File name:

Cristalix (1).exe

Full analysis: https://app.any.run/tasks/1a3736fd-d7ca-4ee1-9308-75bf29205674
Verdict: Malicious activity
Analysis date: June 18, 2025, 00:48:23
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/zip
File info: Zip archive, with extra data prepended
MD5:

AD976BD32550E66CB82C81459D08B602

SHA1:

F6CFE1D80CA681A846000A636EE72F7264B654AC

SHA256:

203A34A75A3589121FB2BBCB81345B8CFC52A04D0ABB09018D949EE46FB058B0

SSDEEP:

98304:FMF7KcQdm/ohZISsV6MAAVGXbjrF6ODmhOL3l9bw5mUoh4SJZ2mk+Js58vRaQEl3:mqk59854sMDFq+Em

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Checks for Java to be installed

      • Cristalix (1).exe (PID: 504)
    • There is functionality for taking screenshot (YARA)

      • javaw.exe (PID: 6360)
    • Detected use of alternative data streams (AltDS)

      • javaw.exe (PID: 6360)
    • Executable content was dropped or overwritten

      • javaw.exe (PID: 6360)
    • Process drops legitimate windows executable

      • javaw.exe (PID: 6360)
    • The process drops C-runtime libraries

      • javaw.exe (PID: 6360)
  • INFO

    • The sample compiled with russian language support

      • Cristalix (1).exe (PID: 504)
    • Checks supported languages

      • Cristalix (1).exe (PID: 504)
      • javaw.exe (PID: 6360)
    • Create files in a temporary directory

      • javaw.exe (PID: 6360)
    • Creates files in the program directory

      • javaw.exe (PID: 6360)
    • Reads the computer name

      • javaw.exe (PID: 6360)
    • Reads the machine GUID from the registry

      • javaw.exe (PID: 6360)
    • Creates files or folders in the user directory

      • javaw.exe (PID: 6360)
    • The sample compiled with english language support

      • javaw.exe (PID: 6360)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2022:09:19 06:58:07+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.32
CodeSize: 54784
InitializedDataSize: 107520
UninitializedDataSize: -
EntryPoint: 0x351d
OSVersion: 5.1
ImageVersion: -
SubsystemVersion: 5.1
Subsystem: Windows GUI
FileVersionNumber: 1.1.0.0
ProductVersionNumber: 1.1.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Russian
CharacterSet: Unicode
CompanyName: Cristalix
FileDescription: Cristalix Launcher
FileVersion: 1.1.0.0
InternalName: Cristalix.exe
LegalCopyright: Copyright (C) 2018-2022 Cristalix
OriginalFileName: Cristalix.exe
ProductName: Cristalix Launcher
ProductVersion: 1.1.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
139
Monitored processes
5
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start cristalix (1).exe no specs javaw.exe icacls.exe no specs conhost.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
504"C:\Users\admin\Desktop\Cristalix (1).exe" C:\Users\admin\Desktop\Cristalix (1).exeexplorer.exe
User:
admin
Company:
Cristalix
Integrity Level:
MEDIUM
Description:
Cristalix Launcher
Exit code:
0
Version:
1.1.0.0
Modules
Images
c:\users\admin\desktop\cristalix (1).exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
2032C:\WINDOWS\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)MC:\Windows\System32\icacls.exejavaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\icacls.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6360"C:\Program Files\Java\jre1.8.0_271\bin\javaw.exe" -XX:MinHeapFreeRatio=5 -XX:MaxHeapFreeRatio=15 -jar "Cristalix (1).exe"C:\Program Files\Java\jre1.8.0_271\bin\javaw.exe
Cristalix (1).exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Version:
8.0.2710.9
Modules
Images
c:\program files\java\jre1.8.0_271\bin\javaw.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
6460\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeicacls.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7000C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
868
Read events
868
Write events
0
Delete events
0

