File name:

HC2Setup.exe

Full analysis: https://app.any.run/tasks/f6494e40-9a02-495f-852e-357b998bcad7
Verdict: Malicious activity
Analysis date: April 29, 2025, 21:07:20
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
evasion
lua
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, RAR self-extracting archive, 4 sections
MD5:

F96A73B23464366E4158620B10FA52C5

SHA1:

1B048D127670EA9C113C3582C7D2BFDE2BC4B32A

SHA256:

6A06B2BA1A32B703D65F43D49DDAA8E74D8F5ADD21A8AB04AA0044937A5A50C5

SSDEEP:

24576:Lev+eq3WBaH4tnpWrcLkx0j6a0BkIgsgq4bSu2wU1DjsJMY9cLYelTgJORXs:a5BaYtnpWrcLkx0j6amkIgsgqASu2wU+

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • HC2Setup.exe (PID: 576)
      • HC2Setup.exe (PID: 2060)
      • HyCam2.exe (PID: 1824)
      • HyCam2.exe (PID: 2304)
      • HyCam2.exe (PID: 3016)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • HC2Setup.exe (PID: 576)
      • HyCam2.exe (PID: 1824)
      • CCleaner.exe (PID: 988)
    • Reads security settings of Internet Explorer

      • HC2Setup.exe (PID: 576)
      • HyCam2.exe (PID: 3016)
      • CCleaner.exe (PID: 988)
    • Reads the Internet Settings

      • HC2Setup.exe (PID: 576)
      • HyCam2.exe (PID: 3016)
      • CCleaner.exe (PID: 988)
    • There is functionality for taking screenshot (YARA)

      • HyCam2.exe (PID: 1824)
      • HyCam2.exe (PID: 3016)
      • vlc.exe (PID: 2784)
    • Creates a software uninstall entry

      • HyCam2.exe (PID: 1824)
    • Starts itself from another location

      • HyCam2.exe (PID: 1824)
    • The process executes via Task Scheduler

      • CCleaner.exe (PID: 988)
    • Reads Internet Explorer settings

      • CCleaner.exe (PID: 988)
    • Reads settings of System Certificates

      • CCleaner.exe (PID: 988)
    • Checks for external IP

      • CCleaner.exe (PID: 988)
      • svchost.exe (PID: 1080)
    • Reads the date of Windows installation

      • CCleaner.exe (PID: 988)
    • Reads Microsoft Outlook installation path

      • CCleaner.exe (PID: 988)
    • Searches for installed software

      • CCleaner.exe (PID: 988)
  • INFO

    • Checks supported languages

      • HC2Setup.exe (PID: 576)
      • HyCam2.exe (PID: 1824)
      • HyCam2.exe (PID: 2304)
      • HyCam2.exe (PID: 3016)
      • CCleaner.exe (PID: 1500)
      • CCleaner.exe (PID: 988)
      • vlc.exe (PID: 2784)
    • Create files in a temporary directory

      • HC2Setup.exe (PID: 576)
    • The sample compiled with english language support

      • HC2Setup.exe (PID: 576)
      • HyCam2.exe (PID: 1824)
      • CCleaner.exe (PID: 988)
    • Reads the computer name

      • HC2Setup.exe (PID: 576)
      • HyCam2.exe (PID: 1824)
      • HyCam2.exe (PID: 3016)
      • CCleaner.exe (PID: 988)
      • CCleaner.exe (PID: 1500)
      • HyCam2.exe (PID: 2304)
      • vlc.exe (PID: 2784)
    • Creates files in the program directory

      • HyCam2.exe (PID: 1824)
      • CCleaner.exe (PID: 988)
    • Manual execution by a user

      • HyCam2.exe (PID: 3016)
      • CCleaner.exe (PID: 1500)
    • Checks proxy server information

      • HyCam2.exe (PID: 3016)
      • CCleaner.exe (PID: 988)
    • Reads the machine GUID from the registry

      • HyCam2.exe (PID: 3016)
      • CCleaner.exe (PID: 988)
    • Creates files or folders in the user directory

      • HyCam2.exe (PID: 3016)
      • CCleaner.exe (PID: 988)
    • Reads Environment values

