download:

ccsetup556_rtb.exe

Full analysis: https://app.any.run/tasks/3567edb7-70d4-4a6f-be36-2d86de62ba44
Verdict: Malicious activity
Threats:

A loader is malicious software that infiltrates devices to deliver malicious payloads. This malware is capable of infecting victims’ computers, analyzing their system information, and installing other types of threats, such as trojans or stealers. Criminals usually deliver loaders through phishing emails and links by relying on social engineering to trick users into downloading and running their executables. Loaders employ advanced evasion and persistence tactics to avoid detection.

Analysis date: May 08, 2019, 15:50:37
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
loader
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

64E066F4443C60632607267738C0AD96

SHA1:

6368E048BCF006212070B7AB60B4E34D7FEB6041

SHA256:

E2F325797FBE214056C3859B346A6A122CAA3E191E421477B1B627D0F386BD21

SSDEEP:

393216:oHAZUdEXZDknrmg3DS80iLEOeE/Rl7k+Q85JIMKy1hQ4KNBa:og/Zo1zrLJ/vYn85JIMQ42k

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • ccsetup556_rtb.exe (PID: 2432)
    • Changes settings of System certificates

      • ccsetup556_rtb.exe (PID: 2432)
    • Actions looks like stealing of personal data

      • ccsetup556_rtb.exe (PID: 2432)
      • CCleaner.exe (PID: 3868)
      • CCleaner.exe (PID: 2072)
    • Application was dropped or rewritten from another process

      • nsDD50.tmp (PID: 1836)
      • CCleaner.exe (PID: 4056)
      • CCUpdate.exe (PID: 1088)
      • CCleaner.exe (PID: 3868)
      • CCleaner.exe (PID: 2072)
      • CCUpdate.exe (PID: 2356)
    • Loads the Task Scheduler COM API

      • CCUpdate.exe (PID: 1088)
      • CCleaner.exe (PID: 4056)
      • CCleaner.exe (PID: 3868)
      • CCleaner.exe (PID: 2072)
    • Changes the autorun value in the registry

      • CCleaner.exe (PID: 2072)
    • Downloads executable files from the Internet

      • CCUpdate.exe (PID: 1088)
  • SUSPICIOUS

    • Low-level read access rights to disk partition

      • ccsetup556_rtb.exe (PID: 2432)
      • CCUpdate.exe (PID: 1088)
      • CCUpdate.exe (PID: 2356)
      • CCleaner.exe (PID: 3868)
      • CCleaner.exe (PID: 2072)
    • Adds / modifies Windows certificates

      • ccsetup556_rtb.exe (PID: 2432)
    • Creates files in the user directory

      • ccsetup556_rtb.exe (PID: 2432)
      • CCleaner.exe (PID: 3868)
      • CCleaner.exe (PID: 2072)
    • Reads Internet Cache Settings

      • ccsetup556_rtb.exe (PID: 2432)
    • Reads internet explorer settings

      • ccsetup556_rtb.exe (PID: 2432)
      • CCleaner.exe (PID: 3868)
      • CCleaner.exe (PID: 2072)
    • Reads the cookies of Mozilla Firefox

      • ccsetup556_rtb.exe (PID: 2432)
    • Reads the cookies of Google Chrome

      • ccsetup556_rtb.exe (PID: 2432)
    • Reads Environment values

      • ccsetup556_rtb.exe (PID: 2432)
      • CCleaner.exe (PID: 2072)
    • Creates a software uninstall entry

      • ccsetup556_rtb.exe (PID: 2432)
    • Starts application with an unusual extension

      • ccsetup556_rtb.exe (PID: 2432)
    • Reads CPU info

      • ccsetup556_rtb.exe (PID: 2432)
      • CCleaner.exe (PID: 2072)
    • Creates files in the program directory

      • ccsetup556_rtb.exe (PID: 2432)
      • CCUpdate.exe (PID: 1088)
    • Modifies the open verb of a shell class

      • ccsetup556_rtb.exe (PID: 2432)
    • Executable content was dropped or overwritten

      • ccsetup556_rtb.exe (PID: 2432)
      • CCUpdate.exe (PID: 1088)
    • Application launched itself

