URL:

https://www.iobit.com/en/advancedsystemcarefree.php

Full analysis: https://app.any.run/tasks/8e5da589-d07a-4c1c-8bcc-4afc8adcf480
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: February 15, 2025, 15:38:14
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
delphi
inno
installer
arch-doc
stealer
arch-scr
arch-html
antivm
Indicators:
MD5:

368FE686DADCB000F4B1B13ECE6FDFEE

SHA1:

AB5A3BC64141E1E7A81A089461249832506BD08A

SHA256:

02106519864ADE8EDDA064A20D927292880B4F1BAC22C8C297A3684E05293281

SSDEEP:

3:N8DSLgz1EoZWRAPDNV:2OLghPZWRYDNV

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Actions looks like stealing of personal data

      • smBootTime.exe (PID: 2580)
      • ASCService.exe (PID: 2756)
      • ASC.exe (PID: 3028)
      • AutoCare.exe (PID: 2748)
    • Steals credentials from Web Browsers

      • smBootTime.exe (PID: 2580)
      • ASC.exe (PID: 3028)
      • AutoCare.exe (PID: 2748)
    • Registers / Runs the DLL via REGSVR32.EXE

      • ASCInit.exe (PID: 2468)
    • Changes the autorun value in the registry

      • ASCInit.exe (PID: 2468)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • advanced-systemcare-setup.exe (PID: 3688)
      • advanced-systemcare-setup.exe (PID: 3676)
      • advanced-systemcare-setup.tmp (PID: 3764)
      • advanced-systemcare-setup.tmp (PID: 1104)
      • advanced-systemcare-setup.exe (PID: 1584)
      • ASCInit.exe (PID: 2468)
      • Monitor.exe (PID: 3388)
    • Cleans NTFS data stream (Zone Identifier)

      • msedge.exe (PID: 1040)
    • Reads the Internet Settings

      • advanced-systemcare-setup.tmp (PID: 3764)
      • advanced-systemcare-setup.tmp (PID: 1104)
      • ASCInit.exe (PID: 2468)
      • Setup.exe (PID: 1852)
      • ASC.exe (PID: 3028)
      • Monitor.exe (PID: 3388)
      • AutoUpdate.exe (PID: 3160)
      • IObitLiveUpdate.exe (PID: 276)
      • AutoCare.exe (PID: 2748)
    • Reads security settings of Internet Explorer

      • advanced-systemcare-setup.tmp (PID: 3764)
      • advanced-systemcare-setup.tmp (PID: 1104)
      • ASCInit.exe (PID: 2468)
      • Setup.exe (PID: 1852)
      • ASC.exe (PID: 3028)
      • ASCVER.exe (PID: 2292)
      • IObitLiveUpdate.exe (PID: 276)
    • Reads the Windows owner or organization settings

      • advanced-systemcare-setup.tmp (PID: 3764)
      • advanced-systemcare-setup.tmp (PID: 1104)
      • smBootTime.exe (PID: 2580)
      • smBootTime.exe (PID: 3284)
      • smBootTime.exe (PID: 2800)
      • ASC.exe (PID: 3028)
      • smBootTime.exe (PID: 1284)
      • AutoCare.exe (PID: 2748)
    • Drops 7-zip archiver for unpacking

      • advanced-systemcare-setup.tmp (PID: 1104)
    • Process drops legitimate windows executable

      • advanced-systemcare-setup.tmp (PID: 1104)
    • Drops a system driver (possible attempt to evade defenses)

      • advanced-systemcare-setup.tmp (PID: 1104)
      • Monitor.exe (PID: 3388)
    • Process drops SQLite DLL files

      • advanced-systemcare-setup.tmp (PID: 1104)
    • Searches for installed software

