| File name: | RunWay.exe |
| Full analysis: | https://app.any.run/tasks/23f8c517-e94c-47b0-99a3-f6b64113873e |
| Verdict: | Malicious activity |
| Analysis date: | April 27, 2025, 15:34:31 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections |
| MD5: | 0B5A958C0DB880331244DC5C5860FA30 |
| SHA1: | 3840D4FDE5BE11960FF51037D4DA48120CCDA430 |
| SHA256: | 2355248070B08D290A07E9A6FF8F8EED856A1BDFB28E256368AFDB89FFC38E35 |
| SSDEEP: | 786432:3UHxvVRDp271lL5NaYsT3W/OLtWhWya91fPiQJbxkO:IxvfDp271lL5xs7W/ULya91fPiQJbxkO |
| .exe | | | Win32 Executable (generic) (52.9) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (23.5) |
| .exe | | | DOS Executable Generic (23.5) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2018:12:15 22:26:14+00:00 |
| ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 6 |
| CodeSize: | 26624 |
| InitializedDataSize: | 473088 |
| UninitializedDataSize: | 16384 |
| EntryPoint: | 0x338f |
| OSVersion: | 4 |
| ImageVersion: | 6 |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.4.2.0 |
| ProductVersionNumber: | 1.4.2.0 |
| FileFlagsMask: | 0x0000 |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Windows, Latin1 |
| CompanyName: | runWay LLC |
| FileDescription: | runWay LLC |
| FileVersion: | 1.4.2 |
| LegalCopyright: | Copyright © 2025 runWay LLC |
| ProductName: | runWay |
| ProductVersion: | 1.4.2 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2136 | "C:\Users\admin\AppData\Local\Programs\runWay\runWay.exe" | C:\Users\admin\AppData\Local\Programs\runWay\runWay.exe | explorer.exe | ||||||||||||
User: admin Company: runWay LLC Integrity Level: HIGH Description: runWay Exit code: 0 Version: 1.4.2 Modules
| |||||||||||||||
| 2692 | "C:\Users\admin\AppData\Local\Programs\runWay\runWay.exe" | C:\Users\admin\AppData\Local\Programs\runWay\runWay.exe | — | explorer.exe | |||||||||||
User: admin Company: runWay LLC Integrity Level: MEDIUM Description: runWay Exit code: 3221226540 Version: 1.4.2 Modules
| |||||||||||||||
| 3332 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4040 | "C:\Users\admin\AppData\Local\Programs\runWay\runWay.exe" --type=gpu-process --user-data-dir="C:\Users\admin\AppData\Roaming\runWay" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1652 --field-trial-handle=1736,i,6122111143698004813,4983148970680085,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2 | C:\Users\admin\AppData\Local\Programs\runWay\runWay.exe | — | runWay.exe | |||||||||||
User: admin Company: runWay LLC Integrity Level: LOW Description: runWay Exit code: 0 Version: 1.4.2 Modules
| |||||||||||||||
| 4120 | "C:\Users\admin\AppData\Local\Temp\RunWay.exe" | C:\Users\admin\AppData\Local\Temp\RunWay.exe | explorer.exe | ||||||||||||
User: admin Company: runWay LLC Integrity Level: MEDIUM Description: runWay LLC Exit code: 0 Version: 1.4.2 Modules
| |||||||||||||||
| 5384 | "C:\Users\admin\AppData\Local\Programs\runWay\runWay.exe" --type=renderer --user-data-dir="C:\Users\admin\AppData\Roaming\runWay" --app-path="C:\Users\admin\AppData\Local\Programs\runWay\resources\app.asar" --no-sandbox --no-zygote --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=4 --mojo-platform-channel-handle=3004 --field-trial-handle=1736,i,6122111143698004813,4983148970680085,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:1 | C:\Users\admin\AppData\Local\Programs\runWay\runWay.exe | — | runWay.exe | |||||||||||
User: admin Company: runWay LLC Integrity Level: HIGH Description: runWay Exit code: 0 Version: 1.4.2 Modules
| |||||||||||||||
| 6516 | "C:\Users\admin\AppData\Local\Programs\runWay\runWay.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --user-data-dir="C:\Users\admin\AppData\Roaming\runWay" --mojo-platform-channel-handle=2112 --field-trial-handle=1736,i,6122111143698004813,4983148970680085,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8 | C:\Users\admin\AppData\Local\Programs\runWay\runWay.exe | runWay.exe | ||||||||||||
User: admin Company: runWay LLC Integrity Level: HIGH Description: runWay Exit code: 0 Version: 1.4.2 Modules
| |||||||||||||||
| (PID) Process: | (4120) RunWay.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\c4d471bd-a4de-5fea-bac8-b772a9787189 |
| Operation: | write | Name: | InstallLocation |
Value: C:\Users\admin\AppData\Local\Programs\runWay | |||
| (PID) Process: | (4120) RunWay.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\c4d471bd-a4de-5fea-bac8-b772a9787189 |
| Operation: | write | Name: | KeepShortcuts |
Value: true | |||
| (PID) Process: | (4120) RunWay.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\c4d471bd-a4de-5fea-bac8-b772a9787189 |
| Operation: | write | Name: | ShortcutName |
Value: runWay | |||
| (PID) Process: | (4120) RunWay.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\c4d471bd-a4de-5fea-bac8-b772a9787189 |
