File name:

2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer

Full analysis: https://app.any.run/tasks/073e806d-a396-47aa-bcba-70ecd563b234
Verdict: Malicious activity
Analysis date: May 15, 2025, 19:29:56
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto-reg
qrcode
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 3 sections
MD5:

DDFEBE6FA894BDBA8EB515BBF2C32974

SHA1:

23FEBEFB517C83B9791E598C5D9F4DC9780BB525

SHA256:

C92DA7A6E04609C26A1A4052C01EB93373AA741DAAACC2BCE5574C36CFAD99C9

SSDEEP:

98304:AtfGrRCpfAbNl7pAEcLB806XcPEs0XQpe0DELXFAzz0Tpcky7+HlPmqPLQ4Za99I:qyjF

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • setup.exe (PID: 6324)
  • SUSPICIOUS

    • Starts itself from another location

      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe (PID: 7720)
      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe (PID: 7988)
    • Reads security settings of Internet Explorer

      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe  (PID: 7748)
      • updater.exe (PID: 8104)
    • Executable content was dropped or overwritten

      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe (PID: 7720)
      • updater.exe (PID: 8104)
      • updater.exe (PID: 7200)
      • 136.0.7103.114_chrome_installer.exe (PID: 6112)
      • setup.exe (PID: 6324)
    • Starts application with an unusual extension

      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe (PID: 7720)
      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe (PID: 7988)
    • Application launched itself

      • updater.exe (PID: 8104)
      • updater.exe (PID: 7200)
      • updater.exe (PID: 4164)
      • setup.exe (PID: 6324)
      • setup.exe (PID: 6036)
      • updater.exe (PID: 3028)
    • Executes as Windows Service

      • updater.exe (PID: 7200)
      • updater.exe (PID: 4164)
      • updater.exe (PID: 3028)
    • Creates a software uninstall entry

      • chrome.exe (PID: 7508)
      • setup.exe (PID: 6324)
    • Searches for installed software

      • setup.exe (PID: 6324)
  • INFO

    • Checks supported languages

      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe (PID: 7720)
      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe  (PID: 7748)
      • icsys.icn.exe (PID: 7800)
      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe (PID: 7988)
      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe  (PID: 8032)
      • icsys.icn.exe (PID: 8068)
      • updater.exe (PID: 8128)
      • updater.exe (PID: 8104)
      • updater.exe (PID: 5072)
      • updater.exe (PID: 4164)
      • updater.exe (PID: 7200)
      • updater.exe (PID: 7256)
      • 136.0.7103.114_chrome_installer.exe (PID: 6112)
      • setup.exe (PID: 6324)
      • setup.exe (PID: 4892)
      • setup.exe (PID: 6036)
      • setup.exe (PID: 7496)
      • elevation_service.exe (PID: 6516)
    • Creates files or folders in the user directory

      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe (PID: 7720)
      • updater.exe (PID: 8104)
    • Reads the computer name

      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe (PID: 7720)
      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe  (PID: 7748)
      • icsys.icn.exe (PID: 7800)
      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe (PID: 7988)
      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe  (PID: 8032)
      • updater.exe (PID: 8104)
      • updater.exe (PID: 7200)
      • updater.exe (PID: 4164)
      • 136.0.7103.114_chrome_installer.exe (PID: 6112)
      • setup.exe (PID: 6324)
      • setup.exe (PID: 6036)
      • elevation_service.exe (PID: 6516)
    • Create files in a temporary directory

      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe (PID: 7720)
      • icsys.icn.exe (PID: 7800)
      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe (PID: 7988)
      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe  (PID: 8032)
      • icsys.icn.exe (PID: 8068)
      • updater.exe (PID: 8104)
    • Failed to create an executable file in Windows directory

      • icsys.icn.exe (PID: 7800)
    • Process checks computer location settings

      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe  (PID: 7748)
    • The sample compiled with english language support

      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe (PID: 7720)
      • updater.exe (PID: 8104)
      • updater.exe (PID: 7200)
      • setup.exe (PID: 6324)
      • 136.0.7103.114_chrome_installer.exe (PID: 6112)
    • Creates files in the program directory

      • 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe  (PID: 8032)
      • updater.exe (PID: 8104)
      • updater.exe (PID: 8128)
      • updater.exe (PID: 7200)
      • updater.exe (PID: 4164)
      • setup.exe (PID: 6324)
      • setup.exe (PID: 6036)
    • Process checks whether UAC notifications are on

