File name:

2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer

Full analysis: https://app.any.run/tasks/073e806d-a396-47aa-bcba-70ecd563b234
Verdict: Malicious activity
Analysis date: May 15, 2025, 19:29:56
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto-reg
qrcode
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 3 sections
MD5:

DDFEBE6FA894BDBA8EB515BBF2C32974

SHA1:

23FEBEFB517C83B9791E598C5D9F4DC9780BB525

SHA256:

C92DA7A6E04609C26A1A4052C01EB93373AA741DAAACC2BCE5574C36CFAD99C9

SSDEEP:

98304:AtfGrRCpfAbNl7pAEcLB806XcPEs0XQpe0DELXFAzz0Tpcky7+HlPmqPLQ4Za99I:qyjF

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • setup.exe (PID: 6324)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe (PID: 7720)
      • updater.exe (PID: 8104)
      • updater.exe (PID: 7200)
      • 136.0.7103.114_chrome_installer.exe (PID: 6112)
      • setup.exe (PID: 6324)
    • Starts application with an unusual extension

      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe (PID: 7720)
      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe (PID: 7988)
    • Starts itself from another location

      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe (PID: 7720)
      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe (PID: 7988)
    • Reads security settings of Internet Explorer

      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe  (PID: 7748)
      • updater.exe (PID: 8104)
    • Application launched itself

      • updater.exe (PID: 8104)
      • updater.exe (PID: 4164)
      • updater.exe (PID: 7200)
      • setup.exe (PID: 6324)
      • updater.exe (PID: 3028)
      • setup.exe (PID: 6036)
    • Executes as Windows Service

      • updater.exe (PID: 4164)
      • updater.exe (PID: 7200)
      • updater.exe (PID: 3028)
    • Creates a software uninstall entry

      • setup.exe (PID: 6324)
      • chrome.exe (PID: 7508)
    • Searches for installed software

      • setup.exe (PID: 6324)
  • INFO

    • Creates files or folders in the user directory

      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe (PID: 7720)
      • updater.exe (PID: 8104)
    • Reads the computer name

      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe (PID: 7720)
      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe  (PID: 7748)
      • icsys.icn.exe (PID: 7800)
      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe (PID: 7988)
      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe  (PID: 8032)
      • updater.exe (PID: 8104)
      • updater.exe (PID: 4164)
      • updater.exe (PID: 7200)
      • 136.0.7103.114_chrome_installer.exe (PID: 6112)
      • setup.exe (PID: 6324)
      • elevation_service.exe (PID: 6516)
      • setup.exe (PID: 6036)
    • The sample compiled with english language support

      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe (PID: 7720)
      • updater.exe (PID: 8104)
      • updater.exe (PID: 7200)
      • 136.0.7103.114_chrome_installer.exe (PID: 6112)
      • setup.exe (PID: 6324)
    • Create files in a temporary directory

      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe (PID: 7720)
      • icsys.icn.exe (PID: 7800)
      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe (PID: 7988)
      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe  (PID: 8032)
      • icsys.icn.exe (PID: 8068)
      • updater.exe (PID: 8104)
    • Checks supported languages

      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe (PID: 7720)
      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe  (PID: 7748)
      • icsys.icn.exe (PID: 7800)
      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe (PID: 7988)
      • icsys.icn.exe (PID: 8068)
      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe  (PID: 8032)
      • updater.exe (PID: 8104)
      • updater.exe (PID: 8128)
      • updater.exe (PID: 4164)
      • updater.exe (PID: 7200)
      • updater.exe (PID: 7256)
      • updater.exe (PID: 5072)
      • 136.0.7103.114_chrome_installer.exe (PID: 6112)
      • setup.exe (PID: 6324)
      • setup.exe (PID: 4892)
      • setup.exe (PID: 7496)
      • elevation_service.exe (PID: 6516)
      • setup.exe (PID: 6036)
    • Process checks computer location settings

      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe  (PID: 7748)
    • Failed to create an executable file in Windows directory