| Operation: | write | Name: | DisplayName |
Value: runWay 1.4.2 | |||
| (PID) Process: | (4120) RunWay.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\c4d471bd-a4de-5fea-bac8-b772a9787189 |
| Operation: | write | Name: | UninstallString |
Value: "C:\Users\admin\AppData\Local\Programs\runWay\Uninstall runWay.exe" /currentuser | |||
| (PID) Process: | (4120) RunWay.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\c4d471bd-a4de-5fea-bac8-b772a9787189 |
| Operation: | write | Name: | QuietUninstallString |
Value: "C:\Users\admin\AppData\Local\Programs\runWay\Uninstall runWay.exe" /currentuser /S | |||
| (PID) Process: | (4120) RunWay.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\c4d471bd-a4de-5fea-bac8-b772a9787189 |
| Operation: | write | Name: | DisplayVersion |
Value: 1.4.2 | |||
| (PID) Process: | (4120) RunWay.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\c4d471bd-a4de-5fea-bac8-b772a9787189 |
| Operation: | write | Name: | DisplayIcon |
Value: C:\Users\admin\AppData\Local\Programs\runWay\runWay.exe,0 | |||
| (PID) Process: | (4120) RunWay.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\c4d471bd-a4de-5fea-bac8-b772a9787189 |
| Operation: | write | Name: | Publisher |
Value: runWay LLC | |||
| (PID) Process: | (4120) RunWay.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\c4d471bd-a4de-5fea-bac8-b772a9787189 |
| Operation: | write | Name: | NoModify |
Value: 1 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 4120 | RunWay.exe | C:\Users\admin\AppData\Local\Temp\nsdD7A6.tmp\app-32.7z | — | |
MD5:— | SHA256:— | |||
| 4120 | RunWay.exe | C:\Users\admin\AppData\Local\Temp\nsdD7A6.tmp\7z-out\icudtl.dat | — | |
MD5:— | SHA256:— | |||
| 4120 | RunWay.exe | C:\Users\admin\AppData\Local\Temp\nsdD7A6.tmp\7z-out\LICENSES.chromium.html | — | |
MD5:— | SHA256:— | |||
| 4120 | RunWay.exe | C:\Users\admin\AppData\Local\Temp\nsdD7A6.tmp\nsis7z.dll | executable | |
MD5:80E44CE4895304C6A3A831310FBF8CD0 | SHA256:B393F05E8FF919EF071181050E1873C9A776E1A0AE8329AEFFF7007D0CADF592 | |||
| 4120 | RunWay.exe | C:\Users\admin\AppData\Local\Temp\nsdD7A6.tmp\7z-out\locales\ca.pak | binary | |
MD5:4CD6B3A91669DDCFCC9EEF9B679AB65C | SHA256:56EFFF228EE3E112357D6121B2256A2C3ACD718769C89413DE82C9D4305459C6 | |||
| 4120 | RunWay.exe | C:\Users\admin\AppData\Local\Temp\nsdD7A6.tmp\7z-out\LICENSE.electron.txt | text | |
MD5:4D42118D35941E0F664DDDBD83F633C5 | SHA256:5154E165BD6C2CC0CFBCD8916498C7ABAB0497923BAFCD5CB07673FE8480087D | |||
| 4120 | RunWay.exe | C:\Users\admin\AppData\Local\Temp\nsdD7A6.tmp\7z-out\chrome_200_percent.pak | binary | |
MD5:48515D600258D60019C6B9C6421F79F6 | SHA256:07BEE34E189FE9A8789AED78EA59AD41414B6E611E7D74DA62F8E6CA36AF01CE | |||
| 4120 | RunWay.exe | C:\Users\admin\AppData\Local\Temp\nsdD7A6.tmp\7z-out\chrome_100_percent.pak | binary | |
MD5:8626E1D68E87F86C5B4DABDF66591913 | SHA256:2CAA1DA9B6A6E87BDB673977FEE5DD771591A1B6ED5D3C5F14B024130A5D1A59 | |||
| 4120 | RunWay.exe | C:\Users\admin\AppData\Local\Temp\nsdD7A6.tmp\SpiderBanner.dll | executable | |
MD5:17309E33B596BA3A5693B4D3E85CF8D7 | SHA256:996A259E53CA18B89EC36D038C40148957C978C0FD600A268497D4C92F882A93 | |||
| 4120 | RunWay.exe | C:\Users\admin\AppData\Local\Temp\nsdD7A6.tmp\7z-out\locales\af.pak | binary | |
MD5:464E5EEABA5EFF8BC93995BA2CB2D73F | SHA256:0AD547BB1DC57907ADEB02E1BE3017CCE78F6E60B8B39395FE0E8B62285797A1 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5496 | MoUsoCoreWorker.exe | GET | 200 | 23.48.23.176:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
2136 | runWay.exe | GET | 200 | 95.179.216.217:80 | http://95.179.216.217:80/uSBEIWt0PYtjZzrmVLmEbg%3D%3D | unknown | — | — | unknown |
4212 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
4212 | SIHClient.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
6544 | svchost.exe | GET | 200 | 23.52.56.216:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | 23.48.23.176:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5496 | MoUsoCoreWorker.exe | 23.35.229.160:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
— | — | 172.211.123.249:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
6516 | runWay.exe | 142.250.184.202:443 | fonts.googleapis.com | GOOGLE | US | whitelisted |
2136 | runWay.exe | 172.217.18.14:443 | calendar.app.google | GOOGLE | US | whitelisted |
2136 | runWay.exe | 216.58.206.46:443 | calendar.google.com | GOOGLE | US | whitelisted |
2136 | runWay.exe | 95.179.216.217:80 | — | AS-CHOOPA | FR | unknown |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
fonts.googleapis.com |
| whitelisted |
calendar.app.google |
| unknown |
calendar.google.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |