Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PandoraFMS_One_Agent_Windows-lts.x86_64.exe

Overview

General Information

Sample name:PandoraFMS_One_Agent_Windows-lts.x86_64.exe
Analysis ID:1543756
MD5:850a59f9c158b9d953ee6a75f55f7f8a
SHA1:00112195c957667f320fa4565966827a8570c168
SHA256:324f914c6e630516c2d2565cbd0b63e33eb6dc171f26aeaadf4f920636b16dc0
Infos:

Detection

Score:32
Range:0 - 100
Whitelisted:false
Confidence:40%

Compliance

Score:34
Range:0 - 100

Signatures

Multi AV Scanner detection for dropped file
Disables security and backup related services
Found API chain indicative of debugger detection
Potential context-aware VBS script found (checks for environment specific values)
Uses schtasks.exe or at.exe to add and modify task schedules
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
EXE planting / hijacking vulnerabilities found
Found dropped PE file which has not been started or loaded
PE file contains an invalid checksum
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses net.exe to stop services

Classification

  • System is w10x64
  • PandoraFMS_One_Agent_Windows-lts.x86_64.exe (PID: 7308 cmdline: "C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe" MD5: 850A59F9C158B9D953EE6A75F55F7F8A)
    • cmd.exe (PID: 7460 cmdline: cmd.exe /c net stop pandoraFMSagent MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7468 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • net.exe (PID: 7512 cmdline: net stop pandoraFMSagent MD5: 31890A7DE89936F922D44D677F681A7F)
        • net1.exe (PID: 7532 cmdline: C:\Windows\system32\net1 stop pandoraFMSagent MD5: 2EFE6ED4C294AB8A39EB59C80813FEC1)
    • cmd.exe (PID: 7700 cmdline: cmd.exe /c PandoraAgent.exe --install MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 7708 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • PandoraAgent.exe (PID: 7764 cmdline: PandoraAgent.exe --install MD5: D885123606524EA6542E5AC351FB3529)
    • schtasks.exe (PID: 7820 cmdline: schtasks /Create /TN pandora_agent_restart /TR "\"C:\Program Files\pandora_agent\scripts\restart_pandora_agent.bat\"" /SC DAILY /ST 00:00:00 /F /RU SYSTEM MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7836 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • schtasks.exe (PID: 7916 cmdline: schtasks /Change /TN pandora_agent_restart /TR "\"C:\Program Files\pandora_agent\scripts\restart_pandora_agent.bat\"" MD5: 48C2FE20575769DE916F48EF0676A965)
      • conhost.exe (PID: 7924 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • ShortElev.exe (PID: 7984 cmdline: "C:\Program Files\pandora_agent\util\ShortElev.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\PandoraFMS_Agent_v7.0NG.777.1\Edit Config File.lnk" MD5: 0137DF9F792F635269E6FFF74F238C95)
      • conhost.exe (PID: 7992 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • ShortElev.exe (PID: 8036 cmdline: "C:\Program Files\pandora_agent\util\ShortElev.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\PandoraFMS_Agent_v7.0NG.777.1\PandoraFMS_Agent_start.lnk" MD5: 0137DF9F792F635269E6FFF74F238C95)
      • conhost.exe (PID: 8044 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • ShortElev.exe (PID: 8088 cmdline: "C:\Program Files\pandora_agent\util\ShortElev.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\PandoraFMS_Agent_v7.0NG.777.1\PandoraFMS_Agent_stop.lnk" MD5: 0137DF9F792F635269E6FFF74F238C95)
      • conhost.exe (PID: 8096 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cmd.exe (PID: 8140 cmdline: C:\Windows\SYSTEM32\cmd.exe /c ""C:\Program Files\pandora_agent\scripts\restart_pandora_agent.bat"" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
    • conhost.exe (PID: 8148 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • net.exe (PID: 8184 cmdline: net stop PandoraFMSAgent MD5: 0BD94A338EEA5A4E1F2830AE326E6D19)
      • net1.exe (PID: 3612 cmdline: C:\Windows\system32\net1 stop PandoraFMSAgent MD5: 55693DF2BB3CBE2899DFDDF18B4EB8C9)
    • net.exe (PID: 1508 cmdline: net start PandoraFMSAgent MD5: 0BD94A338EEA5A4E1F2830AE326E6D19)
      • net1.exe (PID: 4600 cmdline: C:\Windows\system32\net1 start PandoraFMSAgent MD5: 55693DF2BB3CBE2899DFDDF18B4EB8C9)
  • PandoraAgent.exe (PID: 3620 cmdline: "C:\Program Files\pandora_agent\PandoraAgent.exe" MD5: D885123606524EA6542E5AC351FB3529)
  • cleanup
No configs have been found
No yara matches
Source: Process startedAuthor: Michael Haag, Mark Woan (improvements), James Pemberton / @4A616D6573 / oscd.community (improvements): Data: Command: net stop pandoraFMSagent, CommandLine: net stop pandoraFMSagent, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\net.exe, NewProcessName: C:\Windows\SysWOW64\net.exe, OriginalFileName: C:\Windows\SysWOW64\net.exe, ParentCommandLine: cmd.exe /c net stop pandoraFMSagent, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7460, ParentProcessName: cmd.exe, ProcessCommandLine: net stop pandoraFMSagent, ProcessId: 7512, ProcessName: net.exe
Source: Process startedAuthor: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: Data: Command: net start PandoraFMSAgent, CommandLine: net start PandoraFMSAgent, CommandLine|base64offset|contains: , Image: C:\Windows\System32\net.exe, NewProcessName: C:\Windows\System32\net.exe, OriginalFileName: C:\Windows\System32\net.exe, ParentCommandLine: C:\Windows\SYSTEM32\cmd.exe /c ""C:\Program Files\pandora_agent\scripts\restart_pandora_agent.bat"", ParentImage: C:\Windows\System32\cmd.exe, ParentProcessId: 8140, ParentProcessName: cmd.exe, ProcessCommandLine: net start PandoraFMSAgent, ProcessId: 1508, ProcessName: net.exe
Source: Process startedAuthor: Jakob Weinzettl, oscd.community, Nasreddine Bencherchali (Nextron Systems): Data: Command: net stop pandoraFMSagent, CommandLine: net stop pandoraFMSagent, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\net.exe, NewProcessName: C:\Windows\SysWOW64\net.exe, OriginalFileName: C:\Windows\SysWOW64\net.exe, ParentCommandLine: cmd.exe /c net stop pandoraFMSagent, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7460, ParentProcessName: cmd.exe, ProcessCommandLine: net stop pandoraFMSagent, ProcessId: 7512, ProcessName: net.exe
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: C:\Program Files\pandora_agent\util\pandora_hardening.exeReversingLabs: Detection: 13%
Source: PandoraAgent.exe, 00000008.00000002.1898706731.0000000000736000.00000002.00000001.01000000.0000000B.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_17e0a04a-e
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeEXE: schtasks.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeEXE: cmd.exeJump to behavior

Compliance

barindex
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeEXE: schtasks.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeEXE: cmd.exeJump to behavior
Source: PandoraFMS_One_Agent_Windows-lts.x86_64.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeWindow detected: < &BackI &AgreeCancelPandoraFMS v7.0 PandoraFMS v7.0License AgreementPlease review the license terms before installing Pandora FMS Agent 7.0NG.777.1.Press Page Down to see the rest of the agreement.License and terms of use Pandora FMSReview: May 2024General contract conditionsThese general conditions of PandoraFMS (the "Conditions") regulate the terms in which Pandora FMS gives intuitu personae to the Client the use of the PandoraFMS Pandora ITSM or Pandora RC application and of the contracted components as well as the terms in which the support services and the other applicable conditions will be provided. The license of use is fully valid regardless of the services contracted and is an essential part of the contract signed between the parties together with the order or purchase order (if any) and the commercial proposal (all of them together the Contract).These Terms and Conditions are binding to the Client and all entities and persons acting on the Client's behalf or in collaboration with the Client whether they be employees associates collaborators partners suppliers or any other (hereinafter the Associates). Particularly it is understood that all references made to the Client reach and bind the Associates to whom the Client must inform of the content of these conditions and for whose compliance and non-compliance they shall be jointly and severally liable.By the simple installation or acceptance of the installation and by the simple use of the application the Client declares to have read understood and accepted all the Terms of these Conditions. It also declares that it has sufficient power of attorney to be bound by its representation.1. Ownership of PandoraFMS its components and the application documentationPandora FMS Pandora ITSM and Pandora RC are the exclusive property of Pandora FMS SLU ("Pandora FMS"); an entity that manages and coordinates its development as a collective work and that holds all the moral exploitation and remunerative rights over it also exclusively. Pandora FMS hereby grants the Client a license to use the application (the executable binaries the expressly agreed upon source codes the related components provided with the software the application programming interfaces and the other associated media) and grants the Client no rights of reproduction distribution public communication or transformation of the application beyond those strictly necessary for the use intended in the commercial offer.The application manuals and all related material including the material used for their development (in any format) are protected by the same intellectual property rights as the application itself and the current license of use extends to them. Pandora FMS hereby grants the Client no rights of reproduction public communication and distribution of these materials beyond those strictly necessary to learn how to use the application. Any transformation (including translation into any language) of the aid and development materials
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agentJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\tempJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\temp\pandora_agent_nsis.confJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\collectionsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\refJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\helpJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\keyJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\key\id_dsaJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\key\id_dsa.pubJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\key\PUT_SSH_KEYS_HEREJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\LICENSE_EN.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\LICENSE_ES.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\config.tmp.confJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\pandora.icoJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\PandoraAgent.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\README.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\scriptsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\scripts\delete_at_job.batJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\scripts\install_service_restart.batJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\scripts\restart_pandora_agent.batJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\scripts\start_pandora_agent.batJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\scripts\edit_config_file.batJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\scripts\stop_pandora_agent.batJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\utilJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\cmp.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\curl.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\curl-ca-bundle.crtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\cut.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\date.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\df.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\df_percent.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\expr.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\gawk.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\getreg.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\getsnmp.batJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\grep.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\grep_log.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\head.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\logevent_log4x.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\ls.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\md5.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\agentname.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\autodiscover.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\pandora_agent_exec.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\AGENTX-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\DISMAN-EVENT-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\DISMAN-EXPRESSION-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\DISMAN-NSLOOKUP-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\DISMAN-PING-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\DISMAN-SCHEDULE-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\DISMAN-SCRIPT-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\DISMAN-TRACEROUTE-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\EtherLike-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\HCNUM-TC.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\HOST-RESOURCES-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\HOST-RESOURCES-TYPES.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\IANA-ADDRESS-FAMILY-NUMBERS-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\IANA-LANGUAGE-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\IANA-RTPROTO-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\IANAifType-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\ianalistJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\IF-INVERTED-STACK-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\IF-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\INET-ADDRESS-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\IP-FORWARD-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\IP-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\IPV6-ICMP-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\IPV6-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\IPV6-TC.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\IPV6-TCP-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\IPV6-UDP-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\LM-SENSORS-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\Makefile.inJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\Makefile.mibJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\makehtml.plJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\mibfetchJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\MTA-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\NET-SNMP-AGENT-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\NET-SNMP-EXAMPLES-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\NET-SNMP-EXTEND-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\NET-SNMP-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\NET-SNMP-MONITOR-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\NET-SNMP-SYSTEM-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\NET-SNMP-TC.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\NETWORK-SERVICES-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\nodemapJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\NOTIFICATION-LOG-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\README.mibsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\RFC-1215.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\RFC1155-SMI.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\RFC1213-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\rfclistJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\rfcmibs.diffJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\RMON-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\smistripJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\SMUX-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\SNMP-COMMUNITY-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\SNMP-FRAMEWORK-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\SNMP-MPD-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\SNMP-NOTIFICATION-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\SNMP-PROXY-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\SNMP-TARGET-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\SNMP-USER-BASED-SM-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\SNMP-USM-AES-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\SNMP-USM-DH-OBJECTS-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\SNMP-VIEW-BASED-ACM-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\SNMPv2-CONF.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\SNMPv2-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\SNMPv2-SMI.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\SNMPv2-TC.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\SNMPv2-TM.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\TCP-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\TRANSPORT-ADDRESS-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\TUNNEL-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\UCD-DEMO-MIB.incJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\UCD-DEMO-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\UCD-DISKIO-MIB.incJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\UCD-DISKIO-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\UCD-DLMOD-MIB.incJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\UCD-DLMOD-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\UCD-IPFILTER-MIB.incJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\UCD-IPFILTER-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\UCD-IPFWACC-MIB.incJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\UCD-IPFWACC-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\UCD-SNMP-MIB-OLD.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\UCD-SNMP-MIB.incJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\UCD-SNMP-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\UDP-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\pandora_revent.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\pandora_update.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\ps.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\du_percent.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\puttygen.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\snmpget.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\sort.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\tail.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\tentacle_client.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\tentacle_server.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\tr.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\unzip.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\wc.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\cpuinfo.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\moboinfo.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\diskdrives.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\cdromdrives.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\videocardinfo.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\ifaces.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\monitors.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\printers.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\software_installed.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\raminfo.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\userslogged.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\productkey.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\productID.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\architecture.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\domain.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\osversion.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\df_percent_used.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mem_percent_used.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\network.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\route_parser.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\omnishell_client.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\pandora_hardening.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\pandora_security_win.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\pandora_security_win.confJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\ShortElev.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\PandoraFMS_Agent.urlJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\uninst.exeJump to behavior
Source: C:\Program Files\pandora_agent\PandoraAgent.exeDirectory created: C:\Program Files\pandora_agent\pandora_agent.logJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Program Files\pandora_agent\LICENSE_EN.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Program Files\pandora_agent\LICENSE_ES.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Program Files\pandora_agent\README.txtJump to behavior
Source: PandoraFMS_One_Agent_Windows-lts.x86_64.exeStatic PE information: certificate valid
Source: Binary string: c:\projects\md5\Release\md5.pdb source: md5.exe.0.dr
Source: Binary string: C:\data\buildbot-pdk-slave\pdk-grover\build\src\PerlApp\src\paperl512.pdb source: pandora_revent.exe.0.dr
Source: Binary string: .Pdb'L source: PandoraFMS_One_Agent_Windows-lts.x86_64.exe
Source: Binary string: .PdB] source: PandoraFMS_One_Agent_Windows-lts.x86_64.exe
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_00407F13 FindFirstFileA,FindClose,0_2_00407F13
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_004083A8 DeleteFileA,DeleteFileA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,0_2_004083A8
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_0040342B FindFirstFileA,0_2_0040342B
Source: curl.exe.0.drString found in binary or memory: Usage: curl [options...] <url>
Source: curl.exe.0.drString found in binary or memory: E@Usage: curl [options...] <url>Options: (H) means HTTP/HTTPS only, (F) means FTP only --anyauth Pick "any" authentication method (H) -a, --append Append to target file when uploading (F/SFTP) --basic Use HTTP Basic Authentication (H) --cacert FILE CA certificate to verify peer against (SSL) --capath DIR CA directory to verify peer against (SSL) -E, --cert CERT[:PASSWD] Client certificate file and password (SSL) --cert-type TYPE Certificate file type (DER/PEM/ENG) (SSL) --ciphers LIST SSL ciphers to use (SSL) --compressed Request compressed response (using deflate or gzip) -K, --config FILE Specify which config file to read --connect-timeout SECONDS Maximum time allowed for connection -C, --continue-at OFFSET Resumed transfer offset -b, --cookie STRING/FILE String or file to read cookies from (H) -c, --cookie-jar FILE Write cookies to this file after operation (H) --create-dirs Create necessary local directory hierarchy --crlf Convert LF to CRLF in upload --crlfile FILE Get a CRL list in PEM format from the given file -d, --data DATA HTTP POST data (H) --data-ascii DATA HTTP POST ASCII data (H) --data-binary DATA HTTP POST binary data (H) --data-urlencode DATA HTTP POST data url encoded (H) --delegation STRING GSS-API delegation permission --digest Use HTTP Digest Authentication (H) --disable-eprt Inhibit using EPRT or LPRT (F) --disable-epsv Inhibit using EPSV (F) -D, --dump-header FILE Write the headers to this file --egd-file FILE EGD socket path for random data (SSL) --engine ENGINGE Crypto engine (SSL). "--engine list" for list -f, --fail Fail silently (no output at all) on HTTP errors (H) -F, --form CONTENT Specify HTTP multipart POST data (H) --form-string STRING Specify HTTP multipart POST data (H) --ftp-account DATA Account data string (F) --ftp-alternative-to-user COMMAND String to replace "USER [name]" (F) --ftp-create-dirs Create the remote dirs if not present (F) --ftp-method [MULTICWD/NOCWD/SINGLECWD] Control CWD usage (F) --ftp-pasv Use PASV/EPSV instead of PORT (F) -P, --ftp-port ADR Use PORT with given address instead of PASV (F) --ftp-skip-pasv-ip Skip the IP address for PASV (F)
Source: curl.exe.0.drString found in binary or memory: http://curl.haxx.se/P
Source: curl.exe.0.drString found in binary or memory: http://curl.haxx.se/docs/copyright.htmlD
Source: PandoraAgent.exe, 00000008.00000002.1898706731.0000000000736000.00000002.00000001.01000000.0000000B.sdmp, PandoraAgent.exe, 0000001B.00000000.1928109476.0000000000736000.00000002.00000001.01000000.0000000B.sdmp, curl.exe.0.dr, PandoraAgent.exe.0.drString found in binary or memory: http://curl.haxx.se/docs/http-cookies.html
Source: curl.exe.0.drString found in binary or memory: http://curl.haxx.se/docs/sslcerts.html
Source: curl.exe.0.drString found in binary or memory: http://curl.haxx.se/libcurl/c/curl_easy_setopt.html
Source: curl.exe.0.drString found in binary or memory: http://https://-.://%s%s%s/%sall
Source: PandoraFMS_One_Agent_Windows-lts.x86_64.exe, uninst.exe.0.drString found in binary or memory: http://nsis.sf.net/NSIS_Error
Source: PandoraFMS_One_Agent_Windows-lts.x86_64.exe, uninst.exe.0.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: config.tmp.conf.0.dr, pandora_agent_nsis.conf.0.drString found in binary or memory: http://pandorafms.org
Source: md5.exe.0.drString found in binary or memory: http://www.fourmilab.ch/
Source: config.tmp.conf.0.dr, pandora_agent_nsis.conf.0.drString found in binary or memory: http://www.google.com
Source: INET-ADDRESS-MIB.txt.0.drString found in binary or memory: http://www.iana.org/
Source: IP-MIB.txt.0.drString found in binary or memory: http://www.iana.org/assignments/icmp-parameters
Source: IP-MIB.txt.0.drString found in binary or memory: http://www.iana.org/assignments/icmpv6-parameters
Source: AGENTX-MIB.txt.0.drString found in binary or memory: http://www.ietf.org/html.charters/agentx-charter.html
Source: TCP-MIB.txt.0.dr, IP-FORWARD-MIB.txt.0.drString found in binary or memory: http://www.ietf.org/html.charters/ipv6-charter.html
Source: unzip.exe.0.drString found in binary or memory: http://www.info-zip.org/UnZip.htmlDVarFileInfo$
Source: unzip.exe.0.drString found in binary or memory: http://www.info-zip.org/zip-bug.html;
Source: PandoraAgent.exe, 00000008.00000000.1897515760.000000000079D000.00000002.00000001.01000000.0000000B.sdmp, PandoraAgent.exe, 0000001B.00000002.4162596872.000000000079D000.00000002.00000001.01000000.0000000B.sdmp, PandoraAgent.exe.0.drString found in binary or memory: http://www.openssl.org/support/faq.html
Source: PandoraAgent.exe, 00000008.00000000.1897515760.000000000079D000.00000002.00000001.01000000.0000000B.sdmp, PandoraAgent.exe, 0000001B.00000002.4162596872.000000000079D000.00000002.00000001.01000000.0000000B.sdmp, PandoraAgent.exe.0.drString found in binary or memory: http://www.openssl.org/support/faq.htmlRAND
Source: PandoraFMS_One_Agent_Windows-lts.x86_64.exe, 00000000.00000002.4162559671.00000000007EE000.00000004.00000020.00020000.00000000.sdmp, PandoraFMS_Agent.url.0.drString found in binary or memory: http://www.pandorafms.com
Source: PandoraFMS_One_Agent_Windows-lts.x86_64.exe, 00000000.00000002.4163286809.0000000003963000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.pandorafms.com.
Source: PandoraFMS_One_Agent_Windows-lts.x86_64.exe, 00000000.00000002.4162559671.00000000007EE000.00000004.00000020.00020000.00000000.sdmp, LICENSE_EN.txt.0.dr, LICENSE_ES.txt.0.drString found in binary or memory: https://support.pandorafms.com/
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_00406EFB GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SetDlgItemTextA,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,CloseHandle,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00406EFB
Source: C:\Program Files\pandora_agent\PandoraAgent.exeProcess Stats: CPU usage > 49%
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_00404167 EntryPoint,SetErrorMode,GetVersion,lstrlenA,InitCommonControls,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,DeleteFileA,DeleteFileA,GetWindowsDirectoryA,DeleteFileA,DeleteFileA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,DeleteFileA,DeleteFileA,OleUninitialize,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_00404167
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_00408D2E0_2_00408D2E
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_6E5C47100_2_6E5C4710
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_6E5C22B50_2_6E5C22B5
Source: Joe Sandbox ViewDropped File: C:\Program Files\pandora_agent\util\ShortElev.exe D8CB74994754E0FE701F842651AD5EA4F54B41C0450ECFD511E2B7A8C761847E
Source: PandoraAgent.exe.0.drStatic PE information: Number of sections : 18 > 10
Source: ShortElev.exe.0.drStatic PE information: Number of sections : 16 > 10
Source: PandoraFMS_One_Agent_Windows-lts.x86_64.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
Source: grep_log.exe.0.drStatic PE information: Section: .rsrc ZLIB complexity 0.9979870854591837
Source: route_parser.exe.0.drStatic PE information: Section: .rsrc ZLIB complexity 0.9976158993089234
Source: classification engineClassification label: sus32.evad.winEXE@39/174@0/0
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_00405A34 GetDlgItem,SetWindowTextA,SetDlgItemTextA,SetDlgItemTextA,SHAutoComplete,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,GetDiskFreeSpaceExA,GetDiskFreeSpaceA,MulDiv,0_2_00405A34
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_00402988 CoCreateInstance,MultiByteToWideChar,0_2_00402988
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Program Files\pandora_agentJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu.lnkJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7708:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7992:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \BaseNamedObjects\Local\SM0:8148:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7924:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8096:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7836:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8044:120:WilError_03
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7468:120:WilError_03
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Users\user\AppData\Local\Temp\nsnBCF3.tmpJump to behavior
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\SYSTEM32\cmd.exe /c ""C:\Program Files\pandora_agent\scripts\restart_pandora_agent.bat""
Source: PandoraFMS_One_Agent_Windows-lts.x86_64.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: PandoraAgent.exe, 00000008.00000002.1898706731.0000000000736000.00000002.00000001.01000000.0000000B.sdmp, PandoraAgent.exe, 0000001B.00000000.1928109476.0000000000736000.00000002.00000001.01000000.0000000B.sdmp, PandoraAgent.exe.0.drBinary or memory string: SELECT Name, PathName, State FROM Win32_Service.PathName;
Source: PandoraAgent.exeString found in binary or memory: -startinfo
Source: PandoraAgent.exeString found in binary or memory: -StartupInfo
Source: PandoraAgent.exeString found in binary or memory: -address
Source: PandoraAgent.exeString found in binary or memory: -startinfo
Source: PandoraAgent.exeString found in binary or memory: -StartupInfo
Source: PandoraAgent.exeString found in binary or memory: -address
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile read: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe "C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe"
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c net stop pandoraFMSagent
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\net.exe net stop pandoraFMSagent
Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 stop pandoraFMSagent
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c PandoraAgent.exe --install
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files\pandora_agent\PandoraAgent.exe PandoraAgent.exe --install
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Create /TN pandora_agent_restart /TR "\"C:\Program Files\pandora_agent\scripts\restart_pandora_agent.bat\"" /SC DAILY /ST 00:00:00 /F /RU SYSTEM
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Change /TN pandora_agent_restart /TR "\"C:\Program Files\pandora_agent\scripts\restart_pandora_agent.bat\""
Source: C:\Windows\SysWOW64\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess created: C:\Program Files\pandora_agent\util\ShortElev.exe "C:\Program Files\pandora_agent\util\ShortElev.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\PandoraFMS_Agent_v7.0NG.777.1\Edit Config File.lnk"
Source: C:\Program Files\pandora_agent\util\ShortElev.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess created: C:\Program Files\pandora_agent\util\ShortElev.exe "C:\Program Files\pandora_agent\util\ShortElev.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\PandoraFMS_Agent_v7.0NG.777.1\PandoraFMS_Agent_start.lnk"
Source: C:\Program Files\pandora_agent\util\ShortElev.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess created: C:\Program Files\pandora_agent\util\ShortElev.exe "C:\Program Files\pandora_agent\util\ShortElev.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\PandoraFMS_Agent_v7.0NG.777.1\PandoraFMS_Agent_stop.lnk"
Source: C:\Program Files\pandora_agent\util\ShortElev.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: unknownProcess created: C:\Windows\System32\cmd.exe C:\Windows\SYSTEM32\cmd.exe /c ""C:\Program Files\pandora_agent\scripts\restart_pandora_agent.bat""
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net stop PandoraFMSAgent
Source: C:\Windows\System32\net.exeProcess created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 stop PandoraFMSAgent
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net start PandoraFMSAgent
Source: C:\Windows\System32\net.exeProcess created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 start PandoraFMSAgent
Source: unknownProcess created: C:\Program Files\pandora_agent\PandoraAgent.exe "C:\Program Files\pandora_agent\PandoraAgent.exe"
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c net stop pandoraFMSagentJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c PandoraAgent.exe --installJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Create /TN pandora_agent_restart /TR "\"C:\Program Files\pandora_agent\scripts\restart_pandora_agent.bat\"" /SC DAILY /ST 00:00:00 /F /RU SYSTEMJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Change /TN pandora_agent_restart /TR "\"C:\Program Files\pandora_agent\scripts\restart_pandora_agent.bat\""Jump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess created: C:\Program Files\pandora_agent\util\ShortElev.exe "C:\Program Files\pandora_agent\util\ShortElev.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\PandoraFMS_Agent_v7.0NG.777.1\Edit Config File.lnk"Jump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess created: C:\Program Files\pandora_agent\util\ShortElev.exe "C:\Program Files\pandora_agent\util\ShortElev.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\PandoraFMS_Agent_v7.0NG.777.1\PandoraFMS_Agent_start.lnk"Jump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess created: C:\Program Files\pandora_agent\util\ShortElev.exe "C:\Program Files\pandora_agent\util\ShortElev.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\PandoraFMS_Agent_v7.0NG.777.1\PandoraFMS_Agent_stop.lnk"Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\net.exe net stop pandoraFMSagentJump to behavior
Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 stop pandoraFMSagentJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files\pandora_agent\PandoraAgent.exe PandoraAgent.exe --installJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net stop PandoraFMSAgentJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net start PandoraFMSAgentJump to behavior
Source: C:\Windows\System32\net.exeProcess created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 stop PandoraFMSAgentJump to behavior
Source: C:\Windows\System32\net.exeProcess created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 start PandoraFMSAgentJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeSection loaded: dwmapi.dllJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeSection loaded: shfolder.dllJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeSection loaded: riched20.dllJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeSection loaded: usp10.dllJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeSection loaded: msls31.dllJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeSection loaded: linkinfo.dllJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeSection loaded: ntshrui.dllJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeSection loaded: cscapi.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\net.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\SysWOW64\net1.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Program Files\pandora_agent\PandoraAgent.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: taskschd.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeSection loaded: xmllite.dllJump to behavior
Source: C:\Program Files\pandora_agent\util\ShortElev.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\cmd.exeSection loaded: cmdext.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\net1.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\net1.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\net1.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\System32\net1.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\net1.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\net1.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\System32\net1.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: mpr.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\net.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Windows\System32\net1.exeSection loaded: samcli.dllJump to behavior
Source: C:\Windows\System32\net1.exeSection loaded: netutils.dllJump to behavior
Source: C:\Windows\System32\net1.exeSection loaded: dsrole.dllJump to behavior
Source: C:\Windows\System32\net1.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Windows\System32\net1.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Windows\System32\net1.exeSection loaded: logoncli.dllJump to behavior
Source: C:\Windows\System32\net1.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
Source: Start Menu.lnk.0.drLNK file: ..\..\..\..\..\..\Program Files\pandora_agent\README.txt
Source: Start Pandora Agent.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\Program Files\pandora_agent\scripts\start_pandora_agent.bat
Source: Stop Pandora Agent.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\Program Files\pandora_agent\scripts\stop_pandora_agent.bat
Source: Website.lnk.0.drLNK file: ..\..\..\..\..\..\Program Files\pandora_agent\PandoraFMS_Agent.url
Source: Uninstall.lnk.0.drLNK file: ..\..\..\..\..\..\Program Files\pandora_agent\uninst.exe
Source: Edit Config File.lnk.0.drLNK file: ..\..\..\..\..\..\Program Files\pandora_agent\scripts\edit_config_file.bat
Source: PandoraFMS_Agent_start.lnk.0.drLNK file: ..\..\..\..\..\..\Program Files\pandora_agent\scripts\start_pandora_agent.bat
Source: PandoraFMS_Agent_stop.lnk.0.drLNK file: ..\..\..\..\..\..\Program Files\pandora_agent\scripts\stop_pandora_agent.bat
Source: README.lnk.0.drLNK file: ..\..\..\..\..\..\Program Files\pandora_agent\README.txt
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: OK
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: Next >
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: I Agree
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: Install
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: Next >
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: OK
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: Next >
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: OK
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: Next >
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: OK
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: Next >
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: OK
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: Next >
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: OK
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: Next >
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: OK
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: Next >
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: OK
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: Next >
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: OK
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: Next >
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: OK
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: Next >
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: OK
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: Next >
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: OK
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: Next >
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: OK
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: Next >
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: OK
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: Next >
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: OK
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: Next >
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: OK
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: Next >
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: OK
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: Next >
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: OK
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: Next >
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: OK
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: Next >
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: OK
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: Next >
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: OK
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: Next >
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: OK
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: Next >
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: OK
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: Next >
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: OK
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: Next >
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: OK
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: Next >
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: OK
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: Next >
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: OK
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: Next >
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: OK
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: Next >
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: OK
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: Next >
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: OK
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: Next >
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: OK
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: Next >
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAutomated click: OK
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeWindow detected: < &BackI &AgreeCancelPandoraFMS v7.0 PandoraFMS v7.0License AgreementPlease review the license terms before installing Pandora FMS Agent 7.0NG.777.1.Press Page Down to see the rest of the agreement.License and terms of use Pandora FMSReview: May 2024General contract conditionsThese general conditions of PandoraFMS (the "Conditions") regulate the terms in which Pandora FMS gives intuitu personae to the Client the use of the PandoraFMS Pandora ITSM or Pandora RC application and of the contracted components as well as the terms in which the support services and the other applicable conditions will be provided. The license of use is fully valid regardless of the services contracted and is an essential part of the contract signed between the parties together with the order or purchase order (if any) and the commercial proposal (all of them together the Contract).These Terms and Conditions are binding to the Client and all entities and persons acting on the Client's behalf or in collaboration with the Client whether they be employees associates collaborators partners suppliers or any other (hereinafter the Associates). Particularly it is understood that all references made to the Client reach and bind the Associates to whom the Client must inform of the content of these conditions and for whose compliance and non-compliance they shall be jointly and severally liable.By the simple installation or acceptance of the installation and by the simple use of the application the Client declares to have read understood and accepted all the Terms of these Conditions. It also declares that it has sufficient power of attorney to be bound by its representation.1. Ownership of PandoraFMS its components and the application documentationPandora FMS Pandora ITSM and Pandora RC are the exclusive property of Pandora FMS SLU ("Pandora FMS"); an entity that manages and coordinates its development as a collective work and that holds all the moral exploitation and remunerative rights over it also exclusively. Pandora FMS hereby grants the Client a license to use the application (the executable binaries the expressly agreed upon source codes the related components provided with the software the application programming interfaces and the other associated media) and grants the Client no rights of reproduction distribution public communication or transformation of the application beyond those strictly necessary for the use intended in the commercial offer.The application manuals and all related material including the material used for their development (in any format) are protected by the same intellectual property rights as the application itself and the current license of use extends to them. Pandora FMS hereby grants the Client no rights of reproduction public communication and distribution of these materials beyond those strictly necessary to learn how to use the application. Any transformation (including translation into any language) of the aid and development materials
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agentJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\tempJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\temp\pandora_agent_nsis.confJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\collectionsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\refJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\helpJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\keyJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\key\id_dsaJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\key\id_dsa.pubJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\key\PUT_SSH_KEYS_HEREJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\LICENSE_EN.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\LICENSE_ES.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\config.tmp.confJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\pandora.icoJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\PandoraAgent.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\README.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\scriptsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\scripts\delete_at_job.batJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\scripts\install_service_restart.batJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\scripts\restart_pandora_agent.batJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\scripts\start_pandora_agent.batJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\scripts\edit_config_file.batJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\scripts\stop_pandora_agent.batJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\utilJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\cmp.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\curl.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\curl-ca-bundle.crtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\cut.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\date.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\df.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\df_percent.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\expr.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\gawk.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\getreg.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\getsnmp.batJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\grep.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\grep_log.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\head.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\logevent_log4x.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\ls.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\md5.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\agentname.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\autodiscover.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\pandora_agent_exec.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\AGENTX-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\DISMAN-EVENT-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\DISMAN-EXPRESSION-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\DISMAN-NSLOOKUP-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\DISMAN-PING-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\DISMAN-SCHEDULE-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\DISMAN-SCRIPT-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\DISMAN-TRACEROUTE-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\EtherLike-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\HCNUM-TC.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\HOST-RESOURCES-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\HOST-RESOURCES-TYPES.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\IANA-ADDRESS-FAMILY-NUMBERS-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\IANA-LANGUAGE-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\IANA-RTPROTO-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\IANAifType-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\ianalistJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\IF-INVERTED-STACK-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\IF-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\INET-ADDRESS-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\IP-FORWARD-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\IP-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\IPV6-ICMP-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\IPV6-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\IPV6-TC.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\IPV6-TCP-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\IPV6-UDP-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\LM-SENSORS-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\Makefile.inJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\Makefile.mibJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\makehtml.plJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\mibfetchJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\MTA-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\NET-SNMP-AGENT-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\NET-SNMP-EXAMPLES-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\NET-SNMP-EXTEND-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\NET-SNMP-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\NET-SNMP-MONITOR-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\NET-SNMP-SYSTEM-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\NET-SNMP-TC.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\NETWORK-SERVICES-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\nodemapJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\NOTIFICATION-LOG-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\README.mibsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\RFC-1215.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\RFC1155-SMI.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\RFC1213-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\rfclistJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\rfcmibs.diffJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\RMON-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\smistripJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\SMUX-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\SNMP-COMMUNITY-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\SNMP-FRAMEWORK-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\SNMP-MPD-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\SNMP-NOTIFICATION-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\SNMP-PROXY-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\SNMP-TARGET-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\SNMP-USER-BASED-SM-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\SNMP-USM-AES-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\SNMP-USM-DH-OBJECTS-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\SNMP-VIEW-BASED-ACM-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\SNMPv2-CONF.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\SNMPv2-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\SNMPv2-SMI.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\SNMPv2-TC.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\SNMPv2-TM.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\TCP-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\TRANSPORT-ADDRESS-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\TUNNEL-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\UCD-DEMO-MIB.incJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\UCD-DEMO-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\UCD-DISKIO-MIB.incJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\UCD-DISKIO-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\UCD-DLMOD-MIB.incJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\UCD-DLMOD-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\UCD-IPFILTER-MIB.incJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\UCD-IPFILTER-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\UCD-IPFWACC-MIB.incJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\UCD-IPFWACC-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\UCD-SNMP-MIB-OLD.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\UCD-SNMP-MIB.incJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\UCD-SNMP-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mibs\UDP-MIB.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\pandora_revent.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\pandora_update.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\ps.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\du_percent.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\puttygen.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\snmpget.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\sort.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\tail.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\tentacle_client.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\tentacle_server.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\tr.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\unzip.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\wc.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\cpuinfo.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\moboinfo.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\diskdrives.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\cdromdrives.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\videocardinfo.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\ifaces.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\monitors.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\printers.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\software_installed.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\raminfo.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\userslogged.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\productkey.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\productID.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\architecture.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\domain.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\osversion.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\df_percent_used.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\mem_percent_used.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\network.vbsJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\route_parser.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\omnishell_client.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\pandora_hardening.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\pandora_security_win.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\pandora_security_win.confJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\util\ShortElev.exeJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\PandoraFMS_Agent.urlJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDirectory created: C:\Program Files\pandora_agent\uninst.exeJump to behavior
Source: C:\Program Files\pandora_agent\PandoraAgent.exeDirectory created: C:\Program Files\pandora_agent\pandora_agent.logJump to behavior
Source: PandoraFMS_One_Agent_Windows-lts.x86_64.exeStatic PE information: certificate valid
Source: PandoraFMS_One_Agent_Windows-lts.x86_64.exeStatic file information: File size 62120984 > 1048576
Source: Binary string: c:\projects\md5\Release\md5.pdb source: md5.exe.0.dr
Source: Binary string: C:\data\buildbot-pdk-slave\pdk-grover\build\src\PerlApp\src\paperl512.pdb source: pandora_revent.exe.0.dr
Source: Binary string: .Pdb'L source: PandoraFMS_One_Agent_Windows-lts.x86_64.exe
Source: Binary string: .PdB] source: PandoraFMS_One_Agent_Windows-lts.x86_64.exe
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_6E5C22B5 lstrcpyA,GlobalAlloc,GlobalFree,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GetModuleHandleA,LoadLibraryA,GetProcAddress,GetProcAddress,lstrcatA,GetProcAddress,lstrcpyA,GlobalFree,0_2_6E5C22B5
Source: expr.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x56b2
Source: puttygen.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x2f1b4
Source: tr.exe.0.drStatic PE information: real checksum: 0x0 should be: 0xdb79
Source: ls.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x1bafa
Source: cut.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x5f11
Source: head.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x14301
Source: uninst.exe.0.drStatic PE information: real checksum: 0x3b4b43a should be: 0x40336
Source: gawk.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x3c909
Source: cmp.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x2de4
Source: md5.exe.0.drStatic PE information: real checksum: 0x0 should be: 0xcd6f
Source: snmpget.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x483f9
Source: sort.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x13795
Source: grep.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x1acfd
Source: wc.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x122f4
Source: date.exe.0.drStatic PE information: real checksum: 0x0 should be: 0xf68d
Source: tail.exe.0.drStatic PE information: real checksum: 0x0 should be: 0x18175
Source: PandoraAgent.exe.0.drStatic PE information: section name: .xdata
Source: PandoraAgent.exe.0.drStatic PE information: section name: /4
Source: PandoraAgent.exe.0.drStatic PE information: section name: /19
Source: PandoraAgent.exe.0.drStatic PE information: section name: /31
Source: PandoraAgent.exe.0.drStatic PE information: section name: /45
Source: PandoraAgent.exe.0.drStatic PE information: section name: /57
Source: PandoraAgent.exe.0.drStatic PE information: section name: /70
Source: PandoraAgent.exe.0.drStatic PE information: section name: /81
Source: PandoraAgent.exe.0.drStatic PE information: section name: /92
Source: getreg.exe.0.drStatic PE information: section name: .xdata
Source: autodiscover.exe.0.drStatic PE information: section name: _RDATA
Source: omnishell_client.exe.0.drStatic PE information: section name: .xdata
Source: ShortElev.exe.0.drStatic PE information: section name: /4
Source: ShortElev.exe.0.drStatic PE information: section name: /14
Source: ShortElev.exe.0.drStatic PE information: section name: /29
Source: ShortElev.exe.0.drStatic PE information: section name: /41
Source: ShortElev.exe.0.drStatic PE information: section name: /55
Source: ShortElev.exe.0.drStatic PE information: section name: /67
Source: ShortElev.exe.0.drStatic PE information: section name: /80
Source: ShortElev.exe.0.drStatic PE information: section name: /91
Source: ShortElev.exe.0.drStatic PE information: section name: /102
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_00403141 push edx; mov dword ptr [esp], eax0_2_00403156
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_00407F4B push ebx; mov dword ptr [esp], 00434A80h0_2_00407F68
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_00407F4B push eax; mov dword ptr [esp], 00434A80h0_2_00407FE0
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_00402E4B push ebx; mov dword ptr [esp], 00413040h0_2_00402EF6
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_0040194E push ecx; mov dword ptr [esp], eax0_2_0040195B
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_00401860 push eax; mov dword ptr [esp], ebx0_2_0040192D
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_00403164 push edi; mov dword ptr [esp], eax0_2_00403177
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_00404167 push ecx; mov dword ptr [esp], ebx0_2_004041BB
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_00404167 push ebx; mov dword ptr [esp], 0000000Bh0_2_004041D8
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_00404167 push eax; mov dword ptr [esp], 00000000h0_2_00404263
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_00404167 push edx; mov dword ptr [esp], eax0_2_004042A0
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_00404167 push eax; mov dword ptr [esp], ebx0_2_00404382
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_00404167 push eax; mov dword ptr [esp], 00440400h0_2_004044D8
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_00404167 push ecx; mov dword ptr [esp], 00431860h0_2_0040454D
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_00404167 push eax; mov dword ptr [esp], 00431860h0_2_004045B2
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_00404167 push ebx; mov dword ptr [esp], 00000002h0_2_0040462A
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_00401B06 push edx; mov dword ptr [esp], eax0_2_00401B53
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_00401B06 push edi; mov dword ptr [esp], 00412840h0_2_00401B6A
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_00402613 push ecx; mov dword ptr [esp], ebx0_2_00402634
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_00405A34 push esi; mov dword ptr [esp], ebx0_2_00405A71
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_00405A34 push eax; mov dword ptr [esp], 0000000Ah0_2_00405B27
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_00405A34 push ecx; mov dword ptr [esp], ebx0_2_00405BF4
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_00405A34 push eax; mov dword ptr [esp], ebx0_2_00405CA8
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_00405A34 push ecx; mov dword ptr [esp], 00000001h0_2_00405CCD
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_00405A34 push ebx; mov dword ptr [esp], 004324C0h0_2_00405CF4
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_0040183B push ecx; mov dword ptr [esp], eax0_2_0040184E
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_004040CC push eax; mov dword ptr [esp], 00440400h0_2_004040DF
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_004040CC push eax; mov dword ptr [esp], 00440400h0_2_00404101
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_00404DDD push eax; mov dword ptr [esp], 00000405h0_2_00405305
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_00405EED push eax; mov dword ptr [esp], ebx0_2_00406093
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_00405EED push ebx; mov dword ptr [esp], 0043F400h0_2_004060AE
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Program Files\pandora_agent\util\cmp.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Program Files\pandora_agent\util\tentacle_client.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Program Files\pandora_agent\util\route_parser.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Program Files\pandora_agent\util\gawk.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Program Files\pandora_agent\util\tentacle_server.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Program Files\pandora_agent\uninst.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Program Files\pandora_agent\util\pandora_update.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Program Files\pandora_agent\util\grep_log.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Program Files\pandora_agent\util\pandora_revent.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Program Files\pandora_agent\util\expr.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Program Files\pandora_agent\util\snmpget.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Program Files\pandora_agent\util\autodiscover.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Program Files\pandora_agent\util\getreg.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Users\user\AppData\Local\Temp\nsiBE5B.tmp\nsDialogs.dllJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Users\user\AppData\Local\Temp\nsiBE5B.tmp\LangDLL.dllJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Program Files\pandora_agent\util\tr.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Program Files\pandora_agent\util\wc.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Users\user\AppData\Local\Temp\nsiBE5B.tmp\System.dllJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Program Files\pandora_agent\util\cut.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Program Files\pandora_agent\util\puttygen.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Program Files\pandora_agent\util\omnishell_client.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Program Files\pandora_agent\util\pandora_hardening.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Program Files\pandora_agent\util\sort.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Program Files\pandora_agent\util\date.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Program Files\pandora_agent\PandoraAgent.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Program Files\pandora_agent\util\tail.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Program Files\pandora_agent\util\grep.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Program Files\pandora_agent\util\unzip.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Program Files\pandora_agent\util\pandora_agent_exec.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Program Files\pandora_agent\util\head.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Program Files\pandora_agent\util\md5.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Program Files\pandora_agent\util\curl.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Program Files\pandora_agent\util\ShortElev.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Program Files\pandora_agent\util\pandora_security_win.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Program Files\pandora_agent\util\ls.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Program Files\pandora_agent\LICENSE_EN.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Program Files\pandora_agent\LICENSE_ES.txtJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Program Files\pandora_agent\README.txtJump to behavior