      • updater.exe (PID: 8104)
      • updater.exe (PID: 4164)
      • updater.exe (PID: 7200)
    • Checks proxy server information

      • updater.exe (PID: 8104)
    • Reads the software policy settings

      • updater.exe (PID: 4164)
      • updater.exe (PID: 8104)
    • Reads the machine GUID from the registry

      • updater.exe (PID: 4164)
      • updater.exe (PID: 8104)
    • Auto-launch of the file from Registry key

      • setup.exe (PID: 6324)
    • Manual execution by a user

      • chrome.exe (PID: 7508)
      • chrmstp.exe (PID: 7288)
      • msedge.exe (PID: 1244)
      • msedge.exe (PID: 8484)
    • Application launched itself

      • chrome.exe (PID: 7508)
      • chrmstp.exe (PID: 7288)
      • msedge.exe (PID: 1244)
      • chrmstp.exe (PID: 6964)
    • Executes as Windows Service

      • elevation_service.exe (PID: 6516)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable Microsoft Visual Basic 6 (35)
.exe | InstallShield setup (18.3)
.exe | Win32 EXE PECompact compressed (generic) (17.7)
.exe | Win32 Executable MS Visual C++ (generic) (13.3)
.exe | Win64 Executable (generic) (11.8)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2011:06:14 19:01:16+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit
PEType: PE32
LinkerVersion: 6
CodeSize: 176128
InitializedDataSize: 12288
UninitializedDataSize: -
EntryPoint: 0x3670
OSVersion: 4
ImageVersion: 1
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Microsoft
ProductName: Win
FileVersion: 1
ProductVersion: 1
InternalName: Win
OriginalFileName: Win.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
227
Monitored processes
98
Malicious processes
4
Suspicious processes
3

Behavior graph

Click at the process to see the details
start 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe  no specs icsys.icn.exe no specs 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe  no specs icsys.icn.exe no specs updater.exe updater.exe no specs updater.exe updater.exe no specs updater.exe updater.exe no specs 136.0.7103.114_chrome_installer.exe setup.exe setup.exe no specs setup.exe no specs setup.exe no specs slui.exe chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe elevation_service.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrmstp.exe no specs chrome.exe no specs chrome.exe no specs chrmstp.exe no specs chrmstp.exe no specs chrmstp.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs updater.exe updater.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs identity_helper.exe no specs identity_helper.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs chrome.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
672"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=entity_extraction_service.mojom.Extractor --lang=en-US --service-sandbox-type=entity_extraction --onnx-enabled-for-ee --no-appcompat-clear --mojo-platform-channel-handle=5852 --field-trial-handle=2372,i,5432725791750911062,3390029353446386253,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
684"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --enable-dinosaur-easter-egg-alt-images --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=12 --field-trial-handle=1996,i,5229555449803218846,16246775099617426608,262144 --variations-seed-version --mojo-platform-channel-handle=5276 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
136.0.7103.114
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\136.0.7103.114\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
920"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --no-appcompat-clear --lang=en-US --js-flags=--ms-user-locale= --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=3528 --field-trial-handle=2372,i,5432725791750911062,3390029353446386253,262144 --variations-seed-version /prefetch:1C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
968"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=5708 --field-trial-handle=2372,i,5432725791750911062,3390029353446386253,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1040"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --lang=en-US --service-sandbox-type=none --disable-quic --field-trial-handle=1996,i,5229555449803218846,16246775099617426608,262144 --variations-seed-version --mojo-platform-channel-handle=6880 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
136.0.7103.114
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1244"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" https://www.google.com/chrome/go-mobile/?campaign=desktop-chr-whats-newC:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1388"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=unzip.mojom.Unzipper --lang=en-US --service-sandbox-type=service --disable-quic --field-trial-handle=1996,i,5229555449803218846,16246775099617426608,262144 --variations-seed-version --mojo-platform-channel-handle=6496 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
136.0.7103.114
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\136.0.7103.114\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
1512"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --no-pre-read-main-dll --gpu-preferences=UAAAAAAAAADgAAAEAAAAAAAAAAAAAAAAAABgAAEAAAAAAAAAAAAAAAAAAAACAAAAAAAAAAAAAAAAAAAAAAAAABAAAAAAAAAAEAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAA --field-trial-handle=1996,i,5229555449803218846,16246775099617426608,262144 --variations-seed-version --mojo-platform-channel-handle=1992 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Version:
136.0.7103.114
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1628"C:\Program Files (x86)\Google\GoogleUpdater\138.0.7156.0\updater.exe" --crash-handler --system "--database=C:\Program Files (x86)\Google\GoogleUpdater\138.0.7156.0\Crashpad" --url=https://clients2.google.com/cr/report --annotation=prod=Update4 --annotation=ver=138.0.7156.0 "--attachment=C:\Program Files (x86)\Google\GoogleUpdater\updater.log" --initial-client-data=0x298,0x29c,0x2a0,0x274,0x2a4,0xd52e88,0xd52e94,0xd52ea0C:\Program Files (x86)\Google\GoogleUpdater\138.0.7156.0\updater.exeupdater.exe
User:
SYSTEM
Company:
Google LLC
Integrity Level:
SYSTEM
Description:
Google Updater (x86)
Exit code:
0
Version:
138.0.7156.0
Modules
Images
c:\program files (x86)\google\googleupdater\138.0.7156.0\updater.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
1760"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --lang=en-US --service-sandbox-type=service --no-appcompat-clear --mojo-platform-channel-handle=4332 --field-trial-handle=2372,i,5432725791750911062,3390029353446386253,262144 --variations-seed-version /prefetch:8C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Microsoft Edge
Exit code:
0
Version:
122.0.2365.59
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\122.0.2365.59\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
Total events
33 751
Read events
33 468
Write events
253
Delete events
30

