URL:

https://www.iobit.com/en/advancedsystemcarefree.php

Full analysis: https://app.any.run/tasks/8e5da589-d07a-4c1c-8bcc-4afc8adcf480
Verdict: Malicious activity
Threats:

Stealers are a group of malicious software that are intended for gaining unauthorized access to users’ information and transferring it to the attacker. The stealer malware category includes various types of programs that focus on their particular kind of data, including files, passwords, and cryptocurrency. Stealers are capable of spying on their targets by recording their keystrokes and taking screenshots. This type of malware is primarily distributed as part of phishing campaigns.

Analysis date: February 15, 2025, 15:38:14
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
delphi
inno
installer
arch-doc
stealer
arch-scr
arch-html
antivm
Indicators:
MD5:

368FE686DADCB000F4B1B13ECE6FDFEE

SHA1:

AB5A3BC64141E1E7A81A089461249832506BD08A

SHA256:

02106519864ADE8EDDA064A20D927292880B4F1BAC22C8C297A3684E05293281

SSDEEP:

3:N8DSLgz1EoZWRAPDNV:2OLghPZWRYDNV

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Registers / Runs the DLL via REGSVR32.EXE

      • ASCInit.exe (PID: 2468)
    • Changes the autorun value in the registry

      • ASCInit.exe (PID: 2468)
    • Actions looks like stealing of personal data

      • smBootTime.exe (PID: 2580)
      • ASCService.exe (PID: 2756)
      • ASC.exe (PID: 3028)
      • AutoCare.exe (PID: 2748)
    • Steals credentials from Web Browsers

      • smBootTime.exe (PID: 2580)
      • ASC.exe (PID: 3028)
      • AutoCare.exe (PID: 2748)
  • SUSPICIOUS

    • Cleans NTFS data stream (Zone Identifier)

      • msedge.exe (PID: 1040)
    • Executable content was dropped or overwritten

      • advanced-systemcare-setup.exe (PID: 3676)
      • advanced-systemcare-setup.exe (PID: 3688)
      • advanced-systemcare-setup.tmp (PID: 3764)
      • advanced-systemcare-setup.exe (PID: 1584)
      • advanced-systemcare-setup.tmp (PID: 1104)
      • ASCInit.exe (PID: 2468)
      • Monitor.exe (PID: 3388)
    • Reads security settings of Internet Explorer

      • advanced-systemcare-setup.tmp (PID: 3764)
      • advanced-systemcare-setup.tmp (PID: 1104)
      • ASCInit.exe (PID: 2468)
      • Setup.exe (PID: 1852)
      • ASC.exe (PID: 3028)
      • ASCVER.exe (PID: 2292)
      • IObitLiveUpdate.exe (PID: 276)
    • Reads the Internet Settings

      • advanced-systemcare-setup.tmp (PID: 3764)
      • advanced-systemcare-setup.tmp (PID: 1104)
      • ASCInit.exe (PID: 2468)
      • Setup.exe (PID: 1852)
      • Monitor.exe (PID: 3388)
      • ASC.exe (PID: 3028)
      • AutoUpdate.exe (PID: 3160)
      • IObitLiveUpdate.exe (PID: 276)
      • AutoCare.exe (PID: 2748)
    • Reads the Windows owner or organization settings

      • advanced-systemcare-setup.tmp (PID: 3764)
      • advanced-systemcare-setup.tmp (PID: 1104)
      • smBootTime.exe (PID: 2580)
      • smBootTime.exe (PID: 3284)
      • smBootTime.exe (PID: 2800)
      • ASC.exe (PID: 3028)
      • smBootTime.exe (PID: 1284)
      • AutoCare.exe (PID: 2748)
    • Process drops legitimate windows executable

      • advanced-systemcare-setup.tmp (PID: 1104)
    • Process drops SQLite DLL files

      • advanced-systemcare-setup.tmp (PID: 1104)
    • Drops a system driver (possible attempt to evade defenses)

