File name:

C:\Users\admin\AppData\LocalLow\Adobe\AcroCef\DC\Acrobat\Cache\LOG.old

Full analysis: https://app.any.run/tasks/1fe90d6d-3868-4d1d-8092-f4b69fe642d0
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: September 10, 2021, 01:34:20
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MIME: text/plain
File info: ASCII text
MD5:

7DC3E42CADBCDFBAB3896835E465DBD3

SHA1:

C277CDCB6DC9BEC648D9A370AD585B6E2A55415C

SHA256:

84775B0D5F3862FADB1CFB8F984157769724F4E60775161F7F0B215002C87CC8

SSDEEP:

3:tVPjdNVqKKqFkPmyViE2JpKuAtX9OmbMjWIV//Uv:LdHOq2Phn2nKuAl9OmbnIFUv

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads the Task Scheduler COM API

      • CCleaner.exe (PID: 1640)
      • CCleaner.exe (PID: 2348)
      • CCUpdate.exe (PID: 3156)
      • CCleaner.exe (PID: 1748)
      • ccleaner.exe (PID: 3740)
      • ccleaner.exe (PID: 2668)
    • Drops executable file immediately after starts

      • CCleaner.exe (PID: 2348)
      • ccupdate584_free.exe (PID: 3196)
      • CCleaner.exe (PID: 1748)
      • ccleaner.exe (PID: 3740)
      • ccleaner.exe (PID: 2668)
    • Loads dropped or rewritten executable

      • CCleaner.exe (PID: 2348)
      • ccupdate584_free.exe (PID: 3196)
      • CCleaner.exe (PID: 1748)
      • ccleaner.exe (PID: 3740)
      • ccleaner.exe (PID: 2668)
      • CCUpdate.exe (PID: 3004)
    • Changes settings of System certificates

      • CCleaner.exe (PID: 2348)
      • ccleaner.exe (PID: 2668)
    • Application was dropped or rewritten from another process

      • ccupdate584_free.exe (PID: 3196)
      • CCleaner.exe (PID: 1748)
      • CCUpdate.exe (PID: 3156)
      • CCUpdate.exe (PID: 3004)
      • ccleaner.exe (PID: 3740)
      • ccleaner.exe (PID: 2668)
      • Microstub.exe (PID: 3940)
      • avg_antivirus_free_setup.exe (PID: 1972)
  • SUSPICIOUS

    • Starts Internet Explorer

      • rundll32.exe (PID: 3704)
    • Reads the computer name

      • FlashUtil32_32_0_0_453_ActiveX.exe (PID: 600)
      • AdobeARM.exe (PID: 1588)
      • CCleaner.exe (PID: 1640)
      • CCleaner.exe (PID: 2348)
      • ccupdate584_free.exe (PID: 3196)
      • CCUpdate.exe (PID: 3156)
      • CCleaner.exe (PID: 1748)
      • CCUpdate.exe (PID: 3004)
      • ccleaner.exe (PID: 3740)
      • ccleaner.exe (PID: 2668)
      • Microstub.exe (PID: 3940)
      • avg_antivirus_free_setup.exe (PID: 1972)
    • Checks supported languages

      • FlashUtil32_32_0_0_453_ActiveX.exe (PID: 600)
      • Reader_sl.exe (PID: 4028)
      • AdobeARM.exe (PID: 1588)
      • CCleaner.exe (PID: 1640)
      • CCleaner.exe (PID: 2348)
      • ccupdate584_free.exe (PID: 3196)
      • CCleaner.exe (PID: 1748)
      • CCUpdate.exe (PID: 3156)
      • ccleaner.exe (PID: 3740)
      • CCUpdate.exe (PID: 3004)
      • ccleaner.exe (PID: 2668)
      • Microstub.exe (PID: 3940)
      • avg_antivirus_free_setup.exe (PID: 1972)
    • Reads Microsoft Outlook installation path

      • iexplore.exe (PID: 2952)
      • iexplore.exe (PID: 2764)
      • iexplore.exe (PID: 3008)
    • Executed via COM

      • FlashUtil32_32_0_0_453_ActiveX.exe (PID: 600)
    • Creates files in the user directory

      • FlashUtil32_32_0_0_453_ActiveX.exe (PID: 600)
      • CCleaner.exe (PID: 2348)
      • ccleaner.exe (PID: 2668)
    • Executable content was dropped or overwritten