Modification events

No data
Executable files
62
Suspicious files
493
Text files
127
Unknown types
0

Dropped files

PID
Process
Filename
Type
6360javaw.exeC:\Users\admin\.cristalix\updates\24-jre-win-64\lib\modules
MD5:
SHA256:
6360javaw.exeC:\Users\admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1693682860-607145093-2874071422-1001\83aa4cc77f591dfc2374580bbd95f6ba_bb926e54-e3ca-40fd-ae90-2764341e7792binary
MD5:C8366AE350E7019AEFC9D1E6E6A498C6
SHA256:11E6ACA8E682C046C83B721EEB5C72C5EF03CB5936C60DF6F4993511DDC61238
6360javaw.exeC:\ProgramData\Oracle\Java\.oracle_jre_usage\17dfc292991c8061.timestamptext
MD5:F5F6B3EE0602B97349A372618C08DD51
SHA256:2FB4B6D2760A6F7CDA07BDC0D1830F29AC69842B047637A14C9F0BF337321498
6360javaw.exeC:\Users\admin\.cristalix\updates\24-jre-win-64\bin\api-ms-win-core-console-l1-1-0.dllexecutable
MD5:E4A519EF5D0A378EA82C423FE1E4586E
SHA256:5C1CBD16ACF9191F17525F5DD887D944B4EB0083C5EC1ADB68CE1B82639182AE
6360javaw.exeC:\Users\Public\desktop.ini:WinDeviceIdbinary
MD5:F68716B1246697BB48D829A3833810A2
SHA256:861DB123DB137665F864B9E2D05D909B081974C6C05BB01E977F1EA983C3CFC9
6360javaw.exeC:\Users\admin\.cristalix\updates\24-jre-win-64\conf\jaxp-strict.properties.templatetext
MD5:FD9C1610C84407BF676DC11322C522A7
SHA256:3CC9B87633769414B22C24C97ECDED8A15DF630FE5AB12ABCA2398D88E31B32B
6360javaw.exeC:\Users\admin\.cristalix\updates\24-jre-win-64\conf\sound.propertiestext
MD5:4F95242740BFB7B133B879597947A41E
SHA256:299C2360B6155EB28990EC49CD21753F97E43442FE8FAB03E04F3E213DF43A66
6360javaw.exeC:\Users\admin\.cristalix\updates\24-jre-win-64\conf\jaxp.propertiestext
MD5:80F4A5F43C22B97BE120E0716974A029
SHA256:D4F45052A100E5AEF02B6638A3B9C69B2BDD46155CEB58A52671E5D594C30100
6360javaw.exeC:\Users\admin\.cristalix\updates\24-jre-win-64\bin\api-ms-win-core-datetime-l1-1-0.dllexecutable
MD5:B3F46F0820B641C5A9A9D0A4BFC94355
SHA256:E353ECF9DEB083DA0F00F40F2FE99CC4EEA4A904E7118A1CAC4EF6E43F89B154
6360javaw.exeC:\Users\admin\.cristalix\updates\24-jre-win-64\bin\api-ms-win-core-file-l1-1-0.dllexecutable
MD5:B90485EB6D2E835F975C6F1011BE880F
SHA256:72E79CE895AB6506D2C85BCD1709EF6A250B63C990C76C9DF530EC4E5B5CBB6A
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
44
DNS requests
27
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4644
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1268
svchost.exe
GET
200
2.16.241.19:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
2580
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
2580
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
5944
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
1268
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
856
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
6360
javaw.exe
95.181.182.182:443
rucdn2.c7x.dev
EdgeCenter LLC
RU
malicious
6360
javaw.exe
95.129.233.174:443
rudynamiclnchr.c7x.dev
RU
unknown
6360
javaw.exe
95.129.233.149:443
rustaticlnchr.c7x.dev
RU
unknown
6360
javaw.exe
95.129.233.178:443
cristalix.gg
RU
unknown
2336
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 40.127.240.158
whitelisted
google.com
  • 142.250.185.142
whitelisted
rucdn2.c7x.dev
  • 95.181.182.182
unknown
rustorage.c7x.dev
  • 95.181.182.182
unknown
rudynamiclnchr.c7x.dev
  • 95.129.233.174
unknown
rustaticlnchr.c7x.dev
  • 95.129.233.149
unknown
ruwebdata.c7x.dev
  • 95.181.182.182
unknown
cristalix.gg
  • 95.129.233.178
unknown
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 40.126.31.2
  • 20.190.159.23
  • 20.190.159.129
  • 20.190.159.4
  • 20.190.159.71
  • 40.126.31.3
  • 40.126.31.73
  • 40.126.31.128
whitelisted

Threats

No threats detected
No debug info