IOC Report
pcc_installer_9.7.2227.4112+++.exe

loading gif

Files

File Path
Type
Category
Malicious
pcc_installer_9.7.2227.4112+++.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\ProgramData\Avanquest\PC Cleaner\logs\2024.04.16_10.34.37_pcc_installer_9.7.2227.4112+++_pid=6504.txt
ASCII text, with very long lines (664), with CRLF, LF line terminators
dropped
C:\ProgramData\Avanquest\PC Cleaner\settings\current-partner-params
JSON data
dropped
C:\ProgramData\Avanquest\PC Cleaner\settings\deploy-platform
JSON data
dropped
C:\ProgramData\Avanquest\PC Cleaner\settings\installation-id
JSON data
dropped
C:\ProgramData\Avanquest\PC Cleaner\settings\original-partner-params
JSON data
dropped
C:\ProgramData\Avanquest\PC Cleaner\statistics\unsent-events\2024-04-16T08_36_10_057747
JSON data
dropped
C:\ProgramData\Avanquest\PC Cleaner\statistics\unsent-events\2024-04-16T08_37_10_297720
JSON data
dropped
C:\ProgramData\Avanquest\PC Cleaner\statistics\unsent-events\2024-04-16T08_37_40_757746
JSON data
modified
C:\Users\user\AppData\Local\Temp\5d06d429-dca2-4a00-a698-747e6e242f0f\sciter.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Avanquest\PC Cleaner\settings\language
JSON data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\pcc_installer_9.7.2227.4112+++.exe
"C:\Users\user\Desktop\pcc_installer_9.7.2227.4112+++.exe"
malicious

URLs

Name
IP
Malicious
http://crl.entrust.net/g2ca.crl0
unknown
http://ocsp.sectigo.com0
unknown
https://partner-tracking.lavasoft.com/api/trackingc6c53987-bc57-4c76-902d-b4816fc590f2
unknown
http://ocsp.entrust.net02
unknown
http://ocsp.entrust.net01
unknown
http://ocsp.entrust.net00
unknown
https://store.pchelpsoft.com/clickgate/join.aspx?ref=pchelpsoft.com&ujid=tQ7K0qOn5OA%3D&mkey1=DEFAUL
unknown
https://analytic.pchelpsoft.com/api/v1/eventx
unknown
https://paygw.adaware.com/redirect/custom/avanquestpccleaner
unknown
http://www.apache.org/licenses/LICENSE-2.0Copyright
unknown
http://www.apache.org/licenses/LICENSE-2.0RobotoThin
unknown
http://www.apache.
unknown
https://curl.se/docs/hsts.html
unknown
https://pc-cleaner-updateservice.adaware.com/pccleanerInstallerKernel::ScenarioDetector::~ScenarioDe
unknown
https://stackoverflow.com/a/36
unknown
http://www.apache.org/licenses/LICENSE-2.066
unknown
http://crl.entrust.net/csbr1.crl0
unknown
https://geoip.bluebeach-9a0f96b5.northeurope.azurecontainerapps.io/myip
unknown
https://stage-inapp.pchelpsoft.com/api/v1/event
unknown
https://store.pchelpsoft.com/clickgate/join.aspx?ref=pchelpsoft.com&ujid=tQ7K0qOn5OA%3D
unknown
http://aia.entrust.net/evcs2-chain.p7c01
unknown
https://stage-inapp.pchelpsoft.com/api/v1/eventBasic
unknown
https://store.pchelpsoft.com/clickgate/join.aspx?ref=pchelpsoft.com&ujid=tQ7K0qOn5OA%3Dcheckouthttps
unknown
http://www.entrust.net/rpa0
unknown
http://www.apache.org/licenses/LICENSE-2.0RobotoLight
unknown
https://store.pchelpsoft.com/clickgate/join.aspx?ref=pchelpsoft.com&ujid=TS3sF3So%2FHA%3D&step=2
unknown
http://%s:%d;https=https://%s:%dHTTP/1.0:
unknown
https://inapp.pchelpsoft.com/api/v1/event
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
https://sectigo.com/CPS0
unknown
https://curl.se/docs/http-cookies.html
unknown
https://analytic.pchelpsoft.com/api/v1/event2
unknown
http://www.entrust.net/rpa03
unknown
http://www.winimage.com/zLibDllabcdefghijklmnopqrstuvwxyz0123456789
unknown
https://geoip.bluebeach-9a0f96b5.northeurope.azurecontainerapps.io/myipverify-peerinstallation-idMod
unknown
https://curl.se/docs/alt-svc.html
unknown
https://partner-tracking.lavasoft.com/api/tracking
unknown
https://bgk-rapi.adaware.com/apihttps://stage-bgk-rapi.adaware.com/api'
unknown
https://pc-cleaner-updateservice.adaware.com/pccleaner
unknown
http://www.apache.org/licenses/LICENSE-2.0RobotoBlack
unknown
https://analytic.pchelpsoft.com/api/v1/event
unknown
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
unknown
http://www.apache.org/licenses/LICENSE-2.0RobotoMedium
unknown
https://stage-analytic.pchelpsoft.com/api/v1/eventhttps://analytic.pchelpsoft.com/api/v1/eventSessio
unknown
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
unknown
https://stage-paygw.adaware.com/redirect/custom/avanquestpccleanerhttps://paygw.adaware.com/redirect
unknown
https://cloud.pchelpsoft.com/desktop/pc-cleaner/installSoftware
unknown
http://www.winimage.com/zLibDll
unknown
https://stage-bgk-rapi.adaware.com/api
unknown
https://inapp.pchelpsoft.com/api/v1/eventBasic
unknown
https://stage-analytic.pchelpsoft.com/api/v1/event
unknown
https://cloud.pchelpsoft.com/desktop/pc-cleaner/install
unknown
http://www.apache.org/licenses/LICENSE-2.0N
unknown
http://crl.entrust.net/evcs2.crl0
unknown
https://bgk-rapi.adaware.com/api
unknown
https://www.entrust.net/rpa0
unknown
There are 46 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
geoip.bluebeach-9a0f96b5.northeurope.azurecontainerapps.io
20.107.212.238
pc-cleaner-updateservice.adaware.com
104.16.212.94
analytic.pchelpsoft.com
172.67.73.195
partner-tracking.lavasoft.com
104.16.148.130