      • iexplore.exe (PID: 3008)
      • iexplore.exe (PID: 2764)
      • AdobeARM.exe (PID: 1588)
      • CCleaner.exe (PID: 2348)
      • ccupdate584_free.exe (PID: 3196)
      • CCleaner.exe (PID: 1748)
      • CCUpdate.exe (PID: 3156)
      • ccleaner.exe (PID: 3740)
      • ccleaner.exe (PID: 2668)
      • Microstub.exe (PID: 3940)
    • Uses RUNDLL32.EXE to load library

      • iexplore.exe (PID: 2764)
    • Reads the date of Windows installation

      • rundll32.exe (PID: 2712)
      • CCleaner.exe (PID: 2348)
      • ccleaner.exe (PID: 2668)
    • Drops a file with a compile date too recent

      • RdrCEF.exe (PID: 2748)
      • ccupdate584_free.exe (PID: 3196)
      • Microstub.exe (PID: 3940)
    • Creates files in the program directory

      • AdobeARM.exe (PID: 1588)
      • CCleaner.exe (PID: 2348)
      • ccupdate584_free.exe (PID: 3196)
      • CCleaner.exe (PID: 1748)
      • CCUpdate.exe (PID: 3156)
      • ccleaner.exe (PID: 3740)
      • ccleaner.exe (PID: 2668)
      • avg_antivirus_free_setup.exe (PID: 1972)
    • Executed via Task Scheduler

      • CCleaner.exe (PID: 2348)
    • Reads Environment values

      • CCleaner.exe (PID: 1640)
      • CCleaner.exe (PID: 2348)
      • CCleaner.exe (PID: 1748)
      • ccupdate584_free.exe (PID: 3196)
      • ccleaner.exe (PID: 3740)
      • ccleaner.exe (PID: 2668)
    • Drops a file that was compiled in debug mode

      • CCleaner.exe (PID: 2348)
      • ccupdate584_free.exe (PID: 3196)
      • CCleaner.exe (PID: 1748)
      • CCUpdate.exe (PID: 3156)
      • ccleaner.exe (PID: 3740)
      • ccleaner.exe (PID: 2668)
      • Microstub.exe (PID: 3940)
    • Reads CPU info

      • CCleaner.exe (PID: 2348)
      • CCleaner.exe (PID: 1748)
      • ccupdate584_free.exe (PID: 3196)
      • ccleaner.exe (PID: 2668)
      • ccleaner.exe (PID: 3740)
      • avg_antivirus_free_setup.exe (PID: 1972)
    • Reads internet explorer settings

      • CCleaner.exe (PID: 2348)
      • ccleaner.exe (PID: 2668)
    • Adds / modifies Windows certificates

      • CCleaner.exe (PID: 2348)
      • ccleaner.exe (PID: 2668)
    • Creates a directory in Program Files

      • CCleaner.exe (PID: 2348)
    • Creates a software uninstall entry

      • ccupdate584_free.exe (PID: 3196)
    • Searches for installed software

      • ccupdate584_free.exe (PID: 3196)
      • CCleaner.exe (PID: 2348)
      • ccleaner.exe (PID: 2668)
    • Application launched itself

      • CCUpdate.exe (PID: 3156)
      • ccleaner.exe (PID: 3740)
    • Creates files in the Windows directory

      • Microstub.exe (PID: 3940)
      • avg_antivirus_free_setup.exe (PID: 1972)
  • INFO

    • Checks supported languages

      • rundll32.exe (PID: 3704)
      • iexplore.exe (PID: 2952)
      • iexplore.exe (PID: 2764)
      • iexplore.exe (PID: 3008)
      • AcroRd32.exe (PID: 288)
      • RdrCEF.exe (PID: 2748)
      • AcroRd32.exe (PID: 1552)
      • RdrCEF.exe (PID: 3900)
      • RdrCEF.exe (PID: 2688)
      • RdrCEF.exe (PID: 1188)
      • RdrCEF.exe (PID: 148)
      • RdrCEF.exe (PID: 3780)
      • RdrCEF.exe (PID: 4076)
      • opera.exe (PID: 3900)
      • rundll32.exe (PID: 2712)
      • WINWORD.EXE (PID: 3348)
      • explorer.exe (PID: 3980)
      • chrome.exe (PID: 1828)
      • chrome.exe (PID: 1912)
      • chrome.exe (PID: 3944)
      • chrome.exe (PID: 3908)
      • chrome.exe (PID: 2012)
      • chrome.exe (PID: 4080)
      • chrome.exe (PID: 1248)
      • chrome.exe (PID: 3780)
      • chrome.exe (PID: 3820)
      • chrome.exe (PID: 2932)
      • chrome.exe (PID: 3152)
      • chrome.exe (PID: 2816)
      • chrome.exe (PID: 3680)
      • chrome.exe (PID: 2868)
      • chrome.exe (PID: 1604)
      • chrome.exe (PID: 3056)
    • Reads the computer name