      • advanced-systemcare-setup.tmp (PID: 1104)
      • smBootTime.exe (PID: 2580)
      • UninstallInfo.exe (PID: 2144)
      • PrivacyShield.exe (PID: 1836)
      • smBootTime.exe (PID: 3284)
      • ASCService.exe (PID: 2756)
      • Setup.exe (PID: 1852)
      • smBootTime.exe (PID: 2800)
      • Monitor.exe (PID: 3388)
      • ASC.exe (PID: 3028)
      • BrowserProtect.exe (PID: 3464)
      • ASCTray.exe (PID: 3120)
      • Display.exe (PID: 2900)
      • smBootTime.exe (PID: 1284)
      • AutoUpdate.exe (PID: 3160)
      • IObitLiveUpdate.exe (PID: 276)
      • Register.exe (PID: 3972)
      • Display.exe (PID: 2028)
      • Reminder.exe (PID: 2680)
      • AutoCare.exe (PID: 2748)
      • AutoUpdate.exe (PID: 916)
    • Executes as Windows Service

      • ASCService.exe (PID: 2756)
    • Starts SC.EXE for service management

      • cmd.exe (PID: 2728)
    • Windows service management via SC.EXE

      • sc.exe (PID: 2696)
    • Starts CMD.EXE for commands execution

      • ASCInit.exe (PID: 2468)
      • ASC.exe (PID: 3028)
    • Reads the date of Windows installation

      • ASCInit.exe (PID: 2468)
      • ASC.exe (PID: 3028)
      • AutoCare.exe (PID: 2748)
    • Creates/Modifies COM task schedule object

      • regsvr32.exe (PID: 2928)
    • Application launched itself

      • RealTimeProtector.exe (PID: 3520)
    • Checks Windows Trust Settings

      • ASCVER.exe (PID: 2292)
      • AutoCare.exe (PID: 2748)
    • Checks for Java to be installed

      • ASC.exe (PID: 3028)
      • AutoCare.exe (PID: 2748)
    • There is functionality for taking screenshot (YARA)

      • ASC.exe (PID: 3028)
      • Monitor.exe (PID: 3388)
      • AutoCare.exe (PID: 2748)
    • The process checks if it is being run in the virtual environment

      • ASC.exe (PID: 3028)
    • Reads settings of System Certificates

      • ASCVER.exe (PID: 2292)
      • AutoCare.exe (PID: 2748)
    • Adds/modifies Windows certificates

      • ASCVER.exe (PID: 2292)
    • The process verifies whether the antivirus software is installed

      • ASC.exe (PID: 3028)
    • There is functionality for VM detection VirtualBox (YARA)

      • Monitor.exe (PID: 3388)
    • Suspicious use of NETSH.EXE

      • ASC.exe (PID: 3028)
      • AutoCare.exe (PID: 2748)
    • Process uses IPCONFIG to clear DNS cache

      • cmd.exe (PID: 4032)
    • Creates files in the driver directory

      • drvinst.exe (PID: 2916)
      • drvinst.exe (PID: 652)
      • drvinst.exe (PID: 764)
    • Creates or modifies Windows services

      • ASC.exe (PID: 3028)
    • Read startup parameters

      • AutoCare.exe (PID: 2748)
    • Checks for the .NET to be installed

      • AutoCare.exe (PID: 2748)
    • There is functionality for communication over UDP network (YARA)

      • AutoCare.exe (PID: 2748)
    • Reads the history of recent RDP connections

      • AutoCare.exe (PID: 2748)
    • Reads browser cookies

      • AutoCare.exe (PID: 2748)
  • INFO

    • Application launched itself

      • msedge.exe (PID: 1040)
      • msedge.exe (PID: 2512)
      • msedge.exe (PID: 2732)
      • msedge.exe (PID: 1832)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 3400)
      • msedge.exe (PID: 2732)
    • The sample compiled with english language support

      • advanced-systemcare-setup.tmp (PID: 3764)
      • advanced-systemcare-setup.tmp (PID: 1104)
      • ASCInit.exe (PID: 2468)
      • Monitor.exe (PID: 3388)
    • Checks supported languages