      • advanced-systemcare-setup.tmp (PID: 1104)
      • Monitor.exe (PID: 3388)
    • Searches for installed software

      • advanced-systemcare-setup.tmp (PID: 1104)
      • smBootTime.exe (PID: 2580)
      • UninstallInfo.exe (PID: 2144)
      • PrivacyShield.exe (PID: 1836)
      • smBootTime.exe (PID: 3284)
      • ASCService.exe (PID: 2756)
      • smBootTime.exe (PID: 2800)
      • Setup.exe (PID: 1852)
      • BrowserProtect.exe (PID: 3464)
      • Monitor.exe (PID: 3388)
      • ASC.exe (PID: 3028)
      • smBootTime.exe (PID: 1284)
      • Display.exe (PID: 2900)
      • ASCTray.exe (PID: 3120)
      • AutoUpdate.exe (PID: 3160)
      • IObitLiveUpdate.exe (PID: 276)
      • Display.exe (PID: 2028)
      • Register.exe (PID: 3972)
      • Reminder.exe (PID: 2680)
      • AutoCare.exe (PID: 2748)
      • AutoUpdate.exe (PID: 916)
    • Drops 7-zip archiver for unpacking

      • advanced-systemcare-setup.tmp (PID: 1104)
    • Starts CMD.EXE for commands execution

      • ASCInit.exe (PID: 2468)
      • ASC.exe (PID: 3028)
    • Windows service management via SC.EXE

      • sc.exe (PID: 2696)
    • Starts SC.EXE for service management

      • cmd.exe (PID: 2728)
    • Executes as Windows Service

      • ASCService.exe (PID: 2756)
    • Reads the date of Windows installation

      • ASCInit.exe (PID: 2468)
      • ASC.exe (PID: 3028)
      • AutoCare.exe (PID: 2748)
    • Creates/Modifies COM task schedule object

      • regsvr32.exe (PID: 2928)
    • Application launched itself

      • RealTimeProtector.exe (PID: 3520)
    • Checks Windows Trust Settings

      • ASCVER.exe (PID: 2292)
      • AutoCare.exe (PID: 2748)
    • Reads settings of System Certificates

      • ASCVER.exe (PID: 2292)
      • AutoCare.exe (PID: 2748)
    • Adds/modifies Windows certificates

      • ASCVER.exe (PID: 2292)
    • Checks for Java to be installed

      • ASC.exe (PID: 3028)
      • AutoCare.exe (PID: 2748)
    • The process checks if it is being run in the virtual environment

      • ASC.exe (PID: 3028)
    • There is functionality for taking screenshot (YARA)

      • Monitor.exe (PID: 3388)
      • ASC.exe (PID: 3028)
      • AutoCare.exe (PID: 2748)
    • The process verifies whether the antivirus software is installed

      • ASC.exe (PID: 3028)
    • There is functionality for VM detection VirtualBox (YARA)

      • Monitor.exe (PID: 3388)
    • Suspicious use of NETSH.EXE

      • ASC.exe (PID: 3028)
      • AutoCare.exe (PID: 2748)
    • Process uses IPCONFIG to clear DNS cache

      • cmd.exe (PID: 4032)
    • Creates files in the driver directory

      • drvinst.exe (PID: 2916)
      • drvinst.exe (PID: 652)
      • drvinst.exe (PID: 764)
    • Creates or modifies Windows services

      • ASC.exe (PID: 3028)
    • Read startup parameters

      • AutoCare.exe (PID: 2748)
    • Checks for the .NET to be installed

      • AutoCare.exe (PID: 2748)
    • There is functionality for communication over UDP network (YARA)