IPs

IP
Domain
Country
Malicious
20.107.212.238
geoip.bluebeach-9a0f96b5.northeurope.azurecontainerapps.io
United States
104.16.148.130
partner-tracking.lavasoft.com
United States
104.16.212.94
pc-cleaner-updateservice.adaware.com
United States
127.0.0.1
unknown
unknown
172.67.73.195
analytic.pchelpsoft.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
1860000
heap
page read and write
34A8000
heap
page read and write
6CA97000
unkown
page readonly
7043000
heap
page read and write
9CEF000
heap
page read and write
3474000
heap
page read and write
194B000
heap
page read and write
9900000
heap
page read and write
DB0000
heap
page read and write
A1AC000
heap
page read and write
6E20000
trusted library allocation
page read and write
34D2000
heap
page read and write
93B6000
heap
page read and write
34C2000
heap
page read and write
6E10000
trusted library allocation
page read and write
3457000
heap
page read and write
6D10000
trusted library allocation
page read and write
DD0000
unkown
page readonly
9933000
heap
page read and write
6EE4000
heap
page read and write
42A6000
heap
page read and write
6C7E5000
unkown
page write copy
9CAA000
heap
page read and write
3468000
heap
page read and write
A097000
heap
page read and write
34A5000
heap
page read and write
1935000
heap
page read and write
4270000
heap
page read and write
6CA88000
unkown
page read and write
3620000
remote allocation
page read and write
6E10000
trusted library allocation
page read and write
93B9000
heap
page read and write
7068000
heap
page read and write
A1C2000
heap
page read and write
3468000
heap
page read and write
6D90000
trusted library allocation
page read and write
34D4000
heap
page read and write
A1AA000
heap
page read and write
6D30000
trusted library allocation
page read and write
6F2C000
stack
page read and write
6E20000
trusted library allocation
page read and write
A087000
heap
page read and write
34B1000
heap
page read and write
91EE000
stack
page read and write
1034000
unkown
page readonly
6C6A1000
unkown
page readonly
6E00000
trusted library allocation
page read and write
1917000
heap
page read and write
34B8000
heap
page read and write
3465000
heap
page read and write
A1F7000
heap
page read and write
9CB3000
heap
page read and write
A03E000
stack
page read and write
3474000
heap
page read and write
68CE000
stack
page read and write
6C230000
unkown
page readonly
6CAA5000
unkown
page readonly
6E30000
trusted library allocation
page read and write
DD0000
unkown
page readonly
3474000
heap
page read and write
A208000
heap
page read and write
7F757000
trusted library allocation
page execute read
A158000
heap
page read and write
34AA000
heap
page read and write
34D4000
heap
page read and write
4292000
heap
page read and write
11F6000
unkown
page read and write
3492000
heap
page read and write
9F8000
stack
page read and write
345E000
heap
page read and write
6E00000
trusted library allocation
page read and write
6CAC6000
unkown
page readonly
7059000
heap
page read and write
92EC000
stack
page read and write
6D20000
trusted library allocation
page read and write
A1B3000
heap
page read and write
A1BE000
heap
page read and write
34C0000
heap
page read and write
34C2000
heap
page read and write
332E000
heap
page read and write
3C12000
heap
page read and write
3474000
heap
page read and write
3472000
heap
page read and write
11FF000
unkown
page readonly
7F75E000
trusted library allocation
page execute read
9495000
heap
page read and write
34CF000
heap
page read and write
6EE0000
heap
page read and write
18EC000
heap
page read and write
A092000
heap
page read and write
64CF000
stack
page read and write
34D4000
heap
page read and write
348F000
heap
page read and write
429F000
heap
page read and write
193E000
heap
page read and write
3474000
heap
page read and write
6CAAC000
unkown
page readonly
34D9000
heap
page read and write
3474000
heap
page read and write
9CC6000
heap
page read and write
348F000
heap
page read and write
34B4000
heap
page read and write
348F000
heap
page read and write
346C000
heap
page read and write
348F000
heap
page read and write
176E000
heap
page read and write
3C27000
heap
page read and write
A103000
heap
page read and write
A094000
heap
page read and write
7F746000
trusted library allocation
page execute read
674E000