      • wmpnscfg.exe (PID: 3400)
      • advanced-systemcare-setup.exe (PID: 3676)
      • Setup.exe (PID: 1852)
      • advanced-systemcare-setup.exe (PID: 1584)
      • advanced-systemcare-setup.tmp (PID: 1104)
      • ASCUpgrade.exe (PID: 1304)
      • ASCUpgrade.exe (PID: 488)
      • LocalLang.exe (PID: 2368)
      • ASCInit.exe (PID: 2468)
      • ASCService.exe (PID: 2756)
      • smBootTimeBase.exe (PID: 2932)
      • smBootTime.exe (PID: 2580)
      • UninstallInfo.exe (PID: 2144)
      • advanced-systemcare-setup.tmp (PID: 3652)
      • BrowserCleaner.exe (PID: 1336)
      • PrivacyShield.exe (PID: 1836)
      • advanced-systemcare-setup.exe (PID: 3688)
      • advanced-systemcare-setup.tmp (PID: 3764)
      • smBootTime.exe (PID: 3284)
      • RealTimeProtector.exe (PID: 3520)
      • RealTimeProtector.exe (PID: 3508)
      • DiskDefrag.exe (PID: 3552)
      • RealTimeProtector.exe (PID: 3548)
      • smBootTime.exe (PID: 2800)
      • ASC.exe (PID: 3028)
      • Monitor.exe (PID: 3388)
      • ProductStat3.exe (PID: 2908)
      • BrowserProtect.exe (PID: 3464)
      • ASCTray.exe (PID: 3120)
      • smBootTime.exe (PID: 1284)
      • ASCFeature.exe (PID: 3004)
      • ProductStat3.exe (PID: 3788)
      • Display.exe (PID: 2900)
      • asrft.exe (PID: 3180)
      • AutoUpdate.exe (PID: 3160)
      • ASCVER.exe (PID: 2292)
      • ASCFeature.exe (PID: 1280)
      • ProductStat3.exe (PID: 2912)
      • AutoSweep.exe (PID: 1608)
      • ProductStat3.exe (PID: 328)
      • ProductStat3.exe (PID: 1332)
      • ProductStat3.exe (PID: 3432)
      • AutoCare.exe (PID: 2404)
      • IObitLiveUpdate.exe (PID: 276)
      • ProductStat3.exe (PID: 284)
      • drvinst.exe (PID: 2916)
      • drvinst.exe (PID: 652)
      • drvinst.exe (PID: 764)
      • StartupInfo.exe (PID: 3812)
      • ProductStat3.exe (PID: 2220)
      • Display.exe (PID: 2028)
      • Register.exe (PID: 3972)
      • ProductStat3.exe (PID: 2848)
      • BrowserCleaner.exe (PID: 2572)
      • AppsChecker.exe (PID: 1924)
      • ProductStat3.exe (PID: 2436)
      • MonitorDisk.exe (PID: 4056)
      • Reminder.exe (PID: 2680)
      • ProductStat3.exe (PID: 3600)
      • AutoCare.exe (PID: 2748)
      • ProductStat3.exe (PID: 1784)
      • ProductStat3.exe (PID: 1252)
      • ProductStat3.exe (PID: 448)
      • ProductStat3.exe (PID: 3088)
      • ProductStat3.exe (PID: 4060)
      • ProductStat3.exe (PID: 824)
      • AutoUpdate.exe (PID: 916)
    • Executable content was dropped or overwritten

      • msedge.exe (PID: 1040)
    • Create files in a temporary directory

      • advanced-systemcare-setup.exe (PID: 3676)
      • advanced-systemcare-setup.tmp (PID: 3764)
      • Setup.exe (PID: 1852)
      • advanced-systemcare-setup.exe (PID: 1584)
      • advanced-systemcare-setup.tmp (PID: 1104)
      • advanced-systemcare-setup.exe (PID: 3688)
      • ASC.exe (PID: 3028)
      • IObitLiveUpdate.exe (PID: 276)
      • SecEdit.exe (PID: 3280)
      • SecEdit.exe (PID: 3744)
      • AutoCare.exe (PID: 2748)
    • Reads the computer name

