File name:

380edb414750f511e72ad11116e24b9dc1888350ac13ca6d0cf0bbdc1baec4df

Full analysis: https://app.any.run/tasks/1d638c39-689d-4407-a3cf-db0ef2e3dbd6
Verdict: Malicious activity
Threats:

RedLine Stealer is a malicious program that collects users’ confidential data from browsers, systems, and installed software. It also infects operating systems with other malware.

Analysis date: May 18, 2025, 17:05:34
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
confuser
redline
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (console) Intel 80386, for MS Windows, 6 sections
MD5:

DD016453B135F5398E47F1303878FD70

SHA1:

CCA7D84833A744051E53FFF09C3C5310607B5862

SHA256:

380EDB414750F511E72AD11116E24B9DC1888350AC13CA6D0CF0BBDC1BAEC4DF

SSDEEP:

6144:naIDw/wAGasLjAEZ5fwMGQdUxcOIjobtSRXoCeqZiwooLDeCaT4x:5k/wAGrLh2cOYLDeCaT4x

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • REDLINE has been detected (YARA)

      • AppLaunch.exe (PID: 5596)
  • SUSPICIOUS

    • Executes application which crashes

      • 380edb414750f511e72ad11116e24b9dc1888350ac13ca6d0cf0bbdc1baec4df.exe (PID: 4652)
    • Connects to unusual port

      • AppLaunch.exe (PID: 5596)
    • There is functionality for taking screenshot (YARA)

      • AppLaunch.exe (PID: 5596)
  • INFO

    • Checks supported languages

      • 380edb414750f511e72ad11116e24b9dc1888350ac13ca6d0cf0bbdc1baec4df.exe (PID: 4652)
      • AppLaunch.exe (PID: 5596)
    • Creates files or folders in the user directory

      • WerFault.exe (PID: 5324)
    • Reads the machine GUID from the registry

      • AppLaunch.exe (PID: 5596)
    • Reads the computer name

      • AppLaunch.exe (PID: 5596)
    • Confuser has been detected (YARA)

      • AppLaunch.exe (PID: 5596)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

RedLine

(PID) Process(5596) AppLaunch.exe
C2 (1)91.103.252.189:30344
Botnet@xclauscloud_bot
Options
ErrorMessage
Keys
XorPrented
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2023:11:06 13:23:45+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.34
CodeSize: 57856
InitializedDataSize: 265216
UninitializedDataSize: -
EntryPoint: 0x2200
OSVersion: 6
ImageVersion: -
SubsystemVersion: 6
Subsystem: Windows command line
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
135
Monitored processes
6
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 380edb414750f511e72ad11116e24b9dc1888350ac13ca6d0cf0bbdc1baec4df.exe conhost.exe no specs #REDLINE applaunch.exe werfault.exe no specs sppextcomobj.exe no specs slui.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3096\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exe380edb414750f511e72ad11116e24b9dc1888350ac13ca6d0cf0bbdc1baec4df.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
4652"C:\Users\admin\AppData\Local\Temp\380edb414750f511e72ad11116e24b9dc1888350ac13ca6d0cf0bbdc1baec4df.exe" C:\Users\admin\AppData\Local\Temp\380edb414750f511e72ad11116e24b9dc1888350ac13ca6d0cf0bbdc1baec4df.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
3221225477
Modules
Images
c:\users\admin\appdata\local\temp\380edb414750f511e72ad11116e24b9dc1888350ac13ca6d0cf0bbdc1baec4df.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\gdi32.dll
4784C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
5324C:\WINDOWS\SysWOW64\WerFault.exe -u -p 4652 -s 368C:\Windows\SysWOW64\WerFault.exe380edb414750f511e72ad11116e24b9dc1888350ac13ca6d0cf0bbdc1baec4df.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Problem Reporting
Exit code:
0
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\werfault.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
5556"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
5596"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
380edb414750f511e72ad11116e24b9dc1888350ac13ca6d0cf0bbdc1baec4df.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET ClickOnce Launch Utility
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\applaunch.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
RedLine
(PID) Process(5596) AppLaunch.exe
C2 (1)91.103.252.189:30344
Botnet@xclauscloud_bot
Options
ErrorMessage
Keys
XorPrented
Total events
3 354
Read events
3 354
Write events
0
Delete events
0

Modification events

No data
Executable files
0
Suspicious files
3
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
5324WerFault.exeC:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_380edb414750f511_aab0c54e9e1ab6d8813c47441da2403ec251dec_17c54cad_847bc26a-0c5d-430a-b1ad-778bdbc5747d\Report.wer
MD5:
SHA256:
5324WerFault.exeC:\Users\admin\AppData\Local\CrashDumps\380edb414750f511e72ad11116e24b9dc1888350ac13ca6d0cf0bbdc1baec4df.exe.4652.dmpbinary
MD5:C7F1665387071BE3BFD25F7A89E67F6D
SHA256:C8D4CFDAAFC94CC07560B1D46F9630B799DADF15F359CE197174739E3466BA7A
5324WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERB9CC.tmp.dmpbinary
MD5:DA599CFB7807372B6EDB79371B4DF5C5
SHA256:579F3E2F5C2CE2E7665D646C74A239C1DCE1FE797CFBF22268E0FE8555E92F80
5324WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERBA69.tmp.WERInternalMetadata.xmlbinary
MD5:AB082CC41DFB2A04E1C4F11B7BF55A5E
SHA256:B44B6D011BCAA89D864BB12A66B7922F110C7D5247AD324052061065514CF328
5324WerFault.exeC:\ProgramData\Microsoft\Windows\WER\Temp\WERBAB9.tmp.xmlxml
MD5:54BE21464B2C1863A9CFFF0B8597E0DD
SHA256:5C6DCA29244A30C2A1D9E15CDDCB8375D10209ACC8FDF5852C678A334F55DE40
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
52
DNS requests
13
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.48.23.156:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
5892
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5892
SIHClient.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
192.168.100.255:137
whitelisted
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
5496
MoUsoCoreWorker.exe
23.48.23.156:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
5596
AppLaunch.exe
91.103.252.189:30344
Hostglobal.plus Ltd
GB
malicious
6544
svchost.exe
40.126.32.136:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
google.com
  • 142.250.185.174
whitelisted
crl.microsoft.com
  • 23.48.23.156
  • 23.48.23.143
whitelisted
www.microsoft.com
  • 184.30.21.171
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 40.126.32.136
  • 20.190.160.22
  • 20.190.160.65
  • 40.126.32.76
  • 20.190.160.20
  • 20.190.160.131
  • 20.190.160.2
  • 20.190.160.66
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
slscr.update.microsoft.com
  • 4.175.87.197
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted

Threats

No threats detected
No debug info