Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MaxPatrol SIEM Agent.exe

Overview

General Information

Sample name:MaxPatrol SIEM Agent.exe
Analysis ID:1448268
MD5:2c016c91181d4182a16845725bf0b315
SHA1:2be016b6b0dd9d57f2985a6ad0df85f5538d9623
SHA256:4d30fd05c3bdac792e0a011892e2cad02818436484e81b6de6a02928149bc92d
Tags:exe
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Detected potential crypto function
PE file contains sections with non-standard names
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)

Classification

  • System is w10x64
  • MaxPatrol SIEM Agent.exe (PID: 6812 cmdline: "C:\Users\user\Desktop\MaxPatrol SIEM Agent.exe" MD5: 2C016C91181D4182A16845725BF0B315)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: MaxPatrol SIEM Agent.exeAvira: detected
Source: MaxPatrol SIEM Agent.exeVirustotal: Detection: 55%Perma Link
Source: MaxPatrol SIEM Agent.exeReversingLabs: Detection: 55%
Source: MaxPatrol SIEM Agent.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: unknownDNS traffic detected: query: mp0.ignorelist.com replaycode: Name error (3)
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: mp0.ignorelist.com
Source: C:\Users\user\Desktop\MaxPatrol SIEM Agent.exeCode function: 0_2_00007FF6A84710000_2_00007FF6A8471000
Source: C:\Users\user\Desktop\MaxPatrol SIEM Agent.exeCode function: 0_2_00007FF6A84720F00_2_00007FF6A84720F0
Source: C:\Users\user\Desktop\MaxPatrol SIEM Agent.exeCode function: 0_2_00007FF6A8471D600_2_00007FF6A8471D60
Source: C:\Users\user\Desktop\MaxPatrol SIEM Agent.exeCode function: 0_2_00007FF6A8471EE00_2_00007FF6A8471EE0
Source: classification engineClassification label: mal56.winEXE@1/0@3/0
Source: MaxPatrol SIEM Agent.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\MaxPatrol SIEM Agent.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: MaxPatrol SIEM Agent.exeVirustotal: Detection: 55%
Source: MaxPatrol SIEM Agent.exeReversingLabs: Detection: 55%
Source: C:\Users\user\Desktop\MaxPatrol SIEM Agent.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\MaxPatrol SIEM Agent.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\MaxPatrol SIEM Agent.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\Desktop\MaxPatrol SIEM Agent.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\Desktop\MaxPatrol SIEM Agent.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\Desktop\MaxPatrol SIEM Agent.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\Desktop\MaxPatrol SIEM Agent.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\MaxPatrol SIEM Agent.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\MaxPatrol SIEM Agent.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\Desktop\MaxPatrol SIEM Agent.exeSection loaded: rasadhlp.dllJump to behavior
Source: MaxPatrol SIEM Agent.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: MaxPatrol SIEM Agent.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
Source: MaxPatrol SIEM Agent.exeStatic PE information: section name: .xdata
Source: MaxPatrol SIEM Agent.exe, 00000000.00000002.2970544707.0000024B5530C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\MaxPatrol SIEM Agent.exeAPI call chain: ExitProcess graph end nodegraph_0-229
Source: C:\Users\user\Desktop\MaxPatrol SIEM Agent.exeAPI call chain: ExitProcess graph end nodegraph_0-217
Source: C:\Users\user\Desktop\MaxPatrol SIEM Agent.exeAPI call chain: ExitProcess graph end nodegraph_0-214
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory1
System Information Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
