File name:

wordpad.exe

Full analysis: https://app.any.run/tasks/96c5530e-d6d5-40c8-9595-784a3d8a4f34
Verdict: Malicious activity
Threats:

RedLine Stealer is a malicious program that collects users’ confidential data from browsers, systems, and installed software. It also infects operating systems with other malware.

Analysis date: June 21, 2025, 21:54:22
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
redline
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

71E942F424484D35233617B678813B67

SHA1:

DEAC5075CD169A4DE949A41C1B612D0B55723465

SHA256:

30DEB534DF93CE0640536508EE900B68D9E057BD436465AD42CCD23A2C945402

SSDEEP:

3072:QgrIkE0EuogEzawltPwd10mfHDyNcJXFXITVAtkxzGlnoW2MOPhl9hr:Q4kjOd2NqXeTV8kYnoW2tP9h

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • REDLINE has been detected (YARA)

      • wordpad.exe (PID: 1068)
  • SUSPICIOUS

    • There is functionality for taking screenshot (YARA)

      • wordpad.exe (PID: 1068)
  • INFO

    • Checks supported languages

      • wordpad.exe (PID: 1068)
    • Reads the computer name

      • wordpad.exe (PID: 1068)
    • Reads the machine GUID from the registry

      • wordpad.exe (PID: 1068)
    • Checks proxy server information

      • slui.exe (PID: 1080)
    • Reads the software policy settings

      • slui.exe (PID: 1080)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

RedLine

(PID) Process(1068) wordpad.exe
C2 (1)computernewb.com:80
Botnetelijah
Keys
Xor
Options
ErrorMessage
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (62)
.exe | Win64 Executable (generic) (23.3)
.dll | Win32 Dynamic Link Library (generic) (5.5)
.exe | Win32 Executable (generic) (3.8)
.exe | Win16/32 Executable Delphi generic (1.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2081:09:23 12:17:32+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 48
CodeSize: 189440
InitializedDataSize: 117760
UninitializedDataSize: -
EntryPoint: 0x3029e
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 12.9.1.22
ProductVersionNumber: 12.9.1.22
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: XHP Booster
CompanyName: -
FileDescription: XHP
FileVersion: 12.9.1.22
InternalName: Steanings.exe
LegalCopyright: XHP Corporation Copyright © 2021
LegalTrademarks: -
OriginalFileName: Steanings.exe
ProductName: XHP booster
ProductVersion: 12.9.1.22
AssemblyVersion: 1.1.21.1
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
138
Monitored processes
2
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #REDLINE wordpad.exe slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
1068"C:\Users\admin\AppData\Local\Temp\wordpad.exe" C:\Users\admin\AppData\Local\Temp\wordpad.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
XHP
Version:
12.9.1.22
Modules
Images
c:\users\admin\appdata\local\temp\wordpad.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
RedLine
(PID) Process(1068) wordpad.exe
C2 (1)computernewb.com:80
Botnetelijah
Keys
Xor
Options
ErrorMessage
1080C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
2 217
Read events
2 217
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

No data
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
48
DNS requests
17
Threats
35

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1268
svchost.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1268
svchost.exe
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5060
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5060
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
5848
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
2940
svchost.exe
GET
200
23.209.209.135:80
http://x1.c.lencr.org/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1268
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
3732
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
1068
wordpad.exe
172.67.74.244:80
computernewb.com
CLOUDFLARENET
US
whitelisted
1268
svchost.exe
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1268
svchost.exe
23.35.229.160:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5944
MoUsoCoreWorker.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5060
SIHClient.exe
20.12.23.50:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 20.73.194.208
whitelisted
google.com
  • 142.250.186.78
whitelisted
computernewb.com
  • 172.67.74.244
  • 104.26.2.158
  • 104.26.3.158
whitelisted
crl.microsoft.com
  • 23.53.40.178
  • 23.53.40.176
whitelisted
www.microsoft.com
  • 23.35.229.160
  • 95.101.149.131
whitelisted
slscr.update.microsoft.com
  • 20.12.23.50
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted
login.live.com
  • 20.190.159.73
  • 20.190.159.2
  • 20.190.159.131
  • 40.126.31.71
  • 40.126.31.73
  • 40.126.31.1
  • 20.190.159.128
  • 20.190.159.129
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted

Threats

PID
Process
Class
Message
1068
wordpad.exe
Potentially Bad Traffic
ET INFO Microsoft net.tcp Connection Initialization Activity
1068
wordpad.exe
Generic Protocol Command Decode
SURICATA HTTP Request line incomplete
1068
wordpad.exe
Potentially Bad Traffic
ET INFO Microsoft net.tcp Connection Initialization Activity
1068
wordpad.exe
Generic Protocol Command Decode
SURICATA HTTP Request line incomplete
1068
wordpad.exe
Potentially Bad Traffic
ET INFO Microsoft net.tcp Connection Initialization Activity
1068
wordpad.exe
Generic Protocol Command Decode
SURICATA HTTP Request line incomplete
1068
wordpad.exe
Potentially Bad Traffic
ET INFO Microsoft net.tcp Connection Initialization Activity
1068
wordpad.exe
Potentially Bad Traffic
ET INFO Microsoft net.tcp Connection Initialization Activity
1068
wordpad.exe
Potentially Bad Traffic
ET INFO Microsoft net.tcp Connection Initialization Activity
1068
wordpad.exe
Generic Protocol Command Decode
SURICATA HTTP Request line incomplete
No debug info