File name:

46e562e1967e51d3baac23012260c37f4999937fc319ec3868fb832ef0a7e374.bin.exe

Full analysis: https://app.any.run/tasks/8ae08534-48b2-4dc6-ac5c-b46c391ae0ae
Verdict: Malicious activity
Threats:

GCleaner is a type of malware loader that has the capability to deliver numerous malicious software programs, which differ based on the location of the targeted victim. This malware is commonly spread through fraudulent websites that advertise free PC optimization tools

Analysis date: August 01, 2025, 04:38:17
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
gcleaner
loader
auto
lumma
stealer
autoit
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 8 sections
MD5:

9D896D5131C143727CD241F55D51BAFD

SHA1:

C5A7A56CCE10ADC1F21AE5DAE30945345787885E

SHA256:

46E562E1967E51D3BAAC23012260C37F4999937FC319EC3868FB832EF0A7E374

SSDEEP:

98304:M/f8u23l6iLEe5vY5am5DkTTfgXn1Og71h7Ag1iUrBpvBYANUAqQAtcDwe97A50h:FkBOa

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • LUMMA has been found (auto)

      • svchost015.exe (PID: 6492)
    • LUMMA mutex has been found

      • tviwTDgLQOO.exe (PID: 2296)
      • MUSWsS12rwt.exe (PID: 6368)
    • GCLEANER has been detected (YARA)

      • svchost015.exe (PID: 6492)
    • Steals credentials from Web Browsers

      • tviwTDgLQOO.exe (PID: 2296)
    • Actions looks like stealing of personal data

      • tviwTDgLQOO.exe (PID: 2296)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 46e562e1967e51d3baac23012260c37f4999937fc319ec3868fb832ef0a7e374.bin.exe (PID: 6656)
      • 6BLxsOUpv6L.exe (PID: 2388)
      • shPLP1rDI.exe (PID: 7056)
      • ERRSPzEwUVO1.exe (PID: 6812)
      • svchost015.exe (PID: 6492)
      • ExJQKVva3.exe (PID: 2728)
    • There is functionality for taking screenshot (YARA)

      • svchost015.exe (PID: 6492)
      • kLPjwNpfzy.exe (PID: 5188)
      • Market.com (PID: 1468)
      • ARLPL5txvrsO.exe (PID: 1128)
      • tviwTDgLQOO.exe (PID: 2296)
      • Market.com (PID: 6472)
      • Market.com (PID: 4544)
      • MUSWsS12rwt.exe (PID: 6368)
      • Market.com (PID: 2708)
    • Reads security settings of Internet Explorer

      • svchost015.exe (PID: 6492)
    • Connects to the server without a host name

      • svchost015.exe (PID: 6492)
    • Starts CMD.EXE for commands execution

      • 6BLxsOUpv6L.exe (PID: 2388)
      • shPLP1rDI.exe (PID: 7056)
      • ERRSPzEwUVO1.exe (PID: 6812)
      • ExJQKVva3.exe (PID: 2728)
    • Executing commands from ".cmd" file

      • 6BLxsOUpv6L.exe (PID: 2388)
      • shPLP1rDI.exe (PID: 7056)
      • ERRSPzEwUVO1.exe (PID: 6812)
      • ExJQKVva3.exe (PID: 2728)
    • Get information on the list of running processes

      • cmd.exe (PID: 6240)
      • cmd.exe (PID: 7000)
      • cmd.exe (PID: 4936)
      • cmd.exe (PID: 5140)
    • Using 'findstr.exe' to search for text patterns in files and output

      • cmd.exe (PID: 6240)
      • cmd.exe (PID: 7000)
      • cmd.exe (PID: 4936)
      • cmd.exe (PID: 5140)
    • Starts the AutoIt3 executable file

      • cmd.exe (PID: 6240)
      • cmd.exe (PID: 7000)
      • cmd.exe (PID: 4936)
      • cmd.exe (PID: 5140)
    • Starts application with an unusual extension

      • cmd.exe (PID: 6240)
      • cmd.exe (PID: 7000)
      • cmd.exe (PID: 4936)
      • cmd.exe (PID: 5140)
    • The executable file from the user directory is run by the CMD process

      • Market.com (PID: 1468)
      • Market.com (PID: 6472)
      • Market.com (PID: 4544)
      • Market.com (PID: 2708)
    • Runs PING.EXE to delay simulation

      • cmd.exe (PID: 6240)
      • cmd.exe (PID: 7000)
      • cmd.exe (PID: 4936)
      • cmd.exe (PID: 5140)
    • Searches for installed software