Boot Survival

barindex
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess created: C:\Windows\SysWOW64\schtasks.exe schtasks /Create /TN pandora_agent_restart /TR "\"C:\Program Files\pandora_agent\scripts\restart_pandora_agent.bat\"" /SC DAILY /ST 00:00:00 /F /RU SYSTEM
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu.lnkJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Start Pandora Agent.lnkJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Stop Pandora Agent.lnkJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\PandoraFMS_Agent_v7.0NG.777.1Jump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\PandoraFMS_Agent_v7.0NG.777.1\Website.lnkJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\PandoraFMS_Agent_v7.0NG.777.1\Uninstall.lnkJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\PandoraFMS_Agent_v7.0NG.777.1\Edit Config File.lnkJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\PandoraFMS_Agent_v7.0NG.777.1\PandoraFMS_Agent_start.lnkJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\PandoraFMS_Agent_v7.0NG.777.1\PandoraFMS_Agent_stop.lnkJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\PandoraFMS_Agent_v7.0NG.777.1\README.lnkJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\net.exe net stop pandoraFMSagent
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\schtasks.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDropped file: Wscript.StdOut.WriteLine "<data><![CDATA[" & mobo.manufacturer & ";" & mobo.model & ";" & mobo.OEMStringArray(0) & "]]></data>"Jump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDropped file: Wscript.StdOut.WriteLine "<data><![CDATA[" & data.osarchitecture & "]]></data>"Jump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDropped PE file which has not been started: C:\Program Files\pandora_agent\util\tentacle_client.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDropped PE file which has not been started: C:\Program Files\pandora_agent\util\route_parser.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDropped PE file which has not been started: C:\Program Files\pandora_agent\util\cmp.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDropped PE file which has not been started: C:\Program Files\pandora_agent\util\gawk.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDropped PE file which has not been started: C:\Program Files\pandora_agent\uninst.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDropped PE file which has not been started: C:\Program Files\pandora_agent\util\tentacle_server.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDropped PE file which has not been started: C:\Program Files\pandora_agent\util\pandora_update.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDropped PE file which has not been started: C:\Program Files\pandora_agent\util\grep_log.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDropped PE file which has not been started: C:\Program Files\pandora_agent\util\expr.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDropped PE file which has not been started: C:\Program Files\pandora_agent\util\pandora_revent.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDropped PE file which has not been started: C:\Program Files\pandora_agent\util\snmpget.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDropped PE file which has not been started: C:\Program Files\pandora_agent\util\autodiscover.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDropped PE file which has not been started: C:\Program Files\pandora_agent\util\getreg.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsiBE5B.tmp\nsDialogs.dllJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsiBE5B.tmp\LangDLL.dllJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDropped PE file which has not been started: C:\Program Files\pandora_agent\util\tr.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDropped PE file which has not been started: C:\Program Files\pandora_agent\util\wc.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDropped PE file which has not been started: C:\Program Files\pandora_agent\util\cut.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsiBE5B.tmp\System.dllJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDropped PE file which has not been started: C:\Program Files\pandora_agent\util\puttygen.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDropped PE file which has not been started: C:\Program Files\pandora_agent\util\pandora_hardening.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDropped PE file which has not been started: C:\Program Files\pandora_agent\util\omnishell_client.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDropped PE file which has not been started: C:\Program Files\pandora_agent\util\sort.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDropped PE file which has not been started: C:\Program Files\pandora_agent\util\date.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDropped PE file which has not been started: C:\Program Files\pandora_agent\util\tail.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDropped PE file which has not been started: C:\Program Files\pandora_agent\util\grep.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDropped PE file which has not been started: C:\Program Files\pandora_agent\util\unzip.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDropped PE file which has not been started: C:\Program Files\pandora_agent\util\pandora_agent_exec.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDropped PE file which has not been started: C:\Program Files\pandora_agent\util\head.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDropped PE file which has not been started: C:\Program Files\pandora_agent\util\md5.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDropped PE file which has not been started: C:\Program Files\pandora_agent\util\curl.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDropped PE file which has not been started: C:\Program Files\pandora_agent\util\pandora_security_win.exeJump to dropped file
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeDropped PE file which has not been started: C:\Program Files\pandora_agent\util\ls.exeJump to dropped file
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\net1.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile Volume queried: C:\Program Files FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeFile Volume queried: C:\Program Files FullSizeInformationJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_00407F13 FindFirstFileA,FindClose,0_2_00407F13
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_004083A8 DeleteFileA,DeleteFileA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,0_2_004083A8
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_0040342B FindFirstFileA,0_2_0040342B
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeAPI call chain: ExitProcess graph end nodegraph_0-5982

Anti Debugging

barindex
Source: C:\Program Files\pandora_agent\util\ShortElev.exeDebugger detection routine: QueryPerformanceCounter, DebugActiveProcess, DecisionNodes, ExitProcess or Sleepgraph_15-1473
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_6E5C22B5 lstrcpyA,GlobalAlloc,GlobalFree,lstrcpyA,GlobalFree,GlobalFree,GlobalFree,GlobalFree,GetModuleHandleA,LoadLibraryA,GetProcAddress,GetProcAddress,lstrcatA,GetProcAddress,lstrcpyA,GlobalFree,0_2_6E5C22B5
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_00DB1BCC CreateControl,GetProcessHeap,GetProcessHeap,HeapAlloc,GetProcessHeap,GetProcessHeap,HeapReAlloc,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,lstrcmpiA,CreateWindowExA,SetPropA,SendMessageA,SendMessageA,SendMessageA,SetWindowLongA,GetProcessHeap,HeapFree,0_2_00DB1BCC
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_6E5C3AB0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,abort,0_2_6E5C3AB0
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_6E5C3AAC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,abort,0_2_6E5C3AAC
Source: C:\Program Files\pandora_agent\util\ShortElev.exeCode function: 15_2_00401179 Sleep,Sleep,SetUnhandledExceptionFilter,_acmdln,malloc,strlen,malloc,memcpy,__initenv,_cexit,_amsg_exit,_initterm,GetStartupInfoA,_initterm,exit,15_2_00401179
Source: C:\Program Files\pandora_agent\util\ShortElev.exeCode function: 15_2_004021C0 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,abort,15_2_004021C0
Source: C:\Program Files\pandora_agent\util\ShortElev.exeCode function: 15_2_004021BC SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,abort,15_2_004021BC
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\net.exe net stop pandoraFMSagentJump to behavior
Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 stop pandoraFMSagentJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Program Files\pandora_agent\PandoraAgent.exe PandoraAgent.exe --installJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net stop PandoraFMSAgentJump to behavior
Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\net.exe net start PandoraFMSAgentJump to behavior
Source: C:\Windows\System32\net.exeProcess created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 stop PandoraFMSAgentJump to behavior
Source: C:\Windows\System32\net.exeProcess created: C:\Windows\System32\net1.exe C:\Windows\system32\net1 start PandoraFMSAgentJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeQueries volume information: C:\ VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_6E5C3A00 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_6E5C3A00
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeCode function: 0_2_00404167 EntryPoint,SetErrorMode,GetVersion,lstrlenA,InitCommonControls,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,DeleteFileA,DeleteFileA,GetWindowsDirectoryA,DeleteFileA,DeleteFileA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,DeleteFileA,DeleteFileA,OleUninitialize,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_00404167