Modification events

(PID) Process:(7800) icsys.icn.exeKey:HKEY_CURRENT_USER\SOFTWARE\VB and VBA Program Settings\Explorer\Process
Operation:writeName:LO
Value:
1
(PID) Process:(7988) 2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exeKey:HKEY_CURRENT_USER\SOFTWARE\VB and VBA Program Settings\Explorer\Process
Operation:writeName:LO
Value:
1
(PID) Process:(8104) updater.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\Clients\{44fc7fe2-65ce-487c-93f4-edee46eeaaab}
Operation:writeName:pv
Value:
138.0.7156.0
(PID) Process:(8104) updater.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\Clients\{44fc7fe2-65ce-487c-93f4-edee46eeaaab}
Operation:writeName:name
Value:
GoogleUpdater
(PID) Process:(8104) updater.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientState\{44fc7fe2-65ce-487c-93f4-edee46eeaaab}
Operation:writeName:pv
Value:
138.0.7156.0
(PID) Process:(8104) updater.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Google\Update\ClientState\{44fc7fe2-65ce-487c-93f4-edee46eeaaab}
Operation:writeName:name
Value:
GoogleUpdater
(PID) Process:(8104) updater.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{FB3C4578-D834-5B91-838B-33C23D553EAB}
Operation:writeName:AppID
Value:
{FB3C4578-D834-5B91-838B-33C23D553EAB}
(PID) Process:(8104) updater.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{FB3C4578-D834-5B91-838B-33C23D553EAB}
Operation:writeName:LocalService
Value:
GoogleUpdaterInternalService138.0.7156.0
(PID) Process:(8104) updater.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{FB3C4578-D834-5B91-838B-33C23D553EAB}
Operation:writeName:ServiceParameters
Value:
--com-service
(PID) Process:(8104) updater.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{E6B4674A-6469-5F98-B5C4-421C2312C541}\TypeLib
Operation:writeName:Version
Value:
1.0
Executable files
25
Suspicious files
284
Text files
125
Unknown types
0