      • AutoCare.exe (PID: 2748)
    • Reads the history of recent RDP connections

      • AutoCare.exe (PID: 2748)
    • Reads browser cookies

      • AutoCare.exe (PID: 2748)
  • INFO

    • Application launched itself

      • msedge.exe (PID: 1040)
      • msedge.exe (PID: 2512)
      • msedge.exe (PID: 1832)
      • msedge.exe (PID: 2732)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 3400)
      • msedge.exe (PID: 2732)
    • Reads the computer name

      • wmpnscfg.exe (PID: 3400)
      • advanced-systemcare-setup.tmp (PID: 3764)
      • advanced-systemcare-setup.tmp (PID: 3652)
      • Setup.exe (PID: 1852)
      • advanced-systemcare-setup.tmp (PID: 1104)
      • ASCUpgrade.exe (PID: 1304)
      • ASCInit.exe (PID: 2468)
      • ASCUpgrade.exe (PID: 488)
      • ASCService.exe (PID: 2756)
      • smBootTimeBase.exe (PID: 2932)
      • smBootTime.exe (PID: 2580)
      • UninstallInfo.exe (PID: 2144)
      • PrivacyShield.exe (PID: 1836)
      • smBootTime.exe (PID: 3284)
      • RealTimeProtector.exe (PID: 3520)
      • RealTimeProtector.exe (PID: 3548)
      • smBootTime.exe (PID: 2800)
      • RealTimeProtector.exe (PID: 3508)
      • Monitor.exe (PID: 3388)
      • BrowserProtect.exe (PID: 3464)
      • ProductStat3.exe (PID: 2908)
      • ASCTray.exe (PID: 3120)
      • ASC.exe (PID: 3028)
      • smBootTime.exe (PID: 1284)
      • asrft.exe (PID: 3180)
      • AutoUpdate.exe (PID: 3160)
      • ASCFeature.exe (PID: 1280)
      • ASCVER.exe (PID: 2292)
      • ProductStat3.exe (PID: 1332)
      • ProductStat3.exe (PID: 328)
      • ProductStat3.exe (PID: 3432)
      • AutoCare.exe (PID: 2404)
      • IObitLiveUpdate.exe (PID: 276)
      • drvinst.exe (PID: 2916)
      • drvinst.exe (PID: 764)
      • ProductStat3.exe (PID: 2220)
      • ProductStat3.exe (PID: 3600)
      • drvinst.exe (PID: 652)
      • BrowserCleaner.exe (PID: 2572)
      • ProductStat3.exe (PID: 2436)
      • MonitorDisk.exe (PID: 4056)
      • Reminder.exe (PID: 2680)
      • Register.exe (PID: 3972)
      • ProductStat3.exe (PID: 2848)
      • AutoCare.exe (PID: 2748)
      • ProductStat3.exe (PID: 1252)
      • ProductStat3.exe (PID: 448)
      • ProductStat3.exe (PID: 3088)
      • ProductStat3.exe (PID: 4060)
      • ProductStat3.exe (PID: 1784)
      • ProductStat3.exe (PID: 824)
      • AutoUpdate.exe (PID: 916)
    • Checks supported languages

