File name:

f074d617b33f6d20336670bd053abacd5b159cf6c25f2021be8b75ae865875af.exe

Full analysis: https://app.any.run/tasks/545757ee-9ec1-4e7e-8d0a-f5f321ca86ab
Verdict: Malicious activity
Threats:

RedLine Stealer is a malicious program that collects users’ confidential data from browsers, systems, and installed software. It also infects operating systems with other malware.

Analysis date: July 11, 2025, 02:22:33
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
auto-startup
redline
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows, 3 sections
MD5:

E5FC99C8318548060F0E22286F259638

SHA1:

6A01D672C1327EB8F253CAD40433343A9C807E45

SHA256:

F074D617B33F6D20336670BD053ABACD5B159CF6C25F2021BE8B75AE865875AF

SSDEEP:

98304:3mt06KgdnoTtY3M8Koffu6HVonwZxNercESFsTn7Rm4D6lp8ecXhEVn4K7/X4+R+:6M8KAtpw

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Create files in the Startup directory

      • f074d617b33f6d20336670bd053abacd5b159cf6c25f2021be8b75ae865875af.exe (PID: 7156)
    • REDLINE has been detected (YARA)

      • InstallUtil.exe (PID: 3872)
      • InstallUtil.exe (PID: 6164)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • f074d617b33f6d20336670bd053abacd5b159cf6c25f2021be8b75ae865875af.exe (PID: 7156)
    • Runs shell command (SCRIPT)

      • wscript.exe (PID: 7048)
    • Connects to unusual port

      • InstallUtil.exe (PID: 3872)
      • InstallUtil.exe (PID: 6164)
    • There is functionality for taking screenshot (YARA)

      • InstallUtil.exe (PID: 3872)
      • InstallUtil.exe (PID: 6164)
  • INFO

    • Reads the computer name

      • f074d617b33f6d20336670bd053abacd5b159cf6c25f2021be8b75ae865875af.exe (PID: 7156)
      • InstallUtil.exe (PID: 3872)
      • Target.exe (PID: 4044)
      • InstallUtil.exe (PID: 6164)
    • Reads the machine GUID from the registry

      • f074d617b33f6d20336670bd053abacd5b159cf6c25f2021be8b75ae865875af.exe (PID: 7156)
      • InstallUtil.exe (PID: 3872)
      • Target.exe (PID: 4044)
      • InstallUtil.exe (PID: 6164)
    • Creates files or folders in the user directory

      • f074d617b33f6d20336670bd053abacd5b159cf6c25f2021be8b75ae865875af.exe (PID: 7156)
    • Checks supported languages

      • f074d617b33f6d20336670bd053abacd5b159cf6c25f2021be8b75ae865875af.exe (PID: 7156)
      • InstallUtil.exe (PID: 3872)
      • Target.exe (PID: 4044)
      • InstallUtil.exe (PID: 6164)
    • Launching a file from the Startup directory

      • f074d617b33f6d20336670bd053abacd5b159cf6c25f2021be8b75ae865875af.exe (PID: 7156)
    • Manual execution by a user

      • InstallUtil.exe (PID: 3872)
      • wscript.exe (PID: 7048)
      • InstallUtil.exe (PID: 6164)
    • Checks proxy server information

      • slui.exe (PID: 3964)
    • Reads the software policy settings

      • slui.exe (PID: 3964)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

RedLine

(PID) Process(3872) InstallUtil.exe
C2 (1)107.172.232.92:1912
BotnetACROBAT PDF PRO UPGRADED
Options
ErrorMessage
Keys
XorFIP
(PID) Process(6164) InstallUtil.exe
C2 (1)107.172.232.92:1912
BotnetACROBAT PDF PRO UPGRADED
Options
ErrorMessage
Keys
XorFIP
No Malware configuration.

TRiD

.exe | Generic CIL Executable (.NET, Mono, etc.) (82.9)
.dll | Win32 Dynamic Link Library (generic) (7.4)
.exe | Win32 Executable (generic) (5.1)
.exe | Generic Win/DOS Executable (2.2)
.exe | DOS Executable Generic (2.2)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2025:07:10 23:23:59+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 3055104
InitializedDataSize: 2048
UninitializedDataSize: -
EntryPoint: 0x2ebcbe
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.4280.13593
ProductVersionNumber: 1.0.4280.13593
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: PO6072454
FileVersion: 1.0.4280.13593
InternalName: PO6072454.exe
LegalCopyright: Copyright © 2017
LegalTrademarks: -
OriginalFileName: PO6072454.exe
ProductName: PO6072454
ProductVersion: 1.0.4280.13593
AssemblyVersion: 1.0.6130.11434
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
139
Monitored processes
6
Malicious processes
2
Suspicious processes
2