      • iexplore.exe (PID: 2764)
      • iexplore.exe (PID: 2952)
      • rundll32.exe (PID: 3704)
      • iexplore.exe (PID: 3008)
      • rundll32.exe (PID: 2712)
      • AcroRd32.exe (PID: 288)
      • AcroRd32.exe (PID: 1552)
      • RdrCEF.exe (PID: 2748)
      • opera.exe (PID: 3900)
      • WINWORD.EXE (PID: 3348)
      • chrome.exe (PID: 1828)
      • chrome.exe (PID: 3908)
      • chrome.exe (PID: 3944)
      • chrome.exe (PID: 3780)
      • chrome.exe (PID: 3056)
    • Application launched itself

      • iexplore.exe (PID: 2764)
      • AcroRd32.exe (PID: 288)
      • RdrCEF.exe (PID: 2748)
      • chrome.exe (PID: 1828)
    • Reads settings of System Certificates

      • iexplore.exe (PID: 2952)
      • iexplore.exe (PID: 2764)
      • iexplore.exe (PID: 3008)
      • AcroRd32.exe (PID: 288)
      • RdrCEF.exe (PID: 2748)
      • rundll32.exe (PID: 2712)
      • AdobeARM.exe (PID: 1588)
      • CCleaner.exe (PID: 2348)
      • CCUpdate.exe (PID: 3156)
      • ccupdate584_free.exe (PID: 3196)
      • CCUpdate.exe (PID: 3004)
      • ccleaner.exe (PID: 2668)
      • Microstub.exe (PID: 3940)
      • chrome.exe (PID: 3908)
    • Changes internet zones settings

      • iexplore.exe (PID: 2764)
    • Creates files in the user directory

      • iexplore.exe (PID: 2952)
      • iexplore.exe (PID: 2764)
      • opera.exe (PID: 3900)
      • AcroRd32.exe (PID: 288)
      • WINWORD.EXE (PID: 3348)
    • Checks Windows Trust Settings

      • iexplore.exe (PID: 2764)
      • iexplore.exe (PID: 2952)
      • iexplore.exe (PID: 3008)
      • AcroRd32.exe (PID: 288)
      • rundll32.exe (PID: 2712)
      • AdobeARM.exe (PID: 1588)
      • CCleaner.exe (PID: 2348)
      • ccupdate584_free.exe (PID: 3196)
      • ccleaner.exe (PID: 2668)
    • Reads internet explorer settings

      • iexplore.exe (PID: 2952)
      • iexplore.exe (PID: 3008)
    • Reads CPU info

      • iexplore.exe (PID: 2952)
      • AcroRd32.exe (PID: 1552)
    • Changes settings of System certificates

      • iexplore.exe (PID: 2764)
      • chrome.exe (PID: 3908)
    • Adds / modifies Windows certificates

      • iexplore.exe (PID: 2764)
      • chrome.exe (PID: 3908)
    • Modifies the phishing filter of IE

      • iexplore.exe (PID: 2764)
    • Searches for installed software

      • AcroRd32.exe (PID: 288)
      • AcroRd32.exe (PID: 1552)
    • Reads the hosts file

      • RdrCEF.exe (PID: 2748)
      • CCleaner.exe (PID: 2348)
      • CCleaner.exe (PID: 1748)
      • ccleaner.exe (PID: 2668)
      • ccleaner.exe (PID: 3740)
      • chrome.exe (PID: 1828)
      • chrome.exe (PID: 3908)
    • Manual execution by user

      • opera.exe (PID: 3900)
      • CCleaner.exe (PID: 1640)
      • WINWORD.EXE (PID: 3348)
    • Check for Java to be installed

      • opera.exe (PID: 3900)
    • Dropped object may contain Bitcoin addresses

      • opera.exe (PID: 3900)
    • Reads the date of Windows installation

      • opera.exe (PID: 3900)
      • iexplore.exe (PID: 2764)
    • Reads Microsoft Office registry keys

