Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
kdpYfUmykM.exe

Overview

General Information

Sample name:kdpYfUmykM.exe
renamed because original name is a hash value
Original sample name:b3dde3d29de6b58cd247ccd2193e4ced.exe
Analysis ID:1431411
MD5:b3dde3d29de6b58cd247ccd2193e4ced
SHA1:2a1b433479743a064c3fb8a46d3b677c1af4a115
SHA256:c1c4559afcf94b6134fad4507537eced00e44d77000ec17b61352439558c5b43
Tags:exeRedLineStealer
Infos:

Detection

RedLine
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected RedLine Stealer
.NET source code contains very large array initializations
Machine Learning detection for sample
Reads the System eventlog
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Enables debug privileges
Enables security privileges
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • kdpYfUmykM.exe (PID: 7532 cmdline: "C:\Users\user\Desktop\kdpYfUmykM.exe" MD5: B3DDE3D29DE6B58CD247CCD2193E4CED)
    • conhost.exe (PID: 7540 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
No configs have been found
SourceRuleDescriptionAuthorStrings
kdpYfUmykM.exeJoeSecurity_RedLineYara detected RedLine StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.1605716307.0000000000B82000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      00000000.00000002.1657961554.0000000012F01000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
        SourceRuleDescriptionAuthorStrings
        0.2.kdpYfUmykM.exe.12f01a78.1.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
          0.0.kdpYfUmykM.exe.b80000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
            0.2.kdpYfUmykM.exe.12f01a78.1.raw.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
              No Sigma rule has matched
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: kdpYfUmykM.exeAvira: detected
              Source: kdpYfUmykM.exeReversingLabs: Detection: 83%
              Source: kdpYfUmykM.exeVirustotal: Detection: 75%Perma Link
              Source: kdpYfUmykM.exeJoe Sandbox ML: detected
              Source: kdpYfUmykM.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: kdpYfUmykM.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: kdpYfUmykM.exe, 00000000.00000002.1654983397.0000000002F99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: #www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube)
              Source: kdpYfUmykM.exe, 00000000.00000002.1654983397.0000000002F99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 3IndexedDB\https_www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube)
              Source: kdpYfUmykM.exe, 00000000.00000002.1654983397.0000000002F99000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube)
              Source: kdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
              Source: kdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
              Source: kdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
              Source: kdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
              Source: kdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
              Source: kdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
              Source: kdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
              Source: kdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
              Source: kdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
              Source: kdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
              Source: kdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
              Source: kdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
              Source: kdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
              Source: kdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
              Source: kdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
              Source: kdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
              Source: kdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
              Source: kdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
              Source: kdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
              Source: kdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
              Source: kdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
              Source: kdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
              Source: kdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
              Source: kdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
              Source: kdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
              Source: kdpYfUmykM.exe, 00000000.00000002.1654983397.0000000002F58000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.s
              Source: kdpYfUmykM.exe, 00000000.00000002.1654983397.0000000002F58000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/ip
              Source: kdpYfUmykM.exe, 00000000.00000002.1654983397.000000000301D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/users/
              Source: kdpYfUmykM.exe, 00000000.00000002.1654983397.0000000003130000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetRawInputDatamemstr_a1710e40-5