      • CCleaner.exe (PID: 3868)
      • CCUpdate.exe (PID: 1088)
  • INFO

    • Reads settings of System Certificates

      • CCleaner.exe (PID: 3868)
      • CCleaner.exe (PID: 2072)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable (generic) (52.9)
.exe | Generic Win/DOS Executable (23.5)
.exe | DOS Executable Generic (23.5)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2015:12:29 22:34:49+01:00
PEType: PE32
LinkerVersion: 9
CodeSize: 29696
InitializedDataSize: 48128
UninitializedDataSize: 16896
EntryPoint: 0x3a1c
OSVersion: 5
ImageVersion: 6
SubsystemVersion: 5
Subsystem: Windows GUI
FileVersionNumber: 5.56.0.7156
ProductVersionNumber: 5.56.0.7156
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
CompanyName: Piriform Software Ltd
FileDescription: CCleaner Installer
FileVersion: 5.56.0.7156
LegalCopyright: Copyright © 2005-2019 Piriform Software Ltd
ProductName: CCleaner

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 29-Dec-2015 21:34:49
Detected languages:
  • English - United States
CompanyName: Piriform Software Ltd
FileDescription: CCleaner Installer
FileVersion: 5.56.0.7156
LegalCopyright: Copyright © 2005-2019 Piriform Software Ltd
ProductName: CCleaner

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000D8

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 5
Time date stamp: 29-Dec-2015 21:34:49
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x00007250
0x00007400
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.46491
.rdata
0x00009000
0x00002B38
0x00002C00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.41939
.data
0x0000C000
0x00067EDC
0x00000200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
1.89689
.ndata
0x00074000
0x0038D000
0x00000000
IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
.rsrc
0x00401000
0x00008D58
0x00008E00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.95614

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.27868
1212
Latin 1 / Western European
English - United States
RT_MANIFEST
2
5.62687
4264
Latin 1 / Western European
English - United States
RT_ICON
3
4.7389
2216
Latin 1 / Western European
English - United States
RT_ICON
4
3.91559
1384
Latin 1 / Western European
English - United States
RT_ICON
5
5.97397
1128
Latin 1 / Western European
English - United States
RT_ICON
6
3.89369
744
Latin 1 / Western European
English - United States
RT_ICON
103
2.72033
90
Latin 1 / Western European
English - United States
RT_GROUP_ICON
105
2.704
688
Latin 1 / Western European
English - United States
RT_DIALOG
106
2.92897
344
Latin 1 / Western European
English - United States
RT_DIALOG
107
2.52183
160
Latin 1 / Western European
English - United States
RT_DIALOG

Imports

ADVAPI32.dll
COMCTL32.dll
GDI32.dll
KERNEL32.dll
SHELL32.dll
USER32.dll
ole32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
44
Monitored processes
9
Malicious processes
4
Suspicious processes
1