Dropped files

PID
Process
Filename
Type
80322025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe C:\Users\admin\AppData\Local\Temp\Google8032_153996211\UPDATER.PACKED.7Z
MD5:
SHA256:
77202025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exeC:\Users\admin\AppData\Local\Temp\~DF8FD3970BF70C8905.TMPbinary
MD5:DE662BE8620DA0F1317EE50DC91DEF34
SHA256:3EF8834BFE4323838D2162DE22F2A6CB8F79902D7072F798FE509993ADF9D610
79882025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exeC:\Users\admin\AppData\Local\Temp\~DF57CC282C56EBE5AB.TMPbinary
MD5:8B69C91D6238F1E09EF52E3F1C7A7F35
SHA256:36980A314810653620BF035AAF691CF232F7ACD7736A8ACDE28B48FB22F3C907
77202025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exeC:\Users\admin\Desktop\2025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exe executable
MD5:5F05646FC178E8C564F7BB4EB4222AEA
SHA256:8AE4984349D10051DB43CD4E4F7D050FD578D9E92FCE4245CF6F85C6863B2D39
77202025-05-15_ddfebe6fa894bdba8eb515bbf2c32974_amadey_black-basta_darkgate_elex_hijackloader_luca-stealer.exeC:\Users\admin\AppData\Local\icsys.icn.exeexecutable
MD5:8DCD825292FF0CFB52312D27B01DD9FE
SHA256:7EAB719936BA835BB380EDBCA77FF547468DC880CC5A8429B8C10262E67F8BBE
7200updater.exeC:\Program Files (x86)\Google\GoogleUpdater\prefs.json~RF10cf77.TMPbinary
MD5:3F6427D2AB4B18D3993874E76EA4A70A
SHA256:8CD33DE899548BA6CBA67355CDF68040D6C9FAD2777B27220FFA49409266180C
7200updater.exeC:\Program Files (x86)\Google\GoogleUpdater\prefs.jsonbinary
MD5:00307500329DBCFB6E7CECB636DFF668
SHA256:358E3107A9C3E118616970C39EA2F31ABF420C04CF5C384B9365E181614A5FE1
7200updater.exeC:\Windows\SystemTemp\Google7200_1694693340\scoped_dir7200_2095694763\GoogleUpdate.exeexecutable
MD5:3AA2C853D6BC7AF7F2F9B8A934943EFD
SHA256:07034876B9EC0B59432B96FEDB7E10E332440159F9802FAAD5F5B99F01885F6B
4164updater.exeC:\Windows\SystemTemp\chrome_url_fetcher_4164_1076886471\-8a69d345-d564-463c-aff1-a69d9e530f96-_136.0.7103.114_all_ad7dwyzixriyihpq34zcr5sbgv5a.crx3
MD5:
SHA256:
4164updater.exeC:\Program Files (x86)\Google\GoogleUpdater\crx_cache\3c44958b04fc5472723195695245b0c97501b3f727c7d76a2beea42321b274f4
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
17
TCP/UDP connections
176
DNS requests
129
Threats
8

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4488
SIHClient.exe
GET
200
2.16.168.114:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
4488
SIHClient.exe
GET
200
184.25.206.92:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
4488
SIHClient.exe
GET
200
2.16.168.114:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl
unknown
whitelisted
4488
SIHClient.exe
GET
200
2.16.168.114:80
http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl
unknown
whitelisted
4164
updater.exe
GET
200
34.104.35.123:80
http://edgedl.me.gvt1.com/edgedl/release2/chrome/acmzzukkl3jb73m2a5uyibbxyj5a_136.0.7103.114/-8a69d345-d564-463c-aff1-a69d9e530f96-_136.0.7103.114_all_ad7dwyzixriyihpq34zcr5sbgv5a.crx3
unknown
whitelisted
4488
SIHClient.exe
GET
200
184.25.206.92:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
4488
SIHClient.exe
GET
200
184.25.206.92:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
4488
SIHClient.exe
GET
200
184.25.206.92:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.2.crl
unknown
whitelisted
3332
chrome.exe
GET
200
142.250.184.206:80
http://clients2.google.com/time/1/current?cup2key=9:5Gb2VAg8fzaBzbrjM3sCEnn4A6p1IRJ9Cv4vyq_Pixg&cup2hreq=e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
unknown
whitelisted
4488
SIHClient.exe
GET
200
184.25.206.92:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.248:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
4164
updater.exe
172.217.18.3:443
update.googleapis.com
GOOGLE
US
whitelisted
8104
updater.exe
142.250.185.78:443
dl.google.com
GOOGLE
US
whitelisted
4164
updater.exe
34.104.35.123:80
edgedl.me.gvt1.com
GOOGLE
US
whitelisted
4488
SIHClient.exe
52.149.20.212:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4488
SIHClient.exe
2.16.168.114:80
crl.microsoft.com
Akamai International B.V.
RU
whitelisted
4488
SIHClient.exe
184.25.206.92:80
www.microsoft.com
AKAMAI-AS
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
whitelisted
google.com
  • 142.250.185.174
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
update.googleapis.com
  • 172.217.18.3
whitelisted
dl.google.com
  • 142.250.185.78
whitelisted
edgedl.me.gvt1.com
  • 34.104.35.123
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
crl.microsoft.com
  • 2.16.168.114
  • 2.16.168.124
whitelisted
www.microsoft.com
  • 184.25.206.92
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted

Threats

PID
Process
Class
Message
3332
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
3332
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
3332
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
3332
chrome.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
7712
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
7712
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
7712
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
7712
msedge.exe
Not Suspicious Traffic
INFO [ANY.RUN] Google Tag Manager analytics (googletagmanager .com)
No debug info