      • wmpnscfg.exe (PID: 3400)
      • advanced-systemcare-setup.tmp (PID: 3652)
      • advanced-systemcare-setup.tmp (PID: 3764)
      • Setup.exe (PID: 1852)
      • advanced-systemcare-setup.tmp (PID: 1104)
      • ASCUpgrade.exe (PID: 488)
      • ASCUpgrade.exe (PID: 1304)
      • ASCInit.exe (PID: 2468)
      • ASCService.exe (PID: 2756)
      • smBootTimeBase.exe (PID: 2932)
      • smBootTime.exe (PID: 2580)
      • UninstallInfo.exe (PID: 2144)
      • PrivacyShield.exe (PID: 1836)
      • smBootTime.exe (PID: 3284)
      • RealTimeProtector.exe (PID: 3508)
      • RealTimeProtector.exe (PID: 3520)
      • RealTimeProtector.exe (PID: 3548)
      • Monitor.exe (PID: 3388)
      • ASC.exe (PID: 3028)
      • BrowserProtect.exe (PID: 3464)
      • smBootTime.exe (PID: 2800)
      • ASCTray.exe (PID: 3120)
      • smBootTime.exe (PID: 1284)
      • ProductStat3.exe (PID: 2908)
      • AutoUpdate.exe (PID: 3160)
      • ASCFeature.exe (PID: 1280)
      • asrft.exe (PID: 3180)
      • ProductStat3.exe (PID: 328)
      • ProductStat3.exe (PID: 1332)
      • ProductStat3.exe (PID: 3432)
      • ASCVER.exe (PID: 2292)
      • AutoCare.exe (PID: 2404)
      • IObitLiveUpdate.exe (PID: 276)
      • drvinst.exe (PID: 2916)
      • drvinst.exe (PID: 652)
      • drvinst.exe (PID: 764)
      • ProductStat3.exe (PID: 2220)
      • Register.exe (PID: 3972)
      • ProductStat3.exe (PID: 2848)
      • BrowserCleaner.exe (PID: 2572)
      • ProductStat3.exe (PID: 2436)
      • MonitorDisk.exe (PID: 4056)
      • ProductStat3.exe (PID: 3600)
      • Reminder.exe (PID: 2680)
      • AutoCare.exe (PID: 2748)
      • ProductStat3.exe (PID: 1784)
      • ProductStat3.exe (PID: 1252)
      • ProductStat3.exe (PID: 448)
      • ProductStat3.exe (PID: 3088)
      • ProductStat3.exe (PID: 4060)
      • ProductStat3.exe (PID: 824)
      • AutoUpdate.exe (PID: 916)
    • Creates files or folders in the user directory

      • advanced-systemcare-setup.tmp (PID: 3764)
      • Setup.exe (PID: 1852)
      • advanced-systemcare-setup.tmp (PID: 1104)
      • ASCInit.exe (PID: 2468)
      • ASCService.exe (PID: 2756)
      • BrowserCleaner.exe (PID: 1336)
      • smBootTime.exe (PID: 2580)
      • ASCTray.exe (PID: 3120)
      • ASC.exe (PID: 3028)
      • ASCFeature.exe (PID: 3004)
      • Display.exe (PID: 2900)
      • AutoCare.exe (PID: 2748)
    • Reads the machine GUID from the registry

      • Setup.exe (PID: 1852)
      • smBootTime.exe (PID: 2580)
      • ASCInit.exe (PID: 2468)
      • UninstallInfo.exe (PID: 2144)
      • Monitor.exe (PID: 3388)
      • ASC.exe (PID: 3028)
      • ASCTray.exe (PID: 3120)
      • asrft.exe (PID: 3180)
      • smBootTime.exe (PID: 1284)
      • AutoUpdate.exe (PID: 3160)
      • ASCVER.exe (PID: 2292)
      • ASCFeature.exe (PID: 1280)
      • IObitLiveUpdate.exe (PID: 276)
      • AutoCare.exe (PID: 2748)
      • AutoUpdate.exe (PID: 916)
    • Creates files in the program directory

      • Setup.exe (PID: 1852)
      • advanced-systemcare-setup.tmp (PID: 1104)
      • ASCInit.exe (PID: 2468)
      • ASCService.exe (PID: 2756)
      • smBootTimeBase.exe (PID: 2932)
      • smBootTime.exe (PID: 2580)
      • UninstallInfo.exe (PID: 2144)
      • PrivacyShield.exe (PID: 1836)
      • smBootTime.exe (PID: 3284)
      • ASC.exe (PID: 3028)
      • ProductStat3.exe (PID: 2908)
      • BrowserProtect.exe (PID: 3464)
      • Display.exe (PID: 2900)
      • ASCVER.exe (PID: 2292)
      • AutoSweep.exe (PID: 1608)
      • AutoUpdate.exe (PID: 3160)
      • AutoCare.exe (PID: 2404)
      • IObitLiveUpdate.exe (PID: 276)
      • StartupInfo.exe (PID: 3812)
      • AutoCare.exe (PID: 2748)
      • AutoUpdate.exe (PID: 916)
    • Compiled with Borland Delphi (YARA)

