| File name: | CCSetup.exe |
| Full analysis: | https://app.any.run/tasks/f9d982a3-dcc4-4a47-b4df-b02860a572a0 |
| Verdict: | Malicious activity |
| Threats: | A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection. |
| Analysis date: | June 19, 2025, 18:17:56 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections |
| MD5: | 7DE41EA51E2C5A4DB90DD1DD5658C4BD |
| SHA1: | F4E1D1289B97CA9312B082EFF9A010FBAB0DD7FF |
| SHA256: | 99D9B3E49C9EAED0615AAF6289A235FF9F39CB5C3B7382D6F51304A6EC04594A |
| SSDEEP: | 98304:u9V8taQEx5Tf+S+PJYfVHtpy6bcxQ8I7MEAIe/vgbBuMHWM9cBgVt+2ffM0uA1+l:UU8ORV |
| .exe | | | Win64 Executable (generic) (64.6) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (15.4) |
| .exe | | | Win32 Executable (generic) (10.5) |
| .exe | | | Generic Win/DOS Executable (4.6) |
| .exe | | | DOS Executable Generic (4.6) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2021:06:20 19:44:34+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 11 |
| CodeSize: | 622080 |
| InitializedDataSize: | 780288 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x59e5a |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.0.67.0 |
| ProductVersionNumber: | 1.0.67.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Dynamic link library |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Unicode |
| CompanyName: | RCS LT |
| FileDescription: | Combo Cleaner |
| FileVersion: | 1.0.67.0 |
| InternalName: | Setup |
| LegalCopyright: | Copyright (c) 2024 RCS LT, UAB. All Rights Reserved. |
| OriginalFileName: | CCSetup.exe |
| ProductName: | Combo Cleaner |
| ProductVersion: | 1.0.67.0 |
| InternalBuildNumber: | 202227 |
| ISInternalVersion: | 26.0.720 |
| ISInternalDescription: | Setup Launcher Unicode |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 320 | grpconv -o | C:\Windows\System32\grpconv.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Progman Group Converter Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 724 | "C:\WINDOWS\system32\runonce.exe" -r | C:\Windows\System32\runonce.exe | — | rundll32.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Run Once Wrapper Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1028 | net start trufos | C:\Windows\System32\net.exe | — | cmd.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Net Command Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1128 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1204 | C:\Users\admin\AppData\Local\Temp\{A1E03512-8647-4706-97D4-D50C72E03D85}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{9569D830-FBCE-4F99-A3C2-F5EF64FDE292} | C:\Users\admin\AppData\Local\Temp\{A1E03512-8647-4706-97D4-D50C72E03D85}\ISBEW64.exe | — | CCSetup.exe | |||||||||||
User: admin Company: Flexera Integrity Level: HIGH Description: InstallShield (R) 64-bit Setup Engine Exit code: 0 Version: 26.0.720 Modules
| |||||||||||||||
| 1208 | CMD.EXE /C driverquery /v >C:\Users\admin\AppData\Local\Temp\drivers.txt | C:\Windows\SysWOW64\cmd.exe | — | CCSetup.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1232 | "C:\Program Files (x86)\Combo Cleaner\ComboCleaner.exe" -startScan | C:\Program Files (x86)\Combo Cleaner\ComboCleaner.exe | — | CCSetup.exe | |||||||||||
User: admin Company: RCS LT Integrity Level: HIGH Description: Combo Cleaner Exit code: 0 Version: 1.0.67.0 Modules
| |||||||||||||||
| 1328 | "C:\Windows\System32\cmd.exe" /c net start trufos | C:\Windows\System32\cmd.exe | — | ComboCleaner.WinService.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1816 | C:\WINDOWS\system32\net1 start trufos | C:\Windows\System32\net1.exe | — | net.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Net Command Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1944 | -startScan | C:\Program Files (x86)\Combo Cleaner\ComboCleaner.exe | ComboCleaner.exe | ||||||||||||
User: admin Company: RCS LT Integrity Level: MEDIUM Description: Combo Cleaner Version: 1.0.67.0 Modules
| |||||||||||||||
| (PID) Process: | (5248) CCSetup.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion |
| Operation: | delete value | Name: | %IS_PREREQ%-Combo Cleaner |
Value: | |||
| (PID) Process: | (5248) CCSetup.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion |
| Operation: | delete value | Name: | %IS_PREREQF%-Combo Cleaner |
Value: | |||
| (PID) Process: | (5248) CCSetup.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce |
| Operation: | delete value | Name: | ISSetupPrerequisistes |
Value: | |||
| (PID) Process: | (5248) CCSetup.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (5248) CCSetup.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (5248) CCSetup.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (5168) CCSetup.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (5168) CCSetup.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (5168) CCSetup.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (5248) CCSetup.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\LowRegistry |