      • WINWORD.EXE (PID: 3348)
    • Changes default file association

      • chrome.exe (PID: 1828)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
93
Monitored processes
46
Malicious processes
9
Suspicious processes
3

Behavior graph

Click at the process to see the details
start drop and start drop and start drop and start drop and start drop and start drop and start rundll32.exe no specs iexplore.exe iexplore.exe flashutil32_32_0_0_453_activex.exe no specs iexplore.exe rundll32.exe no specs acrord32.exe acrord32.exe no specs rdrcef.exe rdrcef.exe no specs rdrcef.exe no specs rdrcef.exe no specs rdrcef.exe no specs rdrcef.exe no specs rdrcef.exe no specs opera.exe adobearm.exe reader_sl.exe no specs winword.exe no specs ccleaner.exe no specs ccleaner.exe ccupdate584_free.exe ccleaner.exe ccupdate.exe ccupdate.exe ccleaner.exe explorer.exe no specs ccleaner.exe microstub.exe chrome.exe chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs avg_antivirus_free_setup.exe

Process information

PID
CMD
Path
Indicators
Parent process
148"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --field-trial-handle=1184,2893276490495744561,14844267751298508047,131072 --disable-features=NetworkService,VizDisplayCompositor --disable-pack-loading --log-file="C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/20.13.20064 Chrome/80.0.0.0" --lang=en-US --gpu-preferences=KAAAAAAAAADgACAgAQAAAAAAAAAAAGAAAAAAABAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --use-gl=swiftshader-webgl --log-file="C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --service-request-channel-token=17630242774424139504 --mojo-platform-channel-handle=1464 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeRdrCEF.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe RdrCEF
Exit code:
1
Version:
20.13.20064.405839
Modules
Images
c:\program files\adobe\acrobat reader dc\reader\acrocef\rdrcef.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
288"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\winzip25-ootf"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe
rundll32.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
MEDIUM
Description:
Adobe Acrobat Reader DC
Exit code:
1
Version:
20.13.20064.405839
Modules
Images
c:\program files\adobe\acrobat reader dc\reader\acrord32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
600C:\Windows\system32\Macromed\Flash\FlashUtil32_32_0_0_453_ActiveX.exe -EmbeddingC:\Windows\system32\Macromed\Flash\FlashUtil32_32_0_0_453_ActiveX.exesvchost.exe
User:
admin
Company:
Adobe
Integrity Level:
MEDIUM
Description:
Adobe� Flash� Player Installer/Uninstaller 32.0 r0
Exit code:
0
Version:
32,0,0,453
Modules
Images
c:\windows\system32\macromed\flash\flashutil32_32_0_0_453_activex.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1188"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --field-trial-handle=1184,2893276490495744561,14844267751298508047,131072 --disable-features=NetworkService,VizDisplayCompositor --disable-pack-loading --log-file="C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/20.13.20064 Chrome/80.0.0.0" --lang=en-US --gpu-preferences=KAAAAAAAAADgACAgAQAAAAAAAAAAAGAAAAAAABAAAAAIAAAAAAAAACgAAAAEAAAAIAAAAAAAAAAoAAAAAAAAADAAAAAAAAAAOAAAAAAAAAAQAAAAAAAAAAAAAAAFAAAAEAAAAAAAAAAAAAAABgAAABAAAAAAAAAAAQAAAAUAAAAQAAAAAAAAAAEAAAAGAAAA --use-gl=swiftshader-webgl --log-file="C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --service-request-channel-token=2536446175942701847 --mojo-platform-channel-handle=1228 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:2C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exeRdrCEF.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe RdrCEF
Exit code:
1
Version:
20.13.20064.405839
Modules
Images
c:\program files\adobe\acrobat reader dc\reader\acrocef\rdrcef.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1248"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1044,4312263488311671499,1844523070127202229,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2932 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
Modules
Images
c:\windows\system32\ntdll.dll
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\kernel32.dll
c:\program files\google\chrome\application\86.0.4240.198\chrome_elf.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\version.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\api-ms-win-downlevel-shell32-l1-1-0.dll
c:\windows\system32\shell32.dll
1552"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" --type=renderer "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\B6QGX7LP\winzip25-ootf"C:\Program Files\Adobe\Acrobat Reader DC\Reader\AcroRd32.exeAcroRd32.exe
User:
admin
Company:
Adobe Systems Incorporated
Integrity Level:
LOW
Description:
Adobe Acrobat Reader DC
Exit code:
1
Version:
20.13.20064.405839
Modules
Images
c:\program files\adobe\acrobat reader dc\reader\acrord32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
1588"C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe" /PRODUCT:Reader /VERSION:20.0 /MODE:3C:\Program Files\Common Files\Adobe\ARM\1.0\AdobeARM.exe
AcroRd32.exe
User:
admin
Company:
Adobe Inc.
Integrity Level:
MEDIUM
Description:
Adobe Reader and Acrobat Manager
Exit code:
0
Version:
1.824.39.9311
Modules
Images
c:\program files\common files\adobe\arm\1.0\adobearm.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msi.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
1604"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1044,4312263488311671499,1844523070127202229,131072 --enable-features=PasswordImport --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1996 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
86.0.4240.198
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\86.0.4240.198\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
1640"C:\Program Files\CCleaner\CCleaner.exe" C:\Program Files\CCleaner\CCleaner.exeExplorer.EXE
User:
admin
Company:
Piriform Software Ltd
Integrity Level:
MEDIUM
Description:
CCleaner
Exit code:
0
Version:
5.74.0.8198
Modules
Images
c:\windows\system32\ntdll.dll
c:\program files\ccleaner\ccleaner.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\nsi.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
1748"C:\Program Files\CCleaner\CCleaner.exe" /createSkipUAC 5.74.8198C:\Program Files\CCleaner\CCleaner.exe
ccupdate584_free.exe
User:
admin
Company:
Piriform Software Ltd
Integrity Level:
HIGH
Description:
CCleaner
Exit code:
0
Version:
5.84.0.9143
Modules
Images
c:\windows\system32\ntdll.dll
c:\program files\ccleaner\ccleaner.exe
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\gdi32.dll
Total events
112 769
Read events
110 680
Write events
1 863
Delete events
226

