)
      • wmpnscfg.exe (PID: 1380)
    • Checks supported languages

      • Multiple_ROBLOX.exe (PID: 2876)
      • CCleaner.exe (PID: 3072)
      • CCleaner.exe (PID: 2848)
      • wmpnscfg.exe (PID: 1380)
    • Reads Environment values

      • CCleaner.exe (PID: 2848)
      • CCleaner.exe (PID: 3072)
    • Manual execution by a user

      • CCleaner.exe (PID: 2848)
      • wmpnscfg.exe (PID: 1380)
    • Reads CPU info

      • CCleaner.exe (PID: 3072)
    • Reads product name

      • CCleaner.exe (PID: 3072)
    • Creates files in the program directory

      • CCleaner.exe (PID: 3072)
    • Checks proxy server information

      • CCleaner.exe (PID: 3072)
    • Creates files or folders in the user directory

      • CCleaner.exe (PID: 3072)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (82.9)
.dll | Win32 Dynamic Link Library (generic) (7.4)
.exe | Win32 Executable (generic) (5.1)
.exe | Generic Win/DOS Executable (2.2)
.exe | DOS Executable Generic (2.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2017:12:07 04:55:10+01:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32
LinkerVersion: 48
CodeSize: 409088
InitializedDataSize: 372736
UninitializedDataSize: -
EntryPoint: 0x65cfe
OSVersion: 4
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: Multiple ROBLOX
FileVersion: 1.0.0.0
InternalName: Multiple ROBLOX.exe
LegalCopyright: Copyright © 2016
LegalTrademarks: -
OriginalFileName: Multiple ROBLOX.exe
ProductName: Multiple ROBLOX
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
4
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start multiple_roblox.exe no specs ccleaner.exe no specs ccleaner.exe wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1380"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\ole32.dll
2848"C:\Program Files\CCleaner\CCleaner.exe" C:\Program Files\CCleaner\CCleaner.exeexplorer.exe
User:
admin
Company:
Piriform Software Ltd
Integrity Level:
MEDIUM
Description:
CCleaner
Exit code:
0
Version:
6.14.0.10584
Modules
Images
c:\program files\ccleaner\ccleaner.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\nsi.dll
c:\windows\system32\advapi32.dll
2876"C:\Users\admin\AppData\Local\Temp\Multiple_ROBLOX.exe" C:\Users\admin\AppData\Local\Temp\Multiple_ROBLOX.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Multiple ROBLOX
Exit code:
0
Version:
1.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\multiple_roblox.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
3072"C:\Program Files\CCleaner\CCleaner.exe" /uacC:\Program Files\CCleaner\CCleaner.exe
CCleaner.exe
User:
admin
Company:
Piriform Software Ltd
Integrity Level:
HIGH
Description:
CCleaner
Exit code:
0
Version:
6.14.0.10584
Modules
Images
c:\program files\ccleaner\ccleaner.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\nsi.dll
c:\windows\system32\advapi32.dll
Total events
16 115
Read events
15 941
Write events
121
Delete events
53

Modification events

(PID) Process:(2848) CCleaner.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2848) CCleaner.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2848) CCleaner.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2848) CCleaner.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(3072) CCleaner.exeKey:HKEY_CURRENT_USER\Software\Piriform\CCleaner
Operation:writeName:DAST
Value:
07/06/2023 15:07:35
(PID) Process:(3072) CCleaner.exeKey:HKEY_CURRENT_USER\Software\Piriform\CCleaner
Operation:writeName:T8062
Value:
1
(PID) Process:(3072) CCleaner.exeKey:HKEY_CURRENT_USER\Software\Piriform\CCleaner
Operation:writeName:UpdateBackground
Value:
0
(PID) Process:(3072) CCleaner.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\17F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3072) CCleaner.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SystemRestore
Operation:writeName:SystemRestorePointCreationFrequency
Value:
0
(PID) Process:(3072) CCleaner.exeKey:HKEY_CURRENT_USER\Software\Piriform\CCleaner
Operation:writeName:FTU
Value:
02/11/2020|9|1
Executable files
3
Suspicious files
26
Text files
10
Unknown types
0