Lowering of HIPS / PFW / Operating System Security Settings

barindex
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c net stop pandoraFMSagent
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c net stop pandoraFMSagent
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c net stop pandoraFMSagent
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c net stop pandoraFMSagent
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c net stop pandoraFMSagent
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c net stop pandoraFMSagent
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c net stop pandoraFMSagent
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c net stop pandoraFMSagent
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c net stop pandoraFMSagent
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c net stop pandoraFMSagent
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c net stop pandoraFMSagent
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c net stop pandoraFMSagentJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c net stop pandoraFMSagentJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c net stop pandoraFMSagentJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c net stop pandoraFMSagentJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c net stop pandoraFMSagentJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c net stop pandoraFMSagentJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c net stop pandoraFMSagentJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c net stop pandoraFMSagentJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c net stop pandoraFMSagentJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c net stop pandoraFMSagentJump to behavior
Source: C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /c net stop pandoraFMSagentJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity Information11
Scripting
Valid Accounts2
Command and Scripting Interpreter
1
Windows Service
1
Windows Service
3
Masquerading
OS Credential Dumping1
System Time Discovery
Remote Services11
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault Accounts1
Scheduled Task/Job
1
Scheduled Task/Job
11
Process Injection
1
Virtualization/Sandbox Evasion
LSASS Memory21
Security Software Discovery
Remote Desktop Protocol1
Clipboard Data
1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain Accounts1
Service Execution
11
Scripting
1
Scheduled Task/Job
1
Disable or Modify Tools
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal Accounts1
Native API
1
Registry Run Keys / Startup Folder
1
Registry Run Keys / Startup Folder
11
Process Injection
NTDS2
File and Directory Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchd1
DLL Side-Loading
1
DLL Side-Loading
1
Obfuscated Files or Information
LSA Secrets15
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled Task1
DLL Search Order Hijacking
1
DLL Search Order Hijacking
1
Software Packing
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
DLL Side-Loading
DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
DLL Search Order Hijacking
Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 1543756 Sample: PandoraFMS_One_Agent_Window... Startdate: 28/10/2024 Architecture: WINDOWS Score: 32 58 Multi AV Scanner detection for dropped file 2->58 60 Found API chain indicative of debugger detection 2->60 8 PandoraFMS_One_Agent_Windows-lts.x86_64.exe 8 205 2->8         started        12 cmd.exe 1 2->12         started        14 PandoraAgent.exe 2->14         started        process3 file4 50 C:\Users\user\AppData\Local\...\LangDLL.dll, PE32 8->50 dropped 52 C:\Program Files\...\tentacle_server.exe, PE32 8->52 dropped 54 C:\Program Files\...\tentacle_client.exe, PE32 8->54 dropped 56 36 other files (8 malicious) 8->56 dropped 62 Potential context-aware VBS script found (checks for environment specific values) 8->62 64 Uses schtasks.exe or at.exe to add and modify task schedules 8->64 66 Disables security and backup related services 8->66 16 cmd.exe 1 8->16         started        18 cmd.exe 1 8->18         started        20 schtasks.exe 1 8->20         started        28 4 other processes 8->28 22 net.exe 1 12->22         started        24 net.exe 1 12->24         started        26 conhost.exe 12->26         started        signatures5 process6 process7 30 net.exe 1 16->30         started        32 conhost.exe 16->32         started        34 conhost.exe 18->34         started        36 PandoraAgent.exe 2 18->36         started        38 conhost.exe 20->38         started        40 net1.exe 1 22->40         started        42 net1.exe 1 24->42         started        44 conhost.exe 28->44         started        46 3 other processes 28->46 process8 48 net1.exe 1 30->48         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
PandoraFMS_One_Agent_Windows-lts.x86_64.exe3%ReversingLabs
SourceDetectionScannerLabelLink
C:\Program Files\pandora_agent\PandoraAgent.exe0%ReversingLabs
C:\Program Files\pandora_agent\uninst.exe0%ReversingLabs
C:\Program Files\pandora_agent\util\ShortElev.exe0%ReversingLabs
C:\Program Files\pandora_agent\util\autodiscover.exe3%ReversingLabs
C:\Program Files\pandora_agent\util\cmp.exe3%ReversingLabs
C:\Program Files\pandora_agent\util\curl.exe0%ReversingLabs
C:\Program Files\pandora_agent\util\cut.exe4%ReversingLabs
C:\Program Files\pandora_agent\util\date.exe4%ReversingLabs
C:\Program Files\pandora_agent\util\expr.exe0%ReversingLabs
C:\Program Files\pandora_agent\util\gawk.exe4%ReversingLabs
C:\Program Files\pandora_agent\util\getreg.exe0%ReversingLabs
C:\Program Files\pandora_agent\util\grep.exe3%ReversingLabs
C:\Program Files\pandora_agent\util\grep_log.exe0%ReversingLabs
C:\Program Files\pandora_agent\util\head.exe4%ReversingLabs
C:\Program Files\pandora_agent\util\ls.exe4%ReversingLabs
C:\Program Files\pandora_agent\util\md5.exe0%ReversingLabs
C:\Program Files\pandora_agent\util\mibs\makehtml.pl0%ReversingLabs
C:\Program Files\pandora_agent\util\mibs\mibfetch0%ReversingLabs
C:\Program Files\pandora_agent\util\mibs\smistrip0%ReversingLabs
C:\Program Files\pandora_agent\util\omnishell_client.exe0%ReversingLabs
C:\Program Files\pandora_agent\util\pandora_agent_exec.exe3%ReversingLabs
C:\Program Files\pandora_agent\util\pandora_hardening.exe13%ReversingLabs
C:\Program Files\pandora_agent\util\pandora_revent.exe0%ReversingLabs
C:\Program Files\pandora_agent\util\pandora_security_win.exe11%ReversingLabs
C:\Program Files\pandora_agent\util\pandora_update.exe0%ReversingLabs
C:\Program Files\pandora_agent\util\puttygen.exe0%ReversingLabs
C:\Program Files\pandora_agent\util\route_parser.exe0%ReversingLabs
C:\Program Files\pandora_agent\util\snmpget.exe4%ReversingLabs
C:\Program Files\pandora_agent\util\sort.exe3%ReversingLabs
C:\Program Files\pandora_agent\util\tail.exe3%ReversingLabs
C:\Program Files\pandora_agent\util\tentacle_client.exe0%ReversingLabs
C:\Program Files\pandora_agent\util\tentacle_server.exe4%ReversingLabs
C:\Program Files\pandora_agent\util\tr.exe4%ReversingLabs
C:\Program Files\pandora_agent\util\unzip.exe0%ReversingLabs
C:\Program Files\pandora_agent\util\wc.exe4%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsiBE5B.tmp\LangDLL.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsiBE5B.tmp\System.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsiBE5B.tmp\nsDialogs.dll0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://nsis.sf.net/NSIS_Error0%URL Reputationsafe
http://nsis.sf.net/NSIS_ErrorError0%URL Reputationsafe
http://www.openssl.org/support/faq.html0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://www.openssl.org/support/faq.htmlRANDPandoraAgent.exe, 00000008.00000000.1897515760.000000000079D000.00000002.00000001.01000000.0000000B.sdmp, PandoraAgent.exe, 0000001B.00000002.4162596872.000000000079D000.00000002.00000001.01000000.0000000B.sdmp, PandoraAgent.exe.0.drfalse
    unknown
    http://curl.haxx.se/libcurl/c/curl_easy_setopt.htmlcurl.exe.0.drfalse
      unknown
      http://nsis.sf.net/NSIS_ErrorPandoraFMS_One_Agent_Windows-lts.x86_64.exe, uninst.exe.0.drfalse
      • URL Reputation: safe
      unknown
      http://www.pandorafms.comPandoraFMS_One_Agent_Windows-lts.x86_64.exe, 00000000.00000002.4162559671.00000000007EE000.00000004.00000020.00020000.00000000.sdmp, PandoraFMS_Agent.url.0.drfalse
        unknown
        http://www.pandorafms.com.PandoraFMS_One_Agent_Windows-lts.x86_64.exe, 00000000.00000002.4163286809.0000000003963000.00000004.00000020.00020000.00000000.sdmpfalse
          unknown
          http://www.ietf.org/html.charters/agentx-charter.htmlAGENTX-MIB.txt.0.drfalse
            unknown
            http://https://-.://%s%s%s/%sallcurl.exe.0.drfalse
              unknown
              http://www.ietf.org/html.charters/ipv6-charter.htmlTCP-MIB.txt.0.dr, IP-FORWARD-MIB.txt.0.drfalse
                unknown
                http://pandorafms.orgconfig.tmp.conf.0.dr, pandora_agent_nsis.conf.0.drfalse
                  unknown
                  http://www.google.comconfig.tmp.conf.0.dr, pandora_agent_nsis.conf.0.drfalse
                    unknown
                    http://curl.haxx.se/Pcurl.exe.0.drfalse
                      unknown
                      http://www.fourmilab.ch/md5.exe.0.drfalse
                        unknown
                        http://nsis.sf.net/NSIS_ErrorErrorPandoraFMS_One_Agent_Windows-lts.x86_64.exe, uninst.exe.0.drfalse
                        • URL Reputation: safe
                        unknown
                        http://curl.haxx.se/docs/copyright.htmlDcurl.exe.0.drfalse
                          unknown
                          http://curl.haxx.se/docs/sslcerts.htmlcurl.exe.0.drfalse
                            unknown
                            http://www.iana.org/INET-ADDRESS-MIB.txt.0.drfalse
                              unknown
                              http://www.info-zip.org/UnZip.htmlDVarFileInfo$unzip.exe.0.drfalse
                                unknown
                                http://www.info-zip.org/zip-bug.html;unzip.exe.0.drfalse
                                  unknown
                                  https://support.pandorafms.com/PandoraFMS_One_Agent_Windows-lts.x86_64.exe, 00000000.00000002.4162559671.00000000007EE000.00000004.00000020.00020000.00000000.sdmp, LICENSE_EN.txt.0.dr, LICENSE_ES.txt.0.drfalse
                                    unknown
                                    http://www.iana.org/assignments/icmp-parametersIP-MIB.txt.0.drfalse
                                      unknown
                                      http://www.iana.org/assignments/icmpv6-parametersIP-MIB.txt.0.drfalse
                                        unknown
                                        http://www.openssl.org/support/faq.htmlPandoraAgent.exe, 00000008.00000000.1897515760.000000000079D000.00000002.00000001.01000000.0000000B.sdmp, PandoraAgent.exe, 0000001B.00000002.4162596872.000000000079D000.00000002.00000001.01000000.0000000B.sdmp, PandoraAgent.exe.0.drfalse
                                        • URL Reputation: safe
                                        unknown
                                        http://curl.haxx.se/docs/http-cookies.htmlPandoraAgent.exe, 00000008.00000002.1898706731.0000000000736000.00000002.00000001.01000000.0000000B.sdmp, PandoraAgent.exe, 0000001B.00000000.1928109476.0000000000736000.00000002.00000001.01000000.0000000B.sdmp, curl.exe.0.dr, PandoraAgent.exe.0.drfalse
                                          unknown
                                          No contacted IP infos
                                          Joe Sandbox version:41.0.0 Charoite
                                          Analysis ID:1543756
                                          Start date and time:2024-10-28 11:37:59 +01:00
                                          Joe Sandbox product:CloudBasic
                                          Overall analysis duration:0h 9m 50s
                                          Hypervisor based Inspection enabled:false
                                          Report type:full
                                          Cookbook file name:default.jbs
                                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                          Number of analysed new started processes analysed:30
                                          Number of new started drivers analysed:0
                                          Number of existing processes analysed:0
                                          Number of existing drivers analysed:0
                                          Number of injected processes analysed:0
                                          Technologies:
                                          • HCA enabled
                                          • EGA enabled
                                          • AMSI enabled
                                          Analysis Mode:default
                                          Analysis stop reason:Timeout
                                          Sample name:PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                          Detection:SUS
                                          Classification:sus32.evad.winEXE@39/174@0/0
                                          EGA Information:
                                          • Successful, ratio: 100%
                                          HCA Information:
                                          • Successful, ratio: 85%
                                          • Number of executed functions: 67
                                          • Number of non-executed functions: 42
                                          Cookbook Comments:
                                          • Found application associated with file extension: .exe
                                          • Override analysis time to 240000 for current running targets taking high CPU consumption
                                          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                          • Not all processes where analyzed, report is missing behavior information
                                          • Report size exceeded maximum capacity and may have missing behavior information.
                                          • Report size getting too big, too many NtOpenKeyEx calls found.
                                          • Report size getting too big, too many NtQueryValueKey calls found.
                                          • VT rate limit hit for: PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                          TimeTypeDescription
                                          10:39:15Task SchedulerRun new task: pandora_agent_restart path: "C:\Program Files\pandora_agent\scripts\restart_pandora_agent.bat"
                                          No context
                                          No context
                                          No context
                                          No context
                                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                          C:\Program Files\pandora_agent\util\cmp.exesaa.zipGet hashmaliciousUnknownBrowse
                                            setup_http_scclis.fcs.com_8080.exeGet hashmaliciousUnknownBrowse
                                              setup_http_scclis.fcs.com_8080.exeGet hashmaliciousUnknownBrowse
                                                Pandora FMS Windows Agent v7.0NG.772_x86_64.exeGet hashmaliciousUnknownBrowse
                                                  C:\Program Files\pandora_agent\util\ShortElev.exePandora FMS Windows Agent v7.0NG.772_x86_64.exeGet hashmaliciousUnknownBrowse
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:Non-ISO extended-ASCII text, with very long lines (1785), with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):43650
                                                    Entropy (8bit):4.469870888238485
                                                    Encrypted:false
                                                    SSDEEP:768:J7o0jN6DmQm019M+eM32qdFo748El964bHmt2oSXrF4qoGY9cnbZ3zoVr5Q4IaKE:do0vQmKGdYoq8923E6ZFVO
                                                    MD5:5D08FE845FD78A8E0C2A29A2EB6882B7
                                                    SHA1:5F78F8DDD2D7C34ECF43722E3F419C7A736EA988
                                                    SHA-256:748DAA8531D8546A84DC62A00145400E0A0117EA7218C56C0DA5E6052FDEEDC1
                                                    SHA-512:834ABF79B4A5D4D0D3976300F5AF632BAC23E011DB1DB9241E8F139BB9918BFE62E4F3F88DE7C3BF064466A28605739640EE233D9630F3EC32C164DD0F79F2E9
                                                    Malicious:false
                                                    Preview:License and terms of use Pandora FMS..Review: May 2024....General contract conditions..These general conditions of PandoraFMS. (the "Conditions") regulate the terms in which Pandora FMS gives intuitu personae to the Client the use of the PandoraFMS., Pandora ITSM or Pandora RC application and of the contracted components as well as the terms in which the support services and the other applicable conditions will be provided. The license of use is fully valid regardless of the services contracted and is an essential part of the contract signed between the parties together with the order or purchase order (if any) and the commercial proposal (all of them, together, the Contract)...These Terms and Conditions are binding to the Client and all entities and persons acting on the Client's behalf or in collaboration with the Client, whether they be employees, associates, collaborators, partners, suppliers or any other (hereinafter, the Associates). Particularly, it is understood that all refere
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ISO-8859 text, with very long lines (1875), with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):47992
                                                    Entropy (8bit):4.440165166034074
                                                    Encrypted:false
                                                    SSDEEP:768:MAEEwnV6zcg6jsX5NRea6NWDDQPLqUZiXXvJt0kMFoW5vdl6gL/DdBgw8OsZ:BVwnV6zcg6jq5feabvQ+UZiBt0ZFo6lE
                                                    MD5:8AFB4BCEAC29C741EAAFE8501FD6674E
                                                    SHA1:12DA7F60B1DC0601EAB1686BD06385C1D4B93EB4
                                                    SHA-256:F9872441254A9A50AF3613B0BFC730797416F89FE35E2751482DA7F985A5986E
                                                    SHA-512:7427110A8AA29E8C386F034B9FCE4D0CAC360774F38703C543B65A2BFAF50C05628EF8B56AEFD1E136D79D5D47758135D0FEE3005AF4EB800803664692C1B10F
                                                    Malicious:false
                                                    Preview:Licencia y condiciones de uso de Pandora FMS..Revisi.n: Mayo 2024....Condiciones generales de contrataci.n..Las presentes condiciones generales de PandoraFMS. (las condiciones, en lo sucesivo) regulan los t.rminos en que Pandora FMS cede intuitu personae al Cliente el uso de la aplicaci.n PandoraFMS., Pandora ITSM, Pandora NMS o Pandora RC y de los componentes asociados contratados as. como los t.rminos en que se prestar.n los servicios de soporte y las dem.s condiciones aplicables. La licencia de uso tiene plena validez con independencia de los servicios contratados y es parte esencial del contrato firmado entre las partes junto con la orden de pedido o de compra (en su caso) y la propuesta comercial (todos ellos, en su conjunto, el Contrato)...Las presentes condiciones obligan al Cliente y a todas las entidades y personas que act.en en su nombre, por su cuenta o en colaboraci.n con el Cliente, ya sean trabajadores, socios, colaboradores, partners, proveedores o cualesquiera otros (e
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:PE32+ executable (console) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):7811449
                                                    Entropy (8bit):6.228220490058277
                                                    Encrypted:false
                                                    SSDEEP:98304:iTIdfJqZmkm7rnsb9xbmFWm1pS/+DyzaSnfvmZddTGhLurIhANb6byz0MFKVsXSU:itZfLb0pukyLsui
                                                    MD5:D885123606524EA6542E5AC351FB3529
                                                    SHA1:4A227CD193A6C9E52DD45CEE88E882392536D1B2
                                                    SHA-256:60D2F3629D5AAF94895FC7190D82E054EB8C434A5B0E0C0C5F0DD32CFEBBD413
                                                    SHA-512:B93F72B2E70914282AF5BF2A2FB44B343537D601AC7696087EAF722C1B5DB81B5C626F1379E5312F9FC57A8CBD74A23CB2E715EEA060F74C98482DCC8104F919
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....u.f..X._.....'.......2...B...............@...............................Z.......w...`... ..............................................pC.,0....C.P.....>............................................. .C.(....................{C..............................text... .2.......2.................`..`.data....<... 2..H....2.............@.p..rdata.. ....`3......P3.............@..@.pdata........>.......>.............@.0@.xdata....... @.......@.............@.@@.bss.... .....B.......................p..idata..,0...pC..2....B.............@.0..CRT....h.....C.......B.............@.@..tls....h.....C.......B.............@.`..rsrc...P.....C.......B.............@.0./4......`.....C.......B.............@..B/19...........C.......B.............@..B/31...........R.......Q.............@..B/45..........`S......<R.............@..B/57......i...`T..j...6S.............@.@B/70.....
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:MS Windows 95 Internet shortcut text (URL=<http://www.pandorafms.com>), ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):51
                                                    Entropy (8bit):4.603222890736578
                                                    Encrypted:false
                                                    SSDEEP:3:HRAbABGQYm/0S4XUUWZF:HRYFVm/r4TqF
                                                    MD5:122B5BED58055866A70C579A063F7DB7
                                                    SHA1:471DB72AD3631191C4A1FAE84A549BACA2869946
                                                    SHA-256:FF186D9000AAE2A5C32EBFF00BEBEB8561BC45A3AEC98E8E2ACEAF1B9C3772CF
                                                    SHA-512:E27FDCFB11F4B7FD7EE2D46E87B8658AEB26FD68BB50A85ADB3DD57074219DC8DD683EC64F458A2E0E55E6404B3C2BD8B1830C74AA5F76B4D5C43799E3FB3CC7
                                                    Malicious:false
                                                    Preview:[InternetShortcut]..URL=http://www.pandorafms.com..
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with very long lines (556), with CRLF, LF line terminators
                                                    Category:dropped
                                                    Size (bytes):15956
                                                    Entropy (8bit):4.6916421717170635
                                                    Encrypted:false
                                                    SSDEEP:384:q7Mheefshv7+GyIUhEFr55XjPVc5UHu8OmTAQMAMrLUtXbsvb4z71zj+:speEhaI4EFr/Rc5UHxNxdoUtXbEb4z74
                                                    MD5:D87FEC777F849B7CECDDA2A243091AB9
                                                    SHA1:F44691748EEB72915CF9BC48903C8BBC3F3F38C5
                                                    SHA-256:F61A2C07D84F668B577DC61B0DADE1D11FF1E6352D2831BD084FD24188143CC8
                                                    SHA-512:7ED1F6A6ED812D0C7A18B4F14D7EE4DE917CCE73EE3A07DD4821FB45B1A2A6DCECED0F3FC83A3432C1B0A2231E76CAD5555554A7909E9F133BD19D2B7430ABE1
                                                    Malicious:false
                                                    Preview:Pandora FMS Agents...==================......Please checkout our latest Pandora FMS documentation at http://pandorafms.org....This README file is not intended to be a documentation, only a brief introduction to Pandora FMS windows agent.......Understanding what is a Pandora FMS Agent...-----------------------------------------......Pandora FMS agents collect all system's data. They are executed in each local system, although they can also collect remote information by installing monitoring systems for the agent in several different machines - called satellite agents.......They are developed to work under a given platform, making use of the specific tools of the language being used: VBSCript/Windows Scripting for Microsoft platforms (Win2000, WinXP y Win2003), ShellScripting for UNIX - which includes GNU/Linux, Solaris, AIX, HP-UX and BSD, as well as the Nokia's IPSO. Pandora agents can be developed in virtually any language, given its simple API system and being open source. There are
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:C source, Unicode text, UTF-8 text
                                                    Category:dropped
                                                    Size (bytes):13433
                                                    Entropy (8bit):4.956484636428058
                                                    Encrypted:false
                                                    SSDEEP:192:eIaSjJZcaH1Ym0hVkgxcT8fCeSILsEwU7yl0tMd4Py48WJm43fpMGX4l8PMda7O1:P/co6m0hqicT8SIIEZ1PB8XDPbY5b/+
                                                    MD5:77C7E1A77B5BA039E8614913219CFE35
                                                    SHA1:EB7C8D479ED77D6CC6E5A8B6822D7DC8F7146B8B
                                                    SHA-256:16FF3398E8AB258ED8D4C68D424029FD208B9B26636133FEFBCAA9BBC46AA0CB
                                                    SHA-512:53F763BF3924C3AAC71B9DB454C61D52BAE10F59A35F4CF0010F7EC13F959D9F3A6EE09E701F864E6D986D19204CCA1795CDEF919150D693FF5CD0A25D69CC1F
                                                    Malicious:false
                                                    Preview:#include "C:\Archivos de programa\pandora_agent\pandora_agent_alt.conf".#broker_agent name_agent..# Agent uses your hostname automatically, if you need to change agent name.# use directive agent_name (do not use blank spaces, please)..# This parameter is CASE SENSITIVE...# agent_name My_Custom_Agent_name..# To define agent name by specific command, define 'agent_name_cmd'..# If agent_name_cmd is defined, agent_name is ignored..# (In the following example, agent name is 'hostname_IP').# If set to __rand__ the agent will generate a random name..#agent_name_cmd cscript.exe //B "%ProgramFiles%\Pandora_Agent\util\agentname.vbs".agent_name_cmd __rand__..# Agent alias. Name should be unique rather than alias. Hostname by default.# agent_alias $Alias$..#Parent agent_name.#parent_agent_name caprica..# address: Enforce to server a ip address to this agent .# You can also try to detect the first IP using "auto", for example.address auto.# or setting a fixed IP address, like for example:.#address
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:PEM DSA private key
                                                    Category:dropped
                                                    Size (bytes):668
                                                    Entropy (8bit):5.979179465329993
                                                    Encrypted:false
                                                    SSDEEP:12:Lr724byv6crXRGw5hQT4m1xQo5MajP/04SSpsYzkl9hcKBU8HKs7mkrgOSxXzKvn:Lr724bBKksorH+SpsVlTVtHf3iD2X
                                                    MD5:A440B1209E716B8459F3DBC149CEEE84
                                                    SHA1:F4334C049829845076E20881D51A3DC06BEA5736
                                                    SHA-256:C70AA13AE0FF89BD5299EA1E29743A525E4ED94BEB34963D7CEAE06C35FBAEDE