      • icsys.icn.exe (PID: 7800)
    • Creates files in the program directory

      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe  (PID: 8032)
      • updater.exe (PID: 8128)
      • updater.exe (PID: 8104)
      • updater.exe (PID: 7200)
      • updater.exe (PID: 4164)
      • setup.exe (PID: 6324)
      • setup.exe (PID: 6036)
    • Process checks whether UAC notifications are on

      • updater.exe (PID: 8104)
      • updater.exe (PID: 7200)
      • updater.exe (PID: 4164)
    • Reads the software policy settings

      • updater.exe (PID: 4164)
      • updater.exe (PID: 8104)
    • Reads the machine GUID from the registry

      • updater.exe (PID: 4164)
      • updater.exe (PID: 8104)
    • Auto-launch of the file from Registry key

      • setup.exe (PID: 6324)
    • Checks proxy server information

      • updater.exe (PID: 8104)
    • Manual execution by a user

      • chrmstp.exe (PID: 7288)
      • chrome.exe (PID: 7508)
      • msedge.exe (PID: 8484)
      • msedge.exe (PID: 1244)
    • Application launched itself

      • chrmstp.exe (PID: 7288)
      • chrome.exe (PID: 7508)
      • chrmstp.exe (PID: 6964)
      • msedge.exe (PID: 1244)
    • Executes as Windows Service

      • elevation_service.exe (PID: 6516)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable Microsoft Visual Basic 6 (35)
.exe | InstallShield setup (18.3)
.exe | Win32 EXE PECompact compressed (generic) (17.7)
.exe | Win32 Executable MS Visual C++ (generic) (13.3)
.exe | Win64 Executable (generic) (11.8)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2011:06:14 19:01:16+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 176128
InitializedDataSize: 12288
UninitializedDataSize: -
EntryPoint: 0x3670
OSVersion: 4
ImageVersion: 1
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Microsoft
ProductName: Win
FileVersion: 1
ProductVersion: 1
InternalName: Win
OriginalFileName: Win.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
227
Monitored processes
98
Malicious processes
4
Suspicious processes
3

Behavior graph

Click at the process to see the details
start 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe  no specs icsys.icn.exe no specs 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe  no specs icsys.icn.exe no specs updater.exe updater.exe no specs updater.exe updater.exe no specs updater.exe updater.exe no specs 136.0.7103.114_chrome_installer.exe setup.exe setup.exe no specs setup.exe no specs setup.exe no specs slui.exe chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe elevation_service.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrmstp.exe no specs chrome.exe no specs chrome.exe no specs chrmstp.exe no specs chrmstp.exe no specs chrmstp.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs updater.exe updater.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs chrome.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
672"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --no-appcompat-clear --mojo-platform-channel-handle=5852 --field-trial-handle=2372,i,5432725791750911062,3390029353446386253,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
684"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=1996,i,5229555449803218846,16246775099617426608,262144 --variations-seed-version --mojo-platform-channel-handle=5276 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
136.0.7103.114
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\136.0.7103.114\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
920"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3528 --field-trial-handle=2372,i,5432725791750911062,3390029353446386253,262144 --variations-seed-version /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
968"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5708 --field-trial-handle=2372,i,5432725791750911062,3390029353446386253,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1040"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --disable-quic --field-trial-handle=1996,i,5229555449803218846,16246775099617426608,262144 --variations-seed-version --mojo-platform-channel-handle=6880 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
136.0.7103.114
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1244"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" https://www.google.com/chrome/go-mobile/?campaign=desktop-chr-whats-newC:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1388"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --field-trial-handle=1996,i,5229555449803218846,16246775099617426608,262144 --variations-seed-version --mojo-platform-channel-handle=6496 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
136.0.7103.114
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\136.0.7103.114\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1512"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-pre-read-main-dll --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1996,i,5229555449803218846,16246775099617426608,262144 --variations-seed-version --mojo-platform-channel-handle=1992 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
136.0.7103.114
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1628"C:\Program Files (x86)\Google\GoogleUpdater\138.0.7156.0\updater.exe" --crash-handler --system "--database=C:\Program Files (x86)\Google\GoogleUpdater\138.0.7156.0\Crashpad" --url=https://clients2.google.com/cr/report --annotation=prod=Update4 --annotation=ver=138.0.7156.0 "--attachment=C:\Program Files (x86)\Google\GoogleUpdater\updater.log" --initial-client-data=0x298,0x29c,0x2a0,0x274,0x2a4,0xd52e88,0xd52e94,0xd52ea0C:\Program Files (x86)\Google\GoogleUpdater\138.0.7156.0\updater.exeupdater.exe
User:
SYSTEM
Company:
Google LLC
Integrity Level:
SYSTEM
Description:
Google Updater (x86)
Exit code:
0
Version:
138.0.7156.0
Modules
Images
c:\program files (x86)\google\googleupdater\138.0.7156.0\updater.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
1760"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=4332 --field-trial-handle=2372,i,5432725791750911062,3390029353446386253,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
33 751
Read events
33 468
Write events
253
Delete events
30