      • tviwTDgLQOO.exe (PID: 2296)
  • INFO

    • Create files in a temporary directory

      • 46e562e1967e51d3baac23012260c37f4999937fc319ec3868fb832ef0a7e374.bin.exe (PID: 6656)
      • 6BLxsOUpv6L.exe (PID: 2388)
      • extrac32.exe (PID: 5724)
      • shPLP1rDI.exe (PID: 7056)
      • extrac32.exe (PID: 6764)
      • ERRSPzEwUVO1.exe (PID: 6812)
      • extrac32.exe (PID: 4400)
      • ExJQKVva3.exe (PID: 2728)
      • extrac32.exe (PID: 5988)
      • svchost015.exe (PID: 6492)
    • Reads the machine GUID from the registry

      • kLPjwNpfzy.exe (PID: 5188)
      • svchost015.exe (PID: 6492)
      • Market.com (PID: 1468)
      • ARLPL5txvrsO.exe (PID: 1128)
      • Market.com (PID: 6472)
      • tviwTDgLQOO.exe (PID: 2296)
      • Market.com (PID: 4544)
      • MUSWsS12rwt.exe (PID: 6368)
      • Market.com (PID: 2708)
    • Reads the software policy settings

      • kLPjwNpfzy.exe (PID: 5188)
      • svchost015.exe (PID: 6492)
      • ARLPL5txvrsO.exe (PID: 1128)
      • Market.com (PID: 1468)
      • tviwTDgLQOO.exe (PID: 2296)
      • Market.com (PID: 6472)
      • MUSWsS12rwt.exe (PID: 6368)
      • slui.exe (PID: 4172)
      • Market.com (PID: 4544)
      • Market.com (PID: 2708)
    • The sample compiled with english language support

      • 46e562e1967e51d3baac23012260c37f4999937fc319ec3868fb832ef0a7e374.bin.exe (PID: 6656)
      • svchost015.exe (PID: 6492)
    • Checks supported languages

      • svchost015.exe (PID: 6492)
      • 46e562e1967e51d3baac23012260c37f4999937fc319ec3868fb832ef0a7e374.bin.exe (PID: 6656)
      • 6BLxsOUpv6L.exe (PID: 2388)
      • J6m0a0P9zu.exe (PID: 3896)
      • extrac32.exe (PID: 5724)
      • Market.com (PID: 1468)
      • ARLPL5txvrsO.exe (PID: 1128)
      • 4vUeUpIyk.exe (PID: 6236)
      • shPLP1rDI.exe (PID: 7056)
      • extrac32.exe (PID: 6764)
      • Market.com (PID: 6472)
      • tviwTDgLQOO.exe (PID: 2296)
      • wLqAp8rMUP.exe (PID: 1180)
      • ERRSPzEwUVO1.exe (PID: 6812)
      • extrac32.exe (PID: 4400)
      • MUSWsS12rwt.exe (PID: 6368)
      • kLPjwNpfzy.exe (PID: 5188)
      • Market.com (PID: 4544)
      • Q0vtvWBVLc.exe (PID: 7044)
      • ExJQKVva3.exe (PID: 2728)
      • extrac32.exe (PID: 5988)
      • Market.com (PID: 2708)
    • Checks proxy server information

      • svchost015.exe (PID: 6492)
      • slui.exe (PID: 4172)
    • Reads the computer name

      • svchost015.exe (PID: 6492)
      • Market.com (PID: 1468)
      • ARLPL5txvrsO.exe (PID: 1128)
      • extrac32.exe (PID: 5724)
      • extrac32.exe (PID: 6764)
      • Market.com (PID: 6472)
      • tviwTDgLQOO.exe (PID: 2296)
      • extrac32.exe (PID: 4400)
      • Market.com (PID: 4544)
      • kLPjwNpfzy.exe (PID: 5188)
      • MUSWsS12rwt.exe (PID: 6368)
      • Market.com (PID: 2708)
      • extrac32.exe (PID: 5988)
    • Creates files or folders in the user directory

      • svchost015.exe (PID: 6492)
    • Reads mouse settings

      • Market.com (PID: 1468)
      • Market.com (PID: 6472)
      • Market.com (PID: 4544)
      • Market.com (PID: 2708)
    • Process checks computer location settings

      • svchost015.exe (PID: 6492)
    • Application launched itself

      • chrome.exe (PID: 2348)
      • chrome.exe (PID: 5352)
      • chrome.exe (PID: 7032)
      • chrome.exe (PID: 3620)
      • msedge.exe (PID: 2040)
      • msedge.exe (PID: 4216)
      • msedge.exe (PID: 5080)
      • msedge.exe (PID: 3740)
      • msedge.exe (PID: 7104)
      • msedge.exe (PID: 5528)
      • chrome.exe (PID: 3100)
      • chrome.exe (PID: 4916)
      • chrome.exe (PID: 1232)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable Delphi generic (37.4)
.scr | Windows screen saver (34.5)
.exe | Win32 Executable (generic) (11.9)
.exe | Win16/32 Executable Delphi generic (5.4)
.exe | Generic Win/DOS Executable (5.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 1992:06:19 22:22:17+00:00
ImageFileCharacteristics: Executable, No line numbers, No symbols, Bytes reversed lo, 32-bit, Bytes reversed hi
PEType: PE32
LinkerVersion: 2.25
CodeSize: 376832
InitializedDataSize: 2981376
UninitializedDataSize: -
EntryPoint: 0x5cee0
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: -
FileDescription: -
FileVersion: 1.0.0.0
InternalName: -
LegalCopyright: -
LegalTrademarks: -
OriginalFileName: -
ProductName: -
ProductVersion: 1.0.0.0
Comments: -
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
284
Monitored processes
148
Malicious processes
8
Suspicious processes
3

Behavior graph

Click at the process to see the details
start 46e562e1967e51d3baac23012260c37f4999937fc319ec3868fb832ef0a7e374.bin.exe #GCLEANER svchost015.exe klpjwnpfzy.exe j6m0a0p9zu.exe no specs 6blxsoupv6l.exe cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs tasklist.exe no specs findstr.exe no specs extrac32.exe no specs findstr.exe no specs market.com ping.exe no specs slui.exe arlpl5txvrso.exe 4vueupiyk.exe no specs shplp1rdi.exe cmd.exe no specs conhost.exe no specs tasklist.exe no specs findstr.exe no specs tasklist.exe no specs findstr.exe no specs extrac32.exe no specs findstr.exe no specs market.com ping.exe no specs #LUMMA tviwtdglqoo.exe wlqap8rmup.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs errspzewuvo1.exe cmd.exe no specs conhost.exe no specs chrome.exe no specs tasklist.exe no specs findstr.exe no specs tasklist.exe no specs findstr.exe no specs extrac32.exe no specs findstr.exe no specs market.com ping.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs #LUMMA muswss12rwt.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs q0vtvwbvlc.exe no specs msedge.exe no specs msedge.exe no specs exjqkvva3.exe cmd.exe no specs conhost.exe no specs msedge.exe no specs msedge.exe no specs tasklist.exe no specs findstr.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs tasklist.exe no specs findstr.exe no specs extrac32.exe no specs findstr.exe no specs market.com ping.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs chrome.exe chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
188findstr /I "opssvc wrsa" C:\Windows\SysWOW64\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
188"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --edge-skip-compat-layer-relaunchC:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
188"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --string-annotations --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=2044,i,10185319715461863332,15031215815062211617,262144 --variations-seed-version --mojo-platform-channel-handle=2040 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
133.0.6943.127
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
320"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --disable-quic --string-annotations --field-trial-handle=4928,i,10185319715461863332,15031215815062211617,262144 --variations-seed-version --mojo-platform-channel-handle=4936 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
133.0.6943.127
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
472findstr /I "opssvc wrsa" C:\Windows\SysWOW64\findstr.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (QGREP) Utility
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\findstr.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
516ping localhost -n 5C:\Windows\SysWOW64\PING.EXEcmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
TCP/IP Ping Command
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\ping.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
516"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Google\Chrome\User Data" /prefetch:4 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Google\Chrome\User Data\Crashpad" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=133.0.6943.127 --initial-client-data=0x220,0x224,0x228,0x1fc,0x22c,0x7ffc4531fff8,0x7ffc45320004,0x7ffc45320010C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
133.0.6943.127
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
620"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --disable-quic --string-annotations --field-trial-handle=5196,i,12628232165323429787,3831760266667909592,262144 --variations-seed-version --mojo-platform-channel-handle=5212 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
133.0.6943.127
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
828"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --field-trial-handle=3016,i,16417957255298412154,15196800234162956191,262144 --variations-seed-version --mojo-platform-channel-handle=2884 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
133.0.6943.127
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\133.0.6943.127\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
864"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3720,i,885389866950982003,16130765049755559226,262144 --variations-seed-version=20250221-144540.991000 --mojo-platform-channel-handle=3888 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
133.0.6943.127
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\133.0.6943.127\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
Total events
62 210
Read events
62 143
Write events
67
Delete events
0

Modification events

(PID) Process:(6492) svchost015.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(6492) svchost015.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(6492) svchost015.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2348) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(2348) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(2348) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(2348) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(2348) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
(PID) Process:(5352) chrome.exeKey:HKEY_CURRENT_USER\SOFTWARE\Google\Chrome\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(5352) chrome.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientStateMedium\{8A69D345-D564-463C-AFF1-A69D9E530F96}
Operation:writeName:usagestats
Value:
0
Executable files
25
Suspicious files
129
Text files
252
Unknown types
29