                                                    SHA-512:142667818DD080FCF53425D6FA2D6B8C616936E80428D00FA8B7F404895ECC00C935D98F1CB034C0E5B328AE919D5BCF9C4978C141F2FCCAAFB976C48FAB9A6F
                                                    Malicious:false
                                                    Preview:-----BEGIN DSA PRIVATE KEY-----.MIIBuQIBAAKBgHv83WLb4FhOIyqFJjaGvrdBAlhQysvIxeVJRVU40c0hmc0dgWBr.LDJ2gWJu3YlewJGjYtAOTdYH231QrIiBpiutqmKyfwGGo11g7uz3hZB0922Q+4LR.g6ARdCpvWyxYOx4SJDNCPfDqQT/S0OIo7XikU9Pls4khQGRLeKWmTW69AhUAjwNN.7ATXOSuUorVyHZ1kh9QUDU0CgYAFp5pKgPsGW1pxrMPp9jpztfnY4UShJv1kVqKH.9uPc0UksseOTcTtgvZIn7YAete88Jswg1M14VBmCV0MuBLRm5ba0EoXzPxf3/hFX.+AArDz58QklFdSXs07pg66b9L5YxhxrH37wQK4M+6OGiUsBCZDo4PnIy3sfmaPSo.U4nAlAKBgHthtTw3NVOBCfNJGl7/fmi8uVX5Z3PARqyYfuoGmy1TGpx0oDllsXwB.d4gGSGAeNYhT83ndABtttY2UqBfnI8VHgsxepdG0HqtkLDjQLhGTNA/Y2vhO35Nd.kSDsnUDn1pTUu1//Xlx7VHxf/5DPBIF2lts+Hfk7c1+d4eTDcs6FAhRZpURIcied.hWYzHMCW/HEv/C/plQ==.-----END DSA PRIVATE KEY-----.
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:OpenSSH DSA public key
                                                    Category:dropped
                                                    Size (bytes):603
                                                    Entropy (8bit):5.9180826840201695
                                                    Encrypted:false
                                                    SSDEEP:12:BayIZzjeRFRevUa+p++2WbSvQZJkE/L7ZWC6r+rbHKcN7mkrggSxL:x4eRavmEOJkiLVIGbHr1M
                                                    MD5:BAB6678DF71AF38522D1EDBB6A2378CF
                                                    SHA1:8EC2C526483BB2DD8CD61F2E11FF43DA4800FEEC
                                                    SHA-256:E0E8C684D8BEC7B5922D3A70DF615FAA1034B2F4A559C5AB838065D56F137454
                                                    SHA-512:26D56CD50E831AB3239F636E71F5B704F863FC5D23EB97E4AD1428C9DA0055804017691DA6ACDB95FEDCCF119BA2C31809365E5AD9AB52A48E961D52094676EC
                                                    Malicious:false
                                                    Preview:ssh-dss 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 dsa-key-20070820..
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:MS Windows icon resource - 1 icon, -62x-63, 32 bits/pixel
                                                    Category:dropped
                                                    Size (bytes):155234
                                                    Entropy (8bit):2.437683176628952
                                                    Encrypted:false
                                                    SSDEEP:192:cE0EXDTjnHnHnwEn0E0+lJ5E2Tb+g0ck3ttTS2GdzboZCRxLyhpABNx7mRLBo0Nx:cE0EzQE0EBkPT/2czTPTEi7oAHEk
                                                    MD5:85D847A303A902597C10499B564309E6
                                                    SHA1:95FBA86DCCA8A12E1E62FF35DDF5C070729EF165
                                                    SHA-256:0DDD6C3227F03A0468C7827D7FE31A57C88912E68FFFEC43663D49B3BDC7161A
                                                    SHA-512:675748F58F9175BD9A31DC3A8C15ED7A69EAFDBB34C3CB4B2B46A8ACDC9FB247DEAFE4D262067575E16A39E2FB18A9F3A36E3591B810E7DC87814C854055E14F
                                                    Malicious:false
                                                    Preview:............ .L^......(............. ......I............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Program Files\pandora_agent\PandoraAgent.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:modified
                                                    Size (bytes):43
                                                    Entropy (8bit):4.414409522043331
                                                    Encrypted:false
                                                    SSDEEP:3:tR7qdCcfUs1DASw:nmCurpw
                                                    MD5:90BF5F549941BDFA86FC681EFAA7A5A5
                                                    SHA1:47EA99919D2CE871B3D3A25464BDAA4811B6C705
                                                    SHA-256:DEC8109576774FA56B25A90BDEEDAB8D13AF5AB2EF6699DE7719DC7AF979504D
                                                    SHA-512:48793C61D3AB8FD88929254A3662A1081034D9D3BCC51B3BA292D2D194CFD2AEA33845E56C782159D65BB66DD0D96E5A280BAC7FF4BA11B164A5C9CC3C252600
                                                    Malicious:false
                                                    Preview:2024-10-28 06:39:12 Pandora agent stopped..
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text
                                                    Category:dropped
                                                    Size (bytes):112
                                                    Entropy (8bit):4.714203949796385
                                                    Encrypted:false
                                                    SSDEEP:3:UCXwXU6uL8UH984uHMkgmHhtGPmkN32TNi:z56X2984uVgmHhtgmkMTQ
                                                    MD5:D6F8FD64C1C88BA05E44E2ADE2023DDF
                                                    SHA1:9F498E3EF71A445B931B7B850B86AE09DAC69819
                                                    SHA-256:87ED7D01804E4567EDE299F9446005CCA5BBD198DD42CC08E913307935D4DCDE
                                                    SHA-512:227045482575D036127C46793303CCF47987BAD16D4F363B9166CFDB49413566CABCB5247A62D18E480A7DE207CF6AB8C80A1A83B33F78FCD68BE3A61597FA2A
                                                    Malicious:false
                                                    Preview:AT|grep restart_pandora_agent|gawk "{print \"@AT \"$1\" /DELETE\"}" > DEL-AT.BAT & @DEL-AT.BAT & DEL DEL-AT.BAT.
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):63
                                                    Entropy (8bit):4.417933400364558
                                                    Encrypted:false
                                                    SSDEEP:3:RT9mbZjd1KUkBKUMQDHy:RTEpSrDHy
                                                    MD5:243807D40129ADEDE071D14B06563C78
                                                    SHA1:B6262527832AA4C9AD99242DC2C2B4D6DD9B11A9
                                                    SHA-256:9BBF07AB1790772F53E71148713AB582725D28FCBA65138F3279EB557DFF5FA2
                                                    SHA-512:7CECD56FFEC343FDBFAE4E446E2EBF47560CEDA3067CD4495AB1CCD853152CF4C06A3F4D2D25D6914883832CBA21F3CAA1AD151B5A7C0950FB88F0873F3000E0
                                                    Malicious:false
                                                    Preview:@start "" "C:\Program Files\pandora_agent\pandora_agent.conf"..
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text
                                                    Category:dropped
                                                    Size (bytes):215
                                                    Entropy (8bit):4.775024460909131
                                                    Encrypted:false
                                                    SSDEEP:6:7LJpaDoHUo/YH7ul6X24uR/uPrCutl6X24E:7LJK+UnH7ul60/ujhtl6i
                                                    MD5:F34B84C10D7720C198453819F8496ED7
                                                    SHA1:3F7F3DCE7A3AE77B6216E3438CB17861D290488F
                                                    SHA-256:3BBB79C33EDAE0419C6A28A412E085C3BC09B7AACA57A5DA848ABA22BAEFF1DF
                                                    SHA-512:88B9E3A9A828DBE9D925A6AD8D99AF323CEA8549AE83AE54A82DF184FDC913607F5391C2352E40F6A3EA86D320426A01AEA712C43CBD8B793201B129BC3C164D
                                                    Malicious:false
                                                    Preview:@at 00:00 /every:1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30 "'%CD%\restart_pandora_agent.bat'"..schtasks /change /tn pandora_agent_restart /tr "'%CD%\restart_pandora_agent.bat'"
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text
                                                    Category:dropped
                                                    Size (bytes):53
                                                    Entropy (8bit):3.9867756444218045
                                                    Encrypted:false
                                                    SSDEEP:3:mjW0PiKqkXResp1xkXRv:m1MxJ
                                                    MD5:0F0529A8B75A1F4C69953A54BF877DBC
                                                    SHA1:319C861AB205B99E5A9FBC444B2A49D517D1EA5F
                                                    SHA-256:1385B0D9463BE450C515C37117C1FDE69E3EAEDE7303F6A890A746A5C4DDA4FB
                                                    SHA-512:BB35D6B1A26E0881F2930CDBA739FFF5C410DB1BF8439ECC7BDF305ADA228CBD282FC9ADE10F7A80D6C3653CFCDCF383FC86FA820EB2C1E052D31CA8DEAC363A
                                                    Malicious:true
                                                    Preview:@net stop PandoraFMSAgent.@net start PandoraFMSAgent.
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):26
                                                    Entropy (8bit):3.671405583442497
                                                    Encrypted:false
                                                    SSDEEP:3:mjWJL8UvULRn:mIYLR
                                                    MD5:9EF4B7B9606F25304F8E79D872467B95
                                                    SHA1:36DC45F0FE5E507001BC853634AA3E11AE10B19E
                                                    SHA-256:8AA892FD16C9A2B74DEB858332C208321D5A4FD685AAE0752D1543A038FF895F
                                                    SHA-512:1E1F99A6588385E482A30D103C7BA6256E6229BC15E59D57E6635E1DCF22568A492DEBE42F7B57D3EF72A61CFFF95204FFE2F0B9F62624E5920E0C636D8CFA37
                                                    Malicious:false
                                                    Preview:@net start pandoraFMSagent
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with no line terminators
                                                    Category:dropped
                                                    Size (bytes):25
                                                    Entropy (8bit):3.7532696895151085
                                                    Encrypted:false
                                                    SSDEEP:3:mjW0viTvULRn:mZLR
                                                    MD5:8F2979326EBA715FB8755ABD431E3CB8
                                                    SHA1:C85ECF769C5F88C12A74D94FA2FF811602C37638
                                                    SHA-256:5A108C7E7E92681E2FE9896D15D7CEC5F5FF80FD066D71D22389AB2BDF531C25
                                                    SHA-512:9C2F16AB7C4F089055BD14CB1AC526AC96A89D2C44C9E75352EA04E054EE926B35AE50CE851C09D28316C2E5CB5B98E7601FD9E3FB623510807E60251DF02DB3
                                                    Malicious:false
                                                    Preview:@net stop pandoraFMSagent
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:C source, Unicode text, UTF-8 text
                                                    Category:dropped
                                                    Size (bytes):15630
                                                    Entropy (8bit):5.040398790073593
                                                    Encrypted:false
                                                    SSDEEP:192:2IaSjJZcaH1Ym04VkgxcT8fCeSILsEwFnG9i7ylEd4Py48WJm43fpMGX4l8PMdaJ:X/co6m04qicT8SIIJzAPB8XDPbY5b//
                                                    MD5:6408A659A532A04C95DAA74DBC265CC6
                                                    SHA1:FD6ED40F3161B2E120D224DED68F27ED7174FC42
                                                    SHA-256:2C19E9BC896D8ABF9F99EBFFFDD943B9DDFA4267F3D45C6A18D88CC5C07266BD
                                                    SHA-512:20D9F0748E30BA99F1674EF13317EB2C5A3871D7B81778570E97FFA066B06E71E82F67F065B6D0970EF8EE772F5795C7F85ABBA489EAFADD1447353A4AE65C59
                                                    Malicious:false
                                                    Preview:.#include "C:\Archivos de programa\pandora_agent\pandora_agent_alt.conf".#broker_agent name_agent..# Agent uses your hostname automatically, if you need to change agent name.# use directive agent_name (do not use blank spaces, please)..# This parameter is CASE SENSITIVE...# agent_name My_Custom_Agent_name..# To define agent name by specific command, define 'agent_name_cmd'..# If agent_name_cmd is defined, agent_name is ignored..# (In the following example, agent name is 'hostname_IP').# If set to __rand__ the agent will generate a random name..#agent_name_cmd cscript.exe //B "%ProgramFiles%\Pandora_Agent\util\agentname.vbs".agent_name_cmd __rand__..# Agent alias. Name should be unique rather than alias. Hostname by default.# agent_alias $Alias$..#Parent agent_name.#parent_agent_name caprica..# address: Enforce to server a ip address to this agent .# You can also try to detect the first IP using "auto", for example.address auto.# or setting a fixed IP address, like for example:.#address
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, Nullsoft Installer self-extracting archive
                                                    Category:dropped
                                                    Size (bytes):248105
                                                    Entropy (8bit):4.714092305675643
                                                    Encrypted:false
                                                    SSDEEP:3072:yObkmXlKp0OJ6Ixw5L1A5mKmV+xvSeAZFVjFj3:0m11O0tMHQ+vEZF7j3
                                                    MD5:F8D684076FEC4F11E669E1703F8B0594
                                                    SHA1:6F4906C82885A87682F19B59870BB6B9C7F75105
                                                    SHA-256:0A90011466A029E070A26A4D5DED7DB70D82032B5F5E67B46AFC82035B64A117
                                                    SHA-512:49A8B5B70DBDEAE16226504AF890BD2A682949334B52994BE737D9013CBEA8638A78583870D94C182BF303B9897962CDEA83C253B279D957185F3829234C595A
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..... W.........................Z..gA............@..........................P......:......... .................................|..................P................................................................................................text...p........................... .0`.data...............................@.`..rdata...k.......l..................@.`@.bss.....Z... ........................`..idata..|...........................@.0..ndata..............................@.`..rsrc..............................@.0.........................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):111404
                                                    Entropy (8bit):5.451523445205609
                                                    Encrypted:false
                                                    SSDEEP:1536:nh7r8Jq7Mvpo+6g6N7+u1j33zeupIHWTu3yMXnKbFuOTKDsBHvZ8N:h/8Jtvn6r33zNZjKQx8N
                                                    MD5:0137DF9F792F635269E6FFF74F238C95
                                                    SHA1:160E1A74D9AA7527950E78F55AA2781F254E3A0D
                                                    SHA-256:D8CB74994754E0FE701F842651AD5EA4F54B41C0450ECFD511E2B7A8C761847E
                                                    SHA-512:4D6E03EE9BC7F90095119C025481D237E065F87339B34165521A8FA78F84056AF3C96439207A72B9B2C00E7D16C8FCFE11E9E97BEF4753F8170979A887DD7EED
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Joe Sandbox View:
                                                    • Filename: Pandora FMS Windows Agent v7.0NG.772_x86_64.exe, Detection: malicious, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......\.D..!................................0....@........................................... ..............................p.......................................P...............................................q...............................text...$...........................`.P`.data...,....0......................@.0..rdata..0....@....... ..............@.0@/4......5....P.......&..............@.0@.bss....P....`........................p..idata.......p.......(..............@.0..CRT....4...........................@.0..tls.... ............0..............@.0./14..................2..............@.@B/29..................6..............@..B/41..........p......................@..B/55.................................@..B/67..................$..............@.0B/80..................,..............@..B/91..................0..............@..B/102....`............@..
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):762
                                                    Entropy (8bit):5.126338636437445
                                                    Encrypted:false
                                                    SSDEEP:12:JKxsyu2/zqkNwKkO0DHOzbEF+MSdGHJB5qW0VoFyjG2laNTSby59ECbgUkTyn:JKxsyu2/zVmZOH4+5GpujGWaNTh0mn
                                                    MD5:DE44AD7D6FBF39526F68AF40E9ECD4A7
                                                    SHA1:8A4F4981ED33C64F33568942603405575631658C
                                                    SHA-256:A7C65773E82FF00050C82FA2A533F2766F36580E252E667A96F6D7EF7000E0B0
                                                    SHA-512:6620C3ADCB0A0B620D0EF30B9289E7A68E06DF6C23A74436D9078054CA8D781E3E362E66F3DFFDB37071F02C0CB04FB58137D383388B3890F30ACD072E761DBC
                                                    Malicious:false
                                                    Preview:' agentname.vbs..'..' Pandora FMS external command sample for 'agent_name_cmd' token...' This script returns agent name like 'hostname_IPaddress'...' (c) 2014 Junichi Satoh <junichi@rworks.jp>..' ------------------------------------------....Option Explicit....Dim objNetWork..Dim oClassSet..Dim oClass..Dim oLocator..Dim oService....Set objNetWork = WScript.CreateObject("WScript.Network")....Set oLocator = WScript.CreateObject("WbemScripting.SWbemLocator")..Set oService = oLocator.ConnectServer..Set oClassSet = oService.ExecQuery("Select * From Win32_NetworkAdapterConfiguration")....For Each oClass In oClassSet....If oClass.IPEnabled = True Then....Wscript.StdOut.WriteLine objNetWork.ComputerName & "_" & oClass.IPAddress(0)..Exit For....End If....Next..
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1229
                                                    Entropy (8bit):5.2014182276832495
                                                    Encrypted:false
                                                    SSDEEP:24:Wxv0Rk8Q824Uhz/Arwlt/PDv9UKRUh7xav0Y9C6yX:WFOkrxZwKt/PDvavAcb6W
                                                    MD5:AEBD70C47BCEDD3C82D139EFD3417AED
                                                    SHA1:74D38B51B0C7735435B074D6B243D9A68DD7E4C5
                                                    SHA-256:B0EE089647DDEF0B8FF8E31242AD70F69348B0F0F64DA6C8677DD9825F633FA9
                                                    SHA-512:B45A5501400133F7D6D3878AA3CFF0C462097E0F440914563DA2532C82079CE2F8E1182D786BB7C88E71A2A5F2392675E745CA630D20EC4384DD85EAD32C8ADB
                                                    Malicious:false
                                                    Preview:' Pandora FMS Agent Inventory Plugin for Microsoft Windows (All platfforms)..' (c) 2015 Borja Sanchez <fborja.sanchez@artica.es>..' This plugin extends agent inventory feature. Only enterprise version..' --------------------------------------------------------------------------..'WMI architecture....strComputer = "."..Set objWMIService = GetObject("winmgmts:" & "{impersonationLevel=impersonate}!\\" & strComputer & "\root\cimv2")..Set cols = objWMIService.ExecQuery("Select osarchitecture from Win32_OperatingSystem")....on error resume next..flag = cols.Count..If (err.number <> 0) Then.. flag = true..Else.. flag = false..End If..on error goto 0 ....'Print only when there's results..If (NOT flag) Then...Wscript.StdOut.WriteLine "<inventory>"...Wscript.StdOut.WriteLine "<inventory_module>"...Wscript.StdOut.WriteLine "<name>Architecture</name>"...Wscript.StdOut.WriteLine "<type><![CDATA[generic_data_string </type>"...Wscript.StdOut.WriteLine "<datalist>".....For Each data In cols... Ws
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:PE32+ executable (console) x86-64, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):7549822
                                                    Entropy (8bit):7.991056147503995
                                                    Encrypted:true
                                                    SSDEEP:196608:gi8oadQmR5dA6lOuErSEEJwdF6x0YPikiTf:uBdQ2lO+9Jx0h7
                                                    MD5:B78E6406E3C0DA278DB5BCED101601EA
                                                    SHA1:91FA0194585EC6B89D1C55B8CF7582518C852F4D
                                                    SHA-256:748A486B9C21B2EEC81BC6B4CBFC95BBF632F31A5F9D1C60847A5CB05A01AE00
                                                    SHA-512:26C1B2E7D6D6BC8F9BC3DE0DE64917118621533A9E2A5C230174539BC1759113DFC8120537EA8489B623212A14C414F6569F5CADA4AF5BE6A4481000D92052CE
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 3%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......?.^.{.0.{.0.{.0.0.3.|.0.0.5...0.0.4.q.0.4...x.0.4.5.S.0.4.4.j.0.4.3.r.0.0.1.~.0.{.1...0..4.o.0..2.z.0.Rich{.0.........................PE..d...N..d.........."....".....T.................@.............................0......i.s...`.....................................................<.... ........... ........... ..\...P...................................@...............P............................text............................... ..`.rdata...'.......(..................@..@.data...............................@....pdata... ......."..................@..@_RDATA..\...........................@..@.rsrc........ ......................@..@.reloc..\.... ......................@..B................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1365
                                                    Entropy (8bit):5.284576325089948
                                                    Encrypted:false
                                                    SSDEEP:24:Wxv0Rk8Q8v8TGUhz/ArQ3H2WWDv9UKRULxav0A+S5TH:WFOkJTZwQ3H2WWDvaOcAH
                                                    MD5:7C454F085648F76838D1A9002AB7C5EA
                                                    SHA1:5591D61EA5ACBA733EC2F18FF81456B515387919
                                                    SHA-256:E20CA1639B50492EC6B84ACDB36BD396F9B11A63D0AE6DDAC3DFB99CDDA24F83
                                                    SHA-512:62D5175DA6B2747735BED6B88BE9D5058C341E572B2BFC0A8886D6483EB69EBEEDBDB1AF60F000E1CA0D32BE97F016D35EB1679F6A372A61B2F53AA71C0EE7A6
                                                    Malicious:false
                                                    Preview:' Pandora FMS Agent Inventory Plugin for Microsoft Windows (All platfforms)..' (c) 2015 Borja Sanchez <fborja.sanchez@artica.es>..' This plugin extends agent inventory feature. Only enterprise version..' --------------------------------------------------------------------------..'WMI CD_ROM_drives_info....strComputer = "."..Set objWMIService = GetObject("winmgmts:" & "{impersonationLevel=impersonate}!\\" & strComputer & "\root\cimv2")..Set colCDROMDrives = objWMIService.ExecQuery("Select caption,description,drive,deviceid from win32_CDROMDrive")....on error resume next..flag = colCDROMDrives.Count..If (err.number <> 0) Then.. flag = true..Else.. flag = false..End If..on error goto 0 ....'Print only when there's results..If (NOT flag) Then...Wscript.StdOut.WriteLine "<inventory>"...Wscript.StdOut.WriteLine "<inventory_module>"...Wscript.StdOut.WriteLine "<name>CDROM</name>"...Wscript.StdOut.WriteLine "<type><![CDATA[generic_data_string </type>"...Wscript.StdOut.WriteLine "<datalist>
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):11264
                                                    Entropy (8bit):5.501792845685448
                                                    Encrypted:false
                                                    SSDEEP:192:GM5+2WWQnoGXFv5gyGR/vGnXSsxzxQcvV+zg5i3qN:D5ajoG1v9sGv9+z/3qN
                                                    MD5:DAA576E1978EADB12553E248153B75C6
                                                    SHA1:A459ADCD4731222FFE69CF58614B60B2F1D6E960
                                                    SHA-256:D9D3E81879F07A958218D9EC371198246E2A77A21854CDAC850E093148E2E05D
                                                    SHA-512:5BA3F2DDF93ABFE54AB5CF1CD4C6268C219D961AE36ACE442F739B23027027784121CF4CCFD21B30BDA90591833CB88BD3BA92159CCB9C258D9B6BB8DAD4A66C
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 3%
                                                    Joe Sandbox View:
                                                    • Filename: saa.zip, Detection: malicious, Browse
                                                    • Filename: setup_http_scclis.fcs.com_8080.exe, Detection: malicious, Browse
                                                    • Filename: setup_http_scclis.fcs.com_8080.exe, Detection: malicious, Browse
                                                    • Filename: Pandora FMS Windows Agent v7.0NG.772_x86_64.exe, Detection: malicious, Browse
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....~~:...............7. ...................0....@..........................`...............................................P..\....................................................................................................................text............ .................. ..`.data...8....0.......$..............@....bss....0....@...........................idata..\....P.......&..............@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1267
                                                    Entropy (8bit):5.283370013468892
                                                    Encrypted:false
                                                    SSDEEP:24:Wxv0Rk8Q8P6Uhz/ArrcOXxDv9UKRUQxav0ouJMTX:WFOkKZwrcOXxDvaXc5s
                                                    MD5:FA325AB5682E3CAE8E9347829969F91D
                                                    SHA1:6A8FE0D684824804F0B024BDE8ADF748FAC3DD14
                                                    SHA-256:F3AA1F52D0D61F4DB162B906F7E97E54A998ACBE7A9543A5F30EE319FBEA3E4E
                                                    SHA-512:3357B0D8A6102435D48DDF57C818F9EEA201BF67A96BFA7655B410D61F316EECDB2C61BF0E3B6CCF66C74C3FEDEBA490CB8C5AB448BC8BCD07798FFFFDA6857F
                                                    Malicious:false
                                                    Preview:' Pandora FMS Agent Inventory Plugin for Microsoft Windows (All platfforms)..' (c) 2015 Borja Sanchez <fborja.sanchez@artica.es>..' This plugin extends agent inventory feature. Only enterprise version..' --------------------------------------------------------------------------..'WMI cpuinfo....strComputer = "."..Set objWMIService = GetObject("winmgmts:" & "{impersonationLevel=impersonate}!\\" & strComputer & "\root\cimv2")..Set colCPUs = objWMIService.ExecQuery("Select name,maxclockspeed,caption from Win32_Processor")....on error resume next..flag = colCPUs.Count..If (err.number <> 0) Then.. flag = true..Else.. flag = false..End If..on error goto 0 ....'Print only when there's results..If (NOT flag) Then...Wscript.StdOut.WriteLine "<inventory>"...Wscript.StdOut.WriteLine "<inventory_module>"...Wscript.StdOut.WriteLine "<name>CPU</name>"...Wscript.StdOut.WriteLine "<type><![CDATA[generic_data_string </type>"...Wscript.StdOut.WriteLine "<datalist>".....For Each cpu In colCPUs... Ws