      • CCleaner.exe (PID: 1500)
      • CCleaner.exe (PID: 988)
    • Reads CPU info

      • CCleaner.exe (PID: 988)
    • Reads product name

      • CCleaner.exe (PID: 988)
    • Reads the software policy settings

      • CCleaner.exe (PID: 988)
    • Detects AutoHotkey samples (YARA)

      • CCleaner.exe (PID: 988)
    • The process uses Lua

      • vlc.exe (PID: 2784)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | WinRAR Self Extracting archive (94.8)
.scr | Windows screen saver (2.3)
.dll | Win32 Dynamic Link Library (generic) (1.2)
.exe | Win32 Executable (generic) (0.8)
.exe | Generic Win/DOS Executable (0.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2006:09:13 18:20:14+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 5
CodeSize: 77824
InitializedDataSize: 28672
UninitializedDataSize: -
EntryPoint: 0x1000
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
49
Monitored processes
9
Malicious processes
4
Suspicious processes
2

Behavior graph

Click at the process to see the details
start hc2setup.exe hycam2.exe hycam2.exe no specs hycam2.exe ccleaner.exe no specs ccleaner.exe vlc.exe svchost.exe hc2setup.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
576"C:\Users\admin\Desktop\HC2Setup.exe" C:\Users\admin\Desktop\HC2Setup.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\desktop\hc2setup.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
c:\windows\system32\gdi32.dll
988"C:\Program Files\CCleaner\CCleaner.exe" /uacC:\Program Files\CCleaner\CCleaner.exe
taskeng.exe
User:
admin
Company:
Piriform Software Ltd
Integrity Level:
HIGH
Description:
CCleaner
Exit code:
0
Version:
6.14.0.10584
Modules
Images
c:\program files\ccleaner\ccleaner.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\nsi.dll
c:\windows\system32\advapi32.dll
1080C:\Windows\system32\svchost.exe -k NetworkServiceC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1500"C:\Program Files\CCleaner\CCleaner.exe" C:\Program Files\CCleaner\CCleaner.exeexplorer.exe
User:
admin
Company:
Piriform Software Ltd
Integrity Level:
MEDIUM
Description:
CCleaner
Exit code:
0
Version:
6.14.0.10584
Modules
Images
c:\program files\ccleaner\ccleaner.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\nsi.dll
c:\windows\system32\advapi32.dll
1824"C:\Users\admin\AppData\Local\Temp\RarSFX0\HyCam2.exe" -installC:\Users\admin\AppData\Local\Temp\RarSFX0\HyCam2.exe
HC2Setup.exe
User:
admin
Company:
Hyperionics
Integrity Level:
HIGH
Description:
HyperCam
Exit code:
0
Version:
2, 14, 1, 0
Modules
Images
c:\users\admin\appdata\local\temp\rarsfx0\hycam2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\winmm.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2060"C:\Users\admin\Desktop\HC2Setup.exe" C:\Users\admin\Desktop\HC2Setup.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221226540
Modules
Images
c:\users\admin\desktop\hc2setup.exe
c:\windows\system32\ntdll.dll
2304"C:\Program Files\HyCam2\HyCam2.exe" -regonlyC:\Program Files\HyCam2\HyCam2.exeHyCam2.exe
User:
admin
Company:
Hyperionics
Integrity Level:
HIGH
Description:
HyperCam
Exit code:
0
Version:
2, 14, 1, 0
Modules
Images
c:\program files\hycam2\hycam2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\winmm.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2784"C:\Program Files\VideoLAN\VLC\vlc.exe" --started-from-file "C:\Users\admin\Documents\clip0001.avi"C:\Program Files\VideoLAN\VLC\vlc.exe
HyCam2.exe
User:
admin
Company:
VideoLAN
Integrity Level:
MEDIUM
Description:
VLC media player
Exit code:
0
Version:
3.0.11
Modules
Images
c:\program files\videolan\vlc\vlc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\videolan\vlc\libvlc.dll
c:\program files\videolan\vlc\libvlccore.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
3016"C:\Program Files\HyCam2\HyCam2.exe" C:\Program Files\HyCam2\HyCam2.exe
explorer.exe
User:
admin
Company:
Hyperionics
Integrity Level:
MEDIUM
Description:
HyperCam
Exit code:
20
Version:
2, 14, 1, 0
Modules
Images
c:\program files\hycam2\hycam2.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\winmm.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
39 433
Read events
38 996
Write events
351
Delete events
86