stack
page read and write
3468000
heap
page read and write
3464000
heap
page read and write
3474000
heap
page read and write
703A000
heap
page read and write
A0FB000
heap
page read and write
34C2000
heap
page read and write
A1BA000
heap
page read and write
7054000
heap
page read and write
11FF000
unkown
page readonly
34A8000
heap
page read and write
1880000
heap
page read and write
3443000
heap
page read and write
A133000
heap
page read and write
18E5000
heap
page read and write
638D000
stack
page read and write
3474000
heap
page read and write
7060000
heap
page read and write
3464000
heap
page read and write
A12C000
heap
page read and write
18F7000
heap
page read and write
3420000
heap
page read and write
9CA1000
heap
page read and write
A1BC000
heap
page read and write
6C7E1000
unkown
page read and write
702F000
stack
page read and write
664E000
stack
page read and write
34A4000
heap
page read and write
4285000
heap
page read and write
34AE000
heap
page read and write
1785000
heap
page read and write
34B4000
heap
page read and write
CF8000
stack
page read and write
7F751000
trusted library allocation
page execute read
3474000
heap
page read and write
3474000
heap
page read and write
99B5000
heap
page read and write
3468000
heap
page read and write
3474000
heap
page read and write
A1C0000
heap
page read and write
9CD0000
heap
page read and write
7F744000
trusted library allocation
page execute read
3643000
heap
page read and write
196C000
heap
page read and write
DD1000
unkown
page execute read
34C0000
heap
page read and write
18F6000
heap
page read and write
69CF000
stack
page read and write
34CA000
heap
page read and write
A090000
heap
page read and write
9CCB000
heap
page read and write
3492000
heap
page read and write
6E00000
trusted library allocation
page read and write
348F000
heap
page read and write
A0C9000
heap
page read and write
A082000
heap
page read and write
9CFC000
heap
page read and write
191C000
heap
page read and write
9313000
heap
page read and write
9CDF000
heap
page read and write
7F755000
trusted library allocation
page execute read
345B000
heap
page read and write
34D9000
heap
page read and write
3468000
heap
page read and write
1920000
heap
page read and write
7F748000
trusted library allocation
page execute read
1979000
heap
page read and write
3468000
heap
page read and write
34A4000
heap
page read and write
A13F000
heap
page read and write
348F000
heap
page read and write
3474000
heap
page read and write
3474000
heap
page read and write
34C8000
heap
page read and write
705D000
heap
page read and write
6E00000
trusted library allocation
page read and write
34AE000
heap
page read and write
193C000
heap
page read and write
18EF000
heap
page read and write
624D000
stack
page read and write
A1B5000
heap
page read and write
34C2000
heap
page read and write
3614000
heap
page read and write
191A000
heap
page read and write
346A000
heap
page read and write
34D9000
heap
page read and write
3468000
heap
page read and write
1917000
heap
page read and write
6EC0000
heap
page read and write
9CA7000
heap
page read and write
3474000
heap
page read and write
3474000
heap
page read and write
1920000
heap
page read and write
93D3000
heap
page read and write
34B8000
heap
page read and write
93D6000
heap
page read and write
3468000
heap
page read and write
6DF0000
trusted library allocation
page read and write
3474000
heap
page read and write
3560000
heap
page read and write
7063000
heap
page read and write
34AE000
heap
page read and write
3468000
heap
page read and write
DD1000
unkown
page execute read
A199000
heap
page read and write
A0D1000
heap
page read and write
6CAB8000
unkown
page readonly
D60000
heap
page read and write
1034000
unkown
page readonly
348F000
heap
page read and write
3468000
heap
page read and write
704A000
heap
page read and write
A19C000
heap
page read and write
7F742000
trusted library allocation
page execute read
7F759000
trusted library allocation
page execute read
9437000
heap
page read and write
7117000
heap
page read and write
1767000
heap
page read and write
3474000
heap
page read and write
6BE2000
heap
page read and write
3465000
heap
page read and write
34A5000
heap
page read and write
34CA000
heap
page read and write
6E00000
trusted library allocation
page read and write