Behavior graph

Click at the process to see the details
drop and start drop and start drop and start drop and start start ccsetup556_rtb.exe nsdd50.tmp no specs ping.exe no specs ccleaner.exe no specs ccupdate.exe ccupdate.exe ccleaner.exe ccleaner.exe ccsetup556_rtb.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1088"C:\Program Files\CCleaner\CCUpdate.exe" /regC:\Program Files\CCleaner\CCUpdate.exe
ccsetup556_rtb.exe
User:
admin
Company:
Piriform Software Ltd
Integrity Level:
HIGH
Description:
CCleaner emergency updater
Exit code:
0
Version:
19.2.566.0
Modules
Images
c:\program files\ccleaner\ccupdate.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
1836"C:\Users\admin\AppData\Local\Temp\nsr4601.tmp\nsDD50.tmp" C:\Windows\system32\ping.exe -n 1 -w 5000 www.ccleaner.comC:\Users\admin\AppData\Local\Temp\nsr4601.tmp\nsDD50.tmpccsetup556_rtb.exe
User:
admin
Integrity Level:
HIGH
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\nsr4601.tmp\nsdd50.tmp
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
2072"C:\Program Files\CCleaner\CCleaner.exe" /monitorC:\Program Files\CCleaner\CCleaner.exe
CCleaner.exe
User:
admin
Company:
Piriform Software Ltd
Integrity Level:
HIGH
Description:
CCleaner
Exit code:
0
Version:
5.56.0.7156
Modules
Images
c:\program files\ccleaner\ccleaner.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
2304C:\Windows\system32\ping.exe -n 1 -w 5000 www.ccleaner.comC:\Windows\system32\ping.exensDD50.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
TCP/IP Ping Command
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\ping.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iphlpapi.dll
c:\windows\system32\nsi.dll
2356CCUpdate.exe /emupdater /applydll "C:\Program Files\CCleaner\Setup\ae406099-ed20-450a-a3f5-1ae911051acb.dll"C:\Program Files\CCleaner\CCUpdate.exe
CCUpdate.exe
User:
admin
Company:
Piriform Software Ltd
Integrity Level:
HIGH
Description:
CCleaner emergency updater
Exit code:
0
Version:
19.2.566.0
Modules
Images
c:\program files\ccleaner\ccupdate.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
2432"C:\Users\admin\AppData\Local\Temp\ccsetup556_rtb.exe" C:\Users\admin\AppData\Local\Temp\ccsetup556_rtb.exe
explorer.exe
User:
admin
Company:
Piriform Software Ltd
Integrity Level:
HIGH
Description:
CCleaner Installer
Exit code:
3221225547
Version:
5.56.0.7156
Modules
Images
c:\users\admin\appdata\local\temp\ccsetup556_rtb.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
3392"C:\Users\admin\AppData\Local\Temp\ccsetup556_rtb.exe" C:\Users\admin\AppData\Local\Temp\ccsetup556_rtb.exeexplorer.exe
User:
admin
Company:
Piriform Software Ltd
Integrity Level:
MEDIUM
Description:
CCleaner Installer
Exit code:
3221226540
Version:
5.56.0.7156
Modules
Images
c:\users\admin\appdata\local\temp\ccsetup556_rtb.exe
c:\systemroot\system32\ntdll.dll
3868"C:\Program Files\CCleaner\CCleaner.exe" C:\Program Files\CCleaner\CCleaner.exe
ccsetup556_rtb.exe
User:
admin
Company:
Piriform Software Ltd
Integrity Level:
HIGH
Description:
CCleaner
Exit code:
0
Version:
5.56.0.7156
Modules
Images
c:\program files\ccleaner\ccleaner.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
4056"C:\Program Files\CCleaner\CCleaner.exe" /createSkipUAC 5.35.6210C:\Program Files\CCleaner\CCleaner.execcsetup556_rtb.exe
User:
admin
Company:
Piriform Software Ltd
Integrity Level:
HIGH
Description:
CCleaner
Exit code:
0
Version:
5.56.0.7156
Modules
Images
c:\program files\ccleaner\ccleaner.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
Total events
3 235
Read events
2 977
Write events
248
Delete events
10

Modification events

(PID) Process:(2432) ccsetup556_rtb.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Piriform\CCleaner
Operation:delete valueName:GUID
Value:
00000000-0000-4000-8000-d6f7f2be5127
(PID) Process:(2432) ccsetup556_rtb.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2432) ccsetup556_rtb.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\91C6D6EE3E8AC86384E548C299295C756C817B81
Operation:writeName:Blob
Value:
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
(PID) Process:(2432) ccsetup556_rtb.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\91C6D6EE3E8AC86384E548C299295C756C817B81
Operation:writeName:Blob
Value:
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
(PID) Process:(2432) ccsetup556_rtb.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Google Toolbar
Operation:writeName:test
Value:
test
(PID) Process:(2432) ccsetup556_rtb.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Google Toolbar
Operation:delete valueName:test
Value:
test
(PID) Process:(2432) ccsetup556_rtb.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Google\Google Toolbar
Operation:delete keyName:
Value:
(PID) Process:(2432) ccsetup556_rtb.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
(PID) Process:(2432) ccsetup556_rtb.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
1
(PID) Process:(2432) ccsetup556_rtb.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Extensible Cache\MSHist012019050820190509
Operation:writeName:CachePath
Value:
%USERPROFILE%\AppData\Local\Microsoft\Windows\History\History.IE5\MSHist012019050820190509
Executable files
129
Suspicious files
2
Text files
52
Unknown types
8