MaxPatrol SIEM Agent.exe55%VirustotalBrowse
MaxPatrol SIEM Agent.exe55%ReversingLabsWin64.Trojan.Generic
MaxPatrol SIEM Agent.exe100%AviraTR/Agent.ueade
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
mp0.ignorelist.com
unknown
unknownfalse
    unknown
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1448268
    Start date and time:2024-05-28 07:47:06 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 3m 58s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:5
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:MaxPatrol SIEM Agent.exe
    Detection:MAL
    Classification:mal56.winEXE@1/0@3/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 2
    • Number of non-executed functions: 3
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    No simulations
    No context
    No context
    No context
    No context
    No context
    No created / dropped files found
    File type:PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
    Entropy (8bit):3.3478965025071394
    TrID:
    • Win64 Executable (generic) (12005/4) 74.95%
    • Generic Win/DOS Executable (2004/3) 12.51%
    • DOS Executable Generic (2002/1) 12.50%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
    File name:MaxPatrol SIEM Agent.exe
    File size:79'360 bytes
    MD5:2c016c91181d4182a16845725bf0b315
    SHA1:2be016b6b0dd9d57f2985a6ad0df85f5538d9623
    SHA256:4d30fd05c3bdac792e0a011892e2cad02818436484e81b6de6a02928149bc92d
    SHA512:bc2a1b810d1a334470413f103b151f4500f35e1eba4111ee49121bf3ccdb46e99e247a1f9b9a8168344febdeafb76090d6e4b31d7a299e7501f1becf58bef95b
    SSDEEP:768:BRcxV4X32VYyLDU8uoB/qW1cGerHyKvu1YbTgocJ4:B/3aL1cvrHyKvu1g
    TLSH:9D73D683A680817FD5DFF6365802B9A653A63C0DD999330DEBE0B2F9DD35E403A90257
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....n.b...............&.......................@..........................................`... ............................
    Icon Hash:4cf4eb164f4c311f
    Entrypoint:0x140001000
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x140000000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, LARGE_ADDRESS_AWARE, DEBUG_STRIPPED
    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT
    Time Stamp:0x62D06EE0 [Thu Jul 14 19:30:40 2022 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:4
    OS Version Minor:0
    File Version Major:4
    File Version Minor:0
    Subsystem Version Major:4
    Subsystem Version Minor:0
    Import Hash:c780720f489db1bb1bd4cd626443ef53
    Instruction
    inc ecx
    push edi
    inc ecx
    push esi
    inc ecx
    push ebp
    inc ecx
    push esp
    push ebp
    push edi
    push esi
    push ebx
    dec eax
    sub esp, 000007B8h
    dec eax
    lea ebx, dword ptr [esp+00000120h]
    dec eax
    lea edx, dword ptr [esp+000001E8h]
    dec eax
    mov eax, ebx
    nop word ptr [eax+eax+00000000h]
    dec eax
    mov dword ptr [eax], 00000000h
    dec eax
    add eax, 08h
    dec eax
    cmp edx, eax
    jne 00007F6CCCE36852h
    dec esp
    lea esp, dword ptr [esp+000002F0h]
    xor ecx, ecx
    dec eax
    mov eax, 00000000h
    mov byte ptr [eax], al
    add byte ptr [eax], al
    mov dword ptr [esp+000001F0h], 00000020h
    dec esp
    mov edx, esp
    dec eax
    mov dword ptr [esp+000001E8h], eax
    inc ecx
    mov eax, 00000104h
    call dword ptr [00006082h]
    xor edx, edx
    cmp byte ptr [esp+000002F0h], 00000000h
    je 00007F6CCCE36873h
    nop word ptr [eax+eax+00h]
    dec eax
    add edx, 01h
    inc ecx
    cmp byte ptr [esp+edx], 00000000h
    jne 00007F6CCCE36857h
    dec esp
    mov ecx, esp
    call dword ptr [0000608Ch]
    movzx edx, byte ptr [esp+000002F0h]
    test dl, dl
    je 00007F6CCCE37421h
    xor edi, edi
    dec esp
    mov eax, esp
    nop dword ptr [eax+00000000h]
    cmp dl, 0000005Ch
    dec eax
    cmove edi, eax
    movzx edx, byte ptr [eax+01h]
    dec eax
    add eax, 01h
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x70000x298.idata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x80000x10cc0.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x50000x3c.pdata
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x70d80x88.idata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x15f00x1600a51f0bb060cd8981eb629ffe8045f63dFalse0.5983664772727273data5.882662865730422IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .data0x30000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .rdata0x40000x2400x400e9a98db7c201d1c235aa0a9294c115ffFalse0.599609375data5.3666739013771885IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .pdata0x50000x3c0x20064c49f3041758e745b5e0264959652beFalse0.1171875data0.5151570667085339IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .xdata0x60000x600x200b5bedc29d17ee19c76f5933bac39b4deFalse0.177734375data1.408330790784607IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .idata0x70000x2980x4009deaaf603c81764623999dfaececea95False0.3017578125data2.527998666694306IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .rsrc0x80000x10cc00x10e00da11c21ee9149a174a9c2e22a8be86f0False0.08172743055555555data2.8698259815492815IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_ICON0x80e80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 60472 x 60472 px/mEnglishUnited States0.07618596947829173
    RT_GROUP_ICON0x189100x14dataEnglishUnited States1.15
    RT_VERSION0x189280x394OpenPGP Secret KeyEnglishUnited States0.42248908296943233
    DLLImport
    KERNEL32.dllCloseHandle, CreateFileA, ExitProcess, GetFileSize, GetModuleFileNameA, ReadFile, SetCurrentDirectoryA, VirtualAlloc, VirtualProtect
    USER32.dllCharUpperBuffA
    WS2_32.dllWSAStartup, getaddrinfo, select, socket
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    TimestampSource PortDest PortSource IPDest IP
    May 28, 2024 07:48:12.894192934 CEST5235653192.168.2.41.1.1.1
    May 28, 2024 07:48:13.023140907 CEST53523561.1.1.1192.168.2.4
    May 28, 2024 07:49:13.017239094 CEST5298653192.168.2.41.1.1.1
    May 28, 2024 07:49:14.030131102 CEST5298653192.168.2.41.1.1.1
    May 28, 2024 07:49:14.905452967 CEST53529861.1.1.1192.168.2.4
    May 28, 2024 07:49:14.905519009 CEST53529861.1.1.1192.168.2.4
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    May 28, 2024 07:48:12.894192934 CEST192.168.2.41.1.1.10xe977Standard query (0)mp0.ignorelist.comA (IP address)IN (0x0001)false
    May 28, 2024 07:49:13.017239094 CEST192.168.2.41.1.1.10x527fStandard query (0)mp0.ignorelist.comA (IP address)IN (0x0001)false
    May 28, 2024 07:49:14.030131102 CEST192.168.2.41.1.1.10x527fStandard query (0)mp0.ignorelist.comA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    May 28, 2024 07:48:13.023140907 CEST1.1.1.1192.168.2.40xe977Name error (3)mp0.ignorelist.comnonenoneA (IP address)IN (0x0001)false
    May 28, 2024 07:49:14.905452967 CEST1.1.1.1192.168.2.40x527fName error (3)mp0.ignorelist.comnonenoneA (IP address)IN (0x0001)false
    May 28, 2024 07:49:14.905519009 CEST1.1.1.1192.168.2.40x527fName error (3)mp0.ignorelist.comnonenoneA (IP address)IN (0x0001)false

    Click to jump to process

    Click to jump to process

    Target ID:0
    Start time:01:48:02
    Start date:28/05/2024
    Path:C:\Users\user\Desktop\MaxPatrol SIEM Agent.exe
    Wow64 process (32bit):false
    Commandline:"C:\Users\user\Desktop\MaxPatrol SIEM Agent.exe"
    Imagebase:0x7ff6a8470000
    File size:79'360 bytes
    MD5 hash:2C016C91181D4182A16845725BF0B315
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:false

    Reset < >

      Execution Graph

      Execution Coverage:12.8%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:90.3%
      Total number of Nodes:31
      Total number of Limit Nodes:5
      execution_graph 206 7ff6a8471000 207 7ff6a8471030 206->207 207->207 208 7ff6a8471040 GetModuleFileNameA 207->208 209 7ff6a8471082 208->209 210 7ff6a8471093 CharUpperBuffA 208->210 209->210 212 7ff6a84710ac 210->212 231 7ff6a8471a42 210->231 211 7ff6a84715dc 214 7ff6a84715e4 ExitProcess 211->214 212->211 213 7ff6a847117d SetCurrentDirectoryA 212->213 218 7ff6a84710e9 212->218 213->218 215 7ff6a8471154 WSAStartup 216 7ff6a847118b socket 215->216 217 7ff6a8471177 ExitProcess 215->217 237 7ff6a84720a0 select 216->237 218->215 218->231 220 7ff6a847126d getaddrinfo 221 7ff6a84711cf 220->221 221->220 222 7ff6a84720a0 select 221->222 223 7ff6a8471324 221->223 222->221 223->223 224 7ff6a84713b1 CreateFileA 223->224 224->217 225 7ff6a8471403 GetFileSize 224->225 225->214 227 7ff6a847141d VirtualAlloc 225->227 226 7ff6a8471cec VirtualProtect 239 7ff6a84720a0 select 226->239 229 7ff6a8471d4b ExitProcess 227->229 234 7ff6a8471449 227->234 230 7ff6a84715ef CloseHandle 236 7ff6a8471618 230->236 231->226 232 7ff6a8471489 ReadFile 233 7ff6a84714b4 232->233 232->234 233->217 234->230 234->232 238 7ff6a84720a0 select 234->238 236->226 236->231 237->221 238->234 239->233

      Callgraph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2970670714.00007FF6A8471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A8470000, based on PE: true
      • Associated: 00000000.00000002.2970652671.00007FF6A8470000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2970687286.00007FF6A8474000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2970687286.00007FF6A8476000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2970723506.00007FF6A8477000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2970739668.00007FF6A8478000.00000008.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6a8470000_MaxPatrol SIEM Agent.jbxd
      Similarity
      • API ID: BuffCharCurrentDirectoryExitFileModuleNameProcessStartupUpper
      • String ID: $frwi$fwtsqmfile$http
      • API String ID: 2547572210-1342496151
      • Opcode ID: 7b0647800177d1148780a93087458dcf27bec581bb76a6d3cbfe8705caa93fc4
      • Instruction ID: e50f94550f768e6b44b928f211f44455ee192e3f6f1b596c379934461b48d1b0
      • Opcode Fuzzy Hash: 7b0647800177d1148780a93087458dcf27bec581bb76a6d3cbfe8705caa93fc4
      • Instruction Fuzzy Hash: 0E62B372B0E6D186EB358B35E4447AEBBA1F786784F448135CAC987B89EE3DD405CB04

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 160 7ff6a84720a0-7ff6a84720ec select
      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2970670714.00007FF6A8471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A8470000, based on PE: true
      • Associated: 00000000.00000002.2970652671.00007FF6A8470000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2970687286.00007FF6A8474000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2970687286.00007FF6A8476000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2970723506.00007FF6A8477000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2970739668.00007FF6A8478000.00000008.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6a8470000_MaxPatrol SIEM Agent.jbxd
      Similarity
      • API ID: select
      • String ID:
      • API String ID: 1274211008-0
      • Opcode ID: c6099b0cd28add3dfd98dc9d68f4034b9ba61e06afb46c86929c1e4bf4237b8b
      • Instruction ID: 643ae018fd95398a24633bb4545044d34329296d90868ad77d460bea6eb4e6c2
      • Opcode Fuzzy Hash: c6099b0cd28add3dfd98dc9d68f4034b9ba61e06afb46c86929c1e4bf4237b8b
      • Instruction Fuzzy Hash: BFE0E532918A8186E7508F54F44531AB770F3C6308FA05125E78E42B28CF7ED1498F04