      • Setup.exe (PID: 1852)
      • advanced-systemcare-setup.exe (PID: 1584)
      • advanced-systemcare-setup.tmp (PID: 1104)
      • ASCService.exe (PID: 2756)
      • ASC.exe (PID: 3028)
      • ASCTray.exe (PID: 3120)
      • Monitor.exe (PID: 3388)
      • Reminder.exe (PID: 2680)
      • AutoCare.exe (PID: 2748)
    • Detects InnoSetup installer (YARA)

      • advanced-systemcare-setup.exe (PID: 1584)
      • advanced-systemcare-setup.tmp (PID: 1104)
    • The sample compiled with chinese language support

      • advanced-systemcare-setup.tmp (PID: 1104)
    • The sample compiled with french language support

      • advanced-systemcare-setup.tmp (PID: 1104)
    • Creates a software uninstall entry

      • advanced-systemcare-setup.tmp (PID: 1104)
    • Reads Environment values

      • ASCInit.exe (PID: 2468)
      • Monitor.exe (PID: 3388)
      • AutoCare.exe (PID: 2748)
    • Checks proxy server information

      • AutoUpdate.exe (PID: 3160)
      • ASC.exe (PID: 3028)
      • AutoCare.exe (PID: 2748)
    • Reads the software policy settings

      • ASCVER.exe (PID: 2292)
    • Reads Microsoft Office registry keys

      • ASC.exe (PID: 3028)
    • Reads mouse settings

      • ASC.exe (PID: 3028)
    • Reads the time zone

      • AutoCare.exe (PID: 2748)
    • Checks transactions between databases Windows and Oracle

      • AutoCare.exe (PID: 2748)
    • Disables trace logs

      • AutoCare.exe (PID: 2748)
    • Reads Windows Product ID

      • AutoCare.exe (PID: 2748)
    • Process checks the number of cached credentials

      • AutoCare.exe (PID: 2748)
    • Process checks whether UAC notifications are on

      • AutoCare.exe (PID: 2748)
    • Reads product name

      • AutoCare.exe (PID: 2748)
    • Process checks Internet Explorer phishing filters

      • AutoCare.exe (PID: 2748)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
168
Monitored processes
122
Malicious processes
12
Suspicious processes
5

Behavior graph

Click at the process to see the details
start msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs wmpnscfg.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs advanced-systemcare-setup.exe advanced-systemcare-setup.tmp no specs advanced-systemcare-setup.exe advanced-systemcare-setup.tmp setup.exe advanced-systemcare-setup.exe advanced-systemcare-setup.tmp ascupgrade.exe no specs ascupgrade.exe no specs locallang.exe no specs ascinit.exe ascservice.exe smboottimebase.exe no specs cmd.exe no specs smboottime.exe sc.exe no specs uninstallinfo.exe regsvr32.exe no specs browsercleaner.exe no specs privacyshield.exe no specs smboottime.exe no specs SPPSurrogate no specs realtimeprotector.exe no specs diskdefrag.exe no specs realtimeprotector.exe no specs smboottime.exe no specs realtimeprotector.exe no specs browserprotect.exe no specs asc.exe monitor.exe productstat3.exe no specs asctray.exe smboottime.exe no specs ascfeature.exe no specs productstat3.exe no specs productstat3.exe no specs display.exe no specs ascfeature.exe autoupdate.exe asrft.exe ascver.exe no specs autosweep.exe no specs productstat3.exe no specs productstat3.exe no specs productstat3.exe no specs netsh.exe no specs netsh.exe no specs autocare.exe no specs iobitliveupdate.exe productstat3.exe no specs cmd.exe no specs ipconfig.exe no specs drvinst.exe no specs drvinst.exe no specs drvinst.exe no specs startupinfo.exe no specs productstat3.exe no specs display.exe no specs productstat3.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs register.exe no specs productstat3.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs browsercleaner.exe no specs appschecker.exe no specs productstat3.exe no specs monitordisk.exe no specs reminder.exe no specs autocare.exe netsh.exe no specs netsh.exe no specs productstat3.exe no specs productstat3.exe no specs productstat3.exe no specs secedit.exe no specs secedit.exe no specs productstat3.exe no specs productstat3.exe no specs productstat3.exe no specs autoupdate.exe