      • advanced-systemcare-setup.exe (PID: 3676)
      • wmpnscfg.exe (PID: 3400)
      • advanced-systemcare-setup.tmp (PID: 3652)
      • advanced-systemcare-setup.exe (PID: 3688)
      • advanced-systemcare-setup.tmp (PID: 3764)
      • Setup.exe (PID: 1852)
      • advanced-systemcare-setup.exe (PID: 1584)
      • advanced-systemcare-setup.tmp (PID: 1104)
      • ASCUpgrade.exe (PID: 1304)
      • LocalLang.exe (PID: 2368)
      • ASCInit.exe (PID: 2468)
      • ASCUpgrade.exe (PID: 488)
      • ASCService.exe (PID: 2756)
      • smBootTimeBase.exe (PID: 2932)
      • smBootTime.exe (PID: 2580)
      • UninstallInfo.exe (PID: 2144)
      • PrivacyShield.exe (PID: 1836)
      • BrowserCleaner.exe (PID: 1336)
      • smBootTime.exe (PID: 3284)
      • RealTimeProtector.exe (PID: 3520)
      • RealTimeProtector.exe (PID: 3548)
      • RealTimeProtector.exe (PID: 3508)
      • smBootTime.exe (PID: 2800)
      • BrowserProtect.exe (PID: 3464)
      • ASC.exe (PID: 3028)
      • Monitor.exe (PID: 3388)
      • DiskDefrag.exe (PID: 3552)
      • ASCTray.exe (PID: 3120)
      • ProductStat3.exe (PID: 2908)
      • smBootTime.exe (PID: 1284)
      • Display.exe (PID: 2900)
      • ASCFeature.exe (PID: 3004)
      • ProductStat3.exe (PID: 2912)
      • AutoUpdate.exe (PID: 3160)
      • asrft.exe (PID: 3180)
      • ASCFeature.exe (PID: 1280)
      • ProductStat3.exe (PID: 3788)
      • ASCVER.exe (PID: 2292)
      • AutoSweep.exe (PID: 1608)
      • ProductStat3.exe (PID: 328)
      • ProductStat3.exe (PID: 1332)
      • ProductStat3.exe (PID: 3432)
      • ProductStat3.exe (PID: 284)
      • IObitLiveUpdate.exe (PID: 276)
      • drvinst.exe (PID: 2916)
      • drvinst.exe (PID: 652)
      • AutoCare.exe (PID: 2404)
      • StartupInfo.exe (PID: 3812)
      • ProductStat3.exe (PID: 2220)
      • Display.exe (PID: 2028)
      • ProductStat3.exe (PID: 3600)
      • drvinst.exe (PID: 764)
      • ProductStat3.exe (PID: 2848)
      • BrowserCleaner.exe (PID: 2572)
      • ProductStat3.exe (PID: 2436)
      • MonitorDisk.exe (PID: 4056)
      • Reminder.exe (PID: 2680)
      • Register.exe (PID: 3972)
      • AppsChecker.exe (PID: 1924)
      • AutoCare.exe (PID: 2748)
      • ProductStat3.exe (PID: 1784)
      • ProductStat3.exe (PID: 3088)
      • ProductStat3.exe (PID: 4060)
      • ProductStat3.exe (PID: 824)
      • ProductStat3.exe (PID: 1252)
      • ProductStat3.exe (PID: 448)
      • AutoUpdate.exe (PID: 916)
    • Executable content was dropped or overwritten

      • msedge.exe (PID: 1040)
    • Create files in a temporary directory

      • advanced-systemcare-setup.exe (PID: 3676)
      • advanced-systemcare-setup.exe (PID: 3688)
      • advanced-systemcare-setup.tmp (PID: 3764)
      • advanced-systemcare-setup.exe (PID: 1584)
      • Setup.exe (PID: 1852)
      • advanced-systemcare-setup.tmp (PID: 1104)
      • IObitLiveUpdate.exe (PID: 276)
      • ASC.exe (PID: 3028)
      • SecEdit.exe (PID: 3280)
      • AutoCare.exe (PID: 2748)
      • SecEdit.exe (PID: 3744)
    • The sample compiled with english language support

      • advanced-systemcare-setup.tmp (PID: 3764)
      • advanced-systemcare-setup.tmp (PID: 1104)
      • ASCInit.exe (PID: 2468)
      • Monitor.exe (PID: 3388)
    • Creates files or folders in the user directory

      • advanced-systemcare-setup.tmp (PID: 3764)
      • Setup.exe (PID: 1852)
      • advanced-systemcare-setup.tmp (PID: 1104)
      • ASCService.exe (PID: 2756)
      • ASCInit.exe (PID: 2468)
      • BrowserCleaner.exe (PID: 1336)
      • smBootTime.exe (PID: 2580)
      • ASCTray.exe (PID: 3120)
      • ASC.exe (PID: 3028)
      • ASCFeature.exe (PID: 3004)
      • Display.exe (PID: 2900)
      • AutoCare.exe (PID: 2748)
    • Creates files in the program directory