Modification events

(PID) Process:(7800) icsys.icn.exeKey:HKEY_CURRENT_USER\SOFTWARE\VB and VBA Program Settings\Explorer\Process
Operation:writeName:LO
Value:
1
(PID) Process:(7988) 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exeKey:HKEY_CURRENT_USER\SOFTWARE\VB and VBA Program Settings\Explorer\Process
Operation:writeName:LO
Value:
1
(PID) Process:(8104) updater.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\Clients\{44fc7fe2-65ce-487c-93f4-edee46eeaaab}
Operation:writeName:pv
Value:
138.0.7156.0
(PID) Process:(8104) updater.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\Clients\{44fc7fe2-65ce-487c-93f4-edee46eeaaab}
Operation:writeName:name
Value:
GoogleUpdater
(PID) Process:(8104) updater.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientState\{44fc7fe2-65ce-487c-93f4-edee46eeaaab}
Operation:writeName:pv
Value:
138.0.7156.0
(PID) Process:(8104) updater.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientState\{44fc7fe2-65ce-487c-93f4-edee46eeaaab}
Operation:writeName:name
Value:
GoogleUpdater
(PID) Process:(8104) updater.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FB3C4578-D834-5B91-838B-33C23D553EAB}
Operation:writeName:AppID
Value:
{FB3C4578-D834-5B91-838B-33C23D553EAB}
(PID) Process:(8104) updater.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{FB3C4578-D834-5B91-838B-33C23D553EAB}
Operation:writeName:LocalService
Value:
GoogleUpdaterInternalService138.0.7156.0
(PID) Process:(8104) updater.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{FB3C4578-D834-5B91-838B-33C23D553EAB}
Operation:writeName:ServiceParameters
Value:
--com-service
(PID) Process:(8104) updater.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E6B4674A-6469-5F98-B5C4-421C2312C541}\TypeLib
Operation:writeName:Version
Value:
1.0
Executable files
25
Suspicious files
284
Text files
125
Unknown types
0