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text
                                                    Category:dropped
                                                    Size (bytes):221363
                                                    Entropy (8bit):6.002589296839173
                                                    Encrypted:false
                                                    SSDEEP:6144:vNc597qxzwd9aUaNR6dTd4tL2b02dTDkMgV:vNcf7M576f4tLe0mIMq
                                                    MD5:3231FBCBBB54C2963DC37F7224F127FF
                                                    SHA1:5F128B187304334D2C3100D920E74B14D0922B9B
                                                    SHA-256:0D98A1A961AAB523C9DC547E315E1D79E887DEA575426FF03567E455FC0B66B4
                                                    SHA-512:66816E077EE99CEB9535A472E6BBF4F0E48CA838099C8A97C7BAF3297FCADA9A43016EA1DED63A455EE56A8F18501417A0F744FC17B215BB599CAFD76B754518
                                                    Malicious:false
                                                    Preview:##.## Bundle of CA Root Certificates.##.## Certificate data from Mozilla as of: Wed Nov 27 04:12:10 2019 GMT.##.## This is a bundle of X.509 certificates of public Certificate Authorities.## (CA). These were automatically extracted from Mozilla's root certificates.## file (certdata.txt). This file can be found in the mozilla source tree:.## https://hg.mozilla.org/releases/mozilla-release/raw-file/default/security/nss/lib/ckfw/builtins/certdata.txt.##.## It contains the certificates in PEM format and therefore.## can be directly used with curl / libcurl / php_curl, or with.## an Apache+mod_ssl webserver for SSL client authentication..## Just configure this file as the SSLCACertificateFile..##.## Conversion done with mk-ca-bundle.pl version 1.27..## SHA256: 607309057d0ec70f8e4e97b03906bafb2fcebb24cd37b5e8293e681ae26ceae0.##...GlobalSign Root CA.==================.-----BEGIN CERTIFICATE-----.MIIDdTCCAl2gAwIBAgILBAAAAAABFUtaw5QwDQYJKoZIhvcNAQEFBQAwVzELMAkGA1UEBhMCQkUx.GTAXBgNVBAoTEEdsb2Jh
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):444416
                                                    Entropy (8bit):6.713737151861499
                                                    Encrypted:false
                                                    SSDEEP:12288:PqpJsdWqljBi+qbJHM/LFxBmCqy6/KM4dZT88:SJZqljBi+8JH0Lrvqz/2T8
                                                    MD5:1AE73C7377B325580C275199448F56B6
                                                    SHA1:E346D821A2A7BC22A5CAAD3D8E01559805758BD5
                                                    SHA-256:D2694B2365B5DAB4EA938A573908B40BB205E87613747AA6A24C55E738B2CD77
                                                    SHA-512:B9477B64EE3DE5A2EAB28FD0BF96EB3CED951D34CDD4109DA2DF8CFF53B1E6AE38AB0EF353ABC848720111F2A20EDDAEE739395079A561B69C76E5D06D2BCBC4
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...e..P..........................................@..........................0......MM........ .........................`...........................................................................................h................................text...............................`.P`.data...............................@.`..rdata..............................@.`@.bss....l.............................`..edata..`............t..............@.0@.idata...............|..............@.0..CRT....4...........................@.0..tls.... ...........................@.0..rsrc...............................@.0..reloc...........0..................@.0B................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):24064
                                                    Entropy (8bit):6.038442421230171
                                                    Encrypted:false
                                                    SSDEEP:384:8HJRcg7mT/wX23q3wE7RFxBTGbf70OgPMN6wUw1XVck:l9q3weRrRGbYOgGz0
                                                    MD5:E9757F1678ECE31C59997C073A6527A2
                                                    SHA1:27A3B82BD79DBC9F537F9714C7E9E696458B8C50
                                                    SHA-256:D6A826157AF7F290ECCF6F3A35AE7719D959114E76543233E629F2157B1BBD55
                                                    SHA-512:5C2398E778DA47D80EB79F57FC00F6D6FD6C2440CEDC413193258B171310077773155879E1BF996B346BB301C1DFD22824DD44BD84DE1193C63C33AD376D1B2C
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 4%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......7...............7.P...................`....@.............................................................................l....................................................................................................................text....O.......P.................. ..`.data...d....`.......T..............@....bss....@....p...........................idata..l............V..............@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):39424
                                                    Entropy (8bit):6.207643132265192
                                                    Encrypted:false
                                                    SSDEEP:768:uN7cNqRoZWsr1eT4vznnGkDwxqXp4dwdzOsALBBqMZb:uN7c1lr19nGKzXkwdWD
                                                    MD5:5E978EC5F615396EAA1B14334197B68E
                                                    SHA1:B1EB6C03404A135DB5F5E67AB972BD5E6EE9B458
                                                    SHA-256:5B399B89AD901437FAF4BE061DABC2A3F70C6973316A536D4245604BEC394B54
                                                    SHA-512:430729B87F7ACBFBAAA1F3059208116D3D3F46041BD70C29A0E1B6356113F33F20BFC8DA1ED17F3F3F5768BCD464D46CEB50F3BF1CFB03C0658895DA921E69B0
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 4%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......9...............7..........................@..................................................................................................................................................................................................text...0........................... ..`.data...............................@....bss.....................................idata..............................@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF, LF line terminators
                                                    Category:dropped
                                                    Size (bytes):1101
                                                    Entropy (8bit):5.308052812548578
                                                    Encrypted:false
                                                    SSDEEP:12:ZAygBvWdtFKcYtOd1pbt4irXNZci3vAqThYPK/yEYNOxM0IlKLhKQWu7alO6VRaq:ZGAxpbvDh/AwAFQxz3SGa/EyN7n
                                                    MD5:30CD38DA7EF5D8E165D743033950F1BB
                                                    SHA1:254D2646884FC83862436A2D96409D727267A6AD
                                                    SHA-256:A3A2DF6A88DB186A1CF4AAB940DA77A0BF6AEF546B8D703F8ABEE30BEB5042F6
                                                    SHA-512:28F5B30170C128C6B634B9A0B3B8E975F42CECD1FC01BDD76F875DB037A26AA568205466DD78671CB58208B7C55B422424A3E4571188BAED2E91B91AC9B9BCFC
                                                    Malicious:false
                                                    Preview:' df.vbs..' Returns free space for avaible drives...' --------------------------------------....Option Explicit..On Error Resume Next....' Variables..Dim objWMIService, objItem, colItems, argc, argv, i....' Parse command line parameters..argc = Wscript.Arguments.Count..Set argv = CreateObject("Scripting.Dictionary")..For i = 0 To argc - 1.. argv.Add Wscript.Arguments(i), i..Next....' Get drive information..Set objWMIService = GetObject ("winmgmts:\\.\root\cimv2")..Set colItems = objWMIService.ExecQuery ("Select * from Win32_LogicalDisk")....For Each objItem in colItems...If argc = 0 Or argv.Exists(objItem.Name) Then....If objItem.FreeSpace <> "" Then.....Wscript.StdOut.WriteLine "<module>".....Wscript.StdOut.WriteLine " <name><![CDATA[" & objItem.Name & " </name>".....Wscript.StdOut.WriteLine " <description><![CDATA[Drive " & objItem.Name & " free space in MB </description>".....Wscript.StdOut.WriteLine " <data><![CDATA[" & Int(objItem.FreeSpace /1048576) & " </data>"
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1854
                                                    Entropy (8bit):5.378197940319138
                                                    Encrypted:false
                                                    SSDEEP:24:dOSA5pbvDh/AwAFQx7n7PAjlxuGaXQzJfRiUEEvZa7n:dZA5NFFA2mj2GaXGRiUEh
                                                    MD5:274690D1001D718FB7C4A30F3254AAD5
                                                    SHA1:4E5A81EBB21BA5DD6CA68C3F727638C0892498B5
                                                    SHA-256:F91A0A6980B2D8CE3F5C7A91800E73F158424CB7BA2F95E817FF6C1914750F7A
                                                    SHA-512:BC1E8CA84CDC37DBFA2A7E0710C6BE24E3E68E9DAB8A4D33002278A38438A86D01034592C71D8A421E8793959A4B620EF6E067E4FB90543459C844D0D2F88E2C
                                                    Malicious:false
                                                    Preview:' df_all.vbs..' Returns free space (%) for all drives..' Pandora FMS Plugin, (c) 2021 Sancho Lerena..' ------------------------------------------....Option Explicit..On Error Resume Next....' Variables..Dim objWMIService, objItem, colItems, argc, argv, i, Percent......' Parse command line parameters..argc = Wscript.Arguments.Count..Set argv = CreateObject("Scripting.Dictionary")..For i = 0 To argc - 1.. argv.Add Wscript.Arguments(i), i..Next....' Get drive information..Set objWMIService = GetObject ("winmgmts:\\.\root\cimv2")..Set colItems = objWMIService.ExecQuery ("Select * from Win32_LogicalDisk")....For Each objItem in colItems...If argc = 0 Or argv.Exists(objItem.Name) Then....' Include only harddrivers (type 3)....If (objItem.FreeSpace <> "") AND (objItem.DriveType =3) Then.....Percent = round ((objItem.FreeSpace / objItem.Size) * 100, 2).....Wscript.StdOut.WriteLine "<module>".....Wscript.StdOut.WriteLine " <name><![CDATA[DiskFree%_" & objItem.Name & " </name>".....Wscri
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1902
                                                    Entropy (8bit):5.355435841359015
                                                    Encrypted:false
                                                    SSDEEP:24:dnSA5pbvDh/AwAFQx7n7PAMglEGbXJfRiUEEfmImgIR7n:dSA5NFFA2mMg6GbNRiUEUG
                                                    MD5:A008CA020CB746D2E21B6B56CEBF96EE
                                                    SHA1:FFB6EC8FF2CAE4CE461DAD4C70074A49AE6177A8
                                                    SHA-256:EED11686252730687CF953C3CEDA36CF8FA1B1CDB5B49E0236AD290AA5AAC223
                                                    SHA-512:EB915E85B83BF54266D4B109001C935256076AFCCA21579F408723AC8D8C0D3ED284CD0D4C521DBDCE6BB54ECBDB6C2A554F9D7D3D124E63697141F050987408
                                                    Malicious:false
                                                    Preview:' df_all.vbs..' Returns used space (%) for all drives..' Pandora FMS Plugin, (c) 2021 Sancho Lerena..' ------------------------------------------....Option Explicit..On Error Resume Next....' Variables..Dim objWMIService, objItem, colItems, argc, argv, i, Percent......' Parse command line parameters..argc = Wscript.Arguments.Count..Set argv = CreateObject("Scripting.Dictionary")..For i = 0 To argc - 1.. argv.Add Wscript.Arguments(i), i..Next....' Get drive information..Set objWMIService = GetObject ("winmgmts:\\.\root\cimv2")..Set colItems = objWMIService.ExecQuery ("Select * from Win32_LogicalDisk")....For Each objItem in colItems...If argc = 0 Or argv.Exists(objItem.Name) Then....' Include only harddrivers (type 3)....If (objItem.FreeSpace <> "") AND (objItem.DriveType =3) Then.....Percent = round (100 - (objItem.FreeSpace / objItem.Size) * 100, 2).....Wscript.StdOut.WriteLine "<module>".....Wscript.StdOut.WriteLine " <name><![CDATA[DiskUsed_" & objItem.Name & " </name>".....
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1527
                                                    Entropy (8bit):5.328980130098931
                                                    Encrypted:false
                                                    SSDEEP:24:Wxv0Rk8Q8CUhz/ArULDv9UKRUwxav0OgmLxTebF2na+MTX:WFOkGZwULDvancOgm1ebMTC
                                                    MD5:15C8101385C66FC3802E6813CF3DC423
                                                    SHA1:513BA9EB9F012882FD4D7830CA4D1FDA4E2A1872
                                                    SHA-256:8EEE5FB45BFAAC2989F4D3E699B55AB979777E45C9F9E976DE5CC000907C5909
                                                    SHA-512:59DB83A8AC462747485A79A157E8621DF15131809B2AF65C136E8A1151A21F66FE3422FFCA4159E226E8BF2AC43789CDEB3EBDE43ADF9978737F1BEA0E4DAB17
                                                    Malicious:false
                                                    Preview:' Pandora FMS Agent Inventory Plugin for Microsoft Windows (All platfforms)..' (c) 2015 Borja Sanchez <fborja.sanchez@artica.es>..' This plugin extends agent inventory feature. Only enterprise version..' --------------------------------------------------------------------------..'WMI disksinfo....strComputer = "."..Set objWMIService = GetObject("winmgmts:" & "{impersonationLevel=impersonate}!\\" & strComputer & "\root\cimv2")..Set colHDDs = objWMIService.ExecQuery("Select * from win32_diskdrive")....on error resume next..flag = colHDDs.Count..If (err.number <> 0) Then.. flag = true..Else.. flag = false..End If..on error goto 0 ....'Print only when there's results..If (NOT flag) Then...Wscript.StdOut.WriteLine "<inventory>"...Wscript.StdOut.WriteLine "<inventory_module>"...Wscript.StdOut.WriteLine "<name>HD</name>"...Wscript.StdOut.WriteLine "<type><![CDATA[generic_data_string </type>"...Wscript.StdOut.WriteLine "<datalist>".....For Each disco In colHDDs... If ((not IsNull(disco.si
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1192
                                                    Entropy (8bit):5.267122042429685
                                                    Encrypted:false
                                                    SSDEEP:24:Wxv0Rk8Q8XUhz/Ar/mDv9UKRUkFxav0hXZmT2:WFOk9ZA/mDvaPcZ
                                                    MD5:FC5E90EB8E621E54BFD7132688712092
                                                    SHA1:6786BD62C0DA23E5F1F8656F55E328AB3B70A6CE
                                                    SHA-256:6C26CBEC48E95EAF5BD33F33B7A5A0AD776B9D3BB90BE5F8D8287EBC4299127E
                                                    SHA-512:D4BDEAFF47A298034811635BCFC3B8191AEDB5AEF62A1BDC33582A1F4EBAEDCD96A6EF9D00A3D7840DB2E7CEA2AAF4390B680C4684E0E5B2AE562D09D2BC67D5
                                                    Malicious:false
                                                    Preview:' Pandora FMS Agent Inventory Plugin for Microsoft Windows (All platfforms)..' (c) 2015 Borja Sanchez <fborja.sanchez@artica.es>..' This plugin extends agent inventory feature. Only enterprise version..' --------------------------------------------------------------------------..'WMI domain/workgroup info....strComputer = "."..Set objWMIService = GetObject("winmgmts:\\" & strComputer & "\root\CIMV2")..Set colItems = objWMIService.ExecQuery("SELECT Domain FROM Win32_ComputerSystem")....on error resume next..flag = colItems.Count..If (err.number <> 0) Then.. flag = true..Else.. flag = false..End If..on error goto 0 ....'Print only when there's results..If (NOT flag) Then...Wscript.StdOut.WriteLine "<inventory>"...Wscript.StdOut.WriteLine "<inventory_module>"...Wscript.StdOut.WriteLine "<name>Domain</name>"...Wscript.StdOut.WriteLine "<type><![CDATA[generic_data_string </type>"...Wscript.StdOut.WriteLine "<datalist>".....For Each objItem In colItems... WScript.StdOut.WriteLine "<data
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1768
                                                    Entropy (8bit):5.331125189073667
                                                    Encrypted:false
                                                    SSDEEP:24:dOSAhpbvDh/AwAFQx7n7PAelwGaYgxfUxL6YEEmY7n:dZAhNFFA2meCGaYKUxLJP
                                                    MD5:911A706AA3841C19A99E77F19B5DA946
                                                    SHA1:ADA752DF2F0F9070C0B15C729F17B614EC45D17C
                                                    SHA-256:975051E41D150DFAD000B9E49DB2C13C5756789881A4512F6C649E1B532829E4
                                                    SHA-512:73BE56F424415D16619A02BAAF0AB7EE55847455AF24032CB25813D34213186F70ECF858A00F61EB00416E263C8666F03A13A6FE50E35AB4A3873E2EFC9DF47F
                                                    Malicious:false
                                                    Preview:' df_all.vbs..' Returns free space (%) for all drives..' Pandora FMS Plugin, (c) 2021 Sancho Lerena..' ------------------------------------------....Option Explicit..On Error Resume Next....' Variables..Dim objWMIService, objItem, colItems, argc, argv, i, Percent, Percentused......' Parse command line parameters..argc = Wscript.Arguments.Count..Set argv = CreateObject("Scripting.Dictionary")..For i = 0 To argc - 1.. argv.Add Wscript.Arguments(i), i..Next....' Get drive information..Set objWMIService = GetObject ("winmgmts:\\.\root\cimv2")..Set colItems = objWMIService.ExecQuery ("Select * from Win32_LogicalDisk")....For Each objItem in colItems...If argc = 0 Or argv.Exists(objItem.Name) Then....' Include only harddrivers (type 3)....If (objItem.FreeSpace <> "") AND (objItem.DriveType =3) Then.... Percent = round ((objItem.FreeSpace / objItem.Size) * 100, 2).... Percentused = 100 - (Percent).......Wscript.StdOut.WriteLine "<module>".....Wscript.StdOut.WriteLine " <na
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):13824
                                                    Entropy (8bit):5.740202724506134
                                                    Encrypted:false
                                                    SSDEEP:192:YAX8rEZea+I9Z+k7ZlPMtVqol9z5alOXUb9Tc9DOHnvphP0LW0kReEXrQ:YEcm+Ieec7KSUbhc4Hj0SDXrQ
                                                    MD5:8C538C7548AFB81E8F0372F54740D9CF
                                                    SHA1:2E925ED029FEC55BBDF13B40B3F7301CEFF76556
                                                    SHA-256:C412FD2EF78EFAE5F2612D8329B46C8ED4805FB73E5B22E2066D203520F726F5
                                                    SHA-512:9D10FABE78AC9D6FC161F721365566C1D0D0D97121DDDFE47C3300E055AE87495436338075B1883166C979A46EE0FB552DBD041D2BF5DAC2DB07E59C14516484
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........rQ............................Rich....................PE..L...(..4.................".......... /.......@....@..........................`...............................................@..(....................................................................................@...............................text.... .......".................. ..`.rdata.......@.......&..............@..@.data...T....P.......*..............@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):195584
                                                    Entropy (8bit):6.473748107729141
                                                    Encrypted:false
                                                    SSDEEP:3072:mbCutS3/YZXVzJ4xsfiKI3X3jLOzIgbttmR+pcGXofWceMG2jzB+QsPTu3jrpXfw:mUvYZlzJiG1I3X3yntfofBeMG2jzFsPR
                                                    MD5:3436EAB6988E8A911895122ED1862836
                                                    SHA1:93F464CB986A95FBF7E5C96CC484593BBFEB3D07
                                                    SHA-256:C8AF969F2A9A9F05D22AD9373F019D6C3137BA2F2DB4DF25C1B6EFC98756C77E
                                                    SHA-512:DF33D1F24AA1591174B2AA4AD08AE1752CE1D86A903FF17F1001E3F45E613A166020420F5578E313097F43AAD4F67ECD1E5B7E82EAAEDA876A11DE4245193950
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 4%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....L<...............8..... ...4................@..........................`................ ..............................P.......................................................................................................................text............................... ..`.data...$...........................@....bss.....2...............................idata.......P......................@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):43119
                                                    Entropy (8bit):4.491670030116383
                                                    Encrypted:false
                                                    SSDEEP:384:wuaVX0tAlZm5eptodZDZILvGBzW5fRHt2Bs9j6xZhMV64OLSd56jU2Q/FMEmOi9Q:BU0tAlZG3dB8eBEt2O9jXVkmX2QAO+Q
                                                    MD5:2D86FBBAFD56007EFA078D5D5306F91A
                                                    SHA1:CB8936AA26076E00421B3E27DD8537C13A267719
                                                    SHA-256:0FA7D4683BA5C3A04B06952756097A8FF223656F488867AAE039038766831560
                                                    SHA-512:947DC14B156D0D03C14967858C8C3AC9F5D0F62819D6412B55A070128DF4C5B881BCE589C96CBFF295D7211B017C6C630C7975E92680435A78C385A831C36389
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d........D........'...... ... ................@......................................R........ ..............................................................P..@........................................... ...(...................(................................text............ .................. .P`.data........0.......$..............@.P..rdata..@....@.......&..............@.P@.pdata..@....P......................@.0@.xdata.......`.......2..............@.0@.bss.... ....p........................`..idata...............6..............@.0..CRT....h............@..............@.@..tls....h............B..............@.`.........................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:DOS batch file, ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):265
                                                    Entropy (8bit):5.161110927153926
                                                    Encrypted:false
                                                    SSDEEP:3:mKDD0ziqpbowRUE9cViTkD0lofE9cViTka2lcU2yJGWyesovaM0iJm+NwiHIeMjn:hIzrbiVz0leVFl2Z+sBZuKVeMjMFsU9A
                                                    MD5:6F4682D7CBD94D4ED8C3C0E231D81D72
                                                    SHA1:0356F17FD66BF21EB803FA270CF233446FDC8A16
                                                    SHA-256:11750145FB0E2FD110D05FE5595D288F491DE42C6165FED267C574C939CC5D4E
                                                    SHA-512:39833BE508A78C7CCFD65FC7074266863B85CB217CB5A38B1550C4086161E00FB047D501217C9CB33316D3E1B84800BB7699FA396304BDBAA4BDFD4CFB28C1C2
                                                    Malicious:false
                                                    Preview:@echo off....if "%1" == "" GOTO HELP...."%ProgramFiles%\pandora_agent\util\snmpget" -M "%ProgramFiles%\pandora_agent\util\mibs" -Oveqtu -v 1 -c %1 %2 %3..goto EXIT0....:HELP..echo I need parameters...echo getsnmp.bat community ip_address OID..goto EXIT0......:EXIT0
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):80412
                                                    Entropy (8bit):6.510992860563782
                                                    Encrypted:false
                                                    SSDEEP:1536:apE9iHQrLpyzNYTtmg29fDtxHiCGBTScYvphcTraBwHD3PzN/autnDp2HrEuuKa6:apEzLpyWtDqDDHitdScYWHD37wrxuKTb
                                                    MD5:9E05A9C264C8A908A8E79450FCBFF047
                                                    SHA1:363B2EE171DE15AEEA793BD7FDFFD68D0FEB8BA4
                                                    SHA-256:C2EF6FC419630D566154F8372E94859DF8141D02805BC7BCE39C726A1FFEF7C1
                                                    SHA-512:712892E9B08A22B795F9627F6D13412CB2A4610404DE33C6F83A37178B920E7BB9D3042C3A2191E49D661A34A05202E18224C67811D8B52FA0FC2C757EF0F6FA
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 3%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....[.8...............7.(...................@....@..........................p...............................................`.......................................................................................................................text....'.......(.................. ..`.data...h....@.......,..............@....bss.........P...........................idata.......`.......0..............@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1294848
                                                    Entropy (8bit):7.979438113357856
                                                    Encrypted:false
                                                    SSDEEP:24576:FRitTlohVcmj3iZ7jNka03SS9kC9Dm/RKENW:vATY2mjW73/OkC9DkRr
                                                    MD5:3080F13EBA13E255EF7ED6F6CB8F4D27
                                                    SHA1:A7395C8D422DAEF44444F8EC29BF23D10E4407A7
                                                    SHA-256:10031FCBE30267958B39B30BCC52A213C90CBA5B8AB05AD0DD45F7E723CA0F9A
                                                    SHA-512:ADD85294584B2A0955302EA8E438413132D63237AA748F5BAED9C626603204C6D793658F1177230E6849921F784B10E8CDF78203709AA3979EEE306F671905D4
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....V..................................... ....@.................................7....................................................^...........................................................................................................text...............................`.P`.data........ ......................@.`..rdata...?...0...@..................@.`@.bss.........p........................`..idata...............P..............@.0..CRT....4............^..............@.0..tls.... ............`..............@.0..rsrc....^.......`...b..............@.0.................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):24064
                                                    Entropy (8bit):6.180567438948626
                                                    Encrypted:false
                                                    SSDEEP:384:rxqdd34XBb6shS9gfIDnzxbEbtAtOPaHCGldoENvWEc8cjgOhl2mjZESY:rxQaBY/tbGWdiGldXvF0gmlv
                                                    MD5:9851E260F5F64D1E81C2489F660DCAD7
                                                    SHA1:7F1D221C713DAEDE799DFE4933B0BE9DC2491BEA
                                                    SHA-256:FFA5E945163FFB23D26A5DDE041802219B03692E7AF409E621EF92D6692DFBAF
                                                    SHA-512:66DFC4BCF9F2843277DA59A1442069C6E82123C2E844925E75A9E4141F8BDEBC92468758C48E420A2D90654F527FCD7A988444377C892BFEC00BCCD109D05B8D
