File name:

2025-06-01_2a124ba2740d5bb8542b6036318f4121_elex_gcleaner_redline-stealer_stop

Full analysis: https://app.any.run/tasks/49e348eb-ffec-4836-91d3-280b0b852f44
Verdict: Malicious activity
Threats:

Adware is a form of malware that targets users with unwanted advertisements, often disrupting their browsing experience. It typically infiltrates systems through software bundling, malicious websites, or deceptive downloads. Once installed, it may track user activity, collect sensitive data, and display intrusive ads, including pop-ups or banners. Some advanced adware variants can bypass security measures and establish persistence on devices, making removal challenging. Additionally, adware can create vulnerabilities that other malware can exploit, posing a significant risk to user privacy and system security.

Analysis date: June 01, 2025, 16:55:56
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
adware
auto-reg
arch-scr
arch-exec
java
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 4 sections
MD5:

2A124BA2740D5BB8542B6036318F4121

SHA1:

4402FC8FB72A9D8FA387E47E77A0E12A08500131

SHA256:

0207550E30B2C00391CF322F68BCBC096C459B5CCC1594C9CDD7A893908BC91F

SSDEEP:

98304:8cq4Xg0el2RqH1V6w9dpw39MlHulW3xBnCd6H1ZQyWYh56LUSmRHezXasH5iVwIu:9ok

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • 2025-06-01_2a124ba2740d5bb8542b6036318f4121_elex_gcleaner_redline-stealer_stop.exe (PID: 5588)
    • Changes the autorun value in the registry

      • 2025-06-01_2a124ba2740d5bb8542b6036318f4121_elex_gcleaner_redline-stealer_stop.exe (PID: 2104)
    • Registers / Runs the DLL via REGSVR32.EXE

      • cmd.exe (PID: 5176)
    • Connects to the CnC server

      • 2025-06-01_2a124ba2740d5bb8542b6036318f4121_elex_gcleaner_redline-stealer_stop.exe (PID: 2104)
  • SUSPICIOUS

    • Creates/Modifies COM task schedule object

      • 2025-06-01_2a124ba2740d5bb8542b6036318f4121_elex_gcleaner_redline-stealer_stop.exe (PID: 2104)
      • regsvr32.exe (PID: 4068)
    • Executable content was dropped or overwritten

      • 2025-06-01_2a124ba2740d5bb8542b6036318f4121_elex_gcleaner_redline-stealer_stop.exe (PID: 2104)
    • Searches for installed software

      • 2025-06-01_2a124ba2740d5bb8542b6036318f4121_elex_gcleaner_redline-stealer_stop.exe (PID: 2104)
    • Creates a software uninstall entry

      • 2025-06-01_2a124ba2740d5bb8542b6036318f4121_elex_gcleaner_redline-stealer_stop.exe (PID: 2104)
    • Starts CMD.EXE for commands execution

      • 2025-06-01_2a124ba2740d5bb8542b6036318f4121_elex_gcleaner_redline-stealer_stop.exe (PID: 2104)
    • Reads security settings of Internet Explorer

      • 2025-06-01_2a124ba2740d5bb8542b6036318f4121_elex_gcleaner_redline-stealer_stop.exe (PID: 2104)
      • gamevance32.exe (PID: 7888)
    • Access to an unwanted program domain was detected

      • 2025-06-01_2a124ba2740d5bb8542b6036318f4121_elex_gcleaner_redline-stealer_stop.exe (PID: 2104)
  • INFO

    • Reads the computer name

      • 2025-06-01_2a124ba2740d5bb8542b6036318f4121_elex_gcleaner_redline-stealer_stop.exe (PID: 2104)
      • gamevance32.exe (PID: 7888)
      • identity_helper.exe (PID: 1012)
      • javaw.exe (PID: 7468)
    • Create files in a temporary directory

      • 2025-06-01_2a124ba2740d5bb8542b6036318f4121_elex_gcleaner_redline-stealer_stop.exe (PID: 2104)
    • Launch of the file from Registry key

      • 2025-06-01_2a124ba2740d5bb8542b6036318f4121_elex_gcleaner_redline-stealer_stop.exe (PID: 2104)
    • Checks supported languages