      • Setup.exe (PID: 1852)
      • advanced-systemcare-setup.tmp (PID: 1104)
      • ASCInit.exe (PID: 2468)
      • ASCService.exe (PID: 2756)
      • smBootTimeBase.exe (PID: 2932)
      • UninstallInfo.exe (PID: 2144)
      • smBootTime.exe (PID: 2580)
      • PrivacyShield.exe (PID: 1836)
      • smBootTime.exe (PID: 3284)
      • BrowserProtect.exe (PID: 3464)
      • ASC.exe (PID: 3028)
      • ProductStat3.exe (PID: 2908)
      • Display.exe (PID: 2900)
      • ASCVER.exe (PID: 2292)
      • AutoUpdate.exe (PID: 3160)
      • AutoSweep.exe (PID: 1608)
      • AutoCare.exe (PID: 2404)
      • IObitLiveUpdate.exe (PID: 276)
      • StartupInfo.exe (PID: 3812)
      • AutoCare.exe (PID: 2748)
      • AutoUpdate.exe (PID: 916)
    • Reads the machine GUID from the registry

      • Setup.exe (PID: 1852)
      • ASCInit.exe (PID: 2468)
      • UninstallInfo.exe (PID: 2144)
      • smBootTime.exe (PID: 2580)
      • Monitor.exe (PID: 3388)
      • ASC.exe (PID: 3028)
      • ASCTray.exe (PID: 3120)
      • asrft.exe (PID: 3180)
      • smBootTime.exe (PID: 1284)
      • ASCFeature.exe (PID: 1280)
      • AutoUpdate.exe (PID: 3160)
      • ASCVER.exe (PID: 2292)
      • IObitLiveUpdate.exe (PID: 276)
      • AutoCare.exe (PID: 2748)
      • AutoUpdate.exe (PID: 916)
    • Compiled with Borland Delphi (YARA)

      • Setup.exe (PID: 1852)
      • advanced-systemcare-setup.tmp (PID: 1104)
      • advanced-systemcare-setup.exe (PID: 1584)
      • ASCService.exe (PID: 2756)
      • ASCTray.exe (PID: 3120)
      • Monitor.exe (PID: 3388)
      • ASC.exe (PID: 3028)
      • AutoCare.exe (PID: 2748)
      • Reminder.exe (PID: 2680)
    • Detects InnoSetup installer (YARA)

      • advanced-systemcare-setup.tmp (PID: 1104)
      • advanced-systemcare-setup.exe (PID: 1584)
    • The sample compiled with french language support

      • advanced-systemcare-setup.tmp (PID: 1104)
    • Creates a software uninstall entry

      • advanced-systemcare-setup.tmp (PID: 1104)
    • The sample compiled with chinese language support

      • advanced-systemcare-setup.tmp (PID: 1104)
    • Reads Environment values

      • ASCInit.exe (PID: 2468)
      • Monitor.exe (PID: 3388)
      • AutoCare.exe (PID: 2748)
    • Checks proxy server information

      • AutoUpdate.exe (PID: 3160)
      • ASC.exe (PID: 3028)
      • AutoCare.exe (PID: 2748)
    • Reads the software policy settings

      • ASCVER.exe (PID: 2292)
    • Reads Microsoft Office registry keys

      • ASC.exe (PID: 3028)
    • Reads mouse settings

      • ASC.exe (PID: 3028)
    • Reads the time zone

      • AutoCare.exe (PID: 2748)
    • Checks transactions between databases Windows and Oracle