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 4%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......7...............7.R...................p....@..................................................................................................................................................................................................text....Q.......R.................. ..`.data...`....p.......V..............@....bss....@................................idata...............X..............@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2015
                                                    Entropy (8bit):5.19909461302841
                                                    Encrypted:false
                                                    SSDEEP:48:WFOkJiIufZw82cEnjntWn6mDvabcbTOdb:WskJibf64rDCUO5
                                                    MD5:655BFB6E38CB81C29B18EC774C4C0616
                                                    SHA1:AC0A41AAE4440C479C84E88B86CBC1B3C145D259
                                                    SHA-256:FD62EBF990F5A2B7863E9D7C3C16DBF8B75052C5F2DADBBF70DD3B9E9945F665
                                                    SHA-512:792D1E30EA76FADFCE0214282EBC8AB3942C00F064ACDA7E15905A31FC4160E59836D039834EB69207AB1E09A0E450F66016FF85823F974A7E1DFFDB109DC745
                                                    Malicious:false
                                                    Preview:' Pandora FMS Agent Inventory Plugin for Microsoft Windows (All platfforms)..' (c) 2015 Borja Sanchez <fborja.sanchez@artica.es>..' This plugin extends agent inventory feature. Only enterprise version..' --------------------------------------------------------------------------..'WMI real interfaces info..' exlusions: ..' VBox network interfaces..' VMWare network interfaces..'..'nic where "guid is not null and not PNPDeviceID like 'ROOT%'"....strComputer = "."..Set objWMIService = GetObject("winmgmts:" & "{impersonationLevel=impersonate}!\\" & strComputer & "\root\cimv2")..Set colAdapters = objWMIService.ExecQuery("Select * from Win32_NetworkAdapter " & _........"Where not PNPDeviceID like 'ROOT%%' " & _........"and not PNPDeviceID like 'SW%%' " & _........"and not ServiceName is null " & _........"and not ServiceName like 'vwifimp' ")....on error resume next..flag = colAdapters.Count..If (err.number <> 0) Then.. flag = true..Else.. flag = false..End If..on error goto 0 ....
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):3001
                                                    Entropy (8bit):5.288488068699771
                                                    Encrypted:false
                                                    SSDEEP:48:aXiu5mAvAwLb4To+5nFmdkOXeD8HQmCx+OTyuIFQdEE3OY/gIQRQw:aS4AOso+5nFm6fD+Qdx9IF2EOR/sQw
                                                    MD5:61D156A376784D88A48556FF9D27C37B
                                                    SHA1:186E8E8FEFDA6CEC0B57B83CD3F68661B7E2D48A
                                                    SHA-256:A54E68AE0025B9C8E2FFBAE7A148E8176A705AC7AF6F6E2A60523C24E3A1C57A
                                                    SHA-512:DD5F15F2027778A8CC48B47EA73F9635146A3158C0E1FB641DBA10F1289ADEFDF965B7B1DD81D1BD6293A2773B290AC64A17A1DF1A050A7EFA6A60FFE38D28F5
                                                    Malicious:false
                                                    Preview:' --------------------------------------------------------------..' WMI Log Event Parser for Windows..' Used as Plugin in Pandora FMS Monitoring System..' Written by Sancho Lerena <slerena@gmail.com> 2010..' Licensed under BSD Licence..' --------------------------------------------------------------....' This plugin uses three parameters:..'..' module_name : Module name to be reported at pandora, p.e: Event_Application..' logfile : Windows event logfile: Application, System, Security.....' interval: Should be the same interval agent has, p.e: 300 (seconds)....' Code begins here....' Take args from command line..if (Wscript.Arguments.Count = 0) then...WScript.Quit...end if....On Error Resume Next..cfg_module_name = Wscript.Arguments(0)..cfg_logfile = Wscript.Arguments(1)..cfg_interval = Wscript.Arguments(2)..strComputer = "."....MyDate = dateAdd("s", -cfg_interval, Now) ' Latest X seconds....Set dtmStartDate = CreateObject("WbemScripting.SWbemDateTime")....CONVERT_TO_LOCAL_TIME = TRUE..
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):57856
                                                    Entropy (8bit):6.23708681322991
                                                    Encrypted:false
                                                    SSDEEP:1536:zcuFS7zhtBGuq2Vq3h2NEezQOPOv1SPaC:wuFS7zht8uq2eIPOv1SPd
                                                    MD5:81B68D181440D59C0565986ABC141139
                                                    SHA1:62818373DDDCCE027FF2B669AED585168AE2C79F
                                                    SHA-256:4C81921B72CA4C8C747EC65A6541289FB97436DF807FA080F9DEBE7502E7D89A
                                                    SHA-512:693439DA509B49B1E4F7527F1C1199E2C8D21E64BE94BE9F621860249A7E7B8CAF062406A71A359A0AA4AC5118B4E5E17E46429B7FC516A5897EC4EDD47CF8F3
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 4%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....7...............7..........................@.......................... ..................................................@....................................................................................................................text...`........................... ..`.data...............................@....bss.....................................idata..@...........................@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):49152
                                                    Entropy (8bit):5.768233184016395
                                                    Encrypted:false
                                                    SSDEEP:768:R1W26AwlD/vum3barTum08xL50/fEZKA7BPnbpSLD0W0SXbc6+:T69lzLu3b6/fE4A7B/bpSLPc6
                                                    MD5:609F46A341FEDEAEEC18ABF9FB7C9647
                                                    SHA1:1945FE2D0A0507F3F5C6EB47F089204ECDDA00B7
                                                    SHA-256:5B7F9A223AC5A8C768287FB9EE321364F8586EA392A3E4F75F48E3EDEB936E69
                                                    SHA-512:10CE547C0716C627C9EAF25390C35A954C1C6B709C1A87C6EFA190876DC995E717C67CDA2FBBDD3657E138332B4E39643F004BCD22EAE853C10F7C4F3E3943C5
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........VJ..7$.7$.7$.U.9.7$.U.d.7$.U.=.7$.7%.7$.U.8..7$.U...7$.Rich.7$.........................PE..L....e.>.....................@.......'............@............................................................................(...................................................................................................................text....~.......................... ..`.rdata........... ..................@..@.data...D...........................@...........................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1837
                                                    Entropy (8bit):5.35944522348357
                                                    Encrypted:false
                                                    SSDEEP:48:1sNQsZwwRx5Y4jeozXDvhQDvaTlP/4XYHbY3Y4uBD:Wd6wRThSKD+DCTZHH8o3BD
                                                    MD5:8AFC5B6660004DC936BA584883D98CC6
                                                    SHA1:DD7A7A4B5789504E90BA0C9C19CEA3C38328803D
                                                    SHA-256:DB7F12EBD2E77BEBBB1F5E6A15E8A2462F03CA8B46F2052913D9BE3C59F37995
                                                    SHA-512:6262BF98C134F0C8A20E9C5D60C75CEEF98F598401A332939C276787309969C225A2B63D06F3475C38B84E7B438D74161D6BE87935D240113CD978AF9ED8C80D
                                                    Malicious:false
                                                    Preview:' mem_percent_used.vbs..' Returns used RAM (%)..' Pandora FMS Plugin, (c) 2017 Fermin Hernandez..' ------------------------------------------....Dim usedMEM, Percent..Dim totalMEM....strComputer = "."..Set objWMIService = GetObject("winmgmts:" & "{impersonationLevel=impersonate}!\\" & strComputer & "\root\cimv2")..Set colRAMs = objWMIService.ExecQuery("Select * from Win32_ComputerSystem")....totalMEM = 0..For Each total in colRAMs...totalMEM = total.totalPhysicalMemory..Next....Set colUSEDs = objWMIService.ExecQuery("Select freePhysicalMemory from Win32_OperatingSystem")..For Each used in colUSEDs...usedMEM = used.freePhysicalMemory * 1024..Next....on error resume next..flag = colRAMs.Count..If (err.number <> 0) Then.. flag = true..Else.. flag = false..End If..on error goto 0 ....on error resume next..flag = colUSEDs.Count..If (err.number <> 0) Then.. flag = true..Else.. flag = false..End If..on error goto 0 ....'Print only when there's results..If (NOT flag AND totalMEM <> 0) Then
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):17982
                                                    Entropy (8bit):4.840836767052516
                                                    Encrypted:false
                                                    SSDEEP:192:ycx7B7tz/zNjyxNSV+q3A0vhCjKBTszerUTM+0zU+3XfYvdSmHmuI+/ZaHL:jx7VlrNjyxNSV+qNvkqZ3/nfYU8EL
                                                    MD5:701E67A710C4C197AA3FA68E1C64BB86
                                                    SHA1:97647B3CBE31C4F5CF68F3F356FB4612DAEE3325
                                                    SHA-256:7C65E0EDC4A1161B37532ED226924597C369721D609AB0E1D82E00B590FDAEDC
                                                    SHA-512:20BFA4736FE35C4BE9E3EA111676519DC06E3C624CD156A41B4D86DD2AB2645A59FD8325277910ABE01B79BBFA4FA3BA7A531D6F592E7C319A863E4D9CDEFD72
                                                    Malicious:false
                                                    Preview:AGENTX-MIB DEFINITIONS ::= BEGIN....IMPORTS.. MODULE-IDENTITY, OBJECT-TYPE, Unsigned32, mib-2.. FROM SNMPv2-SMI.. SnmpAdminString.. FROM SNMP-FRAMEWORK-MIB.. MODULE-COMPLIANCE, OBJECT-GROUP.. FROM SNMPv2-CONF.. TEXTUAL-CONVENTION, TimeStamp, TruthValue, TDomain.. FROM SNMPv2-TC;..agentxMIB MODULE-IDENTITY.. LAST-UPDATED "200001100000Z" -- Midnight 10 January 2000.. ORGANIZATION "AgentX Working Group".. CONTACT-INFO "WG-email: agentx@dorothy.bmc.com.. Subscribe: agentx-request@dorothy.bmc.com.. WG-email Archive: ftp://ftp.peer.com/pub/agentx/archives.. FTP repository: ftp://ftp.peer.com/pub/agentx.. http://www.ietf.org/html.charters/agentx-charter.html.... Chair: Bob Natale.. ACE*COMM Corporation.. Email: bnatale@acecomm.com.... WG editor: Mark Ellison.. Ellison Software Consulting, Inc... Email:
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):70132
                                                    Entropy (8bit):4.649292030737806
                                                    Encrypted:false
                                                    SSDEEP:384:YX5/TwdNQ4krN3oMmB3oJV4mkNa4Uf2oi9C6PqoDIZuJZ4IFO3o3+1vs7xjA84Fs:YX5sd6JJoMCo3479CQFVio9o9cN+Y
                                                    MD5:7F781DE0F1384AC070D767360379CC43
                                                    SHA1:0EC4FA8AE58CDED0BDF81AF5208463F873A2C410
                                                    SHA-256:21AE5BB52D44DF8D65B2F490C425EFB769E3FFEF834958E67BE97AA76BB0F1A4
                                                    SHA-512:06CF855151E8AD1344CDF90F1E8B453519291E61F315ECDE42E56A940CB08C91E1B17A442F89586A8499FD9B143387C66AF807D86692D3772A752E151EA3F719
                                                    Malicious:false
                                                    Preview:DISMAN-EVENT-MIB DEFINITIONS ::= BEGIN....IMPORTS.. MODULE-IDENTITY, OBJECT-TYPE,.. Integer32, Unsigned32,.. NOTIFICATION-TYPE, Counter32,.. Gauge32, mib-2, zeroDotZero FROM SNMPv2-SMI.. TEXTUAL-CONVENTION, RowStatus,.. TruthValue FROM SNMPv2-TC...... MODULE-COMPLIANCE, OBJECT-GROUP,.. NOTIFICATION-GROUP FROM SNMPv2-CONF.. sysUpTime FROM SNMPv2-MIB.. SnmpTagValue FROM SNMP-TARGET-MIB.. SnmpAdminString FROM SNMP-FRAMEWORK-MIB;....dismanEventMIB MODULE-IDENTITY.. LAST-UPDATED "200010160000Z" -- 16 October 2000.. ORGANIZATION "IETF Distributed Management Working Group".. CONTACT-INFO "Ramanathan Kavasseri.. Cisco Systems, Inc... 170 West Tasman Drive,.. San Jose CA 95134-1706... Phone: +1 408 526 4527.. Email: ramk@cisco.com".. DESCRIPTION.. "The MIB module for defining eve
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):43896
                                                    Entropy (8bit):4.75769364096749
                                                    Encrypted:false
                                                    SSDEEP:768:ntcpP9y/fA/2BfNvsvbLyYPORymLfFmVWhsW0pNaRYrz+RLDuO:n+p4/fo2BfNvGy1kmZFhsW03aRYrz+Rl
                                                    MD5:1E230B08587679EF126B95F1D239B7FE
                                                    SHA1:24D63F64E29DD3CA9B1819BC890AAD6A077CBE82
                                                    SHA-256:557D7AB8F965D1D350AC79EFABD1B75CD9451C2FA4B6EA614F58B21F33511A35
                                                    SHA-512:08946A109D5C899C35CCC244ECFC30D40E9AEA3B865EE7ACA6E6182390ED11C0FE6F09FB1677019B6253971AB69A20CEEF4002DE6ABD24BB4321AF4353F889FC
                                                    Malicious:false
                                                    Preview:DISMAN-EXPRESSION-MIB DEFINITIONS ::= BEGIN....IMPORTS.. MODULE-IDENTITY, OBJECT-TYPE,.. Integer32, Gauge32, Unsigned32,.. Counter32, Counter64, IpAddress,.. TimeTicks, mib-2, zeroDotZero FROM SNMPv2-SMI.. RowStatus, TruthValue, TimeStamp FROM SNMPv2-TC.. sysUpTime FROM SNMPv2-MIB.. SnmpAdminString FROM SNMP-FRAMEWORK-MIB.. MODULE-COMPLIANCE, OBJECT-GROUP FROM SNMPv2-CONF;....dismanExpressionMIB MODULE-IDENTITY.. LAST-UPDATED "200010160000Z" -- 16 October 2000.. ORGANIZATION "IETF Distributed Management Working Group".. CONTACT-INFO "Ramanathan Kavasseri.. Cisco Systems, Inc... 170 West Tasman Drive,.. San Jose CA 95134-1706... Phone: +1 408 527 2446.. Email: ramk@cisco.com".. DESCRIPTION.. "The MIB module for defining expressions of MIB objects for.. management purposes."..-- Revision History.... REVISION "20001016
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):19036
                                                    Entropy (8bit):4.659692972250592
                                                    Encrypted:false
                                                    SSDEEP:192:1mj4u314zRRvTGcR9QCXEkEURUuX3mW3e7dA0CQsdkS5TRSxbY5yOJBkXVRjqvCR:m3GElkRUu9uoyOaYZnHaaWaMfiwEE
                                                    MD5:10C139518C9FE00E4C083D77E7BCA941
                                                    SHA1:674F90E32187E8197F08CDF2AA9687B1F7CCA64A
                                                    SHA-256:BA30FBBEBD1E7EA8FE2A05800E0174482DAD53D6A3B141914A8940857C839C66
                                                    SHA-512:4CD55279A600A5A01D69B3B99534C47048FE553B3FE026E752F0DD498C9C5B33E8487F5560021CE0101D0E37F7B1A3832A3924EF0B39DE5A75BE85C504DBB5CC
                                                    Malicious:false
                                                    Preview:DISMAN-NSLOOKUP-MIB DEFINITIONS ::= BEGIN....IMPORTS.. MODULE-IDENTITY, OBJECT-TYPE,.. Unsigned32, mib-2, Integer32.. FROM SNMPv2-SMI -- RFC2578.. RowStatus.. FROM SNMPv2-TC -- RFC2579.. MODULE-COMPLIANCE, OBJECT-GROUP.. FROM SNMPv2-CONF -- RFC2580.. SnmpAdminString.. FROM SNMP-FRAMEWORK-MIB -- RFC3411.. InetAddressType, InetAddress.. FROM INET-ADDRESS-MIB; -- RFC4001.... lookupMIB MODULE-IDENTITY.. LAST-UPDATED "200606130000Z" -- 13 June 2006.. ORGANIZATION "IETF Distributed Management Working Group".. CONTACT-INFO.. "Juergen Quittek.... NEC Europe Ltd... Network Laboratories.. Kurfuersten-Anlage 36.. 69115 Heidelberg.. Germany.... Phone: +49 6221 4342-115.. Email: quittek@netlab.nec.de".. DESCRIPTION.. "The Lookup MIB (DISMAN-NSLOOKUP-MIB) enables determination.. of either t
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):58871
                                                    Entropy (8bit):4.596854721982835
                                                    Encrypted:false
                                                    SSDEEP:384:n3kzseAcOcZfzn6KehkOoyPTLcLFMHc+yWvlP9Hewym+RoU:3kzselTnOxM5M8+xfHpIRr
                                                    MD5:97302071743D6D8633730E1DC161C6E3
                                                    SHA1:C30D344F955B550DCA491844282D0AB29F7EFF1B
                                                    SHA-256:D7FCC68B363439D7E21103C55DB449C0D8499A9C08B268F2338BA93C4B2E0399
                                                    SHA-512:21E3A971BFA510CA03FE781491388E750F6AADF73EF3289EE5889BE83CC24FD88011C9FD812E37723B4DD16ACC48EC66FCF0A78202FFE9BC403BF1964EC5925A
                                                    Malicious:false
                                                    Preview:DISMAN-PING-MIB DEFINITIONS ::= BEGIN....IMPORTS.. MODULE-IDENTITY, OBJECT-TYPE, Integer32,.. Unsigned32, Gauge32, mib-2,.. NOTIFICATION-TYPE, OBJECT-IDENTITY.. FROM SNMPv2-SMI -- RFC2578.. TEXTUAL-CONVENTION, RowStatus,.. StorageType, DateAndTime, TruthValue.. FROM SNMPv2-TC -- RFC2579.. MODULE-COMPLIANCE, OBJECT-GROUP,.. NOTIFICATION-GROUP.. FROM SNMPv2-CONF -- RFC2580.. InterfaceIndexOrZero -- RFC2863.. FROM IF-MIB.. SnmpAdminString.. FROM SNMP-FRAMEWORK-MIB -- RFC3411.. InetAddressType, InetAddress.. FROM INET-ADDRESS-MIB; -- RFC4001.... pingMIB MODULE-IDENTITY.. LAST-UPDATED "200606130000Z" -- 13 June 2006.. ORGANIZATION "IETF Distributed Management Working Group".. CONTACT-INFO.. "Juergen Quittek.... NEC Europe Ltd... Network Laboratories.. Kurfuersten-Anlage 36.. 69115 Hei
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):25312
                                                    Entropy (8bit):4.654334645509305
                                                    Encrypted:false
                                                    SSDEEP:192:9C4JcdPhVzN+WukGS7jXtVLtq4JkVfgfgd5K22wgMzS/qVS3HwQL8de6VPDczJ2s:tcthhr7j9NvE9vXbwAs
                                                    MD5:DD8851B4DD5A086187FCC5F3D7B1BCD6
                                                    SHA1:7FA5A72A7A4C5A6BF5CDC72160E904832F72FF15
                                                    SHA-256:CC94588DA018D3213E631460CD2C4A04ACAFA356D18EFCBAD30B0B710AC0D3BD
                                                    SHA-512:7015A001494F429A2354C2E3B39F8F9C287C558952C3B96215F8AFC93AD8EB0C5BB43AF294622E4FE3520EC3F9496BF334B30B4DBA9B1FD350DE17F5ADBC1C49
                                                    Malicious:false
                                                    Preview:DISMAN-SCHEDULE-MIB DEFINITIONS ::= BEGIN....IMPORTS.. MODULE-IDENTITY, OBJECT-TYPE, NOTIFICATION-TYPE,.. Integer32, Unsigned32, Counter32, mib-2, zeroDotZero.. FROM SNMPv2-SMI.... TEXTUAL-CONVENTION,.. DateAndTime, RowStatus, StorageType, VariablePointer.. FROM SNMPv2-TC.... MODULE-COMPLIANCE, OBJECT-GROUP, NOTIFICATION-GROUP.. FROM SNMPv2-CONF.... SnmpAdminString.. FROM SNMP-FRAMEWORK-MIB;....schedMIB MODULE-IDENTITY.. LAST-UPDATED "200201070000Z".. ORGANIZATION "IETF Distributed Management Working Group".. CONTACT-INFO.. "WG EMail: disman@dorothy.bmc.com.. Subscribe: disman-request@dorothy.bmc.com.... Chair: Randy Presuhn.. BMC Software, Inc... Postal: Office 1-3141.. 2141 North First Street.. San Jose, California 95131.. USA.. EMail: rpresuhn@bmc.com.. Phone: +1 408 546-1006.... Edi
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):66075
                                                    Entropy (8bit):4.653211226885814
                                                    Encrypted:false
                                                    SSDEEP:768:I7K2y2yluW23rOUzkYhUcVW11h/F0Ql0glyUMOSrYDs9S4DslX:I7ZyHluW59xF0A0LUMIT
                                                    MD5:351D511DCC3222E19AA0FFE570FB4DA8
                                                    SHA1:4BFD2A399D9C10C5E7BC50637B74DE0EDA825DBF
                                                    SHA-256:10FB329954F99DDEB032EBE2C339CE2995B2592AA14201F6EF1031504F650385
                                                    SHA-512:93774ED607576207D32BD9B1DF172D4552821B699FEF906A18F1531529454A7ACB62944C35A6D55532D9971F7AFE24BDF976729CFE4E97F3C8BE32053610E8EE
                                                    Malicious:false
                                                    Preview:DISMAN-SCRIPT-MIB DEFINITIONS ::= BEGIN....IMPORTS.. MODULE-IDENTITY, OBJECT-TYPE, NOTIFICATION-TYPE,.. Integer32, Unsigned32, mib-2.. FROM SNMPv2-SMI.... RowStatus, TimeInterval, DateAndTime, StorageType, DisplayString.. FROM SNMPv2-TC.... MODULE-COMPLIANCE, OBJECT-GROUP, NOTIFICATION-GROUP.. FROM SNMPv2-CONF.... SnmpAdminString.. FROM SNMP-FRAMEWORK-MIB;....scriptMIB MODULE-IDENTITY.. LAST-UPDATED "200108210000Z".. ORGANIZATION "IETF Distributed Management Working Group".. CONTACT-INFO.. "WG EMail: disman@dorothy.bmc.com.. Subscribe: disman-request@dorothy.bmc.com.... Chair: Randy Presuhn.. BMC Software, Inc..... Postal: Office 1-3141.. 2141 North First Street.. San Jose, California 95131.. USA.. EMail: rpresuhn@bmc.com.. Phone: +1 408 546-1006.... Editor: David B. Levi..
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):71366
                                                    Entropy (8bit):4.619267461126673
                                                    Encrypted:false
                                                    SSDEEP:384:z3543yO9BWhACcOPXik7p93nuKU8qxx6n7Bmdn5UO+eDcJr040P875uAFW70FRZX:z54vBWaGRqvAynd+IcJrB7Bw70LZaR0
                                                    MD5:E75DC0921B17C4CB40CB8B8178D2D447
                                                    SHA1:20E5E669CD2397472F4D6BF3031447DEE854FB42
                                                    SHA-256:0864EF25E761688A28F415816F3B1DAAA57276E3F753E49632D7023B68600419
                                                    SHA-512:FA403E26494FA36F689C69E321CE4D51D157A3907A816E7021686B9AB72A2A647889FD05DD2C74C2B836C3A24FFA96B28DD1B3406E944F8B5A4D2A17FC851873
                                                    Malicious:false
                                                    Preview:DISMAN-TRACEROUTE-MIB DEFINITIONS ::= BEGIN....IMPORTS.. MODULE-IDENTITY, OBJECT-TYPE, Integer32,.. Gauge32, Unsigned32, mib-2,.. NOTIFICATION-TYPE,.. OBJECT-IDENTITY.. FROM SNMPv2-SMI -- RFC2578.. RowStatus, StorageType,.. TruthValue, DateAndTime.. FROM SNMPv2-TC -- RFC2579.. MODULE-COMPLIANCE, OBJECT-GROUP,.. NOTIFICATION-GROUP.. FROM SNMPv2-CONF -- RFC2580.. SnmpAdminString.. FROM SNMP-FRAMEWORK-MIB -- RFC3411.. InterfaceIndexOrZero -- RFC2863.. FROM IF-MIB.. InetAddressType, InetAddress.. FROM INET-ADDRESS-MIB -- RFC4001.. OperationResponseStatus.. FROM DISMAN-PING-MIB; -- RFC4560.... traceRouteMIB MODULE-IDENTITY.. LAST-UPDATED "200606130000Z" -- 13 June 2006.. ORGANIZATION "IETF Distributed Management Working Group".. CONTACT-INFO.. "Juergen Quittek.... NEC Europe Ltd..
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):86354
                                                    Entropy (8bit):4.1127098161848155
                                                    Encrypted:false
                                                    SSDEEP:768:RDT2ZCTYcG9GHWeXg5c/W+pZpVWThqvYvuMZmSZd6YcR+8bp/1ADK0GQdRl6:lK9stVCA89WH4Rl6
                                                    MD5:C9D9C3FA4B867B1AC499C2132CBC51E7
                                                    SHA1:A1E54409338CEA447CDB0F594D2BD00B1C0CD70E
                                                    SHA-256:CC3AE91D315E1F26A130AE981A1E6B10F33B6DE77AAF688BF049E1122F4537B7
                                                    SHA-512:C1901F3712DEC7B11E19C016F9127E4C22952EFD76256899128CC268E537A0D7C0AB3655196658A7494001BFE72F116F64D0B330550FB112D2456A318BF5D46D
                                                    Malicious:false
                                                    Preview:EtherLike-MIB DEFINITIONS ::= BEGIN.... IMPORTS.. MODULE-IDENTITY, OBJECT-TYPE, OBJECT-IDENTITY,.. Integer32, Counter32, Counter64, mib-2, transmission.. FROM SNMPv2-SMI.. MODULE-COMPLIANCE, OBJECT-GROUP.. FROM SNMPv2-CONF.. TruthValue.. FROM SNMPv2-TC.. ifIndex, InterfaceIndex.. FROM IF-MIB;.... etherMIB MODULE-IDENTITY.. LAST-UPDATED "200309190000Z" -- September 19, 2003.. ORGANIZATION "IETF Ethernet Interfaces and Hub MIB.. Working Group".. CONTACT-INFO.. "WG E-mail: hubmib@ietf.org.. To subscribe: hubmib-request@ietf.org.... Chair: Dan Romascanu.. Postal: Avaya Inc... Atidum Technology Park, Bldg. 3.. Tel Aviv 61131.. Israel.. Tel: +972 3 645 8414.. E-mail: dromasca@avaya.com.... Editor: John
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):4778
                                                    Entropy (8bit):4.572884815783835
                                                    Encrypted:false
                                                    SSDEEP:96:CcmB27hvFwv/kTWMLgFeCAEmHBD6sKy2DIdeZR1+SO:C5u9i/kyuBgD4eZHO
                                                    MD5:93390923BF869A02334C6EF311262553
                                                    SHA1:065BB2644BD23EF0CE378EC87F1485D048ED8A45
                                                    SHA-256:8ABCFEAB6C29C8A3B01594EA4811DD2C41D52556CC3BB041B11590D1F54B7A52
                                                    SHA-512:AC560F88B248A6F0BADD978F2A7A21C40388351E55959DC39B1FA23DDDC20AD5C74E065D39B70BE62E79F05DD0E574F2CEF0FC421C8F5DCFE7EAB34A603B2EC9
                                                    Malicious:false
                                                    Preview:HCNUM-TC DEFINITIONS ::= BEGIN....IMPORTS.. MODULE-IDENTITY, mib-2, Counter64.. FROM SNMPv2-SMI.. TEXTUAL-CONVENTION.. FROM SNMPv2-TC;....hcnumTC MODULE-IDENTITY.. LAST-UPDATED "200006080000Z".... ORGANIZATION "IETF OPS Area".. CONTACT-INFO.. " E-mail: mibs@ops.ietf.org.. Subscribe: majordomo@psg.com.. with msg body: subscribe mibs.... Andy Bierman.. Cisco Systems Inc... 170 West Tasman Drive.. San Jose, CA 95134 USA.. +1 408-527-3711.. abierman@cisco.com.... Keith McCloghrie.. Cisco Systems Inc... 170 West Tasman Drive.. San Jose, CA 95134 USA.. +1 408-526-5260.. kzm@cisco.com.... Randy Presuhn.. BMC Software, Inc... Office 1-3141.. 2141 North First Street..
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):54084
                                                    Entropy (8bit):4.718878728526424
                                                    Encrypted:false
                                                    SSDEEP:384:WwJ/w7zS0Xpnq4dV1dIBdogyfAjC3lXJ8fVvscaIWj4TMJqpPDlbRLQmsmIyC+4k:WwJ/uS8JrMC3lXyiIoqxlbRLgSjniV+
                                                    MD5:9A157F456142BB85B39539F4E243E40A
                                                    SHA1:C4D92EC96E7B654902A09093DCD9E860588F6D3A
                                                    SHA-256:6F3D02FB95A6CE06A10A897A85D28C78313287829C12B78F1377C01349272706
                                                    SHA-512:8E004199BFCAC73EB7FFA2477C51D68A2F585261A11357160DB46B0EA668257AA9F7B7469262CB4AED90C0C3986A7DEAF3F2E2A7101FC083950FAF653EF7B74B
                                                    Malicious:false
                                                    Preview:HOST-RESOURCES-MIB DEFINITIONS ::= BEGIN....IMPORTS..MODULE-IDENTITY, OBJECT-TYPE, mib-2,..Integer32, Counter32, Gauge32, TimeTicks FROM SNMPv2-SMI....TEXTUAL-CONVENTION, DisplayString,..TruthValue, DateAndTime, AutonomousType FROM SNMPv2-TC....MODULE-COMPLIANCE, OBJECT-GROUP FROM SNMPv2-CONF....InterfaceIndexOrZero FROM IF-MIB;....hostResourcesMibModule MODULE-IDENTITY.. LAST-UPDATED "200003060000Z" -- 6 March 2000.. ORGANIZATION "IETF Host Resources MIB Working Group".. CONTACT-INFO.. "Steve Waldbusser.. Postal: Lucent Technologies, Inc... 1213 Innsbruck Dr... Sunnyvale, CA 94089.. USA.. Phone: 650-318-1251.. Fax: 650-318-1633.. Email: waldbusser@lucent.com.... In addition, the Host Resources MIB mailing list is.. dedicated to discussion of this MIB. To join the.. mailing list, send a request message to.. hostmib-request@andrew.cmu.edu. The m