| Operation: | delete value | Name: | AddToFavoritesInitialSelection |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 5168 | CCSetup.exe | C:\Users\admin\AppData\Local\Temp\{791788E4-9030-49E5-90C8-E84B5A20FFB8}\_ISMSIDEL.INI | text | |
MD5:0D48B58C4721E007F3F03A8DA4EB0BC5 | SHA256:E942811E496FD7687CE05251D344EBEEC2D129BE6C65E54FC72A0A6DE172CBF0 | |||
| 5248 | CCSetup.exe | C:\Users\admin\AppData\Local\Temp\{791788E4-9030-49E5-90C8-E84B5A20FFB8}\Setup.INI | text | |
MD5:E8C4DB7E72F0C84A72E6E08CF8E7D10B | SHA256:5BF7B082ED0F731C57EA5C1A63CB30DF9C68100A8ACC37EE4568DC1FB891EF33 | |||
| 5168 | CCSetup.exe | C:\Users\admin\AppData\Local\Temp\A1D26E2\6C56E441430.tmp | executable | |
MD5:FE50297191B241C60616F04E2FEBB8BB | SHA256:E8ADC6E787862B84A865B06A8EFAECB272F618CC8733B9AE686496418BA6B35B | |||
| 5168 | CCSetup.exe | C:\Users\admin\AppData\Local\Temp\{791788E4-9030-49E5-90C8-E84B5A20FFB8}\CCSetup.exe | executable | |
MD5:7DE41EA51E2C5A4DB90DD1DD5658C4BD | SHA256:99D9B3E49C9EAED0615AAF6289A235FF9F39CB5C3B7382D6F51304A6EC04594A | |||
| 5168 | CCSetup.exe | C:\Users\admin\AppData\Local\Temp\~6C75.tmp | text | |
MD5:E8C4DB7E72F0C84A72E6E08CF8E7D10B | SHA256:5BF7B082ED0F731C57EA5C1A63CB30DF9C68100A8ACC37EE4568DC1FB891EF33 | |||
| 5168 | CCSetup.exe | C:\Program Files\Common Files\System\symsrv.dll | executable | |
MD5:7574CF2C64F35161AB1292E2F532AABF | SHA256:DE055A89DE246E629A8694BDE18AF2B1605E4B9B493C7E4AEF669DD67ACF5085 | |||
| 5168 | CCSetup.exe | C:\Users\admin\AppData\Local\Temp\~6CC5.tmp | text | |
MD5:E8C4DB7E72F0C84A72E6E08CF8E7D10B | SHA256:5BF7B082ED0F731C57EA5C1A63CB30DF9C68100A8ACC37EE4568DC1FB891EF33 | |||
| 5168 | CCSetup.exe | C:\Users\admin\AppData\Local\Temp\~6CB5.tmp | text | |
MD5:E8C4DB7E72F0C84A72E6E08CF8E7D10B | SHA256:5BF7B082ED0F731C57EA5C1A63CB30DF9C68100A8ACC37EE4568DC1FB891EF33 | |||
| 5168 | CCSetup.exe | C:\Users\admin\AppData\Local\Temp\~6CC6.tmp | text | |
MD5:E8C4DB7E72F0C84A72E6E08CF8E7D10B | SHA256:5BF7B082ED0F731C57EA5C1A63CB30DF9C68100A8ACC37EE4568DC1FB891EF33 | |||
| 5248 | CCSetup.exe | C:\Users\admin\AppData\Local\Temp\{791788E4-9030-49E5-90C8-E84B5A20FFB8}\setup.isn | binary | |
MD5:158B74E43CB4EE3467E9DB23AFDBD32C | SHA256:AE7E9458770CDA907AC9205730D3EE1315BC0C14A5F143247E97C03294EB5560 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5944 | MoUsoCoreWorker.exe | GET | 200 | 2.18.121.147:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 2.18.121.147:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
2320 | RUXIMICS.exe | GET | 200 | 2.18.121.147:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
2320 | RUXIMICS.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 172.67.96.20:443 | https://services.combocleaner.com/setups/Installer_Rcs/1.0.67.0/CCSetup.msi | unknown | executable | 1.48 Mb | — |
5168 | CCSetup.exe | GET | 200 | 13.248.169.48:80 | http://www.aieov.com/logo.gif | unknown | — | — | malicious |
— | — | GET | 200 | 172.67.96.20:443 | https://services.combocleaner.com/setups/Installer_Rcs/1.0.67.0/CCSetup.msi | unknown | executable | 1.48 Mb | — |
— | — | POST | 200 | 40.126.31.130:443 | https://login.live.com/RST2.srf | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
1268 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2320 | RUXIMICS.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | 2.18.121.147:80 | crl.microsoft.com | AKAMAI-AS | FR | whitelisted |
1268 | svchost.exe | 2.18.121.147:80 | crl.microsoft.com | AKAMAI-AS | FR | whitelisted |
2320 | RUXIMICS.exe | 2.18.121.147:80 | crl.microsoft.com | AKAMAI-AS | FR | whitelisted |
5944 | MoUsoCoreWorker.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
2320 | RUXIMICS.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
services.combocleaner.com |
| unknown |
5isohu.com |
| whitelisted |
www.aieov.com |
| malicious |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
5168 | CCSetup.exe | Malware Command and Control Activity Detected | MALWARE [ANY.RUN] Possible Floxif CnC Communication |
5168 | CCSetup.exe | Malware Command and Control Activity Detected | MALWARE [ANY.RUN] Possible Floxif CnC Communication |
5168 | CCSetup.exe | Malware Command and Control Activity Detected | MALWARE [ANY.RUN] Possible Floxif CnC Communication |
5168 | CCSetup.exe | Malware Command and Control Activity Detected | MALWARE [ANY.RUN] Possible Floxif CnC Communication |
5168 | CCSetup.exe | Malware Command and Control Activity Detected | MALWARE [ANY.RUN] Possible Floxif CnC Communication |
— | — | Potential Corporate Privacy Violation | ET INFO Observed MSI Download |
5168 | CCSetup.exe | Malware Command and Control Activity Detected | MALWARE [ANY.RUN] Possible Floxif CnC Communication |
— | — | Potential Corporate Privacy Violation | ET HUNTING Suspicious Windows Installer UA for non-MSI |
— | — | Potential Corporate Privacy Violation | ET HUNTING Suspicious Windows Installer UA for non-MSI |