Dropped files

PID
Process
Filename
Type
2432ccsetup556_rtb.exeC:\Users\admin\AppData\Local\Temp\nsr4601.tmp\p\pfBL.dllexecutable
MD5:
SHA256:
2432ccsetup556_rtb.exeC:\Users\admin\AppData\Local\Temp\nsr4601.tmp\System.dllexecutable
MD5:41A3C964232EDD2D7D5EDEA53E8245CD
SHA256:8B65FEC615C7B371C23F8F7F344B12DC5085E40A556F96DB318ED757494D62D5
2432ccsetup556_rtb.exeC:\Users\admin\AppData\Local\Temp\nsr4601.tmp\g\gcombo\ComboOffer_1026.htmlhtml
MD5:31F4AFA1E87F0243C43B0203B89D50B1
SHA256:34C5182D004DF6016042423E040A79F597E9286F5F75F38C0A821FC06494C702
2432ccsetup556_rtb.exeC:\Users\admin\AppData\Local\Temp\nsr4601.tmp\UserInfo.dllexecutable
MD5:C1F778A6D65178D34BDE4206161A98E0
SHA256:9CAF7A78F750713180CF64D18967A2B803B5580E636E59279DCAAF18BA0DAA87
2432ccsetup556_rtb.exeC:\Users\admin\AppData\Local\Temp\nsr4601.tmp\g\gtapi_signed.dllexecutable
MD5:61BC40D1FAD9E0FAA9A07219B90BA0E4
SHA256:89E157A4F61D7D18180CB7F901C0095DA3B7A5CC5A9FD58D710099E5F0EE505A
2432ccsetup556_rtb.exeC:\Users\admin\AppData\Local\Temp\nsr4601.tmp\g\gcombo\ComboOffer_1025.htmlhtml
MD5:3876777E8E7B73A9A1113402FE54ACA9
SHA256:06EE0D941530D5BF86009E7DF0D15DD5767BE6DDA2F955F2AEDBD220EDB261B6
2432ccsetup556_rtb.exeC:\Users\admin\AppData\Local\Temp\nsr4601.tmp\g\gcombo\ComboOffer_1027.htmlhtml
MD5:D23B9D2A41FB327025C45B392B8415A5
SHA256:36B5327492D4A1097A87C6F52EA89D90AB5245799A700E189C48FD41E2EA7179
2432ccsetup556_rtb.exeC:\Users\admin\AppData\Local\Temp\nsr4601.tmp\g\gcombo\ComboOffer_1029.htmlhtml
MD5:D4A26EE683F64D4192888E427503DBA2
SHA256:55B1D3AEF2C70664EFD560B22BDAFFC4A4BE25D25BB0C514C25B5AAE1E60082C
2432ccsetup556_rtb.exeC:\Users\admin\AppData\Local\Temp\nsr4601.tmp\g\gcombo\ComboOffer_1033.htmlhtml
MD5:016F10E3840423FD75A776923AA3E57D
SHA256:C89B3683C75B641526524E2397D9BEB24F5BBD0D813D60CEB2B5B8896AE17659
2432ccsetup556_rtb.exeC:\Users\admin\AppData\Local\Temp\nsr4601.tmp\g\gcombo\ComboOffer_1028.htmlhtml
MD5:3C9D9A1818BEDE3E8E7FA99685D503DF
SHA256:5CDEAA26F12096E1AECDA8ACC42516341599AE4122D8E9C95D461CEB0A7E3010
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
12
TCP/UDP connections
17
DNS requests
18
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1088
CCUpdate.exe
HEAD
200
2.16.186.73:80
http://emupdate.avcdn.net/files/emupdate/pong.txt
unknown
whitelisted
1088
CCUpdate.exe
GET
200
2.16.186.56:80
http://ccleaner.tools.avcdn.net/tools/ccleaner/update/updates.xml
unknown
xml
1.55 Kb
whitelisted
2432
ccsetup556_rtb.exe
GET
200
151.101.0.64:80
http://service.piriform.com/installcheck.aspx?p=1&v=5.56.7156&vx=5.35.6210&l=1033&b=1&o=6.1W3&g=14&i=1&a=0&e=0&n=ccsetup556_rtb.exe&id=003&mk=IJR6-W5SV-5KYR-QBZD-6BY4-RN5Z-WAV9-RVK2-VJCA&mx=97B7721C4994E2556FF6A439510F665DB45337A341A47E15F4997584423BF714&gd=f91f34c6-99d4-4ee3-9e4c-d3a206d8f8f3
US
text
4 b
whitelisted
2356
CCUpdate.exe
GET
200
5.62.38.20:80
http://ip-info.ff.avast.com/v2/info
NL
text
374 b
whitelisted
1088
CCUpdate.exe
GET
200
2.16.186.56:80
http://ccleaner.tools.avcdn.net/tools/ccleaner/update/20180205.dll
unknown
executable
469 Kb
whitelisted
1088
CCUpdate.exe
GET
200
2.16.186.56:80
http://ccleaner.tools.avcdn.net/tools/ccleaner/update/patches.ini
unknown
ini
170 b
whitelisted
2356
CCUpdate.exe
GET
200
216.58.206.14:80
http://www.google-analytics.com/collect?v=1&tid=UA-58120669-26&t=event&cid=97b7721c4994e2556ff6a439510f665db45337a341a47e15f4997584423bf714&ec=20180910&ea=executed&el=1&ev=0
US
image
35 b
whitelisted
3868
CCleaner.exe
GET
200
151.101.2.202:80
http://www.ccleaner.com/auto?a=0&p=cc&v=5.56.7156&l=1033&lk=&mk=IJR6-W5SV-5KYR-QBZD-6BY4-RN5Z-WAV9-RVK2-VJCA&o=6.1W3&au=1&mx=97B7721C4994E2556FF6A439510F665DB45337A341A47E15F4997584423BF714&gd=f91f34c6-99d4-4ee3-9e4c-d3a206d8f8f3
US
text
23 b
whitelisted
3868
CCleaner.exe
GET
200
151.101.2.109:80
http://license.piriform.com/verify/?p=ccpro&c=cc&cv=5.56.7156&l=1033&lk=CJ9T-J7CU-SPNV-GWMB-WBEC&mk=IJR6-W5SV-5KYR-QBZD-6BY4-RN5Z-WAV9-RVK2-VJCA&mx=97B7721C4994E2556FF6A439510F665DB45337A341A47E15F4997584423BF714&gd=f91f34c6-99d4-4ee3-9e4c-d3a206d8f8f3
US
html
5.58 Kb
whitelisted
1088
CCUpdate.exe
GET
200
5.62.38.20:80
http://ip-info.ff.avast.com/v2/info
NL
text
374 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2432
ccsetup556_rtb.exe
77.234.45.54:443
analytics.ff.avast.com
AVAST Software s.r.o.
DE
unknown
2432
ccsetup556_rtb.exe
151.101.0.64:80
service.piriform.com
Fastly
US
whitelisted
2432
ccsetup556_rtb.exe
5.62.48.207:443
shepherd.ff.avast.com
AVAST Software s.r.o.
US
unknown
2356
CCUpdate.exe
5.62.38.20:80
ip-info.ff.avast.com
AVAST Software s.r.o.
NL
suspicious
2356
CCUpdate.exe
216.58.206.14:80
www.google-analytics.com
Google Inc.
US
whitelisted
3868
CCleaner.exe
151.101.2.202:80
www.ccleaner.com
Fastly
US
suspicious
2072
CCleaner.exe
77.234.45.54:443
analytics.ff.avast.com
AVAST Software s.r.o.
DE
unknown
3868
CCleaner.exe
151.101.2.109:443
license.piriform.com
Fastly
US
suspicious
2072
CCleaner.exe
151.101.2.109:443
license.piriform.com
Fastly
US
suspicious
3868
CCleaner.exe
151.101.2.109:80
license.piriform.com
Fastly
US
suspicious