              Spam, unwanted Advertisements and Ransom Demands

              barindex
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior

              System Summary

              barindex
              Source: kdpYfUmykM.exe, Strings.csLarge array initialization: Strings: array initializer size 6160
              Source: 0.2.kdpYfUmykM.exe.12f01a78.1.raw.unpack, Strings.csLarge array initialization: Strings: array initializer size 6160
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess token adjusted: SecurityJump to behavior
              Source: kdpYfUmykM.exe, 00000000.00000002.1657961554.0000000012F01000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBoxy.exe" vs kdpYfUmykM.exe
              Source: kdpYfUmykM.exe, 00000000.00000000.1605716307.0000000000B82000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameBoxy.exe" vs kdpYfUmykM.exe
              Source: kdpYfUmykM.exe, 00000000.00000002.1657961554.0000000013060000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameBoxy.exe" vs kdpYfUmykM.exe
              Source: kdpYfUmykM.exeBinary or memory string: OriginalFilenameBoxy.exe" vs kdpYfUmykM.exe
              Source: kdpYfUmykM.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: kdpYfUmykM.exe, PBE.csCryptographic APIs: 'TransformFinalBlock'
              Source: kdpYfUmykM.exe, Strings.csCryptographic APIs: 'CreateDecryptor'
              Source: 0.2.kdpYfUmykM.exe.12f01a78.1.raw.unpack, PBE.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.kdpYfUmykM.exe.12f01a78.1.raw.unpack, Strings.csCryptographic APIs: 'CreateDecryptor'
              Source: classification engineClassification label: mal80.troj.evad.winEXE@2/1@0/0
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\kdpYfUmykM.exe.logJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeMutant created: NULL
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7540:120:WilError_03
              Source: kdpYfUmykM.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: kdpYfUmykM.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: kdpYfUmykM.exeReversingLabs: Detection: 83%
              Source: kdpYfUmykM.exeVirustotal: Detection: 75%
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeFile read: C:\Users\user\Desktop\kdpYfUmykM.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\kdpYfUmykM.exe "C:\Users\user\Desktop\kdpYfUmykM.exe"
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeSection loaded: mscoree.dllJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeSection loaded: dwrite.dllJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeSection loaded: wintypes.dllJump to behavior
              Source: Window RecorderWindow detected: More than 3 window changes detected
              Source: kdpYfUmykM.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
              Source: kdpYfUmykM.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
              Source: kdpYfUmykM.exeStatic PE information: 0xA5ECEB60 [Tue Mar 19 12:43:12 2058 UTC]
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: kdpYfUmykM.exe, 00000000.00000002.1654983397.000000000301D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeMemory allocated: 1440000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeMemory allocated: 1AEF0000 memory reserve | memory write watchJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exe TID: 7588Thread sleep time: -922337203685477s >= -30000sJump to behavior
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: kdpYfUmykM.exe, 00000000.00000002.1654983397.000000000301D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeProcess token adjusted: DebugJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeMemory allocated: page read and write | page guardJump to behavior
              Source: kdpYfUmykM.exe, 00000000.00000002.1654983397.0000000003130000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetProgmanWindow
              Source: kdpYfUmykM.exe, 00000000.00000002.1654983397.0000000003130000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SetProgmanWindow
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Users\user\Desktop\kdpYfUmykM.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\BELL.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\BOD_B.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\BOD_CI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\BOD_CB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\BOD_CBI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\BRUSHSCI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\CALIST.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\SCHLBKI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\SCHLBKB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\ERASMD.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\ERASDEMI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\ERASBD.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\GIGI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\HATTEN.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\LBRITEDI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\LFAXDI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\LSANSD.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\LSANSI.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\LTYPEBO.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\MAGNETOB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\MATURASC.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\NIAGENG.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\PERTIBD.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\POORICH.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\ROCKB.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\TCCB____.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\flat_officeFontsPreview.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\OFFSYMSL.TTF VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\kdpYfUmykM.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: kdpYfUmykM.exe, type: SAMPLE
              Source: Yara matchFile source: 0.2.kdpYfUmykM.exe.12f01a78.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.0.kdpYfUmykM.exe.b80000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.kdpYfUmykM.exe.12f01a78.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1605716307.0000000000B82000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1657961554.0000000012F01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: kdpYfUmykM.exe, type: SAMPLE
              Source: Yara matchFile source: 0.2.kdpYfUmykM.exe.12f01a78.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.0.kdpYfUmykM.exe.b80000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.kdpYfUmykM.exe.12f01a78.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.1605716307.0000000000B82000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1657961554.0000000012F01000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
              DLL Side-Loading
              2
              Process Injection
              1
              Masquerading
              11
              Input Capture
              11
              Security Software Discovery
              Remote Services11
              Input Capture
              Data ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
              DLL Side-Loading
              1
              Disable or Modify Tools
              LSASS Memory1
              Process Discovery
              Remote Desktop Protocol1
              Archive Collected Data
              Junk DataExfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
              Virtualization/Sandbox Evasion
              Security Account Manager31
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
              Process Injection
              NTDS12
              System Information Discovery
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Deobfuscate/Decode Files or Information
              LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              Timestomp
              Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
              DLL Side-Loading
              DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              kdpYfUmykM.exe83%ReversingLabsByteCode-MSIL.Trojan.RedLineStealer
              kdpYfUmykM.exe75%VirustotalBrowse
              kdpYfUmykM.exe100%AviraTR/Spy.RedLine.dtpfv
              kdpYfUmykM.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              https://api.ip.sb/ip0%URL Reputationsafe
              http://www.tiro.com0%URL Reputationsafe
              http://www.goodfont.co.kr0%URL Reputationsafe
              http://www.goodfont.co.kr0%URL Reputationsafe
              http://www.carterandcone.coml0%URL Reputationsafe
              http://www.carterandcone.coml0%URL Reputationsafe
              http://www.sajatypeworks.com0%URL Reputationsafe
              http://www.typography.netD0%URL Reputationsafe
              http://www.galapagosdesign.com/staff/dennis.htm0%URL Reputationsafe
              http://www.jiyu-kobo.co.jp/0%URL Reputationsafe
              http://www.galapagosdesign.com/DPlease0%URL Reputationsafe
              http://www.sandoll.co.kr0%URL Reputationsafe
              http://www.urwpp.deDPlease0%URL Reputationsafe
              http://www.sakkal.com0%URL Reputationsafe
              http://www.founder.com.cn/cn/bThe0%Avira URL Cloudsafe
              http://www.founder.com.cn/cn0%Avira URL Cloudsafe
              http://www.founder.com.cn/cn/cThe0%Avira URL Cloudsafe
              https://api.ip.s0%Avira URL Cloudsafe
              https://discord.com/api/v9/users/0%Avira URL Cloudsafe
              http://www.zhongyicts.com.cn0%Avira URL Cloudsafe
              https://discord.com/api/v9/users/0%VirustotalBrowse
              http://www.founder.com.cn/cn/bThe0%VirustotalBrowse
              http://www.founder.com.cn/cn0%VirustotalBrowse
              http://www.founder.com.cn/cn/cThe0%VirustotalBrowse
              http://www.zhongyicts.com.cn1%VirustotalBrowse
              No contacted domains info
              NameSourceMaliciousAntivirus DetectionReputation
              http://www.apache.org/licenses/LICENSE-2.0kdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                http://www.fontbureau.comkdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://www.fontbureau.com/designersGkdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://api.ip.sb/ipkdpYfUmykM.exe, 00000000.00000002.1654983397.0000000002F58000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://www.fontbureau.com/designers/?kdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://www.founder.com.cn/cn/bThekdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.fontbureau.com/designers?kdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://www.tiro.comkdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        https://api.ip.skdpYfUmykM.exe, 00000000.00000002.1654983397.0000000002F58000.00000004.00000800.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.fontbureau.com/designerskdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://www.goodfont.co.krkdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.carterandcone.comlkdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          http://www.sajatypeworks.comkdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.typography.netDkdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.fontbureau.com/designers/cabarga.htmlNkdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.founder.com.cn/cn/cThekdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.galapagosdesign.com/staff/dennis.htmkdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpfalse
                            • URL Reputation: safe
                            unknown
                            http://www.founder.com.cn/cnkdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpfalse
                            • 0%, Virustotal, Browse
                            • Avira URL Cloud: safe
                            unknown
                            http://www.fontbureau.com/designers/frere-user.htmlkdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.jiyu-kobo.co.jp/kdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              https://discord.com/api/v9/users/kdpYfUmykM.exe, 00000000.00000002.1654983397.000000000301D000.00000004.00000800.00020000.00000000.sdmpfalse
                              • 0%, Virustotal, Browse
                              • Avira URL Cloud: safe
                              unknown
                              http://www.galapagosdesign.com/DPleasekdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://www.fontbureau.com/designers8kdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.fonts.comkdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.sandoll.co.krkdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.urwpp.deDPleasekdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  http://www.zhongyicts.com.cnkdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • 1%, Virustotal, Browse
                                  • Avira URL Cloud: safe
                                  unknown
                                  http://www.sakkal.comkdpYfUmykM.exe, 00000000.00000002.1659009887.000000001CD92000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • URL Reputation: safe
                                  unknown
                                  No contacted IP infos
                                  Joe Sandbox version:40.0.0 Tourmaline
                                  Analysis ID:1431411
                                  Start date and time:2024-04-25 02:21:05 +02:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 4m 43s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:7
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:kdpYfUmykM.exe
                                  renamed because original name is a hash value
                                  Original Sample Name:b3dde3d29de6b58cd247ccd2193e4ced.exe
                                  Detection:MAL
                                  Classification:mal80.troj.evad.winEXE@2/1@0/0
                                  EGA Information:
                                  • Successful, ratio: 100%
                                  HCA Information:
                                  • Successful, ratio: 100%
                                  • Number of executed functions: 3
                                  • Number of non-executed functions: 0
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                  • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                  • Not all processes where analyzed, report is missing behavior information
                                  No simulations
                                  No context
                                  No context
                                  No context
                                  No context
                                  No context
                                  Process:C:\Users\user\Desktop\kdpYfUmykM.exe
                                  File Type:CSV text
                                  Category:dropped
                                  Size (bytes):1281
                                  Entropy (8bit):5.370111951859942
                                  Encrypted:false
                                  SSDEEP:24:ML9E4KQ71qE4GIs0E4KCKDE4KGKZI6KhPKIE4TKBGKoZAE4KKUNb:MxHKQ71qHGIs0HKCYHKGSI6oPtHTHhA2
                                  MD5:12C61586CD59AA6F2A21DF30501F71BD
                                  SHA1:E6B279DC134544867C868E3FF3C267A06CE340C7
                                  SHA-256:EC20A856DBBCF320F7F24C823D6E9D2FD10E9335F5DE2F56AB9A7DF1ED358543
                                  SHA-512:B0731F59C74C9D25A4C82E166B3DC300BBCF89F6969918EC748B867C641ED0D8E0DE81AAC68209EF140219861B4939F1B07D0885ACA112D494D23AAF9A9C03FE
                                  Malicious:false
                                  Reputation:moderate, very likely benign file
                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\b187b7f31cee3e87b56c8edca55324e0\System.ni.dll",0..3,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Drawing\567ff6b0de7f9dcd8111001e94ab7cf6\System.Drawing.ni.dll",0..3,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Windows.Forms\2a7fffeef3976b2a6f273db66b1f0107\System.Windows.Forms.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\31326613607f69254f3284ec964796c8\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\S
                                  File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Entropy (8bit):5.300072440270305
                                  TrID:
                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                  • Win32 Executable (generic) a (10002005/4) 49.78%
                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                  • Win16/32 Executable Delphi generic (2074/23) 0.01%
                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                  File name:kdpYfUmykM.exe
                                  File size:553'984 bytes
                                  MD5:b3dde3d29de6b58cd247ccd2193e4ced
                                  SHA1:2a1b433479743a064c3fb8a46d3b677c1af4a115
                                  SHA256:c1c4559afcf94b6134fad4507537eced00e44d77000ec17b61352439558c5b43
                                  SHA512:9ae939e2bea12f3634afed17c6b82e55f72ad7ed77197927312e86d0296f7dc7d8528ca743c6fffe2e0ce88fb80030f2cb704e4e4b3b6a324adc855ac50d635f
                                  SSDEEP:12288:RAamDBG+MlCU9lcN3CNIb88WsNMP5F1k:RRlC2W3CNIb88WsNMhF
                                  TLSH:49C48E81B709BD62DA3B06F5948518201F71ED79E816D316ADEB7FBF3E32361420291B
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...`.................0.................. ........@.. ....................................@................................
                                  Icon Hash:079d1d1d4c72e64b
                                  Entrypoint:0x42d7ce
                                  Entrypoint Section:.text
                                  Digitally signed:false
                                  Imagebase:0x400000
                                  Subsystem:windows cui
                                  Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                  Time Stamp:0xA5ECEB60 [Tue Mar 19 12:43:12 2058 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                  Instruction
                                  jmp dword ptr [00402000h]
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x2d7800x4b.text
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x2e0000x5b65c.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x8a0000xc.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x20000x2b7d40x2b80003e49d35088e5e955ce2026ab71789c0False0.48546942349137934data6.355743767006854IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rsrc0x2e0000x5b65c0x5b8000a1a441e5dfce3d18144b4305510c4e2False0.25576598787568305data4.463945530503487IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0x8a0000xc0x200b41a9deb412b3f65f951d99e8d1c2096False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_ICON0x2e2500x42028Device independent bitmap graphic, 256 x 512 x 32, image size 2703360.20358685682161137
                                  RT_ICON0x702780x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.34492192121140425
                                  RT_ICON0x80aa00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.4390056683986774
                                  RT_ICON0x84cc80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.5059128630705394
                                  RT_ICON0x872700x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.5218105065666041
                                  RT_ICON0x883180x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.6020491803278688
                                  RT_ICON0x88ca00x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.6338652482269503
                                  RT_GROUP_ICON0x891080x68data0.7403846153846154
                                  RT_VERSION0x891700x2fedata0.4556135770234987
                                  RT_MANIFEST0x894700x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                  DLLImport
                                  mscoree.dll_CorExeMain
                                  No network behavior found

                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Click to jump to process

                                  Target ID:0
                                  Start time:02:21:49
                                  Start date:25/04/2024
                                  Path:C:\Users\user\Desktop\kdpYfUmykM.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Users\user\Desktop\kdpYfUmykM.exe"
                                  Imagebase:0xb80000
                                  File size:553'984 bytes
                                  MD5 hash:B3DDE3D29DE6B58CD247CCD2193E4CED
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000000.1605716307.0000000000B82000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000002.1657961554.0000000012F01000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:true

                                  Target ID:1
                                  Start time:02:21:49
                                  Start date:25/04/2024
                                  Path:C:\Windows\System32\conhost.exe
                                  Wow64 process (32bit):false
                                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  Imagebase:0x7ff7699e0000
                                  File size:862'208 bytes
                                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Reputation:high
                                  Has exited:true

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:22.5%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:0%
                                    Total number of Nodes:9
                                    Total number of Limit Nodes:0
                                    execution_graph 3185 7ffd9b8a86a5 3186 7ffd9b8a86c3 GetConsoleWindow 3185->3186 3188 7ffd9b8a8783 3186->3188 3181 7ffd9b8ab9b1 3182 7ffd9b8ab9bb ReadFile 3181->3182 3184 7ffd9b8abb56 3182->3184 3189 7ffd9b8ab141 3190 7ffd9b8ab14b CreateFileA 3189->3190 3192 7ffd9b8ab3de 3190->3192

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1659735291.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ffd9b8a0000_kdpYfUmykM.jbxd
                                    Similarity
                                    • API ID: CreateFile
                                    • String ID:
                                    • API String ID: 823142352-0
                                    • Opcode ID: 95ee621f505d130f2b5e49c22756ad017df5b9a432a743a3e12a90d5cccb8b9d
                                    • Instruction ID: c2cb0e1358903cf8785a9c4a60f041c64ce0e7a46f985022068ca2da17a80928
                                    • Opcode Fuzzy Hash: 95ee621f505d130f2b5e49c22756ad017df5b9a432a743a3e12a90d5cccb8b9d
                                    • Instruction Fuzzy Hash: A4A16D70A08A8D8FDFB8EF18C855BE937E5FB59301F10412AE84EC72A1DB75A641CB41
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1659735291.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ffd9b8a0000_kdpYfUmykM.jbxd
                                    Similarity
                                    • API ID: FileRead
                                    • String ID:
                                    • API String ID: 2738559852-0
                                    • Opcode ID: 93e0b3b0a0dfb5c42624ed19ec0ea9796a58a38e5c5c0c34f808a01ccb362d6a
                                    • Instruction ID: cd9847b72f622acbc0a40c0986c5d1f0187449ec9f4a6f57e3594196b403677e
                                    • Opcode Fuzzy Hash: 93e0b3b0a0dfb5c42624ed19ec0ea9796a58a38e5c5c0c34f808a01ccb362d6a
                                    • Instruction Fuzzy Hash: 6B71F570D08A1D8FDBA8DF58C885BE9BBB1FB59310F1082AAD04DE3255DB74A985CF41
                                    Uniqueness

                                    Uniqueness Score: -1.00%

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 44 7ffd9b8a86a5-7ffd9b8a86c1 45 7ffd9b8a86c3 44->45 46 7ffd9b8a86c4-7ffd9b8a8781 GetConsoleWindow 44->46 45->46 51 7ffd9b8a8789-7ffd9b8a87d9 46->51 52 7ffd9b8a8783 46->52 52->51
                                    APIs
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.1659735291.00007FFD9B8A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD9B8A0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ffd9b8a0000_kdpYfUmykM.jbxd
                                    Similarity
                                    • API ID: ConsoleWindow
                                    • String ID:
                                    • API String ID: 2863861424-0
                                    • Opcode ID: 57868464eb419283cda036202fa9a645935a23f5a654e58df0af1fbe50540f6b
                                    • Instruction ID: a328683f66a90816da4a5d3acd8e0b152e9899a2a84e65cb0f19157e505e7f72
                                    • Opcode Fuzzy Hash: 57868464eb419283cda036202fa9a645935a23f5a654e58df0af1fbe50540f6b
                                    • Instruction Fuzzy Hash: F941BD7090CA4C8FDB98DFA8C859BEDBBF0FF5A310F1041AAD049D3252DA74A586CB50
                                    Uniqueness

                                    Uniqueness Score: -1.00%