Dropped files

PID
Process
Filename
Type
80322025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe C:\Users\admin\AppData\Local\Temp\Google8032_153996211\UPDATER.PACKED.7Z
MD5:
SHA256:
8104updater.exeC:\Program Files (x86)\Google\GoogleUpdater\138.0.7156.0\uninstall.cmdtext
MD5:FBC297EE9060D4256192E4EDB98CAD1B
SHA256:099592FFA867124D16C0C6D868AF1214FD2B7180FA76E4EEE01ABF2A5CF8F044
8104updater.exeC:\Program Files (x86)\Google\GoogleUpdater\138.0.7156.0\updater.exeexecutable
MD5:FFDA3134E0823DECE997E1A4FB4FC146
SHA256:802CE5E3714C0D7CCCE24629E9517034E9CCB1F601BC6D29C878985AAA9148C9
8104updater.exeC:\Program Files (x86)\Google\GoogleUpdater\138.0.7156.0\Crashpad\settings.datbinary
MD5:3D9665A395A1119736C08206A155730F
SHA256:E6DB6FEDD6F79AB312C6CEF799622E305500B255CF450320C79FB1837B5FB5D2
8068icsys.icn.exeC:\Users\admin\AppData\Local\Temp\~DF6614E92C5D64CE7B.TMPbinary
MD5:B18A279FD58803BEDA1259E49BB8CBC0
SHA256:E560D8A592CF3E24456D585700D97FF1AB50BF09E4BB58D2BB2F71F407C99081
77202025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exeC:\Users\admin\AppData\Local\Temp\~DF8FD3970BF70C8905.TMPbinary
MD5:DE662BE8620DA0F1317EE50DC91DEF34
SHA256:3EF8834BFE4323838D2162DE22F2A6CB8F79902D7072F798FE509993ADF9D610
79882025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exeC:\Users\admin\AppData\Local\Temp\~DF57CC282C56EBE5AB.TMPbinary
MD5:8B69C91D6238F1E09EF52E3F1C7A7F35
SHA256:36980A314810653620BF035AAF691CF232F7ACD7736A8ACDE28B48FB22F3C907
77202025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exeC:\Users\admin\AppData\Local\icsys.icn.exeexecutable
MD5:8DCD825292FF0CFB52312D27B01DD9FE
SHA256:7EAB719936BA835BB380EDBCA77FF547468DC880CC5A8429B8C10262E67F8BBE
4164updater.exeC:\Windows\SystemTemp\chrome_url_fetcher_4164_1076886471\-8a69d345-d564-463c-aff1-a69d9e530f96-_136.0.7103.114_all_ad7dwyzixriyihpq34zcr5sbgv5a.crx3
MD5:
SHA256:
4164updater.exeC:\Program Files (x86)\Google\GoogleUpdater\crx_cache\3c44958b04fc5472723195695245b0c97501b3f727c7d76a2beea42321b274f4
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
17
TCP/UDP connections
176
DNS requests
129
Threats
8

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4488
SIHClient.exe
GET
200
2.16.168.114:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4488
SIHClient.exe
GET
200
184.25.206.92:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
4488
SIHClient.exe
GET
200
2.16.168.114:80
http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl
unknown
whitelisted
4488
SIHClient.exe
GET
200
2.16.168.114:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl
unknown
whitelisted
4164
updater.exe
GET
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome/acmzzukkl3jb73m2a5uyibbxyj5a_136.0.7103.114/-8a69d345-d564-463c-aff1-a69d9e530f96-_136.0.7103.114_all_ad7dwyzixriyihpq34zcr5sbgv5a.crx3
unknown
whitelisted
4488
SIHClient.exe
GET
200
184.25.206.92:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
4488
SIHClient.exe
GET
200
184.25.206.92:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
4488
SIHClient.exe
GET
200
184.25.206.92:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl
unknown
whitelisted
3332
chrome.exe
GET
200
142.250.184.206:80
http://clients2.google.com/time/1/current?cup2key=9:5Gb2VAg8fzaBzbrjM3sCEnn4A6p1IRJ9Cv4vyq_Pixg&cup2hreq=e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
unknown
whitelisted
8800
svchost.exe
HEAD
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/aca4j7naijrf65juvpzj5lv43una_2025.4.30.0/niikhdgajlphfehepabhhblakbdgeefj_2025.04.30.00_all_pi2vwi5t776kda42vjlunrgh5u.crx3
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
4164
updater.exe
172.217.18.3:443
update.googleapis.com
GOOGLE
US
whitelisted
8104
updater.exe
142.250.185.78:443
dl.google.com
GOOGLE
US
whitelisted
4164
updater.exe
34.104.35.123:80
edgedl.me.gvt1.com
GOOGLE
US
whitelisted
4488
SIHClient.exe
52.149.20.212:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4488
SIHClient.exe
2.16.168.114:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
4488
SIHClient.exe
184.25.206.92:80
www.microsoft.com
AKAMAI-AS
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
google.com
  • 142.250.185.174
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
update.googleapis.com
  • 172.217.18.3
whitelisted
dl.google.com
  • 142.250.185.78
whitelisted
edgedl.me.gvt1.com
  • 34.104.35.123
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
crl.microsoft.com
  • 2.16.168.114
  • 2.16.168.124
whitelisted
www.microsoft.com
  • 184.25.206.92
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted

Threats

PID
Process
Class
Message
3332
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
3332
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
3332
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
3332
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
7712
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
7712
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
7712
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
7712
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
No debug info