      • 2025-06-01_2a124ba2740d5bb8542b6036318f4121_elex_gcleaner_redline-stealer_stop.exe (PID: 2104)
      • gamevance32.exe (PID: 7888)
      • gamevance32.exe (PID: 672)
      • identity_helper.exe (PID: 1012)
      • javaw.exe (PID: 7468)
    • Reads CPU info

      • gamevance32.exe (PID: 7888)
      • 2025-06-01_2a124ba2740d5bb8542b6036318f4121_elex_gcleaner_redline-stealer_stop.exe (PID: 2104)
    • Creates files in the program directory

      • 2025-06-01_2a124ba2740d5bb8542b6036318f4121_elex_gcleaner_redline-stealer_stop.exe (PID: 2104)
    • Checks proxy server information

      • 2025-06-01_2a124ba2740d5bb8542b6036318f4121_elex_gcleaner_redline-stealer_stop.exe (PID: 2104)
      • gamevance32.exe (PID: 7888)
    • Creates files or folders in the user directory

      • 2025-06-01_2a124ba2740d5bb8542b6036318f4121_elex_gcleaner_redline-stealer_stop.exe (PID: 2104)
    • Application launched itself

      • msedge.exe (PID: 6744)
      • msedge.exe (PID: 8044)
    • Manual execution by a user

      • gamevance32.exe (PID: 672)
      • wscript.exe (PID: 1348)
      • msedge.exe (PID: 8044)
      • javaw.exe (PID: 7468)
      • msedge.exe (PID: 6820)
    • Reads Environment values

      • identity_helper.exe (PID: 1012)
    • Application based on Java

      • javaw.exe (PID: 7468)
    • JScript runtime error (SCRIPT)

      • wscript.exe (PID: 1348)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2011:04:28 11:46:01+00:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 9
CodeSize: 100864
InitializedDataSize: 2342400
UninitializedDataSize: -
EntryPoint: 0x1380a
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows GUI
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
187
Monitored processes
58
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start 2025-06-01_2a124ba2740d5bb8542b6036318f4121_elex_gcleaner_redline-stealer_stop.exe cmd.exe no specs conhost.exe no specs gamevance32.exe no specs cmd.exe no specs conhost.exe no specs regsvr32.exe no specs gamevance32.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs wscript.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs rundll32.exe no specs msedge.exe no specs javaw.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs slui.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs svchost.exe 2025-06-01_2a124ba2740d5bb8542b6036318f4121_elex_gcleaner_redline-stealer_stop.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
644"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=5456 --field-trial-handle=2316,i,12567211212503930487,6552072250978088579,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
672"C:\Program Files (x86)\Gamevance Games\gamevance32.exe" aC:\Program Files (x86)\Gamevance Games\gamevance32.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\program files (x86)\gamevance games\gamevance32.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\program files (x86)\gamevance games\gamevancelib32.dll
c:\windows\syswow64\ws2_32.dll
856"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=6612 --field-trial-handle=2316,i,12567211212503930487,6552072250978088579,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1012"C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.59\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --lang=en-US --service-sandbox-type=none --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=6980 --field-trial-handle=2316,i,12567211212503930487,6552072250978088579,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\122.0.2365.59\identity_helper.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
PWA Identity Proxy Host
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\identity_helper.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
1188"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --disable-quic --no-appcompat-clear --mojo-platform-channel-handle=5424 --field-trial-handle=2316,i,12567211212503930487,6552072250978088579,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1196\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1348"C:\Windows\System32\WScript.exe" C:\Users\admin\Desktop\persistence.jsC:\Windows\System32\wscript.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1532"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --disable-gpu-compositing --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=11 --mojo-platform-channel-handle=4940 --field-trial-handle=2316,i,12567211212503930487,6552072250978088579,262144 --variations-seed-version /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1764"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.3636 --no-appcompat-clear --gpu-preferences=WAAAAAAAAADoAAAMAAAAAAAAAAAAAAAAAABgAAAAAAA4AAAAAAAAAAAAAABEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGAAAAAAAAAAYAAAAAAAAAAgAAAAAAAAACAAAAAAAAAAIAAAAAAAAAA== --mojo-platform-channel-handle=7024 --field-trial-handle=2316,i,12567211212503930487,6552072250978088579,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2104"C:\Users\admin\Desktop\2025-06-01_2a124ba2740d5bb8542b6036318f4121_elex_gcleaner_redline-stealer_stop.exe" C:\Users\admin\Desktop\2025-06-01_2a124ba2740d5bb8542b6036318f4121_elex_gcleaner_redline-stealer_stop.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Modules
Images
c:\users\admin\desktop\2025-06-01_2a124ba2740d5bb8542b6036318f4121_elex_gcleaner_redline-stealer_stop.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\shlwapi.dll
Total events
10 306
Read events
10 262
Write events
43
Delete events
1

