File name:

2025-06-04_37aa1be34e08d7590111281adc8106b1_elex_rhadamanthys_stop

Full analysis: https://app.any.run/tasks/273fd5c8-0b70-4d7e-b149-dfb4f3703731
Verdict: Malicious activity
Analysis date: June 04, 2025, 21:05:03
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto-reg
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (console) Intel 80386, for MS Windows, 5 sections
MD5:

37AA1BE34E08D7590111281ADC8106B1

SHA1:

781EB921A68904763A693989CDE7957F1BBCD4E2

SHA256:

9687FB8CE9A021A3C96FBE2EB716114A4C708AE6FB5CF6D7F77EDAD641FDECEA

SSDEEP:

768:zlfXt1onYFa6yHwBCG0PYlvYmmuBLQjOu2bNSKSMdzBSI1R4mchx/FLO5j8:SYpCGNbtKOu2bN9SMdtImYI5j

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • 2025-06-04_37aa1be34e08d7590111281adc8106b1_elex_rhadamanthys_stop.exe (PID: 7376)
      • 2025-06-04_37aa1be34e08d7590111281adc8106b1_elex_rhadamanthys_stop.exe (PID: 3132)
  • SUSPICIOUS

    No suspicious indicators.
  • INFO

    • Checks supported languages

      • 2025-06-04_37aa1be34e08d7590111281adc8106b1_elex_rhadamanthys_stop.exe (PID: 7376)
      • 2025-06-04_37aa1be34e08d7590111281adc8106b1_elex_rhadamanthys_stop.exe (PID: 3132)
    • Launching a file from a Registry key

      • 2025-06-04_37aa1be34e08d7590111281adc8106b1_elex_rhadamanthys_stop.exe (PID: 7376)
      • 2025-06-04_37aa1be34e08d7590111281adc8106b1_elex_rhadamanthys_stop.exe (PID: 3132)
    • Manual execution by a user

      • 2025-06-04_37aa1be34e08d7590111281adc8106b1_elex_rhadamanthys_stop.exe (PID: 3132)
    • Reads the software policy settings

      • slui.exe (PID: 7964)
    • Checks proxy server information

      • slui.exe (PID: 7964)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2016:12:04 09:25:27+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 9
CodeSize: 40960
InitializedDataSize: 18432
UninitializedDataSize: -
EntryPoint: 0x1f13
OSVersion: 5
ImageVersion: -
SubsystemVersion: 5
Subsystem: Windows command line
FileVersionNumber: 2.1.0.18
ProductVersionNumber: 2.1.0.18
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Dynamic link library
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Windows, Cyrillic
Comments: -
CompanyName: Atheros Communications, Inc.
FileDescription: Jumpstart for Wireless
FileVersion: 2.1.0.18
InternalName: JSAPP
LegalCopyright: Copyright © 2004 - 2011, Atheros Communications, Inc. All Rights Reserved.
LegalTrademarks: -
OriginalFileName: JSWSCAPP.EXE
PrivateBuild: -
ProductName: jswscapp
ProductVersion: 2.1.0.18
SpecialBuild: -
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
131
Monitored processes
5
Malicious processes
0
Suspicious processes
2