      Control-flow Graph

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2970670714.00007FF6A8471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A8470000, based on PE: true
      • Associated: 00000000.00000002.2970652671.00007FF6A8470000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2970687286.00007FF6A8474000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2970687286.00007FF6A8476000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2970723506.00007FF6A8477000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2970739668.00007FF6A8478000.00000008.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6a8470000_MaxPatrol SIEM Agent.jbxd
      Similarity
      • API ID:
      • String ID: ,
      • API String ID: 0-3772416878
      • Opcode ID: 6e04d46f99774cb6748f98a8c5afa6cf12f3fe696e67d08020cebd50ce3daf88
      • Instruction ID: 79264bec603ab2cb7cd2527b00909bb2ee1fbcd4f6a8adfb1521dccdf8085d47
      • Opcode Fuzzy Hash: 6e04d46f99774cb6748f98a8c5afa6cf12f3fe696e67d08020cebd50ce3daf88
      • Instruction Fuzzy Hash: 36B16B7260ABD585EB708B19F85479AB2A4F788B84F508135CACD5BB88DF3DC456CB00

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 187 7ff6a8471ee0-7ff6a8471efb 188 7ff6a8471f00-7ff6a8471f14 187->188 188->188 189 7ff6a8471f16-7ff6a847204e 188->189 190 7ff6a8472050-7ff6a8472061 189->190 190->190 191 7ff6a8472063-7ff6a8472068 190->191 192 7ff6a8472075-7ff6a8472084 191->192 193 7ff6a8472086-7ff6a8472094 192->193 194 7ff6a8472070 192->194 194->192
      Memory Dump Source
      • Source File: 00000000.00000002.2970670714.00007FF6A8471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A8470000, based on PE: true
      • Associated: 00000000.00000002.2970652671.00007FF6A8470000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2970687286.00007FF6A8474000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2970687286.00007FF6A8476000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2970723506.00007FF6A8477000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2970739668.00007FF6A8478000.00000008.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6a8470000_MaxPatrol SIEM Agent.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 476b1747148fbb35576df0a031cfcc1b44d0b1b98813c62540cc53061a89e911
      • Instruction ID: b58070281acee741d83405bf659a185927c33f0ab612712fbf184331b8aa635c
      • Opcode Fuzzy Hash: 476b1747148fbb35576df0a031cfcc1b44d0b1b98813c62540cc53061a89e911
      • Instruction Fuzzy Hash: 85419B0622C7E414AB138D762640A7BFE61FBCA644FC7E060EFC692795E93DCC16D254

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 195 7ff6a8471d60-7ff6a8471d79 196 7ff6a8471d80-7ff6a8471d94 195->196 196->196 197 7ff6a8471d96-7ff6a8471e8b 196->197 198 7ff6a8471e90-7ff6a8471ea1 197->198 198->198 199 7ff6a8471ea3-7ff6a8471ea8 198->199 200 7ff6a8471eb5-7ff6a8471ec4 199->200 201 7ff6a8471ec6-7ff6a8471ed2 200->201 202 7ff6a8471eb0 200->202 202->200
      Memory Dump Source
      • Source File: 00000000.00000002.2970670714.00007FF6A8471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6A8470000, based on PE: true
      • Associated: 00000000.00000002.2970652671.00007FF6A8470000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2970687286.00007FF6A8474000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2970687286.00007FF6A8476000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2970723506.00007FF6A8477000.00000004.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2970739668.00007FF6A8478000.00000008.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff6a8470000_MaxPatrol SIEM Agent.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: e6d14f95ae0c1e8e53184a831b6b3e1257df3be8bb8eb5b67b766fdb7c841909
      • Instruction ID: 918995498f5335a4bcbb29d1a7ec40de5585ed3041f9ef0184194bd1da861f54
      • Opcode Fuzzy Hash: e6d14f95ae0c1e8e53184a831b6b3e1257df3be8bb8eb5b67b766fdb7c841909
      • Instruction Fuzzy Hash: CF31970362D6E055E7138E35281062BBEA1B786740FCB9061EFCA82786D92DCC16D750