Modification events

(PID) Process:(2764) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPDaysSinceLastAutoMigration
Value:
1
(PID) Process:(2764) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchLowDateTime
Value:
200174496
(PID) Process:(2764) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\TabbedBrowsing
Operation:writeName:NTPLastLaunchHighDateTime
Value:
30909924
(PID) Process:(2764) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateLowDateTime
Value:
500334028
(PID) Process:(2764) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\UrlBlockManager
Operation:writeName:NextCheckForUpdateHighDateTime
Value:
30909924
(PID) Process:(2764) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
Operation:writeName:CachePrefix
Value:
(PID) Process:(2764) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2764) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2764) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\Main
Operation:writeName:CompatibilityFlags
Value:
0
(PID) Process:(2764) iexplore.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
Executable files
86
Suspicious files
332
Text files
466
Unknown types
165

Dropped files

PID
Process
Filename
Type
2952iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63der
MD5:
SHA256:
2952iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:
SHA256:
2952iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442der
MD5:
SHA256:
2952iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\BF6BNF01.txttext
MD5:
SHA256:
2952iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442binary
MD5:
SHA256:
2952iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\NVRZ1SXL.txttext
MD5:
SHA256:
2952iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_711ED44619924BA6DC33E69F97E7FF63binary
MD5:
SHA256:
2952iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\4Z43FB4K.txttext
MD5:
SHA256:
2952iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\I9B6U3ZO.txttext
MD5:
SHA256:
2952iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\5VYWD6FR.txttext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
115
TCP/UDP connections
339
DNS requests
194
Threats
8