Modification events

(PID) Process:(576) HC2Setup.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(576) HC2Setup.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(576) HC2Setup.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(576) HC2Setup.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(1080) svchost.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\NetworkList\Nla\Cache\Intranet
Operation:writeName:{4040CF00-1B3E-486A-B407-FA14C56B6FC0}
Value:
D4DA6D3E3157
(PID) Process:(1824) HyCam2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\HyperCam 2
Operation:writeName:DisplayName
Value:
HyperCam 2
(PID) Process:(1824) HyCam2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\HyperCam 2
Operation:writeName:UninstallString
Value:
"C:\Program Files\HyCam2\UnHyCam2.exe"
(PID) Process:(2304) HyCam2.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{AAA0A636-928C-11D1-9AD0-0000C0597CC8}\TypeLib
Operation:writeName:Version
Value:
1.0
(PID) Process:(3016) HyCam2.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3016) HyCam2.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:delete valueName:ProxyServer
Value:
Executable files
15
Suspicious files
77
Text files
21
Unknown types
0

Dropped files

PID
Process
Filename
Type
576HC2Setup.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\8-11025d.wavbinary
MD5:A8BBF1676207514D90693EE2FB0364F8
SHA256:D6A44B57B047E4FBCF4886A713CC5143AF065D157FD4972334DD7B5861798FE5
576HC2Setup.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\8-8000u.wavbinary
MD5:D6A10FFAB0437CB757CA0DD098B8B3A7
SHA256:F3B90092A7F0313D5D0B97AD470CE6D68AA4F4780B18D39560A4988520F4C849
576HC2Setup.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\8-8000d.wavbinary
MD5:1912519EA64D50843AE9084D37E8A0C1
SHA256:5F8D2BDA27A1036902C82778FF4C947AC57D63D558C1D6F0AA4B168489774538
576HC2Setup.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\8-22050d.wavbinary
MD5:CA12246A9F402472599F55F894D9183A
SHA256:43B8C0E7D0BCB7EE07B02CB9A9EDA353876E344976BDF6E8D508C10C3C549124
576HC2Setup.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\8-44100d.wavbinary
MD5:38A775466B8DC0A1F2D7E04F34F72BD9
SHA256:FF20BEF1BA7566685B22F5F92DD215178A312DB97DA4C6C743585405F5C040ED
576HC2Setup.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\16-22050d.wavbinary
MD5:E00C8AE722FD731A639F34571375ADB1
SHA256:60C7BC95E033888F55022B12C9D9BAD16FC458B9E499515B2223FDF2D4F8E741
576HC2Setup.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\16-11025u.wavbinary
MD5:12A8E35F4B87AAE6DF4D824D4BF2D601
SHA256:ED614186535078B71D7534F1B2A4DB00BB04389C81D7865D0241C7548A9B5D93
576HC2Setup.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\16-44100u.wavbinary
MD5:A1F0AB08672C56580FE2B1E5C08E8C03
SHA256:798240FE89FD38E5FD6A57FBE4B683D8A93C78B9408349C50C0423637243ED27
576HC2Setup.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\16-22050u.wavbinary
MD5:76F42715F524FB2110CA845520E101D8
SHA256:3B393414011D7CCF8A1EB588C3FFD627105EB33E9660D5BDC050455B3C7A215A
576HC2Setup.exeC:\Users\admin\AppData\Local\Temp\RarSFX0\16-44100d.wavbinary
MD5:77F67F35EE1E4F5BF4F76CCC072550BE
SHA256:46F00FEF0CEBE38DEEFBBA59F859B4A72906FA4A894DB552B0AFDB213C61FCFE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
13
TCP/UDP connections
26
DNS requests
18
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3016
HyCam2.exe
GET
200
66.135.60.154:80
http://www.hyperionics.com/vers/hc2.txt
unknown
malicious
988
CCleaner.exe
GET
200
2.19.126.142:80
http://ncc.avast.com/ncc.txt
unknown
whitelisted
988
CCleaner.exe
GET
200
208.89.74.19:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?c09d7db11f8f83d7
unknown
whitelisted
988
CCleaner.exe
GET
200
208.89.74.19:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?63d1509ae23d71fa
unknown
whitelisted
988
CCleaner.exe
GET
200
208.89.74.19:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?6db5d24d9682e86a
unknown
whitelisted
988
CCleaner.exe
GET
200
208.89.74.19:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?d1b9c1867f8c92da
unknown
whitelisted
988
CCleaner.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAbY2QTVWENG9oovp1QifsQ%3D
unknown
whitelisted
988
CCleaner.exe
GET
200
184.30.131.245:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTk45WiKdPUwcMf8JgMC07ACYqr2AQUt2ui6qiqhIx56rTaD5iyxZV2ufQCEAXfj0A2M0oL7zuU%2F%2F2jetU%3D
unknown
whitelisted
988
CCleaner.exe
GET
200
216.58.212.131:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
unknown
whitelisted
988
CCleaner.exe
GET
200
142.250.185.67:80
http://c.pki.goog/r/r1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
whitelisted
4
System
192.168.100.255:138
whitelisted
3016
HyCam2.exe
66.135.60.154:80
www.hyperionics.com
COGECO-PEER1
US
malicious
988
CCleaner.exe
2.19.126.142:80
ncc.avast.com
Akamai International B.V.
DE
whitelisted
988
CCleaner.exe
34.117.223.223:443
analytics.ff.avast.com
GOOGLE-CLOUD-PLATFORM
US
whitelisted
988
CCleaner.exe
2.19.225.128:443
www.ccleaner.com
AKAMAI-AS
FR
whitelisted
988
CCleaner.exe
34.111.24.1:443
ipm-provider.ff.avast.com
GOOGLE
US
whitelisted
988
CCleaner.exe
34.160.176.28:443
shepherd.ff.avast.com
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.110
whitelisted
www.hyperionics.com
  • 66.135.60.154
malicious
ncc.avast.com
  • 2.19.126.142
  • 2.19.126.158
whitelisted
analytics.ff.avast.com
  • 34.117.223.223
whitelisted
www.ccleaner.com
  • 2.19.225.128
whitelisted
ipm-provider.ff.avast.com
  • 34.111.24.1
whitelisted
shepherd.ff.avast.com
  • 34.160.176.28
whitelisted
ip-info.ff.avast.com
  • 34.111.175.102
whitelisted
ctldl.windowsupdate.com
  • 208.89.74.19
  • 208.89.74.23
  • 208.89.74.29
  • 208.89.74.17
  • 208.89.74.31
  • 208.89.74.27
  • 208.89.74.21
whitelisted
ocsp.digicert.com
  • 184.30.131.245
whitelisted

