Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/soap/actor/next |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/ |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/faultL |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2004/08/addressing/role/anonymous |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequence |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/CreateSequenceResponse |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/LastMessage |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/ |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/ |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id1 |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id10 |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id10Response |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id11 |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id11Response |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id12 |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id12Response |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id13 |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id13Response |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id14 |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id14Response |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id15 |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id15Response |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id16 |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id16Response |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id17 |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id17Response |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id18 |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id18Response |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id19 |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id19Response |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id1Response |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id2 |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id20 |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id20Response |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id21 |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id21Response |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id22 |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id22Response |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id23 |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id23Response |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id24 |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id24Response |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id2Response |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id3 |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id3Response |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id4 |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id4Response |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id5 |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id5Response |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id6 |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id6Response |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id7 |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id7Response |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id8 |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id8Response |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id9 |
Source: AppLaunch.exe, 00000001.00000002.528075908.0000000006851000.00000004.00000800.00020000.00000000.sdmp | String found in binary or memory: http://tempuri.org/Entity/Id9Response |
Source: 5Qq54zuREl.exe, 5Qq54zuREl.exe, 00000000.00000000.262540622.0000000000408000.00000004.00000001.01000000.00000003.sdmp, AppLaunch.exe, 00000001.00000000.256316488.0000000000352000.00000040.00000400.00020000.00000000.sdmp | String found in binary or memory: https://api.ip.sb/ip |
Source: 1.0.AppLaunch.exe.350000.0.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 1.0.AppLaunch.exe.350000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd Author: unknown |
Source: 0.3.5Qq54zuREl.exe.9b0000.0.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 0.3.5Qq54zuREl.exe.9b0000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd Author: unknown |
Source: 0.0.5Qq54zuREl.exe.330000.2.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 0.0.5Qq54zuREl.exe.330000.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd Author: unknown |
Source: 0.0.5Qq54zuREl.exe.330000.0.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 0.0.5Qq54zuREl.exe.330000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd Author: unknown |
Source: 0.0.5Qq54zuREl.exe.330000.1.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 0.0.5Qq54zuREl.exe.330000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd Author: unknown |
Source: 0.2.5Qq54zuREl.exe.330000.0.unpack, type: UNPACKEDPE | Matched rule: Detects RedLine infostealer Author: ditekSHen |
Source: 0.2.5Qq54zuREl.exe.330000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd Author: unknown |
Source: 00000000.00000003.256351154.00000000009B2000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd Author: unknown |
Source: 00000000.00000000.262540622.0000000000408000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd Author: unknown |
Source: 00000000.00000000.260807439.0000000000408000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd Author: unknown |
Source: 00000000.00000002.278517326.0000000000408000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd Author: unknown |
Source: 00000001.00000000.256316488.0000000000352000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd Author: unknown |
Source: 1.0.AppLaunch.exe.350000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 1.0.AppLaunch.exe.350000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd reference_sample = 0ec522dfd9307772bf8b600a8b91fd6facd0bf4090c2b386afd20e955b25206a, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 2d7ff7894b267ba37a2d376b022bae45c4948ef3a70b1af986e7492949b5ae23, id = 3d9371fd-c094-40fc-baf8-f0e9e9a54ff9, last_modified = 2022-04-12 |