Modification events

(PID) Process:(2104) 2025-06-01_2a124ba2740d5bb8542b6036318f4121_elex_gcleaner_redline-stealer_stop.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{0ED403E8-470A-4a8a-85A4-D7688CFE39A3}
Operation:writeName:NoExplorer
Value:
1
(PID) Process:(2104) 2025-06-01_2a124ba2740d5bb8542b6036318f4121_elex_gcleaner_redline-stealer_stop.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Gamevance
Operation:writeName:DisplayName
Value:
Gamevance
(PID) Process:(2104) 2025-06-01_2a124ba2740d5bb8542b6036318f4121_elex_gcleaner_redline-stealer_stop.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Gamevance
Operation:writeName:UninstallString
Value:
C:\Program Files (x86)\Gamevance Games\gvun.exe
(PID) Process:(2104) 2025-06-01_2a124ba2740d5bb8542b6036318f4121_elex_gcleaner_redline-stealer_stop.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Gamevance
Operation:writeName:DisplayIcon
Value:
C:\Program Files (x86)\Gamevance Games\gvun.exe
(PID) Process:(2104) 2025-06-01_2a124ba2740d5bb8542b6036318f4121_elex_gcleaner_redline-stealer_stop.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Gamevance
Value:
C:\Program Files (x86)\Gamevance Games\gamevance32.exe a
(PID) Process:(2104) 2025-06-01_2a124ba2740d5bb8542b6036318f4121_elex_gcleaner_redline-stealer_stop.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0ED403E8-470A-4a8a-85A4-D7688CFE39A3}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Apartment
(PID) Process:(4068) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\GamevanceText.DLL
Operation:writeName:AppID
Value:
{beaC7DC8-E106-4C6A-931E-5A42E7362883}
(PID) Process:(4068) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{beaC7DC8-E106-4C6A-931E-5A42E7362883}\InprocServer32
Operation:writeName:ThreadingModel
Value:
Apartment
(PID) Process:(4068) regsvr32.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{beaC7DC8-E106-4C6A-931E-5A42E7362883}
Operation:writeName:NoExplorer
Value:
1
(PID) Process:(2104) 2025-06-01_2a124ba2740d5bb8542b6036318f4121_elex_gcleaner_redline-stealer_stop.exeKey:HKEY_CURRENT_USER\SOFTWARE\AppDataLow\gvtl
Operation:delete valueName:asktime
Value:
Executable files
30
Suspicious files
145
Text files
13
Unknown types
1