Dropped files

PID
Process
Filename
Type
6492svchost015.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCV3KQBA\success[1].htmbinary
MD5:C4CA4238A0B923820DCC509A6F75849B
SHA256:
665646e562e1967e51d3baac23012260c37f4999937fc319ec3868fb832ef0a7e374.bin.exeC:\Users\admin\AppData\Local\Temp\svchost015.exeexecutable
MD5:CEEAE1523C3864B719E820B75BF728AA
SHA256:4E04E2FB20A9C6846B5D693EA67098214F77737F4F1F3DF5F0C78594650E7F71
665646e562e1967e51d3baac23012260c37f4999937fc319ec3868fb832ef0a7e374.bin.exeC:\Users\admin\AppData\Local\Temp\svcEDC6.tmpexecutable
MD5:AD387E34F627CBF0E4920439D0ED80A5
SHA256:410070FEE996ADD03214A3A4AEA30F343A6F8BAED1A7385295F28432760340D1
6492svchost015.exeC:\Users\admin\AppData\Roaming\h9X7sKSuuzW\kLPjwNpfzy.exeexecutable
MD5:078571ED15C7C1DBC18A3054F13E4CE7
SHA256:991F67D744565F821C268993547B3087A536385797DB30090BCEEF9A043ED994
6492svchost015.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\KCV3KQBA\ONE[1].fileexecutable
MD5:A8D411931DE4630A69441331E645E01A
SHA256:E3CCAE52DB705B4F04FE655C8948B9F63F63A24FFD2149B6303C255FCE52E4E0
23886BLxsOUpv6L.exeC:\Users\admin\AppData\Local\Temp\Manchester.adtsbinary
MD5:BE2850535A13D17D5BDF66A2353C2ECB
SHA256:F9F238F5282D9AC1843DC034EF5BEA5DD4BCC9A151E5DD74382C16C81F8D2546
23886BLxsOUpv6L.exeC:\Users\admin\AppData\Local\Temp\Ac.adtstext
MD5:A456325AC45F67DBD9AC8F2D9B7BE66F
SHA256:CE4B6C45CD266DDFC2CCF3D5D1C48C9F39322738F2157F02F6386BA61CB05417
23886BLxsOUpv6L.exeC:\Users\admin\AppData\Local\Temp\Hon.adtsbinary
MD5:8091904702A39A7D397C64B1E1D757C1
SHA256:1D6576DD04D04A13459947F3724163E3E54F79ECEDF14758CA3FD14A906210F4
6492svchost015.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\E4DJRUXW\info[1].htmtext
MD5:FE9B08252F126DDFCB87FB82F9CC7677
SHA256:E63E7EBE4C2DB7E61FFC71AF0675E870BCDE0A9D8916E5B3BE0CB252478030BF
6492svchost015.exeC:\Users\admin\AppData\Local\Microsoft\Windows\INetCache\IE\AH8CR9J5\TWO[1].fileexecutable
MD5:E1C980E16F677AAF740440ADC882639F
SHA256:4F74C9436D6E306FEE66BC786F8A4C373A7D268A60E14C51FAD83B0C17E9FAAA
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
327
TCP/UDP connections
339
DNS requests
212
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1268
svchost.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1944
RUXIMICS.exe
GET
200
23.48.23.143:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1268
svchost.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1944
RUXIMICS.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
POST
200
40.126.31.128:443
https://login.live.com/RST2.srf
unknown
xml
1.24 Kb
whitelisted
POST
400
20.190.159.130:443
https://login.live.com/ppsecure/deviceaddcredential.srf
unknown
text
203 b
whitelisted
POST
400
40.126.31.128:443
https://login.live.com/ppsecure/deviceaddcredential.srf
unknown
text
203 b
whitelisted
POST
400
40.126.31.131:443
https://login.live.com/ppsecure/deviceaddcredential.srf
unknown
text
203 b
whitelisted
POST
400
20.190.159.71:443
https://login.live.com/ppsecure/deviceaddcredential.srf
unknown
text
203 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1268
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1944
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
1268
svchost.exe
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5944
MoUsoCoreWorker.exe
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1944
RUXIMICS.exe
23.48.23.143:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5944
MoUsoCoreWorker.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
1268
svchost.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
  • 51.104.136.2
whitelisted
google.com
  • 216.58.206.78
whitelisted
crl.microsoft.com
  • 23.48.23.143
  • 23.48.23.156
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
login.live.com
  • 40.126.31.73
  • 20.190.159.4
  • 40.126.31.129
  • 20.190.159.71
  • 20.190.159.73
  • 40.126.31.69
  • 20.190.159.23
  • 20.190.159.131
whitelisted
drive.usercontent.google.com
  • 142.250.186.65
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 13.95.31.18
whitelisted
yikpspbi.my
  • 45.61.165.8
malicious
mastwin.in
  • 45.61.165.8
malicious

Threats

No threats detected
No debug info