Dropped files

PID
Process
Filename
Type
3072CCleaner.exeC:\Program Files\CCleaner\gcapi_17009920493072.dllexecutable
MD5:F637D5D3C3A60FDDB5DD397556FE9B1D
SHA256:641B843CB6EE7538EC267212694C9EF0616B9AC9AB14A0ABD7CF020678D50B02
3072CCleaner.exeC:\Program Files\CCleaner\gcapi_dll.dllexecutable
MD5:F637D5D3C3A60FDDB5DD397556FE9B1D
SHA256:641B843CB6EE7538EC267212694C9EF0616B9AC9AB14A0ABD7CF020678D50B02
3072CCleaner.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ed7a5cc3cca8d52a.customDestinations-ms~RF1c30ac.TMPbinary
MD5:DA39F131D86385E1285BF5489BA6B6F9
SHA256:38C92C3B93D15CCF2E5E59D01D223366D60FF508037EF997C0CDCC11CEC8BAD0
3072CCleaner.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\18VVYN75K3Z0N7P80YUH.tempbinary
MD5:66A01DAA2E03B7F3BC291204D8D4C5EC
SHA256:3F2B8DFA9B9C7E097536D2D10A1945A1D25E86B4AB6BAF0B34A58B122FF79BC8
3072CCleaner.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ed7a5cc3cca8d52a.customDestinations-msbinary
MD5:66A01DAA2E03B7F3BC291204D8D4C5EC
SHA256:3F2B8DFA9B9C7E097536D2D10A1945A1D25E86B4AB6BAF0B34A58B122FF79BC8
3072CCleaner.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04binary
MD5:E5FFACA852A94FE907093E4B1EC31775
SHA256:5DA1A9DB5F314BA719B889831EF5F7CD30B38D281FF2C36E78DE50B5D7CA8310
3072CCleaner.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CAF4703619713E3F18D8A9D5D88D6288_45E3C223BCF135987E4038FB6B0DBA13binary
MD5:037AE8164352CA91E80AD33054D1906D
SHA256:07C018EB07002663D5248DAA8A65EAF587955E3DB45735E7E3AC9CB13D7D664E
3072CCleaner.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C35FF021F54C8E12643FC011A0DD1864_4373F076AA98CFDF5460D564DECA51C0binary
MD5:E1B3336F8C0828C1A119DF604ED614B2
SHA256:5505CD43E9C335165AAB5114CC8DD2BCEE7DE682B9E0DA34C7ADA3C23AE28A93
3072CCleaner.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04binary
MD5:D9CB9BA8CA8A50EDD32452F08C0031A8
SHA256:1CE6A2895E80D095F37D0BD79DB38CC4FA7BC1E38F02F0DA7D348C7FE550EEC0
3072CCleaner.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\24BD96D5497F70B3F510A6B53CD43F3E_3A89246FB90C5EE6620004F1AE0EB0EAbinary
MD5:0308FF4ECC619627CEDBA50F591845A5
SHA256:0C370432B5083BD7F3037B1A09FBA3A610F6BF6A73EB3D23E6207D8621FC8E64
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
16
TCP/UDP connections
22
DNS requests
14
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3072
CCleaner.exe
GET
200
2.22.242.105:80
http://ncc.avast.com/ncc.txt
unknown
text
26 b
unknown
3072
CCleaner.exe
GET
200
8.241.122.254:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?3a66026fd093380d
unknown
compressed
4.66 Kb
unknown
3072
CCleaner.exe
GET
200
8.241.122.254:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?4008a18164441107
unknown
compressed
4.66 Kb
unknown
3072
CCleaner.exe
GET
200
8.241.122.254:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?06ca94e53c833f00
unknown
compressed
4.66 Kb
unknown
3072
CCleaner.exe
GET
200
8.241.122.254:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?c22e6b2005d70fb1
unknown
compressed
4.66 Kb
unknown
3072
CCleaner.exe
GET
200
142.250.186.67:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
unknown
binary
1.41 Kb
unknown
3072
CCleaner.exe
GET
200
192.229.221.95:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAbY2QTVWENG9oovp1QifsQ%3D
unknown
binary
471 b
unknown
3072
CCleaner.exe
GET
200
142.250.186.67:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIAjrICMzZli2TN25s%3D
unknown
binary
724 b
unknown
1080
svchost.exe
GET
304
8.241.122.254:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?20da42ca9bb40799
unknown
unknown
3072
CCleaner.exe
GET
200
142.250.186.67:80
http://ocsp.pki.goog/s/gts1d4/HCBR1rPY_zA/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBSMBFDqU0NJQdZdEGU3bkhj0FoRrQQUJeIYDrJXkZQq5dRdhpCD3lOzuJICEQCuJrycnyDuAAkjSCsH18s3
unknown
binary
472 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1080
svchost.exe
224.0.0.252:5355
unknown
2588
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
3072
CCleaner.exe
2.22.242.105:80
ncc.avast.com
Akamai International B.V.
DE
unknown
3072
CCleaner.exe
34.117.223.223:443
analytics.ff.avast.com
GOOGLE-CLOUD-PLATFORM
US
unknown
3072
CCleaner.exe
34.149.149.62:443
ip-info.ff.avast.com
GOOGLE
US
unknown
3072
CCleaner.exe
34.111.24.1:443
ipm-provider.ff.avast.com
GOOGLE
US
unknown
3072
CCleaner.exe
34.160.176.28:443
shepherd.ff.avast.com
GOOGLE
US
unknown
3072
CCleaner.exe
23.35.237.21:443
www.ccleaner.com
AKAMAI-AS
DE
unknown