Dropped files

PID
Process
Filename
Type
6744msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Local State~RF122a15.TMP
MD5:
SHA256:
21042025-06-01_2a124ba2740d5bb8542b6036318f4121_elex_gcleaner_redline-stealer_stop.exeC:\Program Files (x86)\Gamevance Games\gamevancelib32.dllexecutable
MD5:16D4B94D76256DDA510B95D97C003347
SHA256:D987994697D5DBADF4BA6274FE5BED584A09F634784910DA09317394E109BE17
8044msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\LOG.old~RF122b0f.TMP
MD5:
SHA256:
8044msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\Service Worker\Database\LOG.old
MD5:
SHA256:
8044msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old~RF122b1f.TMP
MD5:
SHA256:
8044msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\PersistentOriginTrials\LOG.old
MD5:
SHA256:
21042025-06-01_2a124ba2740d5bb8542b6036318f4121_elex_gcleaner_redline-stealer_stop.exeC:\Program Files (x86)\Gamevance Games\ars.cfgbinary
MD5:6ED55B69103F9893CE15E6B6E9C88B7F
SHA256:721BB6D0B69A993E30AD01150C79814B3AABEA87F49F7C26AC44F1688C119E8F
21042025-06-01_2a124ba2740d5bb8542b6036318f4121_elex_gcleaner_redline-stealer_stop.exeC:\Program Files (x86)\Gamevance Games\icon.icoimage
MD5:478E8FE226716EC1AFA535996529289E
SHA256:52AE25C24319633721843BD85EF73C35CDA0EF519706085BF3E0E26E59ACAA4C
8044msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old~RF122b2f.TMP
MD5:
SHA256:
8044msedge.exeC:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Default\EdgePushStorageWithConnectTokenAndKey\LOG.old
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
171
TCP/UDP connections
139
DNS requests
92
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
GET
302
23.36.162.216:443
https://www.afternic.com/forsale/www.gamevance.com?utm_source=TDFS_DASLNC&utm_medium=parkedpages&utm_campaign=x_corp_tdfs-daslnc_base&traffic_type=TDFS_DASLNC&traffic_id=daslnc&p=srKz%2F8r1wsH0srLFs7v07MW05Lfm2ufs%2F8WyssG3tLC3wbCywLCyu%2F%2Bj%2F7Ozs7Kzs7Oz%2F8zI
unknown
text
284 b
whitelisted
GET
200
13.107.42.16:443
https://config.edge.skype.com/config/v1/Edge/122.0.2365.59?clientId=4489578223053569932&agents=Edge%2CEdgeConfig%2CEdgeServices%2CEdgeFirstRun%2CEdgeFirstRunConfig&osname=win&client=edge&channel=stable&scpfre=0&osarch=x86_64&osver=10.0.19045&wu=1&devicefamily=desktop&uma=0&sessionid=47&mngd=0&installdate=1661339457&edu=0&bphint=2&soobedate=1504771245&fg=1
unknown
binary
7.92 Kb
whitelisted
GET
503
13.107.6.158:443
https://business.bing.com/work/api/v2/tenant/my/settingswithflights?&clienttype=edge-omnibox
unknown
html
13.7 Kb
whitelisted
POST
200
20.190.160.66:443
https://login.live.com/RST2.srf
unknown
xml
10.3 Kb
whitelisted
POST
200
20.190.160.66:443
https://login.live.com/RST2.srf
unknown
xml
11.0 Kb
whitelisted
POST
200
20.190.160.22:443
https://login.live.com/RST2.srf
unknown
xml
11.0 Kb
whitelisted
POST
200
20.190.160.132:443
https://login.live.com/RST2.srf
unknown
xml
10.3 Kb
whitelisted
POST
200
20.190.160.128:443
https://login.live.com/RST2.srf
unknown
xml
10.3 Kb
whitelisted
GET
200
150.171.27.11:443
https://edge.microsoft.com/serviceexperimentation/v3/?osname=win&channel=stable&osver=10.0.19045&devicefamily=desktop&installdate=1661339457&clientversion=122.0.2365.59&experimentationmode=2&scpguard=0&scpfull=0&scpver=0
unknown
binary
132 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
6544
svchost.exe
20.190.160.65:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6208
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2112
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
8032
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2104
2025-06-01_2a124ba2740d5bb8542b6036318f4121_elex_gcleaner_redline-stealer_stop.exe
13.248.169.48:80
www.gamevance.com
AMAZON-02
US
malicious

DNS requests

Domain
IP
Reputation
login.live.com
  • 20.190.160.65
  • 20.190.160.67
  • 20.190.160.20
  • 40.126.32.68
  • 20.190.160.4
  • 40.126.32.74
  • 20.190.160.132
  • 20.190.160.17
whitelisted
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
google.com
  • 142.250.184.206
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
client.wns.windows.com
  • 172.211.123.248
  • 172.211.123.250
whitelisted
www.gamevance.com
  • 13.248.169.48
  • 76.223.54.146
malicious
config.edge.skype.com
  • 13.107.42.16
whitelisted
edge.microsoft.com
  • 150.171.27.11
  • 150.171.28.11
whitelisted
edge-mobile-static.azureedge.net
  • 13.107.246.45
whitelisted
business.bing.com
  • 13.107.6.158
whitelisted

Threats

PID
Process
Class
Message
2104
2025-06-01_2a124ba2740d5bb8542b6036318f4121_elex_gcleaner_redline-stealer_stop.exe
Possibly Unwanted Program Detected
ET ADWARE_PUP Adware.Gamevance.AV Checkin
Possibly Unwanted Program Detected
ET ADWARE_PUP Adware.Gamevance.AV Checkin
No debug info