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2952
iexplore.exe
GET
301
2.16.186.24:80
http://shell.windows.com/fileassoc/fileassoc.asp?Ext=old%22
unknown
whitelisted
2764
iexplore.exe
GET
304
2.16.186.81:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?ad864b27e0394513
unknown
whitelisted
2764
iexplore.exe
GET
304
2.16.186.81:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?cc6b6e2d1445edcb
unknown
whitelisted
2952
iexplore.exe
GET
200
143.204.101.188:80
http://ocsp.sca1b.amazontrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQz9arGHWbnBV0DFzpNHz4YcTiFDQQUWaRmBlKge5WSPKOUByeWdFv5PdACEAx3EbgazVsTS8sXO4Gmqyo%3D
US
der
471 b
whitelisted
2952
iexplore.exe
GET
200
142.250.185.227:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
US
der
1.41 Kb
whitelisted
2952
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8Ull8gIGmZT9XHrHiJQeI%3D
US
der
1.47 Kb
whitelisted
2952
iexplore.exe
GET
200
143.204.101.177:80
http://o.ss2.us//MEowSDBGMEQwQjAJBgUrDgMCGgUABBSLwZ6EW5gdYc9UaSEaaLjjETNtkAQUv1%2B30c7dH4b0W1Ws3NcQwg6piOcCCQCnDkpMNIK3fw%3D%3D
US
der
1.70 Kb
whitelisted
2952
iexplore.exe
GET
200
143.204.101.42:80
http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwZ%2FlFeFh%2Bisd96yUzJbvJmLVg0%3D
US
der
1.39 Kb
shared
2952
iexplore.exe
GET
200
142.250.185.227:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFNZazTHGPUBUGY%3D
US
der
724 b
whitelisted
2952
iexplore.exe
GET
200
93.184.220.29:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA%2BnRyLFPYjID1ie%2Bx%2BdSjo%3D
US
der
1.47 Kb
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2952
iexplore.exe
104.111.242.51:443
go.microsoft.com
Akamai International B.V.
NL
unknown
2952
iexplore.exe
2.16.186.81:80
ctldl.windowsupdate.com
Akamai International B.V.
whitelisted
2952
iexplore.exe
93.184.220.29:80
ocsp.digicert.com
MCI Communications Services, Inc. d/b/a Verizon Business
US
whitelisted
2952
iexplore.exe
2.16.186.24:80
shell.windows.com
Akamai International B.V.
whitelisted
2952
iexplore.exe
204.79.197.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
2764
iexplore.exe
204.79.197.200:443
www.bing.com
Microsoft Corporation
US
whitelisted
2764
iexplore.exe
2.16.186.81:80
ctldl.windowsupdate.com
Akamai International B.V.
whitelisted
2952
iexplore.exe
40.126.31.139:443
login.microsoftonline.com
Microsoft Corporation
US
suspicious
2952
iexplore.exe
104.16.149.64:443
cdn.cookielaw.org
Cloudflare Inc
US
unknown
2952
iexplore.exe
143.204.98.29:443
cdn.openthefile.net
US
malicious

DNS requests

Domain
IP
Reputation
go.microsoft.com
  • 104.111.242.51
whitelisted
ctldl.windowsupdate.com
  • 2.16.186.81
  • 2.16.186.56
  • 93.184.221.240
whitelisted
ocsp.digicert.com
  • 93.184.220.29
whitelisted
shell.windows.com
  • 2.16.186.24
  • 2.16.186.27
whitelisted
www.bing.com
  • 204.79.197.200
  • 13.107.21.200
whitelisted
login.microsoftonline.com
  • 40.126.31.139
  • 40.126.31.141
  • 20.190.159.138
  • 40.126.31.143
  • 20.190.159.136
  • 40.126.31.1
  • 40.126.31.6
  • 40.126.31.8
whitelisted
login.live.com
  • 20.190.160.129
  • 20.190.160.8
  • 20.190.160.4
  • 20.190.160.71
  • 20.190.160.6
  • 20.190.160.69
  • 20.190.160.134
  • 20.190.160.73
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.openthefile.net
  • 54.172.180.5
  • 54.175.19.8
unknown
o.ss2.us
  • 143.204.101.177
  • 143.204.101.99
  • 143.204.101.195
  • 143.204.101.123
whitelisted

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET INFO TLS Handshake Failure
2952
iexplore.exe
Generic Protocol Command Decode
SURICATA HTTP unable to match response to request
3156
CCUpdate.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3940
Microstub.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
4 ETPRO signatures available at the full report
Process
Message
CCleaner.exe
Failed to open log file 'C:\Program Files\CCleaner'
CCleaner.exe
startCheckingLicense()
CCleaner.exe
Using Sciter version 4.4.4.4-r8057
CCleaner.exe
OnLanguage - en
CCleaner.exe
OnLanguage - en
CCleaner.exe
observing CurrentIndex changed - 0
CCleaner.exe
observing CurrentIndex changed - Context.FirstTime=true CurrentIndex=0 LastIndex=4
CCleaner.exe
observing currentResultDetails changed - None
CCleaner.exe
SetStrings - Live Region updated: ,
CCleaner.exe
observing currentModeType changed - Preview