Process information

PID
CMD
Path
Indicators
Parent process
276"C:\Program Files\IObit\Advanced SystemCare\IObitLiveUpdate.exe" /srvuptC:\Program Files\IObit\Advanced SystemCare\IObitLiveUpdate.exe
ASCService.exe
User:
admin
Company:
IObit
Integrity Level:
HIGH
Description:
Product Updater
Exit code:
0
Version:
3.0.0.6467
284"C:\Program Files\IObit\Advanced SystemCare\ProductStat3.exe" /postcache /days 7C:\Program Files\IObit\Advanced SystemCare\ProductStat3.exeASCService.exe
User:
admin
Company:
IObit
Integrity Level:
HIGH
Description:
IObit stat Component
Exit code:
0
Version:
3.0.0.6398
328"C:\Program Files\IObit\Advanced SystemCare\ProductStat3.exe" /statcom /stflag 1101 /appid "asc18" /pd "asc" /url "https://stats.iobit.com/usage_v2.php?action=insert" /user 0 /insur "other" /type 1 /pr "iobit" /ver "18.1.0.201"C:\Program Files\IObit\Advanced SystemCare\ProductStat3.exeASC.exe
User:
admin
Company:
IObit
Integrity Level:
HIGH
Description:
IObit stat Component
Exit code:
0
Version:
3.0.0.6398
328"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=4252 --field-trial-handle=1248,i,3716962158224087483,16316773877896509975,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:8C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
448"C:\Program Files\IObit\Advanced SystemCare\ProductStat3.exe" /statcom /stflag 201 /appid "asc18" /pd "asc" /url "https://stats.iobit.com/usage_v2.php?action=insert" /user 0 /insur "other" /type 1 /pr "iobit" /ver "18.1.0.201"C:\Program Files\IObit\Advanced SystemCare\ProductStat3.exeASC.exe
User:
admin
Company:
IObit
Integrity Level:
HIGH
Description:
IObit stat Component
Exit code:
0
Version:
3.0.0.6398
488"C:\Users\admin\AppData\Local\Temp\is-6F1NA.tmp\ASCUpgrade.exe" /CleanDir "C:\Program Files\IObit\Advanced SystemCare\"C:\Users\admin\AppData\Local\Temp\is-6F1NA.tmp\ASCUpgrade.exeadvanced-systemcare-setup.tmp
User:
admin
Company:
IObit
Integrity Level:
HIGH
Description:
Upgrader
Exit code:
0
Version:
14.2.0.53
Modules
Images
c:\users\admin\appdata\local\temp\is-6f1na.tmp\ascupgrade.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
652DrvInst.exe "5" "0" "C:\Windows\system32\DriverStore\FileRepository\iastorv.inf_x86_neutral_0bcee2057afcc090\iastorv.inf" "0" "6ab7a7c13" "0000048C" "WinSta0\Default"C:\Windows\System32\drvinst.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
688"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1540 --field-trial-handle=1308,i,372858387457572542,17511353740934660205,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:2C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
764DrvInst.exe "5" "0" "C:\Windows\system32\DriverStore\FileRepository\nvraid.inf_x86_neutral_0276fc3b3ea60d41\nvraid.inf" "0" "6d754b63f" "000003F0" "WinSta0\Default"C:\Windows\System32\drvinst.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
824"C:\Program Files\IObit\Advanced SystemCare\ProductStat3.exe" /statcom /stflag 211 /appid "asc18" /pd "asc" /url "https://stats.iobit.com/usage_v2.php?action=insert" /user 0 /insur "other" /type 1 /pr "iobit" /ver "18.1.0.201"C:\Program Files\IObit\Advanced SystemCare\ProductStat3.exeASC.exe
User:
admin
Company:
IObit
Integrity Level:
HIGH
Description:
IObit stat Component
Exit code:
0
Version:
3.0.0.6398
Total events
405 732
Read events
404 632
Write events
1 029
Delete events
71