348F000
heap
page read and write
18EC000
heap
page read and write
6D8E000
stack
page read and write
A12F000
heap
page read and write
93E6000
heap
page read and write
A1B1000
heap
page read and write
3484000
heap
page read and write
35BC000
stack
page read and write
3474000
heap
page read and write
7F740000
trusted library allocation
page execute read
34B1000
heap
page read and write
18F6000
heap
page read and write
9300000
heap
page read and write
9CBC000
heap
page read and write
6D90000
trusted library allocation
page read and write
6DF0000
trusted library allocation
page read and write
3468000
heap
page read and write
34A5000
heap
page read and write
427E000
heap
page read and write
A275000
heap
page read and write
688D000
stack
page read and write
A23D000
heap
page read and write
9A05000
heap
page read and write
A232000
heap
page read and write
34C5000
heap
page read and write
6E30000
trusted library allocation
page read and write
3474000
heap
page read and write
6DD0000
trusted library allocation
page read and write
3492000
heap
page read and write
3483000
heap
page read and write
A08B000
heap
page read and write
6DF0000
trusted library allocation
page read and write
6CA86000
unkown
page read and write
6E20000
trusted library allocation
page read and write
9447000
heap
page read and write
346A000
heap
page read and write
3463000
heap
page read and write
9964000
heap
page read and write
3445000
heap
page read and write
3474000
heap
page read and write
18A2000
heap
page read and write
3468000
heap
page read and write
3620000
remote allocation
page read and write
3550000
heap
page read and write
3468000
heap
page read and write
1935000
heap
page read and write
3474000
heap
page read and write
3474000
heap
page read and write
6DF0000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
7030000
heap
page read and write
9475000
heap
page read and write
614C000
stack
page read and write
3C48000
heap
page read and write
35FD000
stack
page read and write
A1A8000
heap
page read and write
1760000
heap
page read and write
939D000
heap
page read and write
9522000
trusted library allocation
page read and write
3474000
heap
page read and write
34AD000
heap
page read and write
7037000
heap
page read and write
A20E000
heap
page read and write
348B000
heap
page read and write
3610000
heap
page read and write
3C41000
heap
page read and write
7F75B000
trusted library allocation
page execute read
705B000
heap
page read and write
6CA84000
unkown
page read and write
628C000
stack
page read and write
34B4000
heap
page read and write
3474000
heap
page read and write
9504000
trusted library allocation
page read and write
9CF3000
heap
page read and write
34D9000
heap
page read and write
3474000
heap
page read and write
3474000
heap
page read and write
18EC000
heap
page read and write
18BD000
heap
page read and write
7F753000
trusted library allocation
page execute read
6DE0000
trusted library allocation
page read and write
A040000
heap
page read and write
3C20000
heap
page read and write
3467000
heap
page read and write
3464000
heap
page read and write
9315000
heap
page read and write
63CE000
stack
page read and write
69DA000
heap
page read and write
11DB000
unkown
page write copy
34A4000
heap
page read and write
11FC000
unkown
page read and write
6C231000
unkown
page execute read
34A8000
heap
page read and write
939B000
heap
page read and write
348F000
heap
page read and write
11D8000
unkown
page write copy
6C7F9000
unkown
page read and write
3474000
heap
page read and write
3485000
heap
page read and write
9C96000
heap
page read and write
348F000
heap
page read and write
678D000
stack
page read and write
18A6000
heap
page read and write
11D8000
unkown
page read and write
3C34000
heap
page read and write
3CA1000
heap
page read and write
3430000
heap
page read and write
17B0000
trusted library section
page readonly
92F0000
heap
page read and write
1974000
heap
page read and write
3468000
heap
page read and write
34D5000
heap
page read and write
6CA90000
unkown
page readonly
6CACD000
unkown
page readonly
1780000
heap
page read and write
34A5000
heap
page read and write
348F000
heap
page read and write
3474000
heap
page read and write
3620000
remote allocation
page read and write
There are 343 hidden memdumps, click here to show them.