      • AutoCare.exe (PID: 2748)
    • Reads Windows Product ID

      • AutoCare.exe (PID: 2748)
    • Process checks the number of cached credentials

      • AutoCare.exe (PID: 2748)
    • Process checks whether UAC notifications are on

      • AutoCare.exe (PID: 2748)
    • Disables trace logs

      • AutoCare.exe (PID: 2748)
    • Reads product name

      • AutoCare.exe (PID: 2748)
    • Process checks Internet Explorer phishing filters

      • AutoCare.exe (PID: 2748)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
168
Monitored processes
122
Malicious processes
12
Suspicious processes
5

Behavior graph

Click at the process to see the details
start msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs wmpnscfg.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs advanced-systemcare-setup.exe advanced-systemcare-setup.tmp no specs advanced-systemcare-setup.exe advanced-systemcare-setup.tmp setup.exe advanced-systemcare-setup.exe advanced-systemcare-setup.tmp ascupgrade.exe no specs ascupgrade.exe no specs locallang.exe no specs ascinit.exe ascservice.exe smboottimebase.exe no specs cmd.exe no specs smboottime.exe sc.exe no specs uninstallinfo.exe regsvr32.exe no specs browsercleaner.exe no specs privacyshield.exe no specs smboottime.exe no specs SPPSurrogate no specs realtimeprotector.exe no specs diskdefrag.exe no specs realtimeprotector.exe no specs smboottime.exe no specs realtimeprotector.exe no specs browserprotect.exe no specs asc.exe monitor.exe productstat3.exe no specs asctray.exe smboottime.exe no specs ascfeature.exe no specs productstat3.exe no specs productstat3.exe no specs display.exe no specs ascfeature.exe autoupdate.exe asrft.exe ascver.exe no specs autosweep.exe no specs productstat3.exe no specs productstat3.exe no specs productstat3.exe no specs netsh.exe no specs netsh.exe no specs autocare.exe no specs iobitliveupdate.exe productstat3.exe no specs cmd.exe no specs ipconfig.exe no specs drvinst.exe no specs drvinst.exe no specs drvinst.exe no specs startupinfo.exe no specs productstat3.exe no specs display.exe no specs productstat3.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs register.exe no specs productstat3.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs browsercleaner.exe no specs appschecker.exe no specs productstat3.exe no specs monitordisk.exe no specs reminder.exe no specs autocare.exe netsh.exe no specs netsh.exe no specs productstat3.exe no specs productstat3.exe no specs productstat3.exe no specs secedit.exe no specs secedit.exe no specs productstat3.exe no specs productstat3.exe no specs productstat3.exe no specs autoupdate.exe