Behavior graph

Click at the process to see the details
start f074d617b33f6d20336670bd053abacd5b159cf6c25f2021be8b75ae865875af.exe no specs installutil.exe wscript.exe no specs target.exe no specs installutil.exe slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
3872"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
.NET Framework installation utility
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\installutil.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
RedLine
(PID) Process(3872) InstallUtil.exe
C2 (1)107.172.232.92:1912
BotnetACROBAT PDF PRO UPGRADED
Options
ErrorMessage
Keys
XorFIP
3964C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
4044"C:\Users\admin\AppData\Roaming\Target.exe" C:\Users\admin\AppData\Roaming\Target.exewscript.exe
User:
admin
Integrity Level:
MEDIUM
Description:
PO6072454
Exit code:
4294967295
Version:
1.0.4280.13593
Modules
Images
c:\users\admin\appdata\roaming\target.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
6164"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
.NET Framework installation utility
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\installutil.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
RedLine
(PID) Process(6164) InstallUtil.exe
C2 (1)107.172.232.92:1912
BotnetACROBAT PDF PRO UPGRADED
Options
ErrorMessage
Keys
XorFIP
7048wscript "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Target.vbs"C:\Windows\System32\wscript.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.812.10240.16384
Modules
Images
c:\windows\system32\wscript.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7156"C:\Users\admin\Desktop\f074d617b33f6d20336670bd053abacd5b159cf6c25f2021be8b75ae865875af.exe" C:\Users\admin\Desktop\f074d617b33f6d20336670bd053abacd5b159cf6c25f2021be8b75ae865875af.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
PO6072454
Exit code:
4294967295
Version:
1.0.4280.13593
Modules
Images
c:\users\admin\desktop\f074d617b33f6d20336670bd053abacd5b159cf6c25f2021be8b75ae865875af.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
Total events
7 541
Read events
7 541
Write events
0
Delete events
0

Modification events

No data
Executable files
1
Suspicious files
0
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
7156f074d617b33f6d20336670bd053abacd5b159cf6c25f2021be8b75ae865875af.exeC:\Users\admin\AppData\Roaming\Target.exeexecutable
MD5:E5FC99C8318548060F0E22286F259638
SHA256:F074D617B33F6D20336670BD053ABACD5B159CF6C25F2021BE8B75AE865875AF
7156f074d617b33f6d20336670bd053abacd5b159cf6c25f2021be8b75ae865875af.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Target.vbstext
MD5:C0C3A36819FF4B33F56A213446479C7B
SHA256:245F85E923146CD4FB848E2D10095EE464EF492961D5A3CDB677BE5A463D9B4B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
35
TCP/UDP connections
53
DNS requests
17
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1268
svchost.exe
GET
200
2.20.245.139:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7064
RUXIMICS.exe
GET
200
2.20.245.139:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
7064
RUXIMICS.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
2.20.245.139:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5944
MoUsoCoreWorker.exe
GET
200
2.23.246.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
3028
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.2.crl
unknown
whitelisted
GET
304
172.202.163.200:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
GET
304
172.202.163.200:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
GET
200
172.202.163.200:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
1268
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
7064
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5944
MoUsoCoreWorker.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:138
whitelisted
1268
svchost.exe
2.20.245.139:80
crl.microsoft.com
Akamai International B.V.
SE
whitelisted
7064
RUXIMICS.exe
2.20.245.139:80
crl.microsoft.com
Akamai International B.V.
SE
whitelisted
5944
MoUsoCoreWorker.exe
2.20.245.139:80
crl.microsoft.com
Akamai International B.V.
SE
whitelisted
1268
svchost.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted
7064
RUXIMICS.exe
2.23.246.101:80
www.microsoft.com
Ooredoo Q.S.C.
QA
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 51.104.136.2
whitelisted
google.com
  • 172.217.18.14
whitelisted
crl.microsoft.com
  • 2.20.245.139
  • 2.20.245.137
whitelisted
www.microsoft.com
  • 2.23.246.101
  • 95.101.149.131
whitelisted
login.live.com
  • 20.190.160.130
  • 40.126.32.138
  • 20.190.160.3
  • 20.190.160.2
  • 40.126.32.136
  • 40.126.32.76
  • 40.126.32.134
  • 40.126.32.133
whitelisted
nexusrules.officeapps.live.com
  • 52.111.227.11
whitelisted
slscr.update.microsoft.com
  • 172.202.163.200
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted
activation-v2.sls.microsoft.com
  • 20.83.72.98
whitelisted
x1.c.lencr.org
  • 23.209.209.135
whitelisted

Threats

PID
Process
Class
Message
Unknown Traffic
ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW)
No debug info