DNS requests

Domain
IP
Reputation
analytics.ff.avast.com
  • 77.234.45.54
  • 77.234.45.53
whitelisted
www.ccleaner.com
  • 151.101.2.202
  • 151.101.66.202
  • 151.101.130.202
  • 151.101.194.202
whitelisted
service.piriform.com
  • 151.101.0.64
  • 151.101.64.64
  • 151.101.128.64
  • 151.101.192.64
whitelisted
shepherd.ff.avast.com
  • 5.62.48.207
  • 5.62.53.220
whitelisted
ip-info.ff.avast.com
  • 5.62.48.17
  • 5.62.38.20
whitelisted
emupdate.avcdn.net
  • 2.16.186.49
  • 2.16.186.73
whitelisted
ccleaner.tools.avcdn.net
  • 2.16.186.64
  • 2.16.186.56
whitelisted
www.google-analytics.com
  • 216.58.206.14
whitelisted
license.piriform.com
  • 151.101.2.109
  • 151.101.66.109
  • 151.101.130.109
  • 151.101.194.109
whitelisted
ipm-provider.ff.avast.com
  • 5.62.42.29
  • 5.62.38.205
  • 5.62.38.45
  • 5.62.38.153
  • 5.62.38.152
  • 5.62.38.155
  • 5.62.38.206
  • 5.62.38.203
  • 5.62.38.44
  • 5.62.38.204
  • 5.62.38.143
  • 5.62.42.31
whitelisted

Threats

PID
Process
Class
Message
1088
CCUpdate.exe
Potential Corporate Privacy Violation
ET POLICY PE EXE or DLL Windows file download HTTP
3868
CCleaner.exe
Misc activity
SUSPICIOUS [PTsecurity] Bundled.Toolbar.Google potentially unsafe
No debug info