Process information

PID
CMD
Path
Indicators
Parent process
276"C:\Program Files\IObit\Advanced SystemCare\IObitLiveUpdate.exe" /srvuptC:\Program Files\IObit\Advanced SystemCare\IObitLiveUpdate.exe
ASCService.exe
User:
admin
Company:
IObit
Integrity Level:
HIGH
Description:
Product Updater
Exit code:
0
Version:
3.0.0.6467
284"C:\Program Files\IObit\Advanced SystemCare\ProductStat3.exe" /postcache /days 7C:\Program Files\IObit\Advanced SystemCare\ProductStat3.exeASCService.exe
User:
admin
Company:
IObit
Integrity Level:
HIGH
Description:
IObit stat Component
Exit code:
0
Version:
3.0.0.6398
328"C:\Program Files\IObit\Advanced SystemCare\ProductStat3.exe" /statcom /stflag 1101 /appid "asc18" /pd "asc" /url "https://stats.iobit.com/usage_v2.php?action=insert" /user 0 /insur "other" /type 1 /pr "iobit" /ver "18.1.0.201"C:\Program Files\IObit\Advanced SystemCare\ProductStat3.exeASC.exe
User:
admin
Company:
IObit
Integrity Level:
HIGH
Description:
IObit stat Component
Exit code:
0
Version:
3.0.0.6398
328"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --mojo-platform-channel-handle=4252 --field-trial-handle=1248,i,3716962158224087483,16316773877896509975,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:8C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
448"C:\Program Files\IObit\Advanced SystemCare\ProductStat3.exe" /statcom /stflag 201 /appid "asc18" /pd "asc" /url "https://stats.iobit.com/usage_v2.php?action=insert" /user 0 /insur "other" /type 1 /pr "iobit" /ver "18.1.0.201"C:\Program Files\IObit\Advanced SystemCare\ProductStat3.exeASC.exe
User:
admin
Company:
IObit
Integrity Level:
HIGH
Description:
IObit stat Component
Exit code:
0
Version:
3.0.0.6398
488"C:\Users\admin\AppData\Local\Temp\is-6F1NA.tmp\ASCUpgrade.exe" /CleanDir "C:\Program Files\IObit\Advanced SystemCare\"C:\Users\admin\AppData\Local\Temp\is-6F1NA.tmp\ASCUpgrade.exeadvanced-systemcare-setup.tmp
User:
admin
Company:
IObit
Integrity Level:
HIGH
Description:
Upgrader
Exit code:
0
Version:
14.2.0.53
Modules
Images
c:\users\admin\appdata\local\temp\is-6f1na.tmp\ascupgrade.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\ole32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
652DrvInst.exe "5" "0" "C:\Windows\system32\DriverStore\FileRepository\iastorv.inf_x86_neutral_0bcee2057afcc090\iastorv.inf" "0" "6ab7a7c13" "0000048C" "WinSta0\Default"C:\Windows\System32\drvinst.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
688"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1540 --field-trial-handle=1308,i,372858387457572542,17511353740934660205,131072 --enable-features=msMicrosoftRootStoreUsed /prefetch:2C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
764DrvInst.exe "5" "0" "C:\Windows\system32\DriverStore\FileRepository\nvraid.inf_x86_neutral_0276fc3b3ea60d41\nvraid.inf" "0" "6d754b63f" "000003F0" "WinSta0\Default"C:\Windows\System32\drvinst.exesvchost.exe
User:
SYSTEM
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Driver Installation Module
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
824"C:\Program Files\IObit\Advanced SystemCare\ProductStat3.exe" /statcom /stflag 211 /appid "asc18" /pd "asc" /url "https://stats.iobit.com/usage_v2.php?action=insert" /user 0 /insur "other" /type 1 /pr "iobit" /ver "18.1.0.201"C:\Program Files\IObit\Advanced SystemCare\ProductStat3.exeASC.exe
User:
admin
Company:
IObit
Integrity Level:
HIGH
Description:
IObit stat Component
Exit code:
0
Version:
3.0.0.6398
Total events
405 732
Read events
404 632
Write events
1 029
Delete events
71

Modification events

(PID) Process:(1040) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
(PID) Process:(1040) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
2
(PID) Process:(1040) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\ThirdParty
Operation:writeName:StatusCodes
Value:
(PID) Process:(1040) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\ThirdParty
Operation:writeName:StatusCodes
Value:
01000000
(PID) Process:(1040) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\BLBeacon
Operation:writeName:state
Value:
1
(PID) Process:(1040) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
Operation:writeName:dr
Value:
1
(PID) Process:(1040) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\StabilityMetrics
Operation:writeName:user_experience_metrics.stability.exited_cleanly
Value:
0
(PID) Process:(1040) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\LastWasDefault
Operation:writeName:S-1-5-21-1302019708-1500728564-335382590-1000
Value:
C93F495DC68C2F00
(PID) Process:(1040) msedge.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\EdgeUpdate\ClientStateMedium\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}\FirstNotDefault
Operation:delete valueName:S-1-5-21-1302019708-1500728564-335382590-1000
Value:
(PID) Process:(1040) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge
Operation:writeName:UsageStatsInSample
Value:
1
Executable files
321
Suspicious files
404
Text files
542
Unknown types
0

