File name: | DropCheats.exe |
Full analysis: | https://app.any.run/tasks/614d73cf-a298-411b-9be7-5f125c86fee5 |
Verdict: | Malicious activity |
Threats: | Rhadamanthys is a C++ information-stealing malware that extracts sensitive data from infiltrated machines. Its layered operational chain and advanced evasion tactics make it a major risk in cybersecurity landscapes. |
Analysis date: | July 06, 2025, 16:59:07 |
OS: | Windows 10 Professional (build: 19044, 64 bit) |
Tags: | |
Indicators: | |
MIME: | application/vnd.microsoft.portable-executable |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive, 5 sections |
MD5: | 46A3B096A47C6405C62C309EF6481C24 |
SHA1: | CAB5F30B8367C924E42459DDADC23B13BC9214CC |
SHA256: | E54E12AF5E87DA0B42BCBDA378279E89AFC387954712501BA87674019FA07B98 |
SSDEEP: | 98304:MPnxjYcESeL7GJyu49bY5qavScvRqp0uPwQhO5V9XSuBW3SsG+5Zi51jevsEg6+x:RrQy |
.exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
---|---|---|
.exe | | | Win64 Executable (generic) (37.3) |
.dll | | | Win32 Dynamic Link Library (generic) (8.8) |
.exe | | | Win32 Executable (generic) (6) |
.exe | | | Generic Win/DOS Executable (2.7) |
MachineType: | Intel 386 or later, and compatibles |
---|---|
TimeStamp: | 2010:04:10 12:19:23+00:00 |
ImageFileCharacteristics: | No relocs, Executable, 32-bit |
PEType: | PE32 |
LinkerVersion: | 9 |
CodeSize: | 25600 |
InitializedDataSize: | 518656 |
UninitializedDataSize: | 16896 |
EntryPoint: | 0x33e9 |
OSVersion: | 5 |
ImageVersion: | 6 |
SubsystemVersion: | 5 |
Subsystem: | Windows GUI |
FileVersionNumber: | 2.4412.3.16029 |
ProductVersionNumber: | 2.4412.3.16029 |
FileFlagsMask: | 0x0000 |
FileFlags: | (none) |
FileOS: | Win32 |
ObjectFileType: | Executable application |
FileSubtype: | - |
LanguageCode: | English (U.S.) |
CharacterSet: | Unicode |
Comments: | Health data monitoring for wellness insights. |
CompanyName: | WellnessPulse Solutions |
FileDescription: | Health data monitoring for wellness insights. |
FileVersion: | 2.4412.3.016029 |
LegalCopyright: | Copyright © WellnessPulse Solutions 2021 All rights reserved. |
LegalTrademarks: | HealthPulse is a trademark of WellnessPulse Solutions |
ProductName: | HealthPulse |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
592 | C:\WINDOWS\SysWOW64\WerFault.exe -u -p 1156 -s 956 | C:\Windows\SysWOW64\WerFault.exe | — | Heavily.com | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
952 | extrac32 /Y Girls.ppsm *.* | C:\Windows\SysWOW64\extrac32.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft® CAB File Extract Utility Exit code: 0 Version: 5.00 (WinBuild.160101.0800) Modules
| |||||||||||||||
1156 | Heavily.com s | C:\Users\admin\AppData\Local\Temp\685239\Heavily.com | cmd.exe | ||||||||||||
User: admin Company: AutoIt Team Integrity Level: MEDIUM Description: AutoIt v3 Script (Beta) Exit code: 3221225477 Version: 3, 3, 15, 5 Modules
| |||||||||||||||
1324 | findstr /I "opssvc wrsa" | C:\Windows\SysWOW64\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (QGREP) Utility Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
1328 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
1728 | findstr /V "fin" Automatically | C:\Windows\SysWOW64\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (QGREP) Utility Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
3488 | tasklist | C:\Windows\SysWOW64\tasklist.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Lists the current running tasks Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
3788 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
3836 | choice /d n /t 5 | C:\Windows\SysWOW64\choice.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Offers the user a choice Exit code: 2 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
3872 | "C:\Users\admin\Desktop\DropCheats.exe" | C:\Users\admin\Desktop\DropCheats.exe | — | explorer.exe | |||||||||||