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):10972
                                                    Entropy (8bit):4.866621899873662
                                                    Encrypted:false
                                                    SSDEEP:96:uYJopYASf9Z2oRoogCZSrKUscUyHj7ZrFAjYRWpM6azFf3ue/p:uYJo9+CGs1RWpSn
                                                    MD5:A2A4ED20EEDAD194BE225C5D5296B80F
                                                    SHA1:245C83580B601C974DF58E1655CB69DD7762196C
                                                    SHA-256:6087F9B5A1F99B9DAC0994D6D8EC1390603C4685B28FFD0021B3171EA9B9168F
                                                    SHA-512:FC9A6698903BB2E5212E1E0A04AE14076F117EF363FAED54AA30E0B9A2D7964E4850DE390F9F5564401983EF842A73CEF8409D0924AA2DF3032A13141F4AADAD
                                                    Malicious:false
                                                    Preview:HOST-RESOURCES-TYPES DEFINITIONS ::= BEGIN....IMPORTS.. MODULE-IDENTITY, OBJECT-IDENTITY FROM SNMPv2-SMI.. hrMIBAdminInfo, hrStorage, hrDevice FROM HOST-RESOURCES-MIB;....hostResourcesTypesModule MODULE-IDENTITY.. LAST-UPDATED "200003060000Z" -- 6 March, 2000.. ORGANIZATION "IETF Host Resources MIB Working Group".. CONTACT-INFO.. "Steve Waldbusser.. Postal: Lucent Technologies, Inc... 1213 Innsbruck Dr... Sunnyvale, CA 94089.. USA.. Phone: 650-318-1251.. Fax: 650-318-1633.. Email: waldbusser@ins.com.... In addition, the Host Resources MIB mailing list is dedicated.. to discussion of this MIB. To join the mailing list, send a.. request message to hostmib-request@andrew.cmu.edu. The mailing.. list address is hostmib@andrew.cmu.edu.".. DESCRIPTION.. "This MIB module registers type definitions for.. storage types, device types, and file system types..... After the initia
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):4864
                                                    Entropy (8bit):4.500452096521191
                                                    Encrypted:false
                                                    SSDEEP:48:4MyQfTEwJpveT8lFQKTvTCvjtnySb9ipQbjG8wRbDZMRy5QCrBmoVkEnscxSmS:pswHvEyrCvj0SpVG8Ut89CrBTkEda
                                                    MD5:9D971306D39AC6D012ED9EE3D9848DAB
                                                    SHA1:6C9759A4BDB7A1C0744CD5C7F72CC389691D49F9
                                                    SHA-256:F6C768E44E640937B4C6F25F51B5840CE7285D4A596C7C516ED7E4E9D8296B31
                                                    SHA-512:7FFA8FCB333C680A2ADE851BBDB93E381888712394BBCB1216AE176794CEF215E55B15E85DFB855EC52F6DC0BB0DAA9B560D09E7533DC6C01BD201AC8A8C08D0
                                                    Malicious:false
                                                    Preview: IANA-ADDRESS-FAMILY-NUMBERS-MIB DEFINITIONS ::= BEGIN.... IMPORTS.. MODULE-IDENTITY,.. mib-2 FROM SNMPv2-SMI.. TEXTUAL-CONVENTION FROM SNMPv2-TC;.... ianaAddressFamilyNumbers MODULE-IDENTITY.. LAST-UPDATED "200203140000Z" -- March 14, 2002.. ORGANIZATION "IANA".. CONTACT-INFO.. "Postal: Internet Assigned Numbers Authority.. Internet Corporation for Assigned Names.... and Numbers.. 4676 Admiralty Way, Suite 330.. Marina del Rey, CA 90292-6601.. USA.... Tel: +1 310-823-9358.. E-Mail: iana@iana.org".. DESCRIPTION.. "The MIB module defines the AddressFamilyNumbers.. textual convention.".... -- revision history.... REVISION "200203140000Z" -- March 14, 2002.. DESCRIPTION "AddressFamilyNumbers assignment 22 to .. fibreChannelWWPN
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):4422
                                                    Entropy (8bit):4.835276652966644
                                                    Encrypted:false
                                                    SSDEEP:96:7MuiL1rJQh4MgsGYqmSORdYScUQe2dGJ3QMQ8QWQWQkQ9hQKGCpem:7MuiL1rJQh47sGV6RdY9De2YJgRBXXZn
                                                    MD5:F3B7F541D4F34FA04C7CEC3281362A13
                                                    SHA1:B1FD024359D5D4858E8409E33426560CE6214642
                                                    SHA-256:6172F243FB0A9DDB717D4141C2096482CB941780FE7F15C0E5960EF2D44B056D
                                                    SHA-512:7A3BF42C72A13F44707F8FE11BAF163FA3552458F770E768221F8257F8A98231D9268B52FACB468CFF3AD8DC7E4B3D6FA93B2D4111EDE8F2817C93E60535B00F
                                                    Malicious:false
                                                    Preview:IANA-LANGUAGE-MIB DEFINITIONS ::= BEGIN....IMPORTS.. MODULE-IDENTITY, OBJECT-IDENTITY, mib-2.. FROM SNMPv2-SMI;....ianaLanguages MODULE-IDENTITY.. LAST-UPDATED "200005100000Z" -- May 10, 2000.. ORGANIZATION "IANA".. CONTACT-INFO.. "Internet Assigned Numbers Authority (IANA).... Postal: ICANN.. 4676 Admiralty Way, Suite 330.. Marina del Rey, CA 90292.... Tel: +1 310 823 9358 x20.. E-Mail: iana@iana.org".. DESCRIPTION.. "The MIB module registers object identifier values for.. well-known programming and scripting languages. Every.. language registration MUST describe the format used.. when transferring scripts written in this language..... Any additions or changes to the contents of this MIB.. module require Designated Expert Review as defined in.. the Guidelines for Writing IANA Considerations Section.. document. The Designated Expert wil
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):3610
                                                    Entropy (8bit):4.353424918513813
                                                    Encrypted:false
                                                    SSDEEP:48:KmMC/oyojJoAXYzXdwDkNUKncICn9UaXNl+U/DbNO4mCD6xglORbM:K1A+No/Gk9ncV9UaXyYO49OO
                                                    MD5:1BFEC851076C2557D07352624E479D34
                                                    SHA1:A5BC44B235B0DF57D6DD5A81C418601ABEB58752
                                                    SHA-256:DD298131CF7EEFE793C0F8C68D89CD1A57F75AFC6B2BF19C495C97CC72AAD1DA
                                                    SHA-512:0F3D6B57799EBD385BB42CCAFE16C015DCBDA9FA3EB764AC7A96EB940AD0738A64A4D5BB6CCED5C75AEE3FDCEA050B4374AE6DA5F9AF6EA6A4501363D2F1C855
                                                    Malicious:false
                                                    Preview:..IANA-RTPROTO-MIB DEFINITIONS ::= BEGIN....IMPORTS.. MODULE-IDENTITY, mib-2 FROM SNMPv2-SMI.. TEXTUAL-CONVENTION FROM SNMPv2-TC;....ianaRtProtoMIB MODULE-IDENTITY.. LAST-UPDATED "200009260000Z" -- September 26, 2000.. ORGANIZATION "IANA".. CONTACT-INFO.. " Internet Assigned Numbers Authority.. Internet Corporation for Assigned Names and Numbers.. 4676 Admiralty Way, Suite 330.. Marina del Rey, CA 90292-6601.... Phone: +1 310 823 9358.. EMail: iana@iana.org".. DESCRIPTION.. "This MIB module defines the IANAipRouteProtocol and.. IANAipMRouteProtocol textual conventions for use in MIBs.. which need to identify unicast or multicast routing.. mechanisms..... Any additions or changes to the contents of this MIB module.. require either publication of an RFC, or Designated Expert.. Review as defined
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):24552
                                                    Entropy (8bit):4.441553394080508
                                                    Encrypted:false
                                                    SSDEEP:384:0MDYNWx8WN8lbD9AtsjaDq8wfwy0lWscmItPbmrA4EQgu3iTp6GBF377cXTCeLLp:0M8NWxtN8lbD9AtsjaDq8wfwy0lWscmt
                                                    MD5:33BC1D0806FB9DDFF648B385E708D717
                                                    SHA1:28CEA49B98780F4FC54B7DCA3B632C6711817308
                                                    SHA-256:AF07BBA3163A17F92636237F7AC049D897BE4DC8BD2A5FB83DE42C990E98ACC7
                                                    SHA-512:7B5B1B823031659B2B11F98BBEF21F79043CCA1AC76425E1291C2B3211802B94FAAC2BD028EB7D320F3BD27A5EBF03E0AA20210469B213C1F953D44AD6DF4EB5
                                                    Malicious:false
                                                    Preview: IANAifType-MIB DEFINITIONS ::= BEGIN.... IMPORTS.. MODULE-IDENTITY, mib-2 FROM SNMPv2-SMI.. TEXTUAL-CONVENTION FROM SNMPv2-TC;.... ianaifType MODULE-IDENTITY.. LAST-UPDATED "200510100000Z" -- October 10, 2005.. ORGANIZATION "IANA".. CONTACT-INFO " Internet Assigned Numbers Authority.... Postal: ICANN.. 4676 Admiralty Way, Suite 330.. Marina del Rey, CA 90292.... Tel: +1 310 823 9358.. E-Mail: iana@iana.org".... DESCRIPTION "This MIB module defines the IANAifType Textual.. Convention, and thus the enumerated values of.. the ifType object defined in MIB-II's ifTable.".... REVISION "200510100000Z" -- October 10, 2005.. DESCRIPTION "Registration of new IANA ifType 230.".... REVISION "200509090000Z" -- September 09, 2005.. DESCRIPTION
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):5215
                                                    Entropy (8bit):4.837631060167448
                                                    Encrypted:false
                                                    SSDEEP:96:pvtFXA+WOKy0U0IBtG2IMLD0mo687IHpGLC0HENjYcTzN:pUSF0U0IBtmMvFo6SIQC0WkQN
                                                    MD5:BCCDEECC99EB61D158428304FC1FA7D4
                                                    SHA1:B392E70263410598BD4F349DAF7D99CC57911EA6
                                                    SHA-256:3466F1307C322BF3DE289A99738B74E0CFEA136E1CA309C2C8EAB56D39985AD5
                                                    SHA-512:429D19D1B9B6E6AB9CC509A3845809212804DEB879E9B78CA72F98C1E4E3AD20D29D14B1CBFF7F5C873C7F0B21E5221DCAC15FC1608F230242B2926F979B54B5
                                                    Malicious:false
                                                    Preview:IF-INVERTED-STACK-MIB DEFINITIONS ::= BEGIN....IMPORTS.. MODULE-IDENTITY, OBJECT-TYPE, mib-2 FROM SNMPv2-SMI.. RowStatus FROM SNMPv2-TC.. MODULE-COMPLIANCE, OBJECT-GROUP FROM SNMPv2-CONF.. ifStackGroup2,.. ifStackHigherLayer, ifStackLowerLayer FROM IF-MIB;....ifInvertedStackMIB MODULE-IDENTITY.. LAST-UPDATED "200006140000Z".. ORGANIZATION "IETF Interfaces MIB Working Group".. CONTACT-INFO.. " Keith McCloghrie.. Cisco Systems, Inc... 170 West Tasman Drive.. San Jose, CA 95134-1706.. US.... 408-526-5260.. kzm@cisco.com".. DESCRIPTION.. "The MIB module which provides the Inverted Stack Table for.. interface sub-layers.".. REVISION "200006140000Z".. DESCRIPTION.. "Initial revision, published as RFC 2864".. ::= { mib-2 77 }....ifInvMIBObjects OBJECT IDENTIFIER ::= { ifInvertedStackMIB 1 }....--..-- The
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):73505
                                                    Entropy (8bit):4.500890556773766
                                                    Encrypted:false
                                                    SSDEEP:768:r1zcF4s4EByjzZRUVd4B80ngnL8vnzn/nPndnmnSnYn4EnA69DNDF7nW9c:abnN
                                                    MD5:EF53E4BFB4D4E1840840DA4409582D14
                                                    SHA1:E0509B730173F2D6DE11BB5EC11AFBE2FA378B2B
                                                    SHA-256:EBACA56D0146FD8246A202C68B96F36A10688B77B74B70F268A927D118BD366A
                                                    SHA-512:EFE73729325AC226517C16F6AB309C6626305E26BBAA5BC7D7B4C710DE9FF4B2BFC75896CB84BCDA634B9055385774EA626AD2023B3453CA71EEA837F032771B
                                                    Malicious:false
                                                    Preview:IF-MIB DEFINITIONS ::= BEGIN....IMPORTS.. MODULE-IDENTITY, OBJECT-TYPE, Counter32, Gauge32, Counter64,.. Integer32, TimeTicks, mib-2,.. NOTIFICATION-TYPE FROM SNMPv2-SMI.. TEXTUAL-CONVENTION, DisplayString,.. PhysAddress, TruthValue, RowStatus,.. TimeStamp, AutonomousType, TestAndIncr FROM SNMPv2-TC.. MODULE-COMPLIANCE, OBJECT-GROUP,.. NOTIFICATION-GROUP FROM SNMPv2-CONF.. snmpTraps FROM SNMPv2-MIB.. IANAifType FROM IANAifType-MIB;....ifMIB MODULE-IDENTITY.. LAST-UPDATED "200006140000Z".. ORGANIZATION "IETF Interfaces MIB Working Group".. CONTACT-INFO.. " Keith McCloghrie.. Cisco Systems, Inc... 170 West Tasman Drive.. San Jose, CA 95134-1706.. US.... 408-526-5260.. kzm@cisco.com".. DESCRIPTION.. "The MIB module to describe g
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):17184
                                                    Entropy (8bit):4.562236377256974
                                                    Encrypted:false
                                                    SSDEEP:192:Ez4v5xzRM6N1jO4wszQnG3pfMETzB+87DFmLpkZ0x0NICOe6I3pNaBz6TzQRsmqU:HbdM4jYGQnmffTzB+EFS2QeIwEuDU
                                                    MD5:D014C7A1E43EA5E4D553344F3B72C2E3
                                                    SHA1:C8027555ED4208B30B038FC05578CCE08FDFE98E
                                                    SHA-256:8FCE1BD9FA27EF77CE579A8D22E936718FBE43C99C61366D40BB911B205797B6
                                                    SHA-512:FF954B8C784AEEBA09469F69F7797DD4DB23995FFB03D1C7E9A1C4C4F78D8B99CF497519EDE1B3C847C90FEEF512226B3DF19D443EC3F18D82CEAEFE753BFA7C
                                                    Malicious:false
                                                    Preview:INET-ADDRESS-MIB DEFINITIONS ::= BEGIN....IMPORTS.. MODULE-IDENTITY, mib-2, Unsigned32 FROM SNMPv2-SMI.. TEXTUAL-CONVENTION FROM SNMPv2-TC;....inetAddressMIB MODULE-IDENTITY.. LAST-UPDATED "200502040000Z".. ORGANIZATION.. "IETF Operations and Management Area".. CONTACT-INFO.. "Juergen Schoenwaelder (Editor).. International University Bremen.. P.O. Box 750 561.. 28725 Bremen, Germany.... Phone: +49 421 200-3587.. EMail: j.schoenwaelder@iu-bremen.de.... Send comments to <ietfmibs@ops.ietf.org>.".. DESCRIPTION.. "This MIB module defines textual conventions for.. representing Internet addresses. An Internet.. address can be an IPv4 address, an IPv6 address,.. or a DNS domain name. This module also defines.. textual conventions for Internet port numbers,.. autonomous system numbers, and the length of an.. Internet address prefix.....
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):47723
                                                    Entropy (8bit):4.566157084028072
                                                    Encrypted:false
                                                    SSDEEP:384:oGYH13xtLLiLQ4hhvmPWGOnnIpKrrnloba:oN35Cc8Ism2
                                                    MD5:4D342DE9269A901742DD1C237235E833
                                                    SHA1:2F5D557A5A988579448485D833263208E947777C
                                                    SHA-256:163B5CE2719DBEB81BEF6C9B9BBB2E4BD6C5B1AA74067C3E466D145D40E8740E
                                                    SHA-512:B6BF02AFAA96F3001376097D7E77CCD0EF216735760FBC620B001D10BE0D1DE92B875235C52445DA801CED8F27DDE7E87533B09209802ECD9D0C7767188FF88A
                                                    Malicious:false
                                                    Preview:IP-FORWARD-MIB DEFINITIONS ::= BEGIN....IMPORTS.. MODULE-IDENTITY, OBJECT-TYPE,.. IpAddress, Integer32, Gauge32,.. Counter32 FROM SNMPv2-SMI.. RowStatus FROM SNMPv2-TC........ MODULE-COMPLIANCE, OBJECT-GROUP FROM SNMPv2-CONF.. InterfaceIndexOrZero FROM IF-MIB.. ip FROM IP-MIB.. IANAipRouteProtocol FROM IANA-RTPROTO-MIB.. InetAddress, InetAddressType,.. InetAddressPrefixLength,.. InetAutonomousSystemNumber FROM INET-ADDRESS-MIB;....ipForward MODULE-IDENTITY.. LAST-UPDATED "200602010000Z".. ORGANIZATION.. "IETF IPv6 Working Group.. http://www.ietf.org/html.charters/ipv6-charter.html".. CONTACT-INFO.. "Editor:.. Brian Haberman.. Johns Hopkins University - Applied Physics Laboratory.. Mailstop 17-S442.. 11100 Johns Hopkins Road.. Laurel MD, 20
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):191182
                                                    Entropy (8bit):4.589067886783477
                                                    Encrypted:false
                                                    SSDEEP:3072:wZS+7K8+84IXs73UvM5wyC2JRMbAmo7sQH9OPVJ:uS+7bEI2JRJTOdJ
                                                    MD5:8C6E3432608841E162ACBEA05C85F5F7
                                                    SHA1:DB9B3A722405B6731949468BC0BBAD8AB414F0E8
                                                    SHA-256:827985E73003D4F7C998D69DF2D89E1F159F7CEB4AE27516A8CF055B36452E27
                                                    SHA-512:6E4BBE9D713B2EAC1A510F4C3E86697847E1C7000590E666489D8B437A3039BC75CE5BDF26A7AEA8C14322C20F30162430910901A1EB0C5EC2B2EB51EB5CE09C
                                                    Malicious:false
                                                    Preview:IP-MIB DEFINITIONS ::= BEGIN....IMPORTS.. MODULE-IDENTITY, OBJECT-TYPE,.. Integer32, Counter32, IpAddress,.. mib-2, Unsigned32, Counter64,.. zeroDotZero FROM SNMPv2-SMI.. PhysAddress, TruthValue,.. TimeStamp, RowPointer,.. TEXTUAL-CONVENTION, TestAndIncr,.. RowStatus, StorageType FROM SNMPv2-TC.. MODULE-COMPLIANCE, OBJECT-GROUP FROM SNMPv2-CONF.. InetAddress, InetAddressType,.. InetAddressPrefixLength,.. InetVersion, InetZoneIndex FROM INET-ADDRESS-MIB.. InterfaceIndex FROM IF-MIB;....ipMIB MODULE-IDENTITY.. LAST-UPDATED "200602020000Z".. ORGANIZATION "IETF IPv6 MIB Revision Team".. CONTACT-INFO.. "Editor:........ Shawn A. Routhier.. Interworking Labs.. 108 Whispering Pines Dr. Suite 235.. Scotts Valley, CA 95066.. USA.. EMail: <sar@iwl.com>".. DESCRIPTION.. "The MIB module for managing
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):16465
                                                    Entropy (8bit):4.6904018121072
                                                    Encrypted:false
                                                    SSDEEP:96:WZWAwXelTn/fA2x3sT62AHrmIbS5YoKeR5RCIbJbQE88lW22qrlqcFgrveDopvRE:WbwXelTn/ge+tHCOqWl+jCbD5X+Jh2
                                                    MD5:E0F41D34F7ECEECD8C71C667B257AE17
                                                    SHA1:15914F5D069EEF495DED0BE22154531860DE46A5
                                                    SHA-256:B3DF8FF785B4B7F152C1CDBA0BCC104F6D9AE55E17399CF9C64012AA0A34084B
                                                    SHA-512:3DE9EC44FF324EC41F40590BC6195614EF62A9B84A7672F9B0E56E5249A219F27DB5AE40BAA9286A9329EF6A0CC7F41B7C930E4E2E40ADA2E47A0BE4B27F3605
                                                    Malicious:false
                                                    Preview: IPV6-ICMP-MIB DEFINITIONS ::= BEGIN.... IMPORTS.. MODULE-IDENTITY, OBJECT-TYPE,.. Counter32, mib-2 FROM SNMPv2-SMI.. MODULE-COMPLIANCE, OBJECT-GROUP FROM SNMPv2-CONF.. ipv6IfEntry FROM IPV6-MIB;.... ipv6IcmpMIB MODULE-IDENTITY.. LAST-UPDATED "9801082155Z".. ORGANIZATION "IETF IPv6 Working Group".. CONTACT-INFO.. " Dimitry Haskin.... Postal: Bay Networks, Inc... 660 Techology Park Drive... Billerica, MA 01821.. US.... Tel: +1-978-916-8124.. E-mail: dhaskin@baynetworks.com.... Steve Onishi.... Postal: Bay Networks, Inc... 3 Federal Street.. Billerica, MA 01821.. US.... Tel: +1-978-916-3816.. E-mail: sonishi@baynetworks.com".. DESCRIPTION.. "The MIB module for entities implementing.. the ICMPv6."..
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):50146
                                                    Entropy (8bit):4.633095664367848
                                                    Encrypted:false
                                                    SSDEEP:384:ZFfaiLiTQRor4Sb/vFjTcRz++YEHy7ffdTR//V6nAGOw:jfMrvbHFjoRy+RUhw
                                                    MD5:904A6564FC3492959849D10F8D01A3DF
                                                    SHA1:81C4CB713A66739C6A9BC3C5D29F05C90D4D31E4
                                                    SHA-256:3A941806B960EC1FFA55617A875902B2CAF985AEAD137B3E7A301335344BE586
                                                    SHA-512:289B250E6D0296DDC37EA08FE870B298F56285D72C293ED05B47E7F2E0070248D6FC156C92F82498F1AD0DD3D090EC8FB4B98DC00EB6989BCFDB8BB22F9301EF
                                                    Malicious:false
                                                    Preview: IPV6-MIB DEFINITIONS ::= BEGIN.... IMPORTS.. MODULE-IDENTITY, OBJECT-TYPE, NOTIFICATION-TYPE,.. mib-2, Counter32, Unsigned32, Integer32,.. Gauge32 FROM SNMPv2-SMI.. DisplayString, PhysAddress, TruthValue, TimeStamp,.. VariablePointer, RowPointer FROM SNMPv2-TC.. MODULE-COMPLIANCE, OBJECT-GROUP,.. NOTIFICATION-GROUP FROM SNMPv2-CONF.. Ipv6IfIndex, Ipv6Address, Ipv6AddressPrefix,.. Ipv6AddressIfIdentifier,.. Ipv6IfIndexOrZero FROM IPV6-TC;.... ipv6MIB MODULE-IDENTITY.. LAST-UPDATED "9802052155Z".. ORGANIZATION "IETF IPv6 Working Group".. CONTACT-INFO.. " Dimitry Haskin.... Postal: Bay Networks, Inc... 660 Techology Park Drive... Billerica, MA 01821.... US.... Tel: +1-978-916-8124.. E-mail: dhaskin@baynetworks.com.... Steve Onishi....
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2434
                                                    Entropy (8bit):4.775220868168817
                                                    Encrypted:false
                                                    SSDEEP:24:/fKFNR2Xt2TX9sDmwdKkjNylVE43zLhaf5cs/MwsO1OhXe:URUMXCCTuNyTDsfKMx1Ohu
                                                    MD5:72EA269DC6762733C0A0B9E359516446
                                                    SHA1:EE2983BE6C50143CACAC94FE3CEF8113B298CCE5
                                                    SHA-256:86011652171E2B1851B8560B4265C34F700A7E9B63D37CA399EBA15C9A1A7D58
                                                    SHA-512:2B07AF054A4295A8573CA55125DF488E7B519C521402EBCC9663EEEC6413AB5E05E8644060AB6E0F9B93D341E3603E6C72A02198B4B229BAA87D1E445E030147
                                                    Malicious:false
                                                    Preview:IPV6-TC DEFINITIONS ::= BEGIN....IMPORTS.. Integer32 FROM SNMPv2-SMI.. TEXTUAL-CONVENTION FROM SNMPv2-TC;....-- definition of textual conventions..Ipv6Address ::= TEXTUAL-CONVENTION.. DISPLAY-HINT "2x:".. STATUS current.. DESCRIPTION.. "This data type is used to model IPv6 addresses... This is a binary string of 16 octets in network.. byte-order.".. SYNTAX OCTET STRING (SIZE (16))....Ipv6AddressPrefix ::= TEXTUAL-CONVENTION.. DISPLAY-HINT "2x:".. STATUS current.. DESCRIPTION.. "This data type is used to model IPv6 address.. prefixes. This is a binary string of up to 16.. octets in network byte-order.".. SYNTAX OCTET STRING (SIZE (0..16))....Ipv6AddressIfIdentifier ::= TEXTUAL-CONVENTION.. DISPLAY-HINT "2x:".. STATUS current.. DESCRIPTION.. "This data type is used to model IPv6 address.. interface identifiers. This is a binary string..
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):7468
                                                    Entropy (8bit):4.8005124354895035
                                                    Encrypted:false
                                                    SSDEEP:192:psmXankc9S3fFvlzmqMTgt1ATYzyHEgjL/H:ZXTq6mbsY4yHEo
                                                    MD5:27C2064EA68B92028CB7C150E519B020
                                                    SHA1:9B6AF4777611250BF06D48AD040C2CBDC543A0BC
                                                    SHA-256:8B87EA192A6262B677A7334A8FDC16FA7E7D17669C45D778D9C61B34FF22F6D4
                                                    SHA-512:5ACE153804D2912187F3549EC51E6A9B1C371DB01E6ACFDCDB1C6FF6F8B1203DD4AE0826BFEA2128C45C3B8E756AFE41DD324D40472BC864216CC7E19181B571
                                                    Malicious:false
                                                    Preview:IPV6-TCP-MIB DEFINITIONS ::= BEGIN....IMPORTS.. MODULE-COMPLIANCE, OBJECT-GROUP FROM SNMPv2-CONF.. MODULE-IDENTITY, OBJECT-TYPE,.. mib-2, experimental FROM SNMPv2-SMI.. Ipv6Address, Ipv6IfIndexOrZero FROM IPV6-TC;....ipv6TcpMIB MODULE-IDENTITY.. LAST-UPDATED "9801290000Z".. ORGANIZATION "IETF IPv6 MIB Working Group".. CONTACT-INFO.. " Mike Daniele.... Postal: Compaq Computer Corporation.. 110 Spitbrook Rd.. Nashua, NH 03062... US.... Phone: +1 603 884 1423.. Email: daniele@zk3.dec.com".. DESCRIPTION.. "The MIB module for entities implementing TCP over IPv6.".. ::= { experimental 86 }....-- objects specific to TCP for IPv6....tcp OBJECT IDENTIFIER ::= { mib-2 6 }....-- the TCP over IPv6 Connection table....-- This connection table contains information about this..-- entity's existing TCP connections bet
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):4541
                                                    Entropy (8bit):4.904553465822034
                                                    Encrypted:false
                                                    SSDEEP:96:BU7yAG2h0Fwj5vF0bq0QISSqs77s1A8xuz/kYfLP/:BoG40FwlvF0bqgSSqCw9uNr/
                                                    MD5:8CC9E98F089ECA1B6EB4B72556C96DA7
                                                    SHA1:751201E62204E1F371CB919D34A8C1A61FCE6A23
                                                    SHA-256:E19F75DA5915A7B10CE8E0CC18E9997F37E49A95C81D27C40092A73F43B0552D
                                                    SHA-512:B3180C94C48EDC2771E7DE89D273E813740CF187078910C066792F8896B2A919D1FCDBA05E3E785971A0299CA57F3AAD16A014EDDB0F38DABB474D61C8A8E159
                                                    Malicious:false
                                                    Preview:IPV6-UDP-MIB DEFINITIONS ::= BEGIN....IMPORTS.. MODULE-COMPLIANCE, OBJECT-GROUP FROM SNMPv2-CONF.. MODULE-IDENTITY, OBJECT-TYPE,.. mib-2, experimental FROM SNMPv2-SMI.. Ipv6Address, Ipv6IfIndexOrZero FROM IPV6-TC;....ipv6UdpMIB MODULE-IDENTITY.. LAST-UPDATED "9801290000Z".. ORGANIZATION "IETF IPv6 MIB Working Group".. CONTACT-INFO.. " Mike Daniele.... Postal: Compaq Computer Corporation.. 110 Spitbrook Rd.. Nashua, NH 03062... US.... Phone: +1 603 884 1423.. Email: daniele@zk3.dec.com".. DESCRIPTION.. "The MIB module for entities implementing UDP over IPv6.".. ::= { experimental 87 }....-- objects specific to UDP for IPv6....udp OBJECT IDENTIFIER ::= { mib-2 7 }....-- the UDP over IPv6 Listener table....-- This table contains information about this entity's..-- UDP/IPv6 endpoints. Only endpoin
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):6161
                                                    Entropy (8bit):4.909357761206057
                                                    Encrypted:false
                                                    SSDEEP:96:F9b0S5zrQEV+tgBpuQCBHuhTxmG3nBHcC2qHFpUK63:Pb/5wEVQGbXhTxmmZthHFpUKE
                                                    MD5:1058BB123A09433AC488D924BC9BFCDF
                                                    SHA1:D61AD1ABAB12D8CF03A191CD07A334173B88D72C
                                                    SHA-256:C9929C407B0D168B88C63F9439FF4D60EBEF777F524F38186ECB08031D496DF6
                                                    SHA-512:CA432C1292B323B7D3182405ADA09EDF28B8E433853066FAF368CC2C07942004864C4D5F7396BC743C31BD719A037AEC0CC668FE647310CA3B750A8BB4B13474
                                                    Malicious:false