Dropped files

PID
Process
Filename
Type
1040msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old~RF109ef1.TMP
MD5:
SHA256:
1040msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\commerce_subscription_db\LOG.old
MD5:
SHA256:
1040msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF109f10.TMP
MD5:
SHA256:
1040msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old
MD5:
SHA256:
1040msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF109f20.TMP
MD5:
SHA256:
1040msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\LOG.old~RF10a078.TMP
MD5:
SHA256:
1040msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\LOG.old
MD5:
SHA256:
1040msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Site Characteristics Database\LOG.old~RF109ef1.TMPtext
MD5:CE86C8F851C5C62FD3B245514A656CC3
SHA256:E59B71835032C5D6C65BA4BB15A1676C7287241388CBE117F3C16F601B84E3D0
1936msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\CrashpadMetrics.pmabinary
MD5:886E82F2CA62ECCCE64601B30592078A
SHA256:E5E13D53601100FF3D6BB71514CBCCC4C73FE9B7EF5E930100E644187B42948E
1040msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Sync Data\LevelDB\LOG.old~RF109f01.TMPtext
MD5:D6E3A4A682F60FDD61EA5512284171EC
SHA256:8B8EB180A896C63D5112F8DE6EA7CB016296FAB862F8EEEAC5EB2A1462A53332
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
106
DNS requests
66
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3028
ASC.exe
GET
23.50.131.85:80
http://download.iobit.com/appnews/default/asc_news.dat
unknown
whitelisted
3028
ASC.exe
GET
206
23.50.131.85:80
http://download.iobit.com/appnews/default/asc_news.dat
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
1108
svchost.exe
224.0.0.252:5355
whitelisted
2900
msedge.exe
13.107.42.16:443
config.edge.skype.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
2900
msedge.exe
204.79.197.239:443
edge.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
1040
msedge.exe
239.255.255.250:1900
whitelisted
2900
msedge.exe
44.196.182.72:443
www.iobit.com
AMAZON-AES
US
whitelisted
2900
msedge.exe
142.250.186.138:443
fonts.googleapis.com
GOOGLE
US
whitelisted
2900
msedge.exe
216.58.206.46:443
www.googleoptimize.com
GOOGLE
US
whitelisted
2900
msedge.exe
142.250.184.195:443
fonts.gstatic.com
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.185.78
whitelisted
config.edge.skype.com
  • 13.107.42.16
whitelisted
edge.microsoft.com
  • 204.79.197.239
  • 13.107.21.239
whitelisted
www.iobit.com
  • 44.196.182.72
  • 35.170.235.210
  • 54.221.8.158
whitelisted
fonts.googleapis.com
  • 142.250.186.138
whitelisted
www.googleoptimize.com
  • 216.58.206.46
whitelisted
fonts.gstatic.com
  • 142.250.184.195
  • 142.250.185.227
whitelisted
www.googletagmanager.com
  • 216.58.206.40
whitelisted
bat.bing.com
  • 150.171.27.10
  • 150.171.28.10
whitelisted
www.google-analytics.com
  • 142.250.185.174
whitelisted

Threats

PID
Process
Class
Message
3028
ASC.exe
Potentially Bad Traffic
ET HUNTING Suspicious Mozilla User-Agent - Likely Fake (Mozilla/4.0)
3028
ASC.exe
Potentially Bad Traffic
ET HUNTING Suspicious Mozilla User-Agent - Likely Fake (Mozilla/4.0)
Process
Message
Setup.exe
********** FLanguageName: English
Setup.exe
CheckDiskSpace: 3
Setup.exe
CheckDiskSpace: 1
Setup.exe
GetDownloadPath: 3
Setup.exe
GetDownloadPath: 2
Setup.exe
CheckDiskSpace: 2
Setup.exe
CheckDiskSpace: 5
Setup.exe
FormCreate: 2_1
Setup.exe
CheckDiskSpace: 2
Setup.exe
CheckDiskSpace: 2