Threats

PID
Process
Class
Message
1080
svchost.exe
Misc activity
ET INFO External IP Lookup Service in DNS Query (ip-info .ff .avast .com)
988
CCleaner.exe
Misc activity
ET INFO Observed External IP Lookup Domain (ip-info .ff .avast .com) in TLS SNI
Process
Message
CCleaner.exe
[2025-04-29 21:09:01.739] [error ] [settings ] [ 988: 2356] [6000C4: 356] Failed to get program directory Exception: Unable to determine program folder of product 'piriform-cc'! Code: 0x000000c0 (192)
CCleaner.exe
Failed to open log file 'C:\Program Files\CCleaner'
CCleaner.exe
OnLanguage - en
CCleaner.exe
[2025-04-29 21:09:03.170] [error ] [settings ] [ 988: 2420] [9434E9: 359] Failed to get program directory Exception: Unable to determine program folder of product 'piriform-cc'! Code: 0x000000c0 (192)
CCleaner.exe
[2025-04-29 21:09:03.205] [error ] [Burger ] [ 988: 2420] [FDA25D: 244] [23.1.806.0] [BurgerReporter.cpp] [244] asw::standalone_svc::BurgerReporter::BurgerSwitch: Could not read property BURGER_SETTINGS_PANCAKE_HOSTNAME (0x00000003)
CCleaner.exe
[2025-04-29 21:09:03.206] [error ] [Burger ] [ 988: 2420] [FDA25D: 244] [23.1.806.0] [BurgerReporter.cpp] [244] asw::standalone_svc::BurgerReporter::BurgerSwitch: Could not read property BURGER_SETTINGS_PANCAKE_HOSTNAME (0x00000003)
CCleaner.exe
startCheckingLicense()
CCleaner.exe
OnLanguage - en
CCleaner.exe
OnLanguage - en
CCleaner.exe
OnLanguage - en