Source: 0.3.5Qq54zuREl.exe.9b0000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 0.3.5Qq54zuREl.exe.9b0000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd reference_sample = 0ec522dfd9307772bf8b600a8b91fd6facd0bf4090c2b386afd20e955b25206a, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 2d7ff7894b267ba37a2d376b022bae45c4948ef3a70b1af986e7492949b5ae23, id = 3d9371fd-c094-40fc-baf8-f0e9e9a54ff9, last_modified = 2022-04-12 |
Source: 0.0.5Qq54zuREl.exe.330000.2.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 0.0.5Qq54zuREl.exe.330000.2.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd reference_sample = 0ec522dfd9307772bf8b600a8b91fd6facd0bf4090c2b386afd20e955b25206a, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 2d7ff7894b267ba37a2d376b022bae45c4948ef3a70b1af986e7492949b5ae23, id = 3d9371fd-c094-40fc-baf8-f0e9e9a54ff9, last_modified = 2022-04-12 |
Source: 0.0.5Qq54zuREl.exe.330000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 0.0.5Qq54zuREl.exe.330000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd reference_sample = 0ec522dfd9307772bf8b600a8b91fd6facd0bf4090c2b386afd20e955b25206a, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 2d7ff7894b267ba37a2d376b022bae45c4948ef3a70b1af986e7492949b5ae23, id = 3d9371fd-c094-40fc-baf8-f0e9e9a54ff9, last_modified = 2022-04-12 |
Source: 0.0.5Qq54zuREl.exe.330000.1.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 0.0.5Qq54zuREl.exe.330000.1.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd reference_sample = 0ec522dfd9307772bf8b600a8b91fd6facd0bf4090c2b386afd20e955b25206a, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 2d7ff7894b267ba37a2d376b022bae45c4948ef3a70b1af986e7492949b5ae23, id = 3d9371fd-c094-40fc-baf8-f0e9e9a54ff9, last_modified = 2022-04-12 |
Source: 0.2.5Qq54zuREl.exe.330000.0.unpack, type: UNPACKEDPE | Matched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073 |
Source: 0.2.5Qq54zuREl.exe.330000.0.unpack, type: UNPACKEDPE | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd reference_sample = 0ec522dfd9307772bf8b600a8b91fd6facd0bf4090c2b386afd20e955b25206a, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 2d7ff7894b267ba37a2d376b022bae45c4948ef3a70b1af986e7492949b5ae23, id = 3d9371fd-c094-40fc-baf8-f0e9e9a54ff9, last_modified = 2022-04-12 |
Source: 00000000.00000003.256351154.00000000009B2000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd reference_sample = 0ec522dfd9307772bf8b600a8b91fd6facd0bf4090c2b386afd20e955b25206a, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 2d7ff7894b267ba37a2d376b022bae45c4948ef3a70b1af986e7492949b5ae23, id = 3d9371fd-c094-40fc-baf8-f0e9e9a54ff9, last_modified = 2022-04-12 |
Source: 00000000.00000000.262540622.0000000000408000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd reference_sample = 0ec522dfd9307772bf8b600a8b91fd6facd0bf4090c2b386afd20e955b25206a, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 2d7ff7894b267ba37a2d376b022bae45c4948ef3a70b1af986e7492949b5ae23, id = 3d9371fd-c094-40fc-baf8-f0e9e9a54ff9, last_modified = 2022-04-12 |
Source: 00000000.00000000.260807439.0000000000408000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd reference_sample = 0ec522dfd9307772bf8b600a8b91fd6facd0bf4090c2b386afd20e955b25206a, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 2d7ff7894b267ba37a2d376b022bae45c4948ef3a70b1af986e7492949b5ae23, id = 3d9371fd-c094-40fc-baf8-f0e9e9a54ff9, last_modified = 2022-04-12 |
Source: 00000000.00000002.278517326.0000000000408000.00000004.00000001.01000000.00000003.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd reference_sample = 0ec522dfd9307772bf8b600a8b91fd6facd0bf4090c2b386afd20e955b25206a, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 2d7ff7894b267ba37a2d376b022bae45c4948ef3a70b1af986e7492949b5ae23, id = 3d9371fd-c094-40fc-baf8-f0e9e9a54ff9, last_modified = 2022-04-12 |
Source: 00000001.00000000.256316488.0000000000352000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY | Matched rule: Windows_Trojan_RedLineStealer_3d9371fd reference_sample = 0ec522dfd9307772bf8b600a8b91fd6facd0bf4090c2b386afd20e955b25206a, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 2d7ff7894b267ba37a2d376b022bae45c4948ef3a70b1af986e7492949b5ae23, id = 3d9371fd-c094-40fc-baf8-f0e9e9a54ff9, last_modified = 2022-04-12 |
Source: C:\Users\user\Desktop\5Qq54zuREl.exe | Code function: 0_2_003AC070 | 0_2_003AC070 |
Source: C:\Users\user\Desktop\5Qq54zuREl.exe | Code function: 0_2_003AF439 | 0_2_003AF439 |
Source: C:\Users\user\Desktop\5Qq54zuREl.exe | Code function: 0_2_0038410E | 0_2_0038410E |
Source: C:\Users\user\Desktop\5Qq54zuREl.exe | Code function: 0_2_0039829A | 0_2_0039829A |
Source: C:\Users\user\Desktop\5Qq54zuREl.exe | Code function: 0_2_003CC4B9 | 0_2_003CC4B9 |
Source: C:\Users\user\Desktop\5Qq54zuREl.exe | Code function: 0_2_003A8C33 | 0_2_003A8C33 |
Source: C:\Users\user\Desktop\5Qq54zuREl.exe | Code function: 0_2_003D12DF | 0_2_003D12DF |
Source: C:\Users\user\Desktop\5Qq54zuREl.exe | Code function: 0_2_003D53A2 | 0_2_003D53A2 |
Source: C:\Users\user\Desktop\5Qq54zuREl.exe | Code function: 0_2_003D550A | 0_2_003D550A |
Source: C:\Users\user\Desktop\5Qq54zuREl.exe | Code function: 0_2_00381EE0 | 0_2_00381EE0 |
Source: C:\Users\user\Desktop\5Qq54zuREl.exe | Code function: 0_2_00396316 | 0_2_00396316 |
Source: C:\Users\user\Desktop\5Qq54zuREl.exe | Code function: 0_2_003C2408 | 0_2_003C2408 |
Source: C:\Users\user\Desktop\5Qq54zuREl.exe | Code function: 0_2_003965D4 | 0_2_003965D4 |
Source: C:\Users\user\Desktop\5Qq54zuREl.exe | Code function: 0_2_00331CD0 | 0_2_00331CD0 |
Source: C:\Users\user\Desktop\5Qq54zuREl.exe | Code function: 0_2_003968A5 | 0_2_003968A5 |
Source: C:\Users\user\Desktop\5Qq54zuREl.exe | Code function: 0_2_00396B63 | 0_2_00396B63 |
Source: C:\Users\user\Desktop\5Qq54zuREl.exe | Code function: 0_2_00396E21 | 0_2_00396E21 |
Source: C:\Users\user\Desktop\5Qq54zuREl.exe | Code function: 0_2_003970F2 | 0_2_003970F2 |
Source: C:\Users\user\Desktop\5Qq54zuREl.exe | Code function: 0_2_003C3289 | 0_2_003C3289 |
Source: C:\Users\user\Desktop\5Qq54zuREl.exe | Code function: 0_2_003973B0 | 0_2_003973B0 |
Source: C:\Users\user\Desktop\5Qq54zuREl.exe | Code function: 0_2_003AF439 | 0_2_003AF439 |
Source: C:\Users\user\Desktop\5Qq54zuREl.exe | Code function: 0_2_003AB460 | 0_2_003AB460 |
Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | Code function: 1_2_065FEF08 | 1_2_065FEF08 |