Behavior graph

Click at the process to see the details
start 2025-06-04_37aa1be34e08d7590111281adc8106b1_elex_rhadamanthys_stop.exe conhost.exe no specs 2025-06-04_37aa1be34e08d7590111281adc8106b1_elex_rhadamanthys_stop.exe conhost.exe no specs slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
1696\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exe2025-06-04_37aa1be34e08d7590111281adc8106b1_elex_rhadamanthys_stop.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
3132C:\Users\admin\Desktop\2025-06-04_37aa1be34e08d7590111281adc8106b1_elex_rhadamanthys_stop.exeC:\Users\admin\Desktop\2025-06-04_37aa1be34e08d7590111281adc8106b1_elex_rhadamanthys_stop.exe
explorer.exe
User:
admin
Company:
Atheros Communications, Inc.
Integrity Level:
MEDIUM
Description:
Jumpstart for Wireless
Version:
2.1.0.18
Modules
Images
c:\users\admin\desktop\2025-06-04_37aa1be34e08d7590111281adc8106b1_elex_rhadamanthys_stop.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\user32.dll
c:\windows\syswow64\win32u.dll
6840\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exe2025-06-04_37aa1be34e08d7590111281adc8106b1_elex_rhadamanthys_stop.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7376"C:\Users\admin\Desktop\2025-06-04_37aa1be34e08d7590111281adc8106b1_elex_rhadamanthys_stop.exe" C:\Users\admin\Desktop\2025-06-04_37aa1be34e08d7590111281adc8106b1_elex_rhadamanthys_stop.exe
explorer.exe
User:
admin
Company:
Atheros Communications, Inc.
Integrity Level:
MEDIUM
Description:
Jumpstart for Wireless
Version:
2.1.0.18
Modules
Images
c:\users\admin\desktop\2025-06-04_37aa1be34e08d7590111281adc8106b1_elex_rhadamanthys_stop.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
7964C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
3 436
Read events
3 434
Write events
2
Delete events
0

Modification events

(PID) Process:(7376) 2025-06-04_37aa1be34e08d7590111281adc8106b1_elex_rhadamanthys_stop.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Atheros System inc.
Value:
C:\Users\admin\Desktop\2025-06-04_37aa1be34e08d7590111281adc8106b1_elex_rhadamanthys_stop.exe
(PID) Process:(3132) 2025-06-04_37aa1be34e08d7590111281adc8106b1_elex_rhadamanthys_stop.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Operation:writeName:Atheros System inc.
Value:
C:\Users\admin\Desktop\2025-06-04_37aa1be34e08d7590111281adc8106b1_elex_rhadamanthys_stop.exe
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
24
TCP/UDP connections
43
DNS requests
17
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
8076
RUXIMICS.exe
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
POST
200
40.126.31.1:443
https://login.live.com/RST2.srf
unknown
xml
11.1 Kb
whitelisted
POST
200
40.126.31.0:443
https://login.live.com/RST2.srf
unknown
xml
11.0 Kb
whitelisted
POST
200
40.126.31.0:443
https://login.live.com/RST2.srf
unknown
xml
10.3 Kb
whitelisted
8076
RUXIMICS.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
304
4.245.163.56:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
GET
200
4.245.163.56:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
compressed
23.9 Kb
whitelisted
3100
SIHClient.exe
GET
200
23.53.40.176:80
http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl
unknown
whitelisted
3100
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.1.crl
unknown
whitelisted
3100
SIHClient.exe
GET
200
23.53.40.176:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
7504
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
8076
RUXIMICS.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
8076
RUXIMICS.exe
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
8076
RUXIMICS.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
6544
svchost.exe
40.126.32.133:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3216
svchost.exe
172.211.123.249:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
4
System
192.168.100.255:137
whitelisted
3100
SIHClient.exe
4.245.163.56:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 40.127.240.158
whitelisted
google.com
  • 142.250.185.78
whitelisted
crl.microsoft.com
  • 23.53.40.178
  • 23.53.40.176
whitelisted
www.microsoft.com
  • 23.35.229.160
whitelisted
login.live.com
  • 40.126.32.133
  • 20.190.160.22
  • 20.190.160.14
  • 20.190.160.128
  • 40.126.32.76
  • 40.126.32.136
  • 20.190.160.131
  • 20.190.160.66
whitelisted
client.wns.windows.com
  • 172.211.123.249
whitelisted
slscr.update.microsoft.com
  • 4.245.163.56
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.242.39.171
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted
self.events.data.microsoft.com
  • 13.89.179.9
whitelisted

Threats

No threats detected
No debug info