User: admin Company: WellnessPulse Solutions Integrity Level: MEDIUM Description: Health data monitoring for wellness insights. Version: 2.4412.3.016029 Modules
|
PID | Process | Filename | Type | |
---|---|---|---|---|
3872 | DropCheats.exe | C:\Users\admin\AppData\Local\Temp\Ethiopia.ppsm | binary | |
MD5:9AFA6A78DB90543BF5C0A3FAA7D2F098 | SHA256:B46D1A9B6B918EB9E40480B46CFF4D37AD190CA930AAA7B81B2EA2AE6BA105F9 | |||
3872 | DropCheats.exe | C:\Users\admin\AppData\Local\Temp\Way.ppsm | binary | |
MD5:853F6D362E8C30920416D59E6B971D95 | SHA256:FB42A164433A442CF4D34925EE2F4B1ACE68378781A5D5D73AC2A43B06FDB105 | |||
3872 | DropCheats.exe | C:\Users\admin\AppData\Local\Temp\Grand.ppsm | binary | |
MD5:D2EBF87DEA1A60B28BB08626FBEF91E9 | SHA256:9C7DDF180A29368725B4AC4EFD540271EC0A4EC2DA77C2DF19BC8AB0F5210B5D | |||
3872 | DropCheats.exe | C:\Users\admin\AppData\Local\Temp\Sl.ppsm | binary | |
MD5:159169DCCB39B01B0258BE899C7A78EE | SHA256:EDBE0DE9AE4F559C7C0585A65A06B534E0CD1FAC3DA0A7320061ED09DBAF6CCF | |||
3872 | DropCheats.exe | C:\Users\admin\AppData\Local\Temp\Terrain.ppsm | binary | |
MD5:30BD6C6AEF46876A26F005AD5B6B7480 | SHA256:05378FE62B61C63DF3719121984598DC6062BB6D21983358C6C8E00BB629EA6D | |||
3872 | DropCheats.exe | C:\Users\admin\AppData\Local\Temp\Parental.ppsm | binary | |
MD5:1938DEC4AD436A383164E66D324A6919 | SHA256:B12B8D38FAC5950E1A3CB96B380AD43BEF7A80C7A7C20B632E43DE7278201F7E | |||
3872 | DropCheats.exe | C:\Users\admin\AppData\Local\Temp\Jones.ppsm | text | |
MD5:F3DDC55AD422EB7C986B39DFC0DE0584 | SHA256:9E63B89B16D8E5BF6BAE522A366E4DC96D92AC503A61F73F5A274F31D26A7A8E | |||
3872 | DropCheats.exe | C:\Users\admin\AppData\Local\Temp\Cumshot.ppsm | binary | |
MD5:7F33AB39985C36F7D48D6B55712CEF6C | SHA256:3FE0FCDEB2D9037B0C47816B94492A972E32ECBD1564B3E412A6D8063E081A60 | |||
3872 | DropCheats.exe | C:\Users\admin\AppData\Local\Temp\Girls.ppsm | binary | |
MD5:F6605BBCFAEDED485B16379E981719C9 | SHA256:C9579E52C921F6BA242AAB53C68B5663784F374AA9835A754F60FCE7981CCDD2 | |||
3872 | DropCheats.exe | C:\Users\admin\AppData\Local\Temp\Brian.ppsm | binary | |
MD5:5DCD66D87E78C23FB0F61DE25035955D | SHA256:1D5612936E0D5C65CA022A4549141C8B24A124213B6E9E7ADBD269C1018A6A70 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
5944 | MoUsoCoreWorker.exe | GET | 200 | 23.216.77.37:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
6552 | RUXIMICS.exe | GET | 200 | 23.216.77.37:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 23.216.77.37:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
6552 | RUXIMICS.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | POST | 200 | 40.126.31.73:443 | https://login.live.com/RST2.srf | unknown | xml | 1.24 Kb | whitelisted |
— | — | POST | 200 | 40.126.31.73:443 | https://login.live.com/RST2.srf | unknown | xml | 1.24 Kb | whitelisted |
— | — | POST | 200 | 20.190.159.131:443 | https://login.live.com/ppsecure/deviceaddcredential.srf | unknown | text | 16.7 Kb | whitelisted |
— | — | POST | 200 | 20.190.159.4:443 | https://login.live.com/RST2.srf | unknown | xml | 11.1 Kb | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1268 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
5944 | MoUsoCoreWorker.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
6552 | RUXIMICS.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
6552 | RUXIMICS.exe | 23.216.77.37:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5944 | MoUsoCoreWorker.exe | 23.216.77.37:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
1268 | svchost.exe | 23.216.77.37:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
6552 | RUXIMICS.exe | 23.35.229.160:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
5944 | MoUsoCoreWorker.exe | 23.35.229.160:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
login.live.com |
| whitelisted |
lgVzuFFxVDHnGnhLnksgor.lgVzuFFxVDHnGnhLnksgor |
| unknown |
nexusrules.officeapps.live.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |