Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe

Overview

General Information

Sample name:Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe
Analysis ID:1585740
MD5:44ae6d35f0098112e87243779c924551
SHA1:5227540b8cbff57bc0e435451f4bf69245765253
SHA256:c2c192862a68990222cacb9279cacf63370b015a429d2c39d94cbe15cf987388
Tags:exeMassLoggeruser-threatcat_ch
Infos:

Detection

MassLogger RAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected MassLogger RAT
Yara detected Telegram RAT
AI detected suspicious sample
Initial sample is a PE file and has a suspicious name
Machine Learning detection for sample
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses an obfuscated file name to hide its real file extension (double extension)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • cleanup
{"EXfil Mode": "SMTP", "From": "hubservices@navecepa.com", "Password": "yiwLgN*rC4", "Server": "smtp.navecepa.com", "To": "COMPUTERNAME", "Port": 841675}
SourceRuleDescriptionAuthorStrings
00000002.00000002.2886767429.0000000000702000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    00000002.00000002.2886767429.0000000000702000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000002.00000002.2886767429.0000000000702000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000002.00000002.2886767429.0000000000702000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0xf061:$a1: get_encryptedPassword
        • 0xf389:$a2: get_encryptedUsername
        • 0xedea:$a3: get_timePasswordChanged
        • 0xef0b:$a4: get_passwordField
        • 0xf077:$a5: set_encryptedPassword
        • 0x109dc:$a7: get_logins
        • 0x1068d:$a8: GetOutlookPasswords
        • 0x1047f:$a9: StartKeylogger
        • 0x1092c:$a10: KeyLoggerEventArgs
        • 0x104dc:$a11: KeyLoggerEventArgsEventHandler
        00000002.00000002.2888480424.0000000002704000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Click to see the 12 entries
          SourceRuleDescriptionAuthorStrings
          2.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.700000.0.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
            2.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.700000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              2.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.700000.0.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                2.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.700000.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                • 0xf261:$a1: get_encryptedPassword
                • 0xf589:$a2: get_encryptedUsername
                • 0xefea:$a3: get_timePasswordChanged
                • 0xf10b:$a4: get_passwordField
                • 0xf277:$a5: set_encryptedPassword
                • 0x10bdc:$a7: get_logins
                • 0x1088d:$a8: GetOutlookPasswords
                • 0x1067f:$a9: StartKeylogger
                • 0x10b2c:$a10: KeyLoggerEventArgs
                • 0x106dc:$a11: KeyLoggerEventArgsEventHandler
                2.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.700000.0.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                • 0x142b3:$a2: \Comodo\Dragon\User Data\Default\Login Data
                • 0x137b1:$a3: \Google\Chrome\User Data\Default\Login Data
                • 0x13abf:$a4: \Orbitum\User Data\Default\Login Data
                • 0x148b7:$a5: \Kometa\User Data\Default\Login Data
                Click to see the 20 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-08T07:01:57.008516+010028032742Potentially Bad Traffic192.168.2.449732132.226.247.7380TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeAvira: detected
                Source: 00000002.00000002.2888480424.00000000025E1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: MassLogger {"EXfil Mode": "SMTP", "From": "hubservices@navecepa.com", "Password": "yiwLgN*rC4", "Server": "smtp.navecepa.com", "To": "COMPUTERNAME", "Port": 841675}
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeReversingLabs: Detection: 36%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeJoe Sandbox ML: detected

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49733 version: TLS 1.0
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: G:\IMPORTANT SRC\GOOD Nova\Crypter\Stubs Fully\Public\Public Runpe\PR\PR\obj\Debug\Poses.pdb source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1655913182.0000000002B71000.00000004.00000800.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeCode function: 4x nop then jmp 00D08922h2_2_00D08508
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeCode function: 4x nop then jmp 00D081F9h2_2_00D07F48
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeCode function: 4x nop then jmp 00D08922h2_2_00D084F8
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeCode function: 4x nop then jmp 00D08922h2_2_00D0884F
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeCode function: 4x nop then jmp 00D0FAF8h2_2_00D0F7F8
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
                Source: Joe Sandbox ViewIP Address: 132.226.247.73 132.226.247.73
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.4:49732 -> 132.226.247.73:80
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.4:49733 version: TLS 1.0
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000002.00000002.2888480424.000000000265F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000002.00000002.2888480424.000000000265F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.comd
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000002.00000002.2888480424.00000000025E1000.00000004.00000800.00020000.00000000.sdmp, Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000002.00000002.2888480424.000000000265F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000002.00000002.2888480424.00000000025E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000002.00000002.2888480424.000000000265F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/d
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1655987843.0000000003B79000.00000004.00000800.00020000.00000000.sdmp, Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000002.00000002.2886767429.0000000000702000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000002.00000002.2888480424.000000000265F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgd
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000002.00000002.2888480424.000000000267B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000002.00000002.2888480424.000000000267B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.orgd
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000002.00000002.2888480424.00000000025E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.carterandcone.coml
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/?
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/cabarga.htmlN
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers/frere-user.html
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers8
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designers?
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fontbureau.com/designersG
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.fonts.com
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/bThe
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.founder.com.cn/cn/cThe
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/DPlease
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.galapagosdesign.com/staff/dennis.htm
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.goodfont.co.kr
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.jiyu-kobo.co.jp/
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sajatypeworks.com
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sakkal.com
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.sandoll.co.kr
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.tiro.com
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.typography.netD
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.urwpp.deDPlease
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.zhongyicts.com.cn
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1655987843.0000000003B79000.00000004.00000800.00020000.00000000.sdmp, Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000002.00000002.2886767429.0000000000702000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000002.00000002.2888480424.000000000265F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1655987843.0000000003B79000.00000004.00000800.00020000.00000000.sdmp, Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000002.00000002.2886767429.0000000000702000.00000040.00000400.00020000.00000000.sdmp, Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000002.00000002.2888480424.000000000265F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000002.00000002.2888480424.000000000265F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189d
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000002.00000002.2888480424.000000000265F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189l
                Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733

                System Summary

                barindex
                Source: 2.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.700000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 2.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.700000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.3c0e220.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.3c0e220.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.3c0e220.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.3c0e220.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.3bcd1b0.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.3bcd1b0.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.3ba3380.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.3ba3380.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 00000002.00000002.2886767429.0000000000702000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.1655987843.0000000003B79000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe PID: 984, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe PID: 2336, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: initial sampleStatic PE information: Filename: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeCode function: 0_2_00E8E0840_2_00E8E084
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeCode function: 0_2_08D717D90_2_08D717D9
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeCode function: 2_2_00D0AC082_2_00D0AC08
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeCode function: 2_2_00D02DE02_2_00D02DE0
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeCode function: 2_2_00D0F1282_2_00D0F128
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeCode function: 2_2_00D07F482_2_00D07F48
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeCode function: 2_2_00D0E7802_2_00D0E780
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeCode function: 2_2_00D027B92_2_00D027B9
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeCode function: 2_2_00D0E77C2_2_00D0E77C
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeCode function: 2_2_00D0AC062_2_00D0AC06
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeCode function: 2_2_00D0EF082_2_00D0EF08
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeCode function: 2_2_00D0F7F82_2_00D0F7F8
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeCode function: 2_2_00D07F372_2_00D07F37
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1655913182.0000000002BEB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePoses.dll, vs Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1655913182.0000000002BEB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000000.1641724730.0000000000802000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameNone.exe* vs Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1655913182.0000000002B71000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePoses.dll, vs Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1655987843.0000000003B79000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameVebinace.dll2 vs Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1655987843.0000000003B79000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000002.00000002.2886767429.000000000071A000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000002.00000002.2886631566.00000000006F7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeBinary or memory string: OriginalFilenameNone.exe* vs Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 2.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.700000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 2.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.700000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.3c0e220.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.3c0e220.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.3c0e220.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.3c0e220.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.3bcd1b0.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.3bcd1b0.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.3ba3380.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.3ba3380.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000002.00000002.2886767429.0000000000702000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.1655987843.0000000003B79000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe PID: 984, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe PID: 2336, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@2/2
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.logJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeMutant created: NULL
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000002.00000002.2888480424.00000000026DD000.00000004.00000800.00020000.00000000.sdmp, Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000002.00000002.2888480424.00000000026BF000.00000004.00000800.00020000.00000000.sdmp, Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000002.00000002.2888480424.00000000026CE000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeReversingLabs: Detection: 36%
                Source: unknownProcess created: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe "C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe"
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess created: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe "C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe"
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess created: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe "C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: G:\IMPORTANT SRC\GOOD Nova\Crypter\Stubs Fully\Public\Public Runpe\PR\PR\obj\Debug\Poses.pdb source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1655913182.0000000002B71000.00000004.00000800.00020000.00000000.sdmp
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeStatic PE information: 0x827F415A [Thu May 19 00:31:22 2039 UTC]
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeCode function: 2_2_00D03F7A push ebx; retn 5500h2_2_00D03F86
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeCode function: 2_2_00D007FF push ebx; retn 0000h2_2_00D00802
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeCode function: 2_2_00D00811 push ebx; retn 0000h2_2_00D00812
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeCode function: 2_2_00D0081F push ebx; retn 0000h2_2_00D00822
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeCode function: 2_2_00D00828 push ebp; retn 0000h2_2_00D00832
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeStatic PE information: section name: .text entropy: 7.733649552354785

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: Possible double extension: pdf.scrStatic PE information: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeMemory allocated: E80000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeMemory allocated: 2B70000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeMemory allocated: 2990000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeMemory allocated: CC0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeMemory allocated: 25E0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeMemory allocated: 45E0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe TID: 4076Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000002.00000002.2887232668.00000000008F7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeCode function: 2_2_00D0F128 LdrInitializeThunk,LdrInitializeThunk,2_2_00D0F128
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeMemory allocated: page read and write | page guardJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeProcess created: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe "C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\FRADM.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\FRADMIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\FRAMDCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\FRADMCN.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\FRAHV.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\FRAHVIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\AGENCYR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\AGENCYB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\ALGER.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\ARLRDBD.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BASKVILL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BELLI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BERNHC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BOD_R.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BOD_I.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BOD_BI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BOD_CR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BOD_BLAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BOD_BLAI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BOD_PSTC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BRITANIC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\BRLNSB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\CALIFI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\CALIFB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\CALISTBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\CENSCBK.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\SCHLBKBI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\CENTAUR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\COOPBL.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\COPRGTB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\DUBAI-REGULAR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\ELEPHNT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\FORTE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\FRABKIT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\GILI____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\GILB____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\GLECB.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\HARNGTON.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\IMPRISHA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\LCALLIG.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\LTYPE.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\ONYX.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\PERTILI.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\TCB_____.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\VIVALDII.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\VLADIMIR.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 2.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.700000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.3c0e220.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.3c0e220.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.3bcd1b0.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.3ba3380.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2886767429.0000000000702000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1655987843.0000000003B79000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe PID: 984, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe PID: 2336, type: MEMORYSTR
                Source: Yara matchFile source: 2.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.700000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.3c0e220.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.3c0e220.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.3bcd1b0.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.3ba3380.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2886767429.0000000000702000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1655987843.0000000003B79000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe PID: 984, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe PID: 2336, type: MEMORYSTR
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: Yara matchFile source: 2.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.700000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.3c0e220.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.3c0e220.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.3bcd1b0.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.3ba3380.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2886767429.0000000000702000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.2888480424.0000000002704000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1655987843.0000000003B79000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe PID: 984, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe PID: 2336, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 2.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.700000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.3c0e220.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.3c0e220.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.3bcd1b0.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.3ba3380.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2886767429.0000000000702000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1655987843.0000000003B79000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe PID: 984, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe PID: 2336, type: MEMORYSTR
                Source: Yara matchFile source: 2.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.700000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.3c0e220.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.3c0e220.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.3bcd1b0.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe.3ba3380.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.2886767429.0000000000702000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1655987843.0000000003B79000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe PID: 984, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe PID: 2336, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                DLL Side-Loading
                11
                Process Injection
                11
                Masquerading
                1
                OS Credential Dumping
                1
                Query Registry
                Remote Services1
                Email Collection
                11
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                1
                Disable or Modify Tools
                LSASS Memory1
                Security Software Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                1
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
                Virtualization/Sandbox Evasion
                Security Account Manager1
                Process Discovery
                SMB/Windows Admin Shares1
                Data from Local System
                2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                Process Injection
                NTDS31
                Virtualization/Sandbox Evasion
                Distributed Component Object ModelInput Capture13
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script13
                Obfuscated Files or Information
                LSA Secrets1
                System Network Configuration Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Software Packing
                Cached Domain Credentials13
                System Information Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                Timestomp
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                DLL Side-Loading
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe37%ReversingLabsByteCode-MSIL.Trojan.MassloggerRAT
                Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe100%AviraHEUR/AGEN.1306813
                Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                NameIPActiveMaliciousAntivirus DetectionReputation
                reallyfreegeoip.org
                188.114.97.3
                truefalse
                  high
                  checkip.dyndns.com
                  132.226.247.73
                  truefalse
                    high
                    checkip.dyndns.org
                    unknown
                    unknownfalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      https://reallyfreegeoip.org/xml/8.46.123.189false
                        high
                        http://checkip.dyndns.org/false
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          http://www.apache.org/licenses/LICENSE-2.0Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://www.fontbureau.comMv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://www.fontbureau.com/designersGMv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://www.fontbureau.com/designers/?Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://www.founder.com.cn/cn/bTheMv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.fontbureau.com/designers?Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://reallyfreegeoip.orgdMv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000002.00000002.2888480424.000000000267B000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://www.tiro.comMv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://checkip.dyndns.orgMv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000002.00000002.2888480424.00000000025E1000.00000004.00000800.00020000.00000000.sdmp, Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000002.00000002.2888480424.000000000265F000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.fontbureau.com/designersMv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://www.goodfont.co.krMv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://www.carterandcone.comlMv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  http://www.sajatypeworks.comMv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://www.typography.netDMv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.fontbureau.com/designers/cabarga.htmlNMv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://www.founder.com.cn/cn/cTheMv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://www.galapagosdesign.com/staff/dennis.htmMv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://www.founder.com.cn/cnMv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://www.fontbureau.com/designers/frere-user.htmlMv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://reallyfreegeoip.org/xml/8.46.123.189lMv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000002.00000002.2888480424.000000000265F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://checkip.dyndns.comdMv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000002.00000002.2888480424.000000000265F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    http://checkip.dyndns.org/qMv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1655987843.0000000003B79000.00000004.00000800.00020000.00000000.sdmp, Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000002.00000002.2886767429.0000000000702000.00000040.00000400.00020000.00000000.sdmpfalse
                                                                      high
                                                                      http://www.jiyu-kobo.co.jp/Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        https://reallyfreegeoip.org/xml/8.46.123.189dMv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000002.00000002.2888480424.000000000265F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          http://reallyfreegeoip.orgMv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000002.00000002.2888480424.000000000267B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            http://checkip.dyndns.orgdMv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000002.00000002.2888480424.000000000265F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              http://www.galapagosdesign.com/DPleaseMv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                https://reallyfreegeoip.orgMv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000002.00000002.2888480424.000000000265F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  http://www.fontbureau.com/designers8Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    http://www.fonts.comMv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      http://www.sandoll.co.krMv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        http://checkip.dyndns.comMv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000002.00000002.2888480424.000000000265F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          http://www.urwpp.deDPleaseMv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            http://www.zhongyicts.com.cnMv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              http://checkip.dyndns.org/dMv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000002.00000002.2888480424.000000000265F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                high
                                                                                                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameMv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000002.00000002.2888480424.00000000025E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                  high
                                                                                                  http://www.sakkal.comMv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1657512161.0000000006D02000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    high
                                                                                                    https://api.telegram.org/bot-/sendDocument?chat_id=Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1655987843.0000000003B79000.00000004.00000800.00020000.00000000.sdmp, Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000002.00000002.2886767429.0000000000702000.00000040.00000400.00020000.00000000.sdmpfalse
                                                                                                      high
                                                                                                      https://reallyfreegeoip.org/xml/Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000000.00000002.1655987843.0000000003B79000.00000004.00000800.00020000.00000000.sdmp, Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000002.00000002.2886767429.0000000000702000.00000040.00000400.00020000.00000000.sdmp, Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe, 00000002.00000002.2888480424.000000000265F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        high
                                                                                                        • No. of IPs < 25%
                                                                                                        • 25% < No. of IPs < 50%
                                                                                                        • 50% < No. of IPs < 75%
                                                                                                        • 75% < No. of IPs
                                                                                                        IPDomainCountryFlagASNASN NameMalicious
                                                                                                        188.114.97.3
                                                                                                        reallyfreegeoip.orgEuropean Union
                                                                                                        13335CLOUDFLARENETUSfalse
                                                                                                        132.226.247.73
                                                                                                        checkip.dyndns.comUnited States
                                                                                                        16989UTMEMUSfalse
                                                                                                        Joe Sandbox version:41.0.0 Charoite
                                                                                                        Analysis ID:1585740
                                                                                                        Start date and time:2025-01-08 07:01:06 +01:00
                                                                                                        Joe Sandbox product:CloudBasic
                                                                                                        Overall analysis duration:0h 4m 32s
                                                                                                        Hypervisor based Inspection enabled:false
                                                                                                        Report type:full
                                                                                                        Cookbook file name:default.jbs
                                                                                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                        Number of analysed new started processes analysed:7
                                                                                                        Number of new started drivers analysed:0
                                                                                                        Number of existing processes analysed:0
                                                                                                        Number of existing drivers analysed:0
                                                                                                        Number of injected processes analysed:0
                                                                                                        Technologies:
                                                                                                        • HCA enabled
                                                                                                        • EGA enabled
                                                                                                        • AMSI enabled
                                                                                                        Analysis Mode:default
                                                                                                        Analysis stop reason:Timeout
                                                                                                        Sample name:Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe
                                                                                                        Detection:MAL
                                                                                                        Classification:mal100.troj.spyw.evad.winEXE@3/1@2/2
                                                                                                        EGA Information:
                                                                                                        • Successful, ratio: 100%
                                                                                                        HCA Information:
                                                                                                        • Successful, ratio: 100%
                                                                                                        • Number of executed functions: 24
                                                                                                        • Number of non-executed functions: 2
                                                                                                        Cookbook Comments:
                                                                                                        • Found application associated with file extension: .exe
                                                                                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                                                        • Excluded IPs from analysis (whitelisted): 23.56.254.164, 4.245.163.56, 13.107.246.45
                                                                                                        • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                                        • Not all processes where analyzed, report is missing behavior information
                                                                                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                                                        No simulations
                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                        188.114.97.3GTA5-elamigos.exeGet hashmaliciousEsquele StealerBrowse
                                                                                                        • /api/get/dll
                                                                                                        DHL DOCS 2-0106-25.exeGet hashmaliciousFormBookBrowse
                                                                                                        • www.uzshou.world/ricr/
                                                                                                        Order Inquiry.exeGet hashmaliciousFormBookBrowse
                                                                                                        • www.cifasnc.info/8rr3/
                                                                                                        Gg6wivFINd.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                                        • unasnetds.ru/eternalPython_RequestUpdateprocessAuthSqlTrafficTemporary.php
                                                                                                        Payment Receipt.exeGet hashmaliciousFormBookBrowse
                                                                                                        • www.cifasnc.info/8rr3/
                                                                                                        dGhlYXB0Z3JvdXA=-free.exeGet hashmaliciousUnknownBrowse
                                                                                                        • /api/get/free
                                                                                                        dGhlYXB0Z3JvdXA=-free.exeGet hashmaliciousUnknownBrowse
                                                                                                        • /api/get/free
                                                                                                        RFQ 3100185 MAHAD.exeGet hashmaliciousFormBookBrowse
                                                                                                        • www.rgenerousrs.store/o362/
                                                                                                        A2028041200SD.exeGet hashmaliciousFormBookBrowse
                                                                                                        • www.beylikduzu616161.xyz/2nga/
                                                                                                        Delivery_Notification_00000260791.doc.jsGet hashmaliciousUnknownBrowse
                                                                                                        • radostdetym.ru/?ad=1JXSXybzEjjRJQDbVngTy7d8kEFAxmgmDN&id=rWoA9pTQhV1o4c5fjbOa-d26BGh3QU3-Bk0PqI4WnzM-5vl4IqKPymhrqkRpunF_PTHktMR-2qUlNAtnXA&rnd=45
                                                                                                        132.226.247.73MV DESPINA_VESSEL_DESCRIPTION.doc.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        yxU3AgeVTi.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        W2k2NLSvja.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        FACT0987789000900.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        file.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        Requested Documentation.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        Dotc67890990.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        Invoice DHL - AWB 2024 E4001 - 0000731.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        PURCHASE ORDER TRC-090971819130-24_pdf.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        D.G Governor Istek,Docx.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake KeyloggerBrowse
                                                                                                        • checkip.dyndns.org/
                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                        reallyfreegeoip.orgNew order 2025.msgGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                                                                        • 188.114.97.3
                                                                                                        ENQ-0092025.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 188.114.97.3
                                                                                                        MV DESPINA_VESSEL_DESCRIPTION.doc.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                        • 188.114.97.3
                                                                                                        FORTUNE RICH_PARTICULARS.pdf.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                        • 188.114.97.3
                                                                                                        document pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 188.114.96.3
                                                                                                        fiyati_teklif 615TBI507_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 188.114.96.3
                                                                                                        yxU3AgeVTi.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 188.114.97.3
                                                                                                        ITT # KRPBV2663 .docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 188.114.97.3
                                                                                                        PI ITS15235.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 188.114.96.3
                                                                                                        kP8EgMorTr.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 188.114.97.3
                                                                                                        checkip.dyndns.comNew order 2025.msgGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                                                                        • 193.122.6.168
                                                                                                        ENQ-0092025.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 132.226.8.169
                                                                                                        MV DESPINA_VESSEL_DESCRIPTION.doc.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                        • 132.226.247.73
                                                                                                        FORTUNE RICH_PARTICULARS.pdf.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                        • 158.101.44.242
                                                                                                        document pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 132.226.8.169
                                                                                                        fiyati_teklif 615TBI507_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 158.101.44.242
                                                                                                        yxU3AgeVTi.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 132.226.247.73
                                                                                                        ITT # KRPBV2663 .docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 132.226.8.169
                                                                                                        PI ITS15235.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 158.101.44.242
                                                                                                        kP8EgMorTr.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 132.226.8.169
                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                        CLOUDFLARENETUS3.elfGet hashmaliciousUnknownBrowse
                                                                                                        • 1.4.26.56
                                                                                                        https://www.google.co.th/url?q=jODz3y3HOSozuuQiApLh&rct=5CHARyytTPSJ3J3wDcT&sa=t&esrc=evsqlwgFgECA0xys8Em2FL&source=&cd=HXUursu8uEcr4eTiw9XH&cad=XpPkDfJ6CHARlDJVS0Y&ved=xjnktlqryYWwZIBRrgvK&uact=&url=amp%2F%70%68%69%6C%2D%68%65%61%6C%74%68%2D%75%6B%2E%67%6C%69%74%63%68%2E%6D%65%2F#test@kghm.comGet hashmaliciousUnknownBrowse
                                                                                                        • 1.1.1.1
                                                                                                        http://plnbl.io/review/VdCYQSoKp54zGet hashmaliciousHTMLPhisherBrowse
                                                                                                        • 104.22.54.104
                                                                                                        file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, XWorm, XmrigBrowse
                                                                                                        • 104.21.36.11
                                                                                                        https://www.google.com/url?q=YG2GERTSbxgfeaGh1Yi5pby8yODY0MDkxOTEyNjI3MjNkMzQzMGNlYjE1ZTRjZjNlZWUwMTM5NGMyMDk3MmRmYTllZTBkMzUzMDBlZDFjOWNjMjdhNWZiYmM0OTU1ODkzMjEyMjI5MjAwOTkviinbsewtyuas53D1e4a0cefd8db4ad28e54c10117f7d498%2526i%253DNjI2YjE3MTBiZWI4YTgxMWUwNDIxNzE3%2526p%253Dm%2526s%253DAVNPUEhUT0NFTkNSWVBUSVYmhcLGCIsQzpMqHgYCBBo2kwEPWKEfFaahaLsnpofO4A%2526t%253DM3dHV0ZCT2t4azAvRVhKQ3B1ZC95RFFTdmpSMCt3cEFxWHJocUMzM0EyZz0%25253D%2526u%253DaHR0cHM6Ly9tLmV4YWN0YWcuY29tL2NsLmFzcHg_ZXh0UHJvdkFwaT1zaXh0L&sa=t&url=amp%2Fdlocumndjkacheckckoqingnmlcsoftlineon-secure-portal.us-iad-10.linodeobjects.com/newdocusign.html#Tdcjoiletuzn43fqnlhtwn8dbfakjhsdbfjhasbdfkjasbdkf%20ashjdbaksdbfkjasbdbfadGet hashmaliciousUnknownBrowse
                                                                                                        • 104.18.95.41
                                                                                                        https://sUNg.ethamoskag.ru/0cUrcw3/#Msburkholder@heartland-derm.comGet hashmaliciousUnknownBrowse
                                                                                                        • 104.17.25.14
                                                                                                        https://juddshaw.acemlnc.com/lt.php?x=3DZy~GDHJXeaEpz5-g1FVxNz1qEjv_Qij~tijXnLI3Ke75_7z0y.yuJz5X6lmNI~juswGet hashmaliciousHTMLPhisherBrowse
                                                                                                        • 104.17.25.14
                                                                                                        Sburkholder.pdfGet hashmaliciousUnknownBrowse
                                                                                                        • 104.17.25.14
                                                                                                        GTA5-elamigos.exeGet hashmaliciousEsquele StealerBrowse
                                                                                                        • 188.114.96.3
                                                                                                        GTA5-elamigos.exeGet hashmaliciousEsquele StealerBrowse
                                                                                                        • 188.114.97.3
                                                                                                        UTMEMUSmiori.ppc.elfGet hashmaliciousUnknownBrowse
                                                                                                        • 132.224.247.83
                                                                                                        ENQ-0092025.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 132.226.8.169
                                                                                                        MV DESPINA_VESSEL_DESCRIPTION.doc.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                        • 132.226.247.73
                                                                                                        document pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 132.226.8.169
                                                                                                        yxU3AgeVTi.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 132.226.247.73
                                                                                                        ITT # KRPBV2663 .docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 132.226.8.169
                                                                                                        kP8EgMorTr.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 132.226.8.169
                                                                                                        armv5l.elfGet hashmaliciousUnknownBrowse
                                                                                                        • 132.244.2.45
                                                                                                        31.13.224.14-x86-2025-01-03T22_14_18.elfGet hashmaliciousMiraiBrowse
                                                                                                        • 132.226.42.231
                                                                                                        W2k2NLSvja.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 132.226.247.73
                                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                        54328bd36c14bd82ddaa0c04b25ed9adNew order 2025.msgGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                                                                        • 188.114.97.3
                                                                                                        ENQ-0092025.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 188.114.97.3
                                                                                                        MV DESPINA_VESSEL_DESCRIPTION.doc.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                        • 188.114.97.3
                                                                                                        FORTUNE RICH_PARTICULARS.pdf.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                                                        • 188.114.97.3
                                                                                                        document pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 188.114.97.3
                                                                                                        fiyati_teklif 615TBI507_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 188.114.97.3
                                                                                                        yxU3AgeVTi.exeGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 188.114.97.3
                                                                                                        ITT # KRPBV2663 .docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 188.114.97.3
                                                                                                        PI ITS15235.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 188.114.97.3
                                                                                                        kP8EgMorTr.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                                        • 188.114.97.3
                                                                                                        No context
                                                                                                        Process:C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe
                                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                                        Category:dropped
                                                                                                        Size (bytes):1119
                                                                                                        Entropy (8bit):5.345080863654519
                                                                                                        Encrypted:false
                                                                                                        SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0Hj
                                                                                                        MD5:88593431AEF401417595E7A00FE86E5F
                                                                                                        SHA1:1714B8F6F6DCAAB3F3853EDABA7687F16DD331F4
                                                                                                        SHA-256:ED5E60336FB00579E0867B9615CBD0C560BB667FE3CEE0674F690766579F1032
                                                                                                        SHA-512:1D442441F96E69D8A6D5FB7E8CF01F13AF88CA2C2D0960120151B15505DD1CADC607EF9983373BA8E422C65FADAB04A615968F335A875B5C075BB9A6D0F346C9
                                                                                                        Malicious:true
                                                                                                        Reputation:moderate, very likely benign file
                                                                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                                        Entropy (8bit):7.713164928219554
                                                                                                        TrID:
                                                                                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                                        • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                                        • DOS Executable Generic (2002/1) 0.01%
                                                                                                        File name:Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe
                                                                                                        File size:210'944 bytes
                                                                                                        MD5:44ae6d35f0098112e87243779c924551
                                                                                                        SHA1:5227540b8cbff57bc0e435451f4bf69245765253
                                                                                                        SHA256:c2c192862a68990222cacb9279cacf63370b015a429d2c39d94cbe15cf987388
                                                                                                        SHA512:f4b1a2e12cba34f74008336a29a58472aa7ab8612be1f803a306b939fe37cad3486ae79ba902ab33621180f5144a1851f4b176ef740a8c5801739d1455f6718a
                                                                                                        SSDEEP:3072:gXeIOgeLRN9KkUFBlFdXcowGj8x5B1H7ljUpUxazpJEJ2WTi5s/N2Fbg:guIOgelGrfgGjq5B1H7ljUpUxlJ2u+
                                                                                                        TLSH:3124F7DB07ACC254E8DC4232D552CEA19FB4F196B6BB5BD7196BBA4DDC8839C080C6D0
                                                                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...ZA................0..............7... ...@....@.. ....................................@................................
                                                                                                        Icon Hash:64581e034d0d9919
                                                                                                        Entrypoint:0x43371e
                                                                                                        Entrypoint Section:.text
                                                                                                        Digitally signed:false
                                                                                                        Imagebase:0x400000
                                                                                                        Subsystem:windows gui
                                                                                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                                        Time Stamp:0x827F415A [Thu May 19 00:31:22 2039 UTC]
                                                                                                        TLS Callbacks:
                                                                                                        CLR (.Net) Version:
                                                                                                        OS Version Major:4
                                                                                                        OS Version Minor:0
                                                                                                        File Version Major:4
                                                                                                        File Version Minor:0
                                                                                                        Subsystem Version Major:4
                                                                                                        Subsystem Version Minor:0
                                                                                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                                        Instruction
                                                                                                        jmp dword ptr [00402000h]
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        add byte ptr [eax], al
                                                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x336c40x57.text
                                                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x340000x1b6c.rsrc
                                                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x360000xc.reloc
                                                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                        .text0x20000x317240x318007a3cb9c31e5824317c4ec0fffdbf2b70False0.6842250631313131data7.733649552354785IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                        .rsrc0x340000x1b6c0x1c0075dfd18645095dec02dc4a4df252e918False0.8440290178571429data7.378634137537574IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                        .reloc0x360000xc0x2006f6bb9996e1bcbc53f04faf30c5d7cb1False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                        RT_ICON0x341300x153ePNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9711290915777859
                                                                                                        RT_GROUP_ICON0x356700x14data0.9
                                                                                                        RT_VERSION0x356840x2fcdata0.43324607329842935
                                                                                                        RT_MANIFEST0x359800x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                                                        DLLImport
                                                                                                        mscoree.dll_CorExeMain
                                                                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                        2025-01-08T07:01:57.008516+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.449732132.226.247.7380TCP
                                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                                        Jan 8, 2025 07:01:56.006426096 CET4973280192.168.2.4132.226.247.73
                                                                                                        Jan 8, 2025 07:01:56.011317968 CET8049732132.226.247.73192.168.2.4
                                                                                                        Jan 8, 2025 07:01:56.011509895 CET4973280192.168.2.4132.226.247.73
                                                                                                        Jan 8, 2025 07:01:56.011729002 CET4973280192.168.2.4132.226.247.73
                                                                                                        Jan 8, 2025 07:01:56.016462088 CET8049732132.226.247.73192.168.2.4
                                                                                                        Jan 8, 2025 07:01:56.703402996 CET8049732132.226.247.73192.168.2.4
                                                                                                        Jan 8, 2025 07:01:56.752907038 CET4973280192.168.2.4132.226.247.73
                                                                                                        Jan 8, 2025 07:01:56.757697105 CET8049732132.226.247.73192.168.2.4
                                                                                                        Jan 8, 2025 07:01:56.962198019 CET8049732132.226.247.73192.168.2.4
                                                                                                        Jan 8, 2025 07:01:57.008516073 CET4973280192.168.2.4132.226.247.73
                                                                                                        Jan 8, 2025 07:01:57.011583090 CET49733443192.168.2.4188.114.97.3
                                                                                                        Jan 8, 2025 07:01:57.011627913 CET44349733188.114.97.3192.168.2.4
                                                                                                        Jan 8, 2025 07:01:57.011852026 CET49733443192.168.2.4188.114.97.3
                                                                                                        Jan 8, 2025 07:01:57.045154095 CET49733443192.168.2.4188.114.97.3
                                                                                                        Jan 8, 2025 07:01:57.045169115 CET44349733188.114.97.3192.168.2.4
                                                                                                        Jan 8, 2025 07:01:57.525266886 CET44349733188.114.97.3192.168.2.4
                                                                                                        Jan 8, 2025 07:01:57.525343895 CET49733443192.168.2.4188.114.97.3
                                                                                                        Jan 8, 2025 07:01:57.530813932 CET49733443192.168.2.4188.114.97.3
                                                                                                        Jan 8, 2025 07:01:57.530823946 CET44349733188.114.97.3192.168.2.4
                                                                                                        Jan 8, 2025 07:01:57.531110048 CET44349733188.114.97.3192.168.2.4
                                                                                                        Jan 8, 2025 07:01:57.581604004 CET49733443192.168.2.4188.114.97.3
                                                                                                        Jan 8, 2025 07:01:57.623336077 CET44349733188.114.97.3192.168.2.4
                                                                                                        Jan 8, 2025 07:01:57.695321083 CET44349733188.114.97.3192.168.2.4
                                                                                                        Jan 8, 2025 07:01:57.695379972 CET44349733188.114.97.3192.168.2.4
                                                                                                        Jan 8, 2025 07:01:57.695450068 CET49733443192.168.2.4188.114.97.3
                                                                                                        Jan 8, 2025 07:01:57.702341080 CET49733443192.168.2.4188.114.97.3
                                                                                                        Jan 8, 2025 07:03:01.961798906 CET8049732132.226.247.73192.168.2.4
                                                                                                        Jan 8, 2025 07:03:01.961872101 CET4973280192.168.2.4132.226.247.73
                                                                                                        Jan 8, 2025 07:03:36.993838072 CET4973280192.168.2.4132.226.247.73
                                                                                                        Jan 8, 2025 07:03:36.998603106 CET8049732132.226.247.73192.168.2.4
                                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                                        Jan 8, 2025 07:01:55.994265079 CET5406853192.168.2.41.1.1.1
                                                                                                        Jan 8, 2025 07:01:56.001151085 CET53540681.1.1.1192.168.2.4
                                                                                                        Jan 8, 2025 07:01:56.998085022 CET5949853192.168.2.41.1.1.1
                                                                                                        Jan 8, 2025 07:01:57.005306005 CET53594981.1.1.1192.168.2.4
                                                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                        Jan 8, 2025 07:01:55.994265079 CET192.168.2.41.1.1.10xe990Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                                                        Jan 8, 2025 07:01:56.998085022 CET192.168.2.41.1.1.10x3db5Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                        Jan 8, 2025 07:01:56.001151085 CET1.1.1.1192.168.2.40xe990No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                                                        Jan 8, 2025 07:01:56.001151085 CET1.1.1.1192.168.2.40xe990No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                                                        Jan 8, 2025 07:01:56.001151085 CET1.1.1.1192.168.2.40xe990No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                                                        Jan 8, 2025 07:01:56.001151085 CET1.1.1.1192.168.2.40xe990No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                                                        Jan 8, 2025 07:01:56.001151085 CET1.1.1.1192.168.2.40xe990No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                                                        Jan 8, 2025 07:01:56.001151085 CET1.1.1.1192.168.2.40xe990No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                                                        Jan 8, 2025 07:01:57.005306005 CET1.1.1.1192.168.2.40x3db5No error (0)reallyfreegeoip.org188.114.97.3A (IP address)IN (0x0001)false
                                                                                                        Jan 8, 2025 07:01:57.005306005 CET1.1.1.1192.168.2.40x3db5No error (0)reallyfreegeoip.org188.114.96.3A (IP address)IN (0x0001)false
                                                                                                        • reallyfreegeoip.org
                                                                                                        • checkip.dyndns.org
                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        0192.168.2.449732132.226.247.73802336C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        Jan 8, 2025 07:01:56.011729002 CET151OUTGET / HTTP/1.1
                                                                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                        Host: checkip.dyndns.org
                                                                                                        Connection: Keep-Alive
                                                                                                        Jan 8, 2025 07:01:56.703402996 CET273INHTTP/1.1 200 OK
                                                                                                        Date: Wed, 08 Jan 2025 06:01:56 GMT
                                                                                                        Content-Type: text/html
                                                                                                        Content-Length: 104
                                                                                                        Connection: keep-alive
                                                                                                        Cache-Control: no-cache
                                                                                                        Pragma: no-cache
                                                                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                        Jan 8, 2025 07:01:56.752907038 CET127OUTGET / HTTP/1.1
                                                                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                        Host: checkip.dyndns.org
                                                                                                        Jan 8, 2025 07:01:56.962198019 CET273INHTTP/1.1 200 OK
                                                                                                        Date: Wed, 08 Jan 2025 06:01:56 GMT
                                                                                                        Content-Type: text/html
                                                                                                        Content-Length: 104
                                                                                                        Connection: keep-alive
                                                                                                        Cache-Control: no-cache
                                                                                                        Pragma: no-cache
                                                                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                        0192.168.2.449733188.114.97.34432336C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe
                                                                                                        TimestampBytes transferredDirectionData
                                                                                                        2025-01-08 06:01:57 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                        Host: reallyfreegeoip.org
                                                                                                        Connection: Keep-Alive
                                                                                                        2025-01-08 06:01:57 UTC855INHTTP/1.1 200 OK
                                                                                                        Date: Wed, 08 Jan 2025 06:01:57 GMT
                                                                                                        Content-Type: text/xml
                                                                                                        Content-Length: 362
                                                                                                        Connection: close
                                                                                                        Age: 1630906
                                                                                                        Cache-Control: max-age=31536000
                                                                                                        cf-cache-status: HIT
                                                                                                        last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=57sgIlIKN8IyLxNm%2FLkG9A29Aa2fcGBxwacS5qKuz9k9mUfuQSJUkAkPOpVZCJDP4AVz%2B5z7Y1WqK4b6XnJkxElZg5JxPwGop5VMcrz%2Bb3jyRiUR79Ttwk1r8AFQfGaN9W9T04JT"}],"group":"cf-nel","max_age":604800}
                                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                        Server: cloudflare
                                                                                                        CF-RAY: 8fe9f9d73830c32d-EWR
                                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1656&min_rtt=1650&rtt_var=631&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1718658&cwnd=252&unsent_bytes=0&cid=a2f16f20ea6d360b&ts=181&x=0"
                                                                                                        2025-01-08 06:01:57 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                        Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                        Click to jump to process

                                                                                                        Click to jump to process

                                                                                                        Click to dive into process behavior distribution

                                                                                                        Click to jump to process

                                                                                                        Target ID:0
                                                                                                        Start time:01:01:53
                                                                                                        Start date:08/01/2025
                                                                                                        Path:C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:"C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe"
                                                                                                        Imagebase:0x800000
                                                                                                        File size:210'944 bytes
                                                                                                        MD5 hash:44AE6D35F0098112E87243779C924551
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Yara matches:
                                                                                                        • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000000.00000002.1655987843.0000000003B79000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1655987843.0000000003B79000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.1655987843.0000000003B79000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1655987843.0000000003B79000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                        Reputation:low
                                                                                                        Has exited:true

                                                                                                        Target ID:2
                                                                                                        Start time:01:01:54
                                                                                                        Start date:08/01/2025
                                                                                                        Path:C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe
                                                                                                        Wow64 process (32bit):true
                                                                                                        Commandline:"C:\Users\user\Desktop\Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exe"
                                                                                                        Imagebase:0x2f0000
                                                                                                        File size:210'944 bytes
                                                                                                        MD5 hash:44AE6D35F0098112E87243779C924551
                                                                                                        Has elevated privileges:true
                                                                                                        Has administrator privileges:true
                                                                                                        Programmed in:C, C++ or other language
                                                                                                        Yara matches:
                                                                                                        • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000002.00000002.2886767429.0000000000702000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2886767429.0000000000702000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000002.2886767429.0000000000702000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.2886767429.0000000000702000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2888480424.0000000002704000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                        Reputation:low
                                                                                                        Has exited:false

                                                                                                        Reset < >

                                                                                                          Execution Graph

                                                                                                          Execution Coverage:9.9%
                                                                                                          Dynamic/Decrypted Code Coverage:100%
                                                                                                          Signature Coverage:2.4%
                                                                                                          Total number of Nodes:126
                                                                                                          Total number of Limit Nodes:11
                                                                                                          execution_graph 17329 e8d788 DuplicateHandle 17330 e8d81e 17329->17330 17331 e84668 17332 e8467a 17331->17332 17333 e84686 17332->17333 17337 e84778 17332->17337 17342 e83e1c 17333->17342 17335 e846a5 17338 e8479d 17337->17338 17346 e84888 17338->17346 17350 e84878 17338->17350 17343 e83e27 17342->17343 17358 e85cec 17343->17358 17345 e872f8 17345->17335 17348 e848af 17346->17348 17347 e8498c 17347->17347 17348->17347 17354 e8449c 17348->17354 17352 e848af 17350->17352 17351 e8498c 17351->17351 17352->17351 17353 e8449c CreateActCtxA 17352->17353 17353->17351 17355 e85918 CreateActCtxA 17354->17355 17357 e859db 17355->17357 17359 e85cf7 17358->17359 17362 e85d0c 17359->17362 17361 e8739d 17361->17345 17363 e85d17 17362->17363 17366 e85d3c 17363->17366 17365 e8747a 17365->17361 17367 e85d47 17366->17367 17370 e85d6c 17367->17370 17369 e8756d 17369->17365 17372 e85d77 17370->17372 17371 e88b09 17371->17369 17372->17371 17374 e8ce60 17372->17374 17375 e8ce91 17374->17375 17376 e8ceb5 17375->17376 17379 e8d428 17375->17379 17383 e8d418 17375->17383 17376->17371 17380 e8d435 17379->17380 17382 e8d46f 17380->17382 17387 e8d230 17380->17387 17382->17376 17384 e8d435 17383->17384 17385 e8d46f 17384->17385 17386 e8d230 2 API calls 17384->17386 17385->17376 17386->17385 17388 e8d23b 17387->17388 17390 e8dd80 17388->17390 17391 e8d35c 17388->17391 17390->17390 17392 e8d367 17391->17392 17393 e85d6c 2 API calls 17392->17393 17394 e8ddef 17393->17394 17395 e8ddfe 17394->17395 17398 e8e270 17394->17398 17402 e8e239 17394->17402 17395->17390 17399 e8e29e 17398->17399 17400 e8e36a KiUserCallbackDispatcher 17399->17400 17401 e8e36f 17399->17401 17400->17401 17404 e8e23e 17402->17404 17403 e8e36f 17404->17403 17405 e8e36a KiUserCallbackDispatcher 17404->17405 17405->17403 17454 8d70d80 17456 8d70da8 17454->17456 17457 8d70dd4 17454->17457 17455 8d70db1 17456->17455 17460 8d710b0 17456->17460 17465 8d710a0 17456->17465 17461 8d710bb 17460->17461 17462 8d710cb 17461->17462 17470 8d71501 OleInitialize 17461->17470 17472 8d71508 OleInitialize 17461->17472 17462->17457 17466 8d710b0 17465->17466 17467 8d710cb 17466->17467 17468 8d71501 OleInitialize 17466->17468 17469 8d71508 OleInitialize 17466->17469 17467->17457 17468->17467 17469->17467 17471 8d7156c 17470->17471 17471->17462 17473 8d7156c 17472->17473 17473->17462 17474 8d721a0 17475 8d721e4 17474->17475 17476 8d721ee EnumThreadWindows 17474->17476 17475->17476 17477 8d72220 17476->17477 17406 e86fa0 17407 e86fb7 17406->17407 17411 e872be 17407->17411 17415 e8713f 17407->17415 17408 e86fd4 17413 e87267 17411->17413 17412 e85cec 2 API calls 17414 e872f8 17412->17414 17413->17411 17413->17412 17414->17408 17416 e87177 17415->17416 17417 e85cec 2 API calls 17416->17417 17418 e872f8 17417->17418 17418->17408 17419 e8d540 17420 e8d586 GetCurrentProcess 17419->17420 17422 e8d5d8 GetCurrentThread 17420->17422 17423 e8d5d1 17420->17423 17424 e8d60e 17422->17424 17425 e8d615 GetCurrentProcess 17422->17425 17423->17422 17424->17425 17426 e8d64b 17425->17426 17427 e8d673 GetCurrentThreadId 17426->17427 17428 e8d6a4 17427->17428 17478 e8b1b0 17481 e8b2ad 17478->17481 17479 e8b1bf 17482 e8b2b9 17481->17482 17483 e8b2dc 17481->17483 17482->17483 17484 e8b4e0 GetModuleHandleW 17482->17484 17483->17479 17485 e8b50d 17484->17485 17485->17479 17429 8d717d9 17430 8d71809 17429->17430 17431 8d71894 17430->17431 17434 8d71fc0 17430->17434 17440 8d71fb0 17430->17440 17435 8d71fdf 17434->17435 17446 8d720a1 17435->17446 17436 8d72013 17450 8d711d0 17436->17450 17438 8d72022 17438->17431 17441 8d71fdf 17440->17441 17445 8d720a1 GetCurrentThreadId 17441->17445 17442 8d72013 17443 8d711d0 GetCurrentThreadId 17442->17443 17444 8d72022 17443->17444 17444->17431 17445->17442 17447 8d720ff GetCurrentThreadId 17446->17447 17449 8d72145 17447->17449 17449->17436 17451 8d711db 17450->17451 17452 8d724cc GetCurrentThreadId 17451->17452 17453 8d724f7 17451->17453 17452->17453 17453->17438
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1658735961.0000000008D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D70000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_8d70000_Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 08a2eea68b4d3e611871aacc26663f0afb9fced5afd1cc76ef96e9cc135e481e
                                                                                                          • Instruction ID: c8ecbb6f933ccdc3d232c9645d4985217f22059d7e0ecb1d9de90e6cc42d0325
                                                                                                          • Opcode Fuzzy Hash: 08a2eea68b4d3e611871aacc26663f0afb9fced5afd1cc76ef96e9cc135e481e
                                                                                                          • Instruction Fuzzy Hash: D4D11930A00219CFDF14DFA9C948BADBBF1BF44355F158658E809AF2A5EB70E945CB84

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 263 e8d530-e8d538 264 e8d53a-e8d5cf GetCurrentProcess 263->264 265 e8d4f7-e8d52f 263->265 272 e8d5d8-e8d60c GetCurrentThread 264->272 273 e8d5d1-e8d5d7 264->273 275 e8d60e-e8d614 272->275 276 e8d615-e8d649 GetCurrentProcess 272->276 273->272 275->276 278 e8d64b-e8d651 276->278 279 e8d652-e8d66d call e8d710 276->279 278->279 282 e8d673-e8d6a2 GetCurrentThreadId 279->282 283 e8d6ab-e8d70d 282->283 284 e8d6a4-e8d6aa 282->284 284->283
                                                                                                          APIs
                                                                                                          • GetCurrentProcess.KERNEL32 ref: 00E8D5BE
                                                                                                          • GetCurrentThread.KERNEL32 ref: 00E8D5FB
                                                                                                          • GetCurrentProcess.KERNEL32 ref: 00E8D638
                                                                                                          • GetCurrentThreadId.KERNEL32 ref: 00E8D691
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1655092736.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_e80000_Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Current$ProcessThread
                                                                                                          • String ID: 4'^q
                                                                                                          • API String ID: 2063062207-1614139903
                                                                                                          • Opcode ID: 1ead02096a231b116d2667796587c8fb715ae17b271b561aa0bb7a799fcfcf67
                                                                                                          • Instruction ID: e71214463b2f2f76e995835bbd9159ad9e1d0d750827291e76d437b75a899b86
                                                                                                          • Opcode Fuzzy Hash: 1ead02096a231b116d2667796587c8fb715ae17b271b561aa0bb7a799fcfcf67
                                                                                                          • Instruction Fuzzy Hash: 926147B0900349CFCB14DFA9D948BDEBFF1EF89318F248459D409AB2A0DB749985CB65

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 291 e8d540-e8d5cf GetCurrentProcess 295 e8d5d8-e8d60c GetCurrentThread 291->295 296 e8d5d1-e8d5d7 291->296 297 e8d60e-e8d614 295->297 298 e8d615-e8d649 GetCurrentProcess 295->298 296->295 297->298 300 e8d64b-e8d651 298->300 301 e8d652-e8d66d call e8d710 298->301 300->301 304 e8d673-e8d6a2 GetCurrentThreadId 301->304 305 e8d6ab-e8d70d 304->305 306 e8d6a4-e8d6aa 304->306 306->305
                                                                                                          APIs
                                                                                                          • GetCurrentProcess.KERNEL32 ref: 00E8D5BE
                                                                                                          • GetCurrentThread.KERNEL32 ref: 00E8D5FB
                                                                                                          • GetCurrentProcess.KERNEL32 ref: 00E8D638
                                                                                                          • GetCurrentThreadId.KERNEL32 ref: 00E8D691
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1655092736.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_e80000_Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Current$ProcessThread
                                                                                                          • String ID:
                                                                                                          • API String ID: 2063062207-0
                                                                                                          • Opcode ID: 584d114075522e74116f2755e5627ab59aa85eb36923bec91b5888f99bfd7c7e
                                                                                                          • Instruction ID: 87cec6baac8d7336fb6cf11c696b6105984be54a4b1ff65f1c25415ec7901c93
                                                                                                          • Opcode Fuzzy Hash: 584d114075522e74116f2755e5627ab59aa85eb36923bec91b5888f99bfd7c7e
                                                                                                          • Instruction Fuzzy Hash: A15126B0900359CFDB14DFA9D548BDEBBF1AF88314F208469E419B72A0DB749984CF65

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 313 e8b2ad-e8b2b7 314 e8b2b9-e8b2c6 call e8af38 313->314 315 e8b2e3-e8b2e7 313->315 322 e8b2c8 314->322 323 e8b2dc 314->323 316 e8b2e9-e8b2f3 315->316 317 e8b2fb-e8b33c 315->317 316->317 324 e8b349-e8b357 317->324 325 e8b33e-e8b346 317->325 368 e8b2ce call e8b540 322->368 369 e8b2ce call e8b533 322->369 323->315 327 e8b359-e8b35e 324->327 328 e8b37b-e8b37d 324->328 325->324 326 e8b2d4-e8b2d6 326->323 329 e8b418-e8b4d8 326->329 331 e8b369 327->331 332 e8b360-e8b367 call e8af44 327->332 330 e8b380-e8b387 328->330 363 e8b4da-e8b4dd 329->363 364 e8b4e0-e8b50b GetModuleHandleW 329->364 334 e8b389-e8b391 330->334 335 e8b394-e8b39b 330->335 333 e8b36b-e8b379 331->333 332->333 333->330 334->335 337 e8b3a8-e8b3b1 call e8af54 335->337 338 e8b39d-e8b3a5 335->338 344 e8b3be-e8b3c3 337->344 345 e8b3b3-e8b3bb 337->345 338->337 346 e8b3e1-e8b3ee 344->346 347 e8b3c5-e8b3cc 344->347 345->344 353 e8b3f0-e8b40e 346->353 354 e8b411-e8b417 346->354 347->346 349 e8b3ce-e8b3de call e8af64 call e8af74 347->349 349->346 353->354 363->364 365 e8b50d-e8b513 364->365 366 e8b514-e8b528 364->366 365->366 368->326 369->326
                                                                                                          APIs
                                                                                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 00E8B4FE
                                                                                                          Strings
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1655092736.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_e80000_Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: HandleModule
                                                                                                          • String ID: DP$DP
                                                                                                          • API String ID: 4139908857-2441717064
                                                                                                          • Opcode ID: bd33626e3e79e10bdc4feb9976e93581cfc955828f5e407226fa68b5a910c1eb
                                                                                                          • Instruction ID: d1b262a881481a11aa1d58b3d1b65f4b44f4b3f002b54b35bb8e59f5acf090d5
                                                                                                          • Opcode Fuzzy Hash: bd33626e3e79e10bdc4feb9976e93581cfc955828f5e407226fa68b5a910c1eb
                                                                                                          • Instruction Fuzzy Hash: 9D712470A00B058FD724EF29D14179ABBF1BF88304F109A2ED09AEBB50D775E949CB91

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 488 e8590c-e859d9 CreateActCtxA 490 e859db-e859e1 488->490 491 e859e2-e85a3c 488->491 490->491 498 e85a4b-e85a4f 491->498 499 e85a3e-e85a41 491->499 500 e85a60 498->500 501 e85a51-e85a5d 498->501 499->498 503 e85a61 500->503 501->500 503->503
                                                                                                          APIs
                                                                                                          • CreateActCtxA.KERNEL32(?), ref: 00E859C9
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1655092736.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_e80000_Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Create
                                                                                                          • String ID:
                                                                                                          • API String ID: 2289755597-0
                                                                                                          • Opcode ID: 057c04f08037f729706f433a86108a462bb71ec14753cb03e4bb5909d2330497
                                                                                                          • Instruction ID: 5d40f28ea96e5ff4e5404af15303a5a86b1de2788f3763275bd0a6242e07a809
                                                                                                          • Opcode Fuzzy Hash: 057c04f08037f729706f433a86108a462bb71ec14753cb03e4bb5909d2330497
                                                                                                          • Instruction Fuzzy Hash: EF41F4B1C00619CFDB24DFA9C8847DEBBB5BF49304F24819AD408AB255DB75594ACF90

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 504 e8449c-e859d9 CreateActCtxA 507 e859db-e859e1 504->507 508 e859e2-e85a3c 504->508 507->508 515 e85a4b-e85a4f 508->515 516 e85a3e-e85a41 508->516 517 e85a60 515->517 518 e85a51-e85a5d 515->518 516->515 520 e85a61 517->520 518->517 520->520
                                                                                                          APIs
                                                                                                          • CreateActCtxA.KERNEL32(?), ref: 00E859C9
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1655092736.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_e80000_Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Create
                                                                                                          • String ID:
                                                                                                          • API String ID: 2289755597-0
                                                                                                          • Opcode ID: bd39efcaa83c0faf2554292d8e8d85fc094a87cd7e73f311e5a06599fb4d18d3
                                                                                                          • Instruction ID: e584bcef33877b281c4eaace4771af0322190b15404ebfc8bbdf449f96a9cbb1
                                                                                                          • Opcode Fuzzy Hash: bd39efcaa83c0faf2554292d8e8d85fc094a87cd7e73f311e5a06599fb4d18d3
                                                                                                          • Instruction Fuzzy Hash: 1141DFB1C00629CFDB24DFA9C884B9EBBB5BF48304F2481AAD418AB255DB756945CF90

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 521 8d720a1-8d72143 GetCurrentThreadId 525 8d72145-8d7214b 521->525 526 8d7214c-8d7217b call 8d71224 521->526 525->526 530 8d72180-8d7218d 526->530
                                                                                                          APIs
                                                                                                          • GetCurrentThreadId.KERNEL32 ref: 08D72132
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1658735961.0000000008D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D70000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_8d70000_Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: CurrentThread
                                                                                                          • String ID:
                                                                                                          • API String ID: 2882836952-0
                                                                                                          • Opcode ID: 44776f16609b3c6996d07879e3fba7a99ebf5ea7db06785247333ed356b8ca57
                                                                                                          • Instruction ID: 7a5c57b5917494b2bfb67e98ffab4aafe348deecd1a371851a8492d515a895a9
                                                                                                          • Opcode Fuzzy Hash: 44776f16609b3c6996d07879e3fba7a99ebf5ea7db06785247333ed356b8ca57
                                                                                                          • Instruction Fuzzy Hash: F13145B490428A8FCB01DFA9D880A9EFFF0FB49314F148659D455AB362D374A984CFA1

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 531 e8d780-e8d786 532 e8d788-e8d81c DuplicateHandle 531->532 533 e8d81e-e8d824 532->533 534 e8d825-e8d842 532->534 533->534
                                                                                                          APIs
                                                                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00E8D80F
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1655092736.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_e80000_Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: DuplicateHandle
                                                                                                          • String ID:
                                                                                                          • API String ID: 3793708945-0
                                                                                                          • Opcode ID: d19b97187f4b23d6bdd417737ecd7c61d9aa41cf0a7563979b8a14979827130d
                                                                                                          • Instruction ID: 545f6d11ed97d8918ca4f61382ab8c3a1fdba72fef865d99e7fcd889ab3c3a4f
                                                                                                          • Opcode Fuzzy Hash: d19b97187f4b23d6bdd417737ecd7c61d9aa41cf0a7563979b8a14979827130d
                                                                                                          • Instruction Fuzzy Hash: FB21E3B5900258AFDB10CFAAD984ADEBFF4EB48324F14801AE958A3350D374A944CFA5

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 537 e8d788-e8d81c DuplicateHandle 538 e8d81e-e8d824 537->538 539 e8d825-e8d842 537->539 538->539
                                                                                                          APIs
                                                                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00E8D80F
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1655092736.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_e80000_Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: DuplicateHandle
                                                                                                          • String ID:
                                                                                                          • API String ID: 3793708945-0
                                                                                                          • Opcode ID: 013c878b7c6f646bdec8d4636b553e90f3f20498d71dd647caafde929167eada
                                                                                                          • Instruction ID: a05d505d8a3b06c15ccca77a4836593b29c780b8bc02f16c2bf271885bdad440
                                                                                                          • Opcode Fuzzy Hash: 013c878b7c6f646bdec8d4636b553e90f3f20498d71dd647caafde929167eada
                                                                                                          • Instruction Fuzzy Hash: C321C4B5900258DFDB10CF9AD984ADEBFF4FB48320F14841AE958A7350D374A944CFA5

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 542 8d72198-8d721e2 543 8d721e4-8d721ec 542->543 544 8d721ee-8d7221e EnumThreadWindows 542->544 543->544 545 8d72227-8d72254 544->545 546 8d72220-8d72226 544->546 546->545
                                                                                                          APIs
                                                                                                          • EnumThreadWindows.USER32(?,00000000,?), ref: 08D72211
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1658735961.0000000008D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D70000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_8d70000_Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: EnumThreadWindows
                                                                                                          • String ID:
                                                                                                          • API String ID: 2941952884-0
                                                                                                          • Opcode ID: 24491aa871c5e19965f54a36f59fdccd8934136ab2699f6499f802a548b1fc52
                                                                                                          • Instruction ID: 5b802aba6d3fdcd5d64862cf52d44df681945709181e407e35440b5c2e6beb55
                                                                                                          • Opcode Fuzzy Hash: 24491aa871c5e19965f54a36f59fdccd8934136ab2699f6499f802a548b1fc52
                                                                                                          • Instruction Fuzzy Hash: 772177B1D042498FDB14CFAAC884BEEFBF4EB88320F14842ED459A7250D774A944CFA5
                                                                                                          APIs
                                                                                                          • EnumThreadWindows.USER32(?,00000000,?), ref: 08D72211
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1658735961.0000000008D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D70000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_8d70000_Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: EnumThreadWindows
                                                                                                          • String ID:
                                                                                                          • API String ID: 2941952884-0
                                                                                                          • Opcode ID: 5d985f5dfcb25b814cf040fa071d4735b219e586473b5b3e1dc8a91fb0d29d3e
                                                                                                          • Instruction ID: 251acbbf3b3ec3ae69392fed778554adf8ebdeca3ecd6d2b5755d162bd36f08d
                                                                                                          • Opcode Fuzzy Hash: 5d985f5dfcb25b814cf040fa071d4735b219e586473b5b3e1dc8a91fb0d29d3e
                                                                                                          • Instruction Fuzzy Hash: F92124B1D002598FDB14CF9AC844BEEFBF5EB88320F14842AD469A7250D778A944CFA5
                                                                                                          APIs
                                                                                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 00E8B4FE
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1655092736.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_e80000_Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: HandleModule
                                                                                                          • String ID:
                                                                                                          • API String ID: 4139908857-0
                                                                                                          • Opcode ID: e9703eb83e4403c39c01f4664f0a69afc20d35abe0c845e19473a1c2c7e4bbeb
                                                                                                          • Instruction ID: 790fe060d74141516df23f2a3ba7f382c11ae774781ea67ec89b3005b5201ffa
                                                                                                          • Opcode Fuzzy Hash: e9703eb83e4403c39c01f4664f0a69afc20d35abe0c845e19473a1c2c7e4bbeb
                                                                                                          • Instruction Fuzzy Hash: AD111DB6C00249CFCB20DF9AC444ADEFBF5AB88324F10842AD828B7210D379A545CFA5
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1658735961.0000000008D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D70000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_8d70000_Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Initialize
                                                                                                          • String ID:
                                                                                                          • API String ID: 2538663250-0
                                                                                                          • Opcode ID: 74002f2e05bdb93571661b90627c53f2acf2208181e4c57ce632068ab2e213d7
                                                                                                          • Instruction ID: e4ba64330464ac9f49f2b2cdae423d7d638d8505f631e89d55fd5f3acf161151
                                                                                                          • Opcode Fuzzy Hash: 74002f2e05bdb93571661b90627c53f2acf2208181e4c57ce632068ab2e213d7
                                                                                                          • Instruction Fuzzy Hash: B31112B5C003988FCB20DFAAD589BDEBFF4AB48320F20865AD559A7310D374A544CFA5
                                                                                                          APIs
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1658735961.0000000008D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 08D70000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_8d70000_Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: Initialize
                                                                                                          • String ID:
                                                                                                          • API String ID: 2538663250-0
                                                                                                          • Opcode ID: 9c8f67af8328fa00f5056c79dd72c39e6f249d2f0103acd4862dc0918b23ff3c
                                                                                                          • Instruction ID: 1f1e47ad6f31b9f89d8fa43e35527994446adf6ed21bd4742dc62ef979637ff3
                                                                                                          • Opcode Fuzzy Hash: 9c8f67af8328fa00f5056c79dd72c39e6f249d2f0103acd4862dc0918b23ff3c
                                                                                                          • Instruction Fuzzy Hash: A61112B18002488FCB20DF9AD485BCEBFF4EB48320F20851AD519A7210D374A544CFA5
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1654134480.0000000000E2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E2D000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_e2d000_Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 95b6374c5b3e5cd115ad8d8782c676e9c1df5fa4de72f1be825bc38700794707
                                                                                                          • Instruction ID: 24b2c083d211d7abde600eca00d1e45c3a2050c3cc74c29e84b76a2918090e5e
                                                                                                          • Opcode Fuzzy Hash: 95b6374c5b3e5cd115ad8d8782c676e9c1df5fa4de72f1be825bc38700794707
                                                                                                          • Instruction Fuzzy Hash: F021F271608240DFCB14DF14E984F26BBA6FB84318F20C569DA4A5B2A6C73AD847CA61
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1654134480.0000000000E2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E2D000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_e2d000_Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 6ff682a803a7488462a23ccb078c11669c551e4dde1408fb3783de7c9ee1e240
                                                                                                          • Instruction ID: 6359a3df6455733672b159d9a28e59271b7bc572e752a752dcb2e9bf15a584b1
                                                                                                          • Opcode Fuzzy Hash: 6ff682a803a7488462a23ccb078c11669c551e4dde1408fb3783de7c9ee1e240
                                                                                                          • Instruction Fuzzy Hash: 7021537550D3808FD712CF24D994B15BF72EB46314F28C5DAD9498F6A7C33A980ACB62
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000000.00000002.1655092736.0000000000E80000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E80000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_0_2_e80000_Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 7d427f474e7b223aa0d32d94337c7bd2bc36f516df5f113aeb495b930917354d
                                                                                                          • Instruction ID: f4ae42bfa87b58b796894eab0e14c22d1f64a599725eccdac6db0a15fb04bf14
                                                                                                          • Opcode Fuzzy Hash: 7d427f474e7b223aa0d32d94337c7bd2bc36f516df5f113aeb495b930917354d
                                                                                                          • Instruction Fuzzy Hash: D1A17E32E002158FCF05EFB5C84459EBBB2FF89304B15557AE809BB265DB31E945CB90

                                                                                                          Execution Graph

                                                                                                          Execution Coverage:15.8%
                                                                                                          Dynamic/Decrypted Code Coverage:100%
                                                                                                          Signature Coverage:35.3%
                                                                                                          Total number of Nodes:34
                                                                                                          Total number of Limit Nodes:3
                                                                                                          execution_graph 12646 d046d8 12647 d046e4 12646->12647 12650 d07d1c 12647->12650 12651 d07d2c 12650->12651 12655 d07f37 12651->12655 12662 d07f48 12651->12662 12652 d04713 12656 d07f6a 12655->12656 12657 d08036 12656->12657 12669 d0ef08 12656->12669 12673 d0f50c 12656->12673 12679 d0eef9 12656->12679 12685 d0f128 12656->12685 12657->12652 12663 d07f6a 12662->12663 12664 d08036 12663->12664 12665 d0ef08 LdrInitializeThunk 12663->12665 12666 d0f128 2 API calls 12663->12666 12667 d0eef9 2 API calls 12663->12667 12668 d0f50c 2 API calls 12663->12668 12664->12652 12665->12664 12666->12664 12667->12664 12668->12664 12670 d0ef1a 12669->12670 12671 d0ef1f 12669->12671 12670->12657 12671->12670 12672 d0f649 LdrInitializeThunk 12671->12672 12672->12670 12678 d0f3c3 12673->12678 12674 d0f504 LdrInitializeThunk 12676 d0f661 12674->12676 12676->12657 12677 d0ef08 LdrInitializeThunk 12677->12678 12678->12674 12678->12677 12680 d0ef1a 12679->12680 12681 d0ef1f 12679->12681 12680->12657 12681->12680 12682 d0f504 LdrInitializeThunk 12681->12682 12684 d0ef08 LdrInitializeThunk 12681->12684 12682->12680 12684->12681 12687 d0f159 12685->12687 12686 d0f2b9 12686->12657 12687->12686 12688 d0f504 LdrInitializeThunk 12687->12688 12690 d0ef08 LdrInitializeThunk 12687->12690 12688->12686 12690->12687

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1143 d0f128-d0f157 1144 d0f159 1143->1144 1145 d0f15e-d0f1f4 call d08e48 1143->1145 1144->1145 1148 d0f293-d0f299 1145->1148 1149 d0f1f9-d0f20c 1148->1149 1150 d0f29f-d0f2b7 1148->1150 1151 d0f213-d0f264 1149->1151 1152 d0f20e 1149->1152 1153 d0f2b9-d0f2c6 1150->1153 1154 d0f2cb-d0f2de 1150->1154 1172 d0f266-d0f274 1151->1172 1173 d0f277-d0f289 1151->1173 1152->1151 1157 d0f661-d0f75f 1153->1157 1155 d0f2e0 1154->1155 1156 d0f2e5-d0f301 1154->1156 1155->1156 1160 d0f303 1156->1160 1161 d0f308-d0f32c 1156->1161 1162 d0f761-d0f766 call d08e48 1157->1162 1163 d0f767-d0f771 1157->1163 1160->1161 1167 d0f333-d0f365 1161->1167 1168 d0f32e 1161->1168 1162->1163 1177 d0f367 1167->1177 1178 d0f36c-d0f3ae 1167->1178 1168->1167 1172->1150 1174 d0f290 1173->1174 1175 d0f28b 1173->1175 1174->1148 1175->1174 1177->1178 1180 d0f3b0 1178->1180 1181 d0f3b5-d0f3be 1178->1181 1180->1181 1182 d0f5e6-d0f5ec 1181->1182 1183 d0f5f2-d0f605 1182->1183 1184 d0f3c3-d0f3e8 1182->1184 1187 d0f607 1183->1187 1188 d0f60c-d0f627 1183->1188 1185 d0f3ea 1184->1185 1186 d0f3ef-d0f426 1184->1186 1185->1186 1196 d0f428 1186->1196 1197 d0f42d-d0f45f 1186->1197 1187->1188 1189 d0f629 1188->1189 1190 d0f62e-d0f642 1188->1190 1189->1190 1194 d0f644 1190->1194 1195 d0f649-d0f65f LdrInitializeThunk 1190->1195 1194->1195 1195->1157 1196->1197 1199 d0f461-d0f486 1197->1199 1200 d0f4c3-d0f4d6 1197->1200 1203 d0f488 1199->1203 1204 d0f48d-d0f4bb 1199->1204 1201 d0f4d8 1200->1201 1202 d0f4dd-d0f502 1200->1202 1201->1202 1207 d0f511-d0f549 1202->1207 1208 d0f504-d0f505 1202->1208 1203->1204 1204->1200 1209 d0f550-d0f5b1 call d0ef08 1207->1209 1210 d0f54b 1207->1210 1208->1183 1216 d0f5b3 1209->1216 1217 d0f5b8-d0f5dc 1209->1217 1210->1209 1216->1217 1220 d0f5e3 1217->1220 1221 d0f5de 1217->1221 1220->1182 1221->1220
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.2888006941.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_d00000_Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 4a1e2870180d9107a224884db238f063f80a22595187efc0adacfae36f7c37e0
                                                                                                          • Instruction ID: 73e259740cb1e34d7d1dfa8bfcc87fbf29e62d2cad3842e24f3d30e37a0ef1b4
                                                                                                          • Opcode Fuzzy Hash: 4a1e2870180d9107a224884db238f063f80a22595187efc0adacfae36f7c37e0
                                                                                                          • Instruction Fuzzy Hash: 1EF1E874D01218CFDB24DFA9D884B9DBBB2BF88304F64C1A9E408AB395DB759985CF50
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.2888006941.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_d00000_Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: b2da2a17e5a29132faf55e82c1bce21022ae3e4dfd1c4d7ece612f03442d5e22
                                                                                                          • Instruction ID: 85eae8905cdc8bc572db367de58eb839521c776f2d35630006f87bff38213a15
                                                                                                          • Opcode Fuzzy Hash: b2da2a17e5a29132faf55e82c1bce21022ae3e4dfd1c4d7ece612f03442d5e22
                                                                                                          • Instruction Fuzzy Hash: 26C18074E01218CFDB54DFA5D994B9DBBB2FB88300F1084AAD809AB364DB359E85DF50
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.2888006941.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_d00000_Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: baa2a2e4736c6aab92ad3b9a28ab88b600210b5c0992c91bd512d865dd892a1d
                                                                                                          • Instruction ID: 92bf73fdd091a72bf62fe891f83b1d92f34b9e87d8e64c6d72068895fe25fa4e
                                                                                                          • Opcode Fuzzy Hash: baa2a2e4736c6aab92ad3b9a28ab88b600210b5c0992c91bd512d865dd892a1d
                                                                                                          • Instruction Fuzzy Hash: 67A10570D00208CFDB14DFA9D584BDDBBB1FF89304F249269E449AB2A1DB749985CF64
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.2888006941.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_d00000_Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: cbd30d7aa3a964ec2131ebdcaf01fdb81cb32fdce3f97c4bed172d9cf74f95b5
                                                                                                          • Instruction ID: 85c3ed480b8cb1e3f3f600bbb504b4e8d01f0abf985b5f71dc74b5d9c94a07b2
                                                                                                          • Opcode Fuzzy Hash: cbd30d7aa3a964ec2131ebdcaf01fdb81cb32fdce3f97c4bed172d9cf74f95b5
                                                                                                          • Instruction Fuzzy Hash: BCA10570D00208CFDB14DFA9D988BDDBBB1FF88314F249269E448A72A1DB745985CF64
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.2888006941.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_d00000_Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: dcbe2b2facae9bee293f7cb2084a82b23898ec2a1adc53ed1680442f5828a0e4
                                                                                                          • Instruction ID: a70d39568bd52478d3b461a80346979cbf023d0e7d4db2220fa3f63ce2db8590
                                                                                                          • Opcode Fuzzy Hash: dcbe2b2facae9bee293f7cb2084a82b23898ec2a1adc53ed1680442f5828a0e4
                                                                                                          • Instruction Fuzzy Hash: AA910470D00208CFDB14DFA8D988BDDBBB1FF49310F249269E449AB2A1DB749985CF65

                                                                                                          Control-flow Graph

                                                                                                          • Executed
                                                                                                          • Not Executed
                                                                                                          control_flow_graph 1222 d0f50c 1223 d0f5cb-d0f5dc 1222->1223 1224 d0f5e3-d0f5ec 1223->1224 1225 d0f5de 1223->1225 1227 d0f5f2-d0f605 1224->1227 1228 d0f3c3-d0f3e8 1224->1228 1225->1224 1231 d0f607 1227->1231 1232 d0f60c-d0f627 1227->1232 1229 d0f3ea 1228->1229 1230 d0f3ef-d0f426 1228->1230 1229->1230 1240 d0f428 1230->1240 1241 d0f42d-d0f45f 1230->1241 1231->1232 1233 d0f629 1232->1233 1234 d0f62e-d0f642 1232->1234 1233->1234 1238 d0f644 1234->1238 1239 d0f649-d0f65f LdrInitializeThunk 1234->1239 1238->1239 1242 d0f661-d0f75f 1239->1242 1240->1241 1248 d0f461-d0f486 1241->1248 1249 d0f4c3-d0f4d6 1241->1249 1244 d0f761-d0f766 call d08e48 1242->1244 1245 d0f767-d0f771 1242->1245 1244->1245 1253 d0f488 1248->1253 1254 d0f48d-d0f4bb 1248->1254 1251 d0f4d8 1249->1251 1252 d0f4dd-d0f502 1249->1252 1251->1252 1257 d0f511-d0f549 1252->1257 1258 d0f504-d0f505 1252->1258 1253->1254 1254->1249 1259 d0f550-d0f5b1 call d0ef08 1257->1259 1260 d0f54b 1257->1260 1258->1227 1266 d0f5b3 1259->1266 1267 d0f5b8-d0f5ca 1259->1267 1260->1259 1266->1267 1267->1223
                                                                                                          APIs
                                                                                                          • LdrInitializeThunk.NTDLL(00000000), ref: 00D0F64E
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.2888006941.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_d00000_Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID: InitializeThunk
                                                                                                          • String ID:
                                                                                                          • API String ID: 2994545307-0
                                                                                                          • Opcode ID: 53b618b9e57425c55c0ed7255f66251f170ae9afdf9b98bdca48320c0ba8272e
                                                                                                          • Instruction ID: fc6169bea0f8e1d4c7a72389750804ef1d4f4ee1df5c5ad2e7d6cc2072d1602f
                                                                                                          • Opcode Fuzzy Hash: 53b618b9e57425c55c0ed7255f66251f170ae9afdf9b98bdca48320c0ba8272e
                                                                                                          • Instruction Fuzzy Hash: 10113A74E011099FDB14DFA8D884BADBBB5FB88304F64D565E848E7691DB31E841CF60
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.2887737622.0000000000C2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C2D000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_c2d000_Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 187f89f8082b4488c0bb74b3a8eb633bb3ba493cdc93b5e2cfc74090ba291822
                                                                                                          • Instruction ID: d071416d21810bb7b517af2fa3a4157a4039e8c49b30fed7bb3cfa0eeacbd553
                                                                                                          • Opcode Fuzzy Hash: 187f89f8082b4488c0bb74b3a8eb633bb3ba493cdc93b5e2cfc74090ba291822
                                                                                                          • Instruction Fuzzy Hash: ED316B7550D3C49FCB13CF24D990711BF71AB56214F29C5EBD9898F6A3C23A980ACB62
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.2887737622.0000000000C2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C2D000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_c2d000_Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: b00adf4d40a9a9eba7168cc9a2d69368ee0468c8908b2c856d67ac0e55520045
                                                                                                          • Instruction ID: 824fad50dc00a4b43050713c60cefcce375acc1de49ee878975fd34428a190b1
                                                                                                          • Opcode Fuzzy Hash: b00adf4d40a9a9eba7168cc9a2d69368ee0468c8908b2c856d67ac0e55520045
                                                                                                          • Instruction Fuzzy Hash: 95214671504300DFCB10DF14E9C0B26BBA5FBA4314F30C66DD80A4B6A6C73AD847CA62
                                                                                                          Memory Dump Source
                                                                                                          • Source File: 00000002.00000002.2888006941.0000000000D00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D00000, based on PE: false
                                                                                                          Joe Sandbox IDA Plugin
                                                                                                          • Snapshot File: hcaresult_2_2_d00000_Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.jbxd
                                                                                                          Similarity
                                                                                                          • API ID:
                                                                                                          • String ID:
                                                                                                          • API String ID:
                                                                                                          • Opcode ID: 854db86260415d32726c60824a712080264b5c612c6d393a311244fd571beb0d
                                                                                                          • Instruction ID: 9c926f377002be556d36c4d9475851dd0c9af62f07ed676698b4f2be86a3ef7b
                                                                                                          • Opcode Fuzzy Hash: 854db86260415d32726c60824a712080264b5c612c6d393a311244fd571beb0d
                                                                                                          • Instruction Fuzzy Hash: 0CD1C474E01218CFDB14DFA5D994B9DBBB2EF89300F2484AAD408AB3A5DB359D85CF50