DNS requests

Domain
IP
Reputation
ncc.avast.com
  • 2.22.242.105
  • 2.22.242.9
whitelisted
analytics.ff.avast.com
  • 34.117.223.223
whitelisted
www.ccleaner.com
  • 23.35.237.21
whitelisted
ipm-provider.ff.avast.com
  • 34.111.24.1
whitelisted
ip-info.ff.avast.com
  • 34.149.149.62
whitelisted
shepherd.ff.avast.com
  • 34.160.176.28
whitelisted
ctldl.windowsupdate.com
  • 8.241.122.254
  • 8.253.204.120
  • 67.26.81.254
  • 67.26.137.254
  • 67.27.235.126
whitelisted
ocsp.digicert.com
  • 192.229.221.95
whitelisted
ocsp.pki.goog
  • 142.250.186.67
whitelisted
ipmcdn.avast.com
  • 104.102.46.251
whitelisted

Threats

No threats detected
Process
Message
CCleaner.exe
[2023-11-26 09:47:29.203] [error ] [settings ] [ 3072: 824] [6000C4: 356] Failed to get program directory Exception: Unable to determine program folder of product 'piriform-cc'! Code: 0x000000c0 (192)
CCleaner.exe
Failed to open log file 'C:\Program Files\CCleaner'
CCleaner.exe
OnLanguage - en
CCleaner.exe
[2023-11-26 09:47:29.891] [error ] [settings ] [ 3072: 3188] [9434E9: 359] Failed to get program directory Exception: Unable to determine program folder of product 'piriform-cc'! Code: 0x000000c0 (192)
CCleaner.exe
[2023-11-26 09:47:29.906] [error ] [Burger ] [ 3072: 3188] [FDA25D: 244] [23.1.806.0] [BurgerReporter.cpp] [244] asw::standalone_svc::BurgerReporter::BurgerSwitch: Could not read property BURGER_SETTINGS_PANCAKE_HOSTNAME (0x00000003)
CCleaner.exe
[2023-11-26 09:47:29.906] [error ] [Burger ] [ 3072: 3188] [FDA25D: 244] [23.1.806.0] [BurgerReporter.cpp] [244] asw::standalone_svc::BurgerReporter::BurgerSwitch: Could not read property BURGER_SETTINGS_PANCAKE_HOSTNAME (0x00000003)
CCleaner.exe
OnLanguage - en
CCleaner.exe
startCheckingLicense()
CCleaner.exe
OnLanguage - en
CCleaner.exe
OnLanguage - en