Modification events

(PID) Process:(1040) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(1040) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(1040) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(1040) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(1040) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(1040) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
Operation:writeName:dr
Value:
1
(PID) Process:(1040) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(1040) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1302019708-1500728564-335382590-1000
Value:
C93F495DC68C2F00
(PID) Process:(1040) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\FirstNotDefault
Operation:delete valueName:S-1-5-21-1302019708-1500728564-335382590-1000
Value:
(PID) Process:(1040) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge
Operation:writeName:UsageStatsInSample
Value:
1
Executable files
321
Suspicious files
404
Text files
542
Unknown types
0

Dropped files

PID
Process
Filename
Type
1040msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF109ef1.TMP
MD5:
SHA256:
1040msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
1040msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF109f10.TMP
MD5:
SHA256:
1040msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old
MD5:
SHA256:
1040msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF109f20.TMP
MD5:
SHA256:
1040msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\LOG.old~RF10a078.TMP
MD5:
SHA256:
1040msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\LOG.old
MD5:
SHA256:
1040msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Crashpad\settings.datbinary
MD5:C782147434522F2D11132EDC5ABD4ED8
SHA256:5D7501D5B5E6537D56B518A1EF57410DFFCF6AD8EE67DEB77DF91C060FEE324B
1936msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\CrashpadMetrics.pmabinary
MD5:886E82F2CA62ECCCE64601B30592078A
SHA256:E5E13D53601100FF3D6BB71514CBCCC4C73FE9B7EF5E930100E644187B42948E
1040msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Variationsbinary
MD5:961E3604F228B0D10541EBF921500C86
SHA256:F7B24F2EB3D5EB0550527490395D2F61C3D2FE74BB9CB345197DAD81B58B5FED
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
106
DNS requests
66
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3028
ASC.exe
GET
23.50.131.85:80
http://download.iobit.com/appnews/default/asc_news.dat
unknown
whitelisted
3028
ASC.exe
GET
206
23.50.131.85:80
http://download.iobit.com/appnews/default/asc_news.dat
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
1108
svchost.exe
224.0.0.252:5355
whitelisted
2900
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2900
msedge.exe
204.79.197.239:443
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
1040
msedge.exe
239.255.255.250:1900
whitelisted
2900
msedge.exe
44.196.182.72:443
www.iobit.com
AMAZON-AES
US
whitelisted
2900
msedge.exe
142.250.186.138:443
fonts.googleapis.com
GOOGLE
US
whitelisted
2900
msedge.exe
216.58.206.46:443
www.googleoptimize.com
GOOGLE
US
whitelisted
2900
msedge.exe
142.250.184.195:443
fonts.gstatic.com
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.78
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
edge.microsoft.com
  • 204.79.197.239
  • 13.107.21.239
whitelisted
www.iobit.com
  • 44.196.182.72
  • 35.170.235.210
  • 54.221.8.158
whitelisted
fonts.googleapis.com
  • 142.250.186.138
whitelisted
www.googleoptimize.com
  • 216.58.206.46
whitelisted
fonts.gstatic.com
  • 142.250.184.195
  • 142.250.185.227
whitelisted
www.googletagmanager.com
  • 216.58.206.40
whitelisted
bat.bing.com
  • 150.171.27.10
  • 150.171.28.10
whitelisted
www.google-analytics.com
  • 142.250.185.174
whitelisted

Threats

PID
Process
Class
Message
3028
ASC.exe
Potentially Bad Traffic
ET HUNTING Suspicious Mozilla User-Agent - Likely Fake (Mozilla/4.0)
3028
ASC.exe
Potentially Bad Traffic
ET HUNTING Suspicious Mozilla User-Agent - Likely Fake (Mozilla/4.0)
Process
Message
Setup.exe
********** FLanguageName: English
Setup.exe
CheckDiskSpace: 3
Setup.exe
CheckDiskSpace: 1
Setup.exe
GetDownloadPath: 3
Setup.exe
GetDownloadPath: 2
Setup.exe
CheckDiskSpace: 2
Setup.exe
CheckDiskSpace: 5
Setup.exe
FormCreate: 2_1
Setup.exe
CheckDiskSpace: 2
Setup.exe
CheckDiskSpace: 2