                                                    Preview:LM-SENSORS-MIB DEFINITIONS ::= BEGIN....--..-- Derived from the original VEST-INTERNETT-MIB. Open issues:..--..-- (a) where to register this MIB?..-- (b) use not-accessible for diskIOIndex?..--......IMPORTS.. MODULE-IDENTITY, OBJECT-TYPE, Integer32, Gauge32.. FROM SNMPv2-SMI.. DisplayString.. FROM SNMPv2-TC.. ucdExperimental.. FROM UCD-SNMP-MIB;....lmSensorsMIB MODULE-IDENTITY.. LAST-UPDATED "200011050000Z".. ORGANIZATION "AdamsNames Ltd".. CONTACT-INFO .. "Primary Contact: M J Oldfield.. email: m@mail.tc".. DESCRIPTION.. "This MIB module defines objects for lm_sensor derived data.".. REVISION "200011050000Z".. DESCRIPTION.. "Derived from DISKIO-MIB ex UCD.".. ::= { lmSensors 1 }....lmSensors OBJECT IDENTIFIER ::= { ucdExperimental 16 }....--....lmTempSensorsTable OBJECT-TYPE.. SYNTAX SEQUENCE OF LMTempSensorsEntry.. MAX-ACCESS not-accessible.. STATUS current.. DESCRIP
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):43601
                                                    Entropy (8bit):4.945422988806991
                                                    Encrypted:false
                                                    SSDEEP:384:J1qDX39+XGEVr9IJT/upxiVD0+QY0ODDdx3Duz/m5aAPfo6bkQZ3ZgZGnRDgr4Pz:JsDXQ2CrOJruBY/DeRcvgr4Ohav+pv+r
                                                    MD5:214774D0A14FEE3F2F0EAA060B0865CF
                                                    SHA1:B85726EBB501D6814E5040FE761E8EC9B60C9F16
                                                    SHA-256:B6270D6E0591D57E59BD9A8AA33F60941CCD1A8B4C6591A5D597284C50C7F656
                                                    SHA-512:169E98C3B353BB67733505A886B7A70388D736E57EF104A6CB92A1DE884E62690336AD3086A397E6A203BEB9C7F66E6DDC87D6E5EFBD10E75ECF2FC72B3A323A
                                                    Malicious:false
                                                    Preview:MTA-MIB DEFINITIONS ::= BEGIN....IMPORTS.. OBJECT-TYPE, Counter32, Gauge32, MODULE-IDENTITY, mib-2.. FROM SNMPv2-SMI.. TimeInterval.. FROM SNMPv2-TC.. MODULE-COMPLIANCE, OBJECT-GROUP.. FROM SNMPv2-CONF.. SnmpAdminString.. FROM SNMP-FRAMEWORK-MIB.. applIndex, URLString.. FROM NETWORK-SERVICES-MIB;....mta MODULE-IDENTITY.. LAST-UPDATED "200003030000Z".. ORGANIZATION "IETF Mail and Directory Management Working Group".. CONTACT-INFO.. " Ned Freed.... Postal: Innosoft International, Inc... 1050 Lakes Drive.. West Covina, CA 91790.. US.... Tel: +1 626 919 3600.. Fax: +1 626 919 3614.... E-Mail: ned.freed@innosoft.com".. DESCRIPTION.. "The MIB module describing Message Transfer Agents (MTAs)".. REVISION "200003030000Z".. DESCRIPTION.. "This revision, published in RFC 2789, changes a number of.. DisplayStrings to SnmpAdminStrings. Note that this change.... is not
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:makefile script, ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2209
                                                    Entropy (8bit):5.41063668399195
                                                    Encrypted:false
                                                    SSDEEP:48:og7N22iplLYUKdty8SDbNxE8NpmaYaKsaOV2asIfM/r7+WyJW/DJG1tXYy:142Y9YUKdtbobNtEp//OV2F3Dt/etIy
                                                    MD5:D07395EA3D0DAFB840CFF796D6FEC340
                                                    SHA1:39BB8C1DB9D277EF9D1C095B7F301053600CE8EA
                                                    SHA-256:BDB8AE6214EEA299D84F96FDD3010CC029BCEFA88E507FCF0130A52F9438F5A3
                                                    SHA-512:D186C2F636805BC5AF44B53E414CF8A6C2248BFADF1492656F7394D64F711AB75495CE7C35FC8A158C0AEA829BE1A09C6D17922E726D8347173408D66627564E
                                                    Malicious:false
                                                    Preview:#..# Makefile to install mib files...#....top_builddir=......VPATH..= @srcdir@....#..# Stuff here..#..OTHERINSTALL=mibsinstall..OTHERUNINSTALL=mibsuninstall......V1MIBS.= RFC1155-SMI.txt RFC1213-MIB.txt RFC-1215.txt....V2MIBS = SNMPv2-CONF.txt SNMPv2-SMI.txt SNMPv2-TC.txt SNMPv2-TM.txt \...SNMPv2-MIB.txt....V3MIBS.= SNMP-FRAMEWORK-MIB.txt SNMP-MPD-MIB.txt SNMP-TARGET-MIB.txt \...SNMP-NOTIFICATION-MIB.txt SNMP-PROXY-MIB.txt \...SNMP-USER-BASED-SM-MIB.txt SNMP-VIEW-BASED-ACM-MIB.txt \...SNMP-COMMUNITY-MIB.txt TRANSPORT-ADDRESS-MIB.txt....AGENTMIBS = AGENTX-MIB.txt SMUX-MIB.txt....IANAMIBS = IANAifType-MIB.txt IANA-LANGUAGE-MIB.txt \...IANA-ADDRESS-FAMILY-NUMBERS-MIB.txt....RFCMIBS.= IF-MIB.txt IF-INVERTED-STACK-MIB.txt \...EtherLike-MIB.txt \...IP-MIB.txt IP-FORWARD-MIB.txt IANA-RTPROTO-MIB.txt \...TCP-MIB.txt UDP-MIB.txt \...INET-ADDRESS-MIB.txt HCNUM-TC.txt \...HOST-RESOURCES-MIB.txt HOST-RESOURCES-TYPES.txt \...RMON-MIB.txt \...IPV6-TC.txt IPV6-MIB.txt IPV6-ICMP-MIB.txt IPV6-TCP-MIB.t
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:makefile script, ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):4764
                                                    Entropy (8bit):5.526750996464224
                                                    Encrypted:false
                                                    SSDEEP:96:wuSV/A1V8j6DeboElJTkoi34bRHLN7sRxOL0:SlA1VkknCHLBsi0
                                                    MD5:22470257D315E2D2C3F4C63C99D35806
                                                    SHA1:0B2E87ADE0F3121985E5ACA41F9AF4AE05E6B540
                                                    SHA-256:C8DDAAA22DBCADFFEC578FC1C9FE2EE440B82DBF8D59773497C42FAFB4A9DFEA
                                                    SHA-512:891FD666292B2D29CDEB2EC87FD18167C3962AB977E814669EDAE2A0C8836248113FFDC2C566B208642E49D853EC124EE9BEB19C58FCE1F8380230B3AE844258
                                                    Malicious:false
                                                    Preview:# RFCHOST =.ftp://ftp.nordu.net..RFCHOST =.ftp://ftp.ietf.org..RFCDIR =.rfc....IANAHOST =.http://www.iana.org..IANADIR =.assignments....PREFIX =./usr/local..ALLDIR =.$(PREFIX)/share/snmp/rfc.orig..INSTDIR =.$(PREFIX)/share/snmp/rfc....MIBS =.SNMPv2-TC.txt SNMPv2-TM.txt SNMPv2-SMI.txt SNMPv2-MIB.txt \...SNMPv2-CONF.txt HCNUM-TC.txt INET-ADDRESS-MIB.txt \...SNMP-FRAMEWORK-MIB.txt SNMP-MPD-MIB.txt SNMP-USER-BASED-SM-MIB.txt \...SNMP-VIEW-BASED-ACM-MIB.txt SNMP-COMMUNITY-MIB.txt \...SNMP-TARGET-MIB.txt SNMP-NOTIFICATION-MIB.txt SNMP-PROXY-MIB.txt \...AGENTX-MIB.txt SMUX-MIB.txt \...DISMAN-SCRIPT-MIB.txt DISMAN-SCHEDULE-MIB.txt \...IANA-LANGUAGE-MIB.txt IANA-ADDRESS-FAMILY-NUMBERS-MIB.txt \...IF-MIB.txt IF-INVERTED-STACK-MIB.txt \...IP-MIB.txt IP-FORWARD-MIB.txt TCP-MIB.txt UDP-MIB.txt \...IANAifType-MIB.txt EtherLike-MIB.txt \...IPV6-TC.txt IPV6-MIB.txt IPV6-ICMP-MIB.txt \...IPV6-TCP-MIB.txt IPV6-UDP-MIB.txt \...HOST-RESOURCES-MIB.txt HOST-RESOURCES-TYPES.txt \...NETWORK-SERVICES-MIB.txt
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):16282
                                                    Entropy (8bit):4.98957441977315
                                                    Encrypted:false
                                                    SSDEEP:192:B5o0gA3c4igF/XyXhXDBsONYpkN6kQ8ejABF5b7gZ7EOSazGrnePk3ns:Ml6FiBN8afeGr7s
                                                    MD5:E137D8C80CCA494FAD2CB2D427DAC533
                                                    SHA1:9A2A6500AE1C4EC774F15D83D9581945EAC00BD2
                                                    SHA-256:4E4101A45CB3E24A900429D10D9E8E3F4487C5985DD230C858F4FDA2D633B49D
                                                    SHA-512:DF6BF99D66AF73424B836903B5F45DC1A5497B926B8980007AD7094D7CAE75D21A4739D9B484EFD2CD2D117A018255056630FFC2FB80CC5BEA10785C144E7A3B
                                                    Malicious:false
                                                    Preview:NET-SNMP-AGENT-MIB DEFINITIONS ::= BEGIN....--..-- Defines control and monitoring structures for the Net-SNMP agent...--....IMPORTS.. SnmpAdminString.. .FROM SNMP-FRAMEWORK-MIB.... netSnmpObjects, netSnmpModuleIDs, netSnmpNotifications, netSnmpGroups...FROM NET-SNMP-MIB.... OBJECT-TYPE, NOTIFICATION-TYPE, MODULE-IDENTITY, Integer32, Unsigned32.. FROM SNMPv2-SMI.... OBJECT-GROUP, NOTIFICATION-GROUP...FROM SNMPv2-CONF.... TEXTUAL-CONVENTION, DisplayString, RowStatus, TruthValue...FROM SNMPv2-TC;......netSnmpAgentMIB MODULE-IDENTITY.. LAST-UPDATED "200502070000Z".. ORGANIZATION "www.net-snmp.org".. CONTACT-INFO ... "postal: Wes Hardaker.. P.O. Box 382.. Davis CA 95617.... email: net-snmp-coders@lists.sourceforge.net".. DESCRIPTION... "Defines control and monitoring structures for the Net-SNMP agent.".. REVISION "200502070000Z".. DESCRIPTION.. ."Fixing syntax errors".. REVISION
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):9439
                                                    Entropy (8bit):4.999329811882366
                                                    Encrypted:false
                                                    SSDEEP:192:JaRo0SCGDNFZiIL09IjNAaVnyCA83SPc9OSId:Jx7/NFZiIL098NdnyMiU9OX
                                                    MD5:5E69A7F345317D31EA04A277FBEFA59B
                                                    SHA1:AC3425E059EAACFD33B6EB3A59770E3479472C73
                                                    SHA-256:5424F9D36D1337A06C1928A6E873C71F389D0EB983026A00C47CDE629C3A3A90
                                                    SHA-512:B2BDFA7A238E12528FBF134099C315167B1B4CDAB852843D75B475D89203FF6149DA16BF64927B3A167FECBFBF309B54826A1346872356AF0B42EFD651DD1DD8
                                                    Malicious:false
                                                    Preview:NET-SNMP-EXAMPLES-MIB DEFINITIONS ::= BEGIN....--..-- Example MIB objects for agent module example implementations..--....IMPORTS.. MODULE-IDENTITY, OBJECT-TYPE, Integer32,.. NOTIFICATION-TYPE FROM SNMPv2-SMI.. SnmpAdminString FROM SNMP-FRAMEWORK-MIB.. netSnmp FROM NET-SNMP-MIB.. RowStatus, StorageType FROM SNMPv2-TC.. InetAddressType, InetAddress FROM INET-ADDRESS-MIB..;....netSnmpExamples MODULE-IDENTITY.. LAST-UPDATED "200406150000Z".. ORGANIZATION "www.net-snmp.org".. CONTACT-INFO ... "postal: Wes Hardaker.. P.O. Box 382.. Davis CA 95617.... email: net-snmp-coders@lists.sourceforge.net".. DESCRIPTION..."Example MIB objects for agent module example implementations".. REVISION "200406150000Z".. DESCRIPTION..."Corrected notification example definitions".. REVISION "200202060000Z"
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):9520
                                                    Entropy (8bit):4.872104016633364
                                                    Encrypted:false
                                                    SSDEEP:96:tq6Eo0UUp4xF6R6Y7JFW3h7sa+dsacRQN+2pupkjeJAAD6M00Gw5Bt9FPyUTWtae:t0o0bpQY9FWWdBSpkjkAY7V6ta/CV6ZM
                                                    MD5:B2514ABC5F09F9881DA56C6E9F05DEFF
                                                    SHA1:7013532EF84E0C169BD6A1E668CB24ADCFCAF7CE
                                                    SHA-256:319D812877D11166AE18EBC0D84234214BB072863EA629A529B5B8676058FF5F
                                                    SHA-512:9D818DC6CC935BA5FBD0D2C3194F970CF3C312A76A30C6E5E957EE003F2E455F7E6C587BBEE8B784017CE936A827174BAA0B5CFA301C2C6DA086A0A5706B6A7D
                                                    Malicious:false
                                                    Preview:NET-SNMP-EXTEND-MIB DEFINITIONS ::= BEGIN....--..-- Defines a framework for scripted extensions..--....IMPORTS.. nsExtensions FROM NET-SNMP-AGENT-MIB.... OBJECT-TYPE, NOTIFICATION-TYPE, MODULE-IDENTITY, Integer32.. FROM SNMPv2-SMI.... OBJECT-GROUP, NOTIFICATION-GROUP...FROM SNMPv2-CONF.... DisplayString, RowStatus, StorageType FROM SNMPv2-TC;......netSnmpExtendMIB MODULE-IDENTITY.. LAST-UPDATED "200405080000Z".. ORGANIZATION "www.net-snmp.org".. CONTACT-INFO ... "postal: Wes Hardaker.. P.O. Box 382.. Davis CA 95617.... email: net-snmp-coders@lists.sourceforge.net".. DESCRIPTION... "Defines a framework for scripted extensions for the Net-SNMP agent.".. REVISION "200405080000Z".. DESCRIPTION..."First revision.".. ::= { nsExtensions 1 }....nsExtendObjects OBJECT IDENTIFIER ::= { nsExtensions 2}..nsExtendGroups OBJECT IDENTIFIER ::= { nsExtensions 3}....nsExtendNumEntries OBJECT-TYPE..
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2103
                                                    Entropy (8bit):5.031535837454501
                                                    Encrypted:false
                                                    SSDEEP:24:8L6F6gtVLo0CVoVT6F25V092+UD/nmF9JtT2BWnmFx6aCpCAeR0x4tJTHOLo4bc:8L26gnLo0CV222L09+gJQB0pCrtAkf
                                                    MD5:222876F2F94EFB4D20B999F18B0D4003
                                                    SHA1:A794DDA8E5C1815914D94AFF64030E389A001B32
                                                    SHA-256:4F62DD4775E1654F2337BEB145D0680CB12E11131649AFD490092C8728761E78
                                                    SHA-512:07B46D40AA31D3824A443730D3A652337017DE3207CB5E2C1BC17A98764765B8841CAE3AE80BF1BE0C3D93EFEE6F3C9F80744E87BBBB2A6D5091CBE83E23583C
                                                    Malicious:false
                                                    Preview:NET-SNMP-MIB DEFINITIONS ::= BEGIN....--..-- Top-level infrastructure of the Net-SNMP project enterprise MIB tree..--....IMPORTS.. MODULE-IDENTITY, enterprises FROM SNMPv2-SMI;....netSnmp MODULE-IDENTITY.. LAST-UPDATED "200201300000Z".. ORGANIZATION "www.net-snmp.org".. CONTACT-INFO ... "postal: Wes Hardaker.. P.O. Box 382.. Davis CA 95617.... email: net-snmp-coders@lists.sourceforge.net".. DESCRIPTION..."Top-level infrastructure of the Net-SNMP project enterprise MIB tree".. REVISION "200201300000Z".. DESCRIPTION..."First draft".. ::= { enterprises 8072}......--..-- Net-SNMP enterprise-specific management objects..--....netSnmpObjects OBJECT IDENTIFIER ::= {netSnmp 1}..-- netSnmpExamples OBJECT IDENTIFIER ::= {netSnmp 2}..netSnmpEnumerations OBJECT IDENTIFIER ::= {netSnmp 3}..netSnmpModuleIDs OBJECT IDENTIFIER ::= {netSnmpEnumerations 1}..netSnmpAgentOIDs
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1274
                                                    Entropy (8bit):5.011071089884632
                                                    Encrypted:false
                                                    SSDEEP:24:8pSzUI/f4HIml2pzo0CVTSzUf4pexMV1IV:8pSzUEf6Iml2zo0CVTSzUfEe6VGV
                                                    MD5:99915F9603ACD040D0514346CA4AB91A
                                                    SHA1:B3F142CD6B5ABD38B3043E400884E33C600DBEEF
                                                    SHA-256:98346A109BBFD3AB2F5D505E62BDE271F3C84C779E9F2845CE4CD292F82CFA87
                                                    SHA-512:BD86A880945BBB7AFA7A242508C651F852CA60069F79B7DE1495936DC1661B91027051FFE2B22B0702CF8725ECB310FF70F6F4FFC6AA0D8636F2AFCA2E0B97FB
                                                    Malicious:false
                                                    Preview:NET-SNMP-MONITOR-MIB DEFINITIONS ::= BEGIN....--..-- Configured elements of the system to monitor.(XXX - ugh! - need a better description!)..--....IMPORTS.. netSnmpObjects, netSnmpModuleIDs FROM NET-SNMP-MIB.... OBJECT-TYPE, NOTIFICATION-TYPE, MODULE-IDENTITY, Integer32.. FROM SNMPv2-SMI.... DisplayString FROM SNMPv2-TC;......netSnmpMonitorMIB MODULE-IDENTITY.. LAST-UPDATED "200202090000Z".. ORGANIZATION "www.net-snmp.org".. CONTACT-INFO ... "postal: Wes Hardaker.. P.O. Box 382.. Davis CA 95617.... email: net-snmp-coders@lists.sourceforge.net".. DESCRIPTION..."Configured elements of the system to monitor... (XXX - ugh! - need a better description!)".. REVISION "200202090000Z".. DESCRIPTION..."First revision.".. ::= { netSnmpModuleIDs 3}......nsProcess OBJECT IDENTIFIER ::= {netSnmpObjects 21}..nsDisk OBJECT IDENTIFIER ::= {netSnmpObjects 22}..nsFile
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1289
                                                    Entropy (8bit):4.962659873677018
                                                    Encrypted:false
                                                    SSDEEP:12:ILrae3bijRdjkeIOQm7NXXS4Fl2cyxAzhGWvC+F/YXCRfYLoieREgVq4f+23qffG:8zXeIIVJl2Azo0CVAXeZe4mwi
                                                    MD5:BF0CF220E8C982AA58DE0A71DE2279E8
                                                    SHA1:16C4C0408FDF2C94012D5B988CFB347202B9E4F6
                                                    SHA-256:D8F0630D7B859901BF48179BEFAF80EC37B0C1940B259ECC08461AE37BF2C8E2
                                                    SHA-512:568F0A84E27EEB629666354C84F94C11D3437242514FDC1C09500A6F0AB27B65BDC8A5FE56D89BA04DE5509B2026131C0D424253A06661A9321C8F32A279F05A
                                                    Malicious:false
                                                    Preview:NET-SNMP-SYSTEM-MIB DEFINITIONS ::= BEGIN....--..-- Characteristics of the current running system..--....IMPORTS.. netSnmpObjects, netSnmpModuleIDs FROM NET-SNMP-MIB.... Float FROM NET-SNMP-TC.... OBJECT-TYPE, NOTIFICATION-TYPE, MODULE-IDENTITY, Integer32, Counter32.. FROM SNMPv2-SMI.... DisplayString FROM SNMPv2-TC;......netSnmpSystemMIB MODULE-IDENTITY.. LAST-UPDATED "200202090000Z".. ORGANIZATION "www.net-snmp.org".. CONTACT-INFO ... "postal: Wes Hardaker.. P.O. Box 382.. Davis CA 95617.... email: net-snmp-coders@lists.sourceforge.net".. DESCRIPTION..."Characteristics of the current running system".. REVISION "200202090000Z".. DESCRIPTION..."First draft.".. ::= { netSnmpModuleIDs 4}......nsMemory OBJECT IDENTIFIER ::= {netSnmpObjects 31}..nsSwap OBJECT IDENTIFIER ::= {netSnmpObjects 32}..nsCPU OBJECT IDENTIFIER ::= {netSnmp
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):4617
                                                    Entropy (8bit):5.15653678847066
                                                    Encrypted:false
                                                    SSDEEP:48:8s1ud1o0CViCH7bf/xBk5TKWdZ9CoCuukFz61HV2wSnyRPKxR8Ms+b54E:p4Ho0Ui0z/nk5+WwShR6lQVygxRYE
                                                    MD5:DADDB933CFDEAADA581E6F3AA130F14E
                                                    SHA1:B3B809BE6214ACD36D6A323982FF9FA311B766A8
                                                    SHA-256:F9ED09E0E72CD8E174601866F3F0C614959EABDB7CDE35273A513CDD94D1788E
                                                    SHA-512:EA95C1DCAE5E74147346BA9573A246574BA2BD84FA4D91DA49CCAA7B7009C3950C0E5D368144A48EA56351477C685FE7F1ECBBA4B12DC68D74DDFDF26854B92B
                                                    Malicious:false
                                                    Preview:NET-SNMP-TC DEFINITIONS ::= BEGIN....--..-- Textual conventions and enumerations for the Net-SNMP project..--....IMPORTS.. netSnmpModuleIDs, netSnmpAgentOIDs, netSnmpDomains FROM NET-SNMP-MIB.... MODULE-IDENTITY, Opaque FROM SNMPv2-SMI.... TEXTUAL-CONVENTION FROM SNMPv2-TC;....netSnmpTCs MODULE-IDENTITY.. LAST-UPDATED "200510140000Z".. ORGANIZATION "www.net-snmp.org".. CONTACT-INFO ... "postal: Wes Hardaker.. P.O. Box 382.. Davis CA 95617.... email: net-snmp-coders@lists.sourceforge.net".. DESCRIPTION..."Textual conventions and enumerations for the Net-SNMP project".. REVISION "200202120000Z".. DESCRIPTION..."First draft".. ::= { netSnmpModuleIDs 1}......-- =====================..--..-- Textual Conventions..--..-- =====================....--..-- Define the Float Textual Convention..-- This definition was written by David Perkins...--....Float ::= TEXTUAL-CONVENTION.. STATUS current..
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):21632
                                                    Entropy (8bit):4.930974415881389
                                                    Encrypted:false
                                                    SSDEEP:384:+CfMBcvlUImN2wHB2GQoRnZAm+rxcmvq00mGPeDXeDGeDkU:+CfMkwNE+ZA800mGmOhX
                                                    MD5:6E91D98D348132A8BE01AE5D6E272B2C
                                                    SHA1:DAFC30756CAD2CBBB969379D9752040954CDBE3F
                                                    SHA-256:9AF972265BEC90D5402D6489A969B08F72FBCFA2DB1B76722B4FDF08D36EED99
                                                    SHA-512:05DADFE3726C948DB9DA2626EC828D221A1DAFE4E3FA9BA936A88AC64AB7CD74D93FEE4AFE95F70ED6ED30BC72EF7EAFE6A2BA455A84EBC38F95DEA115B3A15C
                                                    Malicious:false
                                                    Preview:NETWORK-SERVICES-MIB DEFINITIONS ::= BEGIN....IMPORTS.. OBJECT-TYPE, Counter32, Gauge32, MODULE-IDENTITY, mib-2.. FROM SNMPv2-SMI.. TimeStamp, TEXTUAL-CONVENTION.. FROM SNMPv2-TC.. MODULE-COMPLIANCE, OBJECT-GROUP.. FROM SNMPv2-CONF.. SnmpAdminString.. FROM SNMP-FRAMEWORK-MIB;....application MODULE-IDENTITY.. LAST-UPDATED "200003030000Z".. ORGANIZATION "IETF Mail and Directory Management Working Group".... CONTACT-INFO.. " Ned Freed.... Postal: Innosoft International, Inc... 1050 Lakes Drive.. West Covina, CA 91790.. US.... Tel: +1 626 919 3600.. Fax: +1 626 919 3614.... E-Mail: ned.freed@innosoft.com".. DESCRIPTION.. "The MIB module describing network service applications".. REVISION "200003030000Z".. DESCRIPTION.. "This revision, published in RFC 2788, changes a number of.. DisplayStrings to SnmpAdminStrings. Note that this change..
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):25505
                                                    Entropy (8bit):4.859242291281773
                                                    Encrypted:false
                                                    SSDEEP:384:nYzsBrEGCWdD7iOMqPGGTdy0vsmnpP+DlLub:nYzs5EGCeD7/MeGKQ0vVnpP+DlLub
                                                    MD5:D01122F476E946F4D54E4632A0DF0B77
                                                    SHA1:69D663E17C71F5D5AE8F8763F792B2228E2D9705
                                                    SHA-256:D8E34A4C400B10BF250D5015F7480C59F9086589A154F63CF74A8850D126E978
                                                    SHA-512:5AE04515F8FCEC4BD1979CB9F1DE11C131FB2DAA6071E19CCAA022FDD32775B0920766C1B0392F5D421C0C1736812B9025F37B7B3E6B6A27C28FEF43E6575DBB
                                                    Malicious:false
                                                    Preview:NOTIFICATION-LOG-MIB DEFINITIONS ::= BEGIN....IMPORTS.. MODULE-IDENTITY, OBJECT-TYPE,.. Integer32, Unsigned32,.. TimeTicks, Counter32, Counter64,.. IpAddress, Opaque, mib-2 FROM SNMPv2-SMI.. TimeStamp, DateAndTime,.. StorageType, RowStatus,.. TAddress, TDomain FROM SNMPv2-TC.. SnmpAdminString, SnmpEngineID FROM SNMP-FRAMEWORK-MIB.. MODULE-COMPLIANCE, OBJECT-GROUP FROM SNMPv2-CONF;....notificationLogMIB MODULE-IDENTITY.. LAST-UPDATED "200011270000Z" -- 27 November 2000.. ORGANIZATION "IETF Distributed Management Working Group".. CONTACT-INFO "Ramanathan Kavasseri.. Cisco Systems, Inc... 170 West Tasman Drive,.. San Jose CA 95134-1706... Phone: +1 408 527 2446.. Email: ramk@cisco.com".. DESCRIPTION.. "The MIB module for logging SNMP Notifications, that is, Traps...... and Informs."..-- Revision History.... REVISION
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2209
                                                    Entropy (8bit):4.67653917297465
                                                    Encrypted:false
                                                    SSDEEP:48:7vfsHAgM2aOoIGGnE7z2evdBAyFb1ss7WZXwNfPRULzXYWmu:L0g9jXwmbgkfZoXYI
                                                    MD5:93C9ECDB3366FDEBFB87C7ECC4342CF1
                                                    SHA1:CCD952FEFE7DA5A4B6E9344E3A69ECF7BC863435
                                                    SHA-256:BC2C82A6CCE8A866DB9F9C29206C1D439A91F70AB594BB48DF32A3A3DC311A4A
                                                    SHA-512:5374386CAD87F9712A72340D3959F5150FA55400A029EF8DFFFA336640E23E2A46A4A89B5E099DBD9BE3D11B8B07E8F9DAC733E035E55A793AED3594D243E9AF
                                                    Malicious:false
                                                    Preview:About the MIBS distributed with Net-SNMP.....This directory contains a very basic set of MIB files, ready for use...In addition, there are some scripts and table files to help you get a..fuller collection of MIB files.....smistrip - a script that can extract a MIB file from an RFC (or I-D)..mibfetch - a script that will fetch an RFC file from a mirror, and extract...the hosted MIB from it. It assumes that you have wget installed...rfclist - a list of RFC numbers and corresponding MIB name(s)..ianalist - a list of files at the IANA server that holds IANA maintained...MIBs..Makefile.mib - rules for extracting current MIB files from RFC and IANA...files...rfcmibs.diff - a set of required patches for MIB files extracted from RFCs....The file Makefile.mib holds rules that fetch and extract MIB files from..their hosting RFCs. Make will use wget to retrieve the RFC files, and,..as I am located in Denmark, use the RFC mirror at NORDUnet. You may change..that at the top of Makefile.mib.....Make
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1212
                                                    Entropy (8bit):4.6916246802471315
                                                    Encrypted:false
                                                    SSDEEP:24:djUD8QeQZMm1EBBwegimIgd/lgyrw5YZ5NY2mHTXDzsHJ12ETmB32TF:Kfedm1EQegi2eyE5y5+nsnhTmB3WF
                                                    MD5:725DE387B4E39A6F7294F691E0BA5F86
                                                    SHA1:4045801262A657A4138465529DE01EA1F0598C30
                                                    SHA-256:F900B6FC0FCE8C9ED85081C3620997CCF8FF74D86598A8E2EE346F8CB90FF4F6
                                                    SHA-512:F68C588754F55399AF480500F40D3CF0D522ECF1CF6769F12A5330DB31BB80D2F2102F829CA86D502C72E5DEC387954125CCB585087C0C3D47B607F831DB6AD9
                                                    Malicious:false
                                                    Preview:..RFC-1215 DEFINITIONS ::= BEGIN....-- This module is a empty module. It has been created solely for the ..-- purpose of allowing other modules to correctly import the TRAP-TYPE ..-- clause from RFC-1215 where it should be imported from. It's a..-- built in type in the UCD-SNMP code, and in fact RFC-1215 doesn't..-- actually define a mib at all; it only defines macros. However,..-- importing the TRAP-TYPE is conventionally done from an import..-- clause pointing to RFC-1215...--..-- Wes 7/17/98....TRAP-TYPE MACRO ::=..BEGIN.. TYPE NOTATION ::= "ENTERPRISE" value.. (enterprise OBJECT IDENTIFIER).. VarPart.. DescrPart.. ReferPart.. VALUE NOTATION ::= value (VALUE INTEGER).. VarPart ::=.. "VARIABLES" "{" VarTypes "}".. | empty.. VarTypes ::=.. VarType | VarTypes "," VarType.. VarType ::=.. value (vartype ObjectName).. DescrPart
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):3186
                                                    Entropy (8bit):4.378911320395915
                                                    Encrypted:false
                                                    SSDEEP:96:O2sMaqQiwRsEcHXgOHXdx4vCI77v2ALRn:9sDVjJMXLXUAAVn
                                                    MD5:ED912CF00F9731C866B74473C8FBFEF4
                                                    SHA1:F28BC8753FDB0699884F97916D54592982AEC49B
                                                    SHA-256:BAC4961D44BDA723D5307D491D61AF714D08C78A686A0ED7091EF862B9670677
                                                    SHA-512:15B9CB694A4B5FE717C9E867EEA1BCBAC77472879BBEABC8428CEFF38E9BA5FD650B1C7EC8E95E405F86A3B896A32844841210BBA1AB18B89126F3AEEDB06810
                                                    Malicious:false
                                                    Preview:RFC1155-SMI DEFINITIONS ::= BEGIN....EXPORTS -- EVERYTHING.. internet, directory, mgmt,.. experimental, private, enterprises,.. OBJECT-TYPE, ObjectName, ObjectSyntax, SimpleSyntax,.. ApplicationSyntax, NetworkAddress, IpAddress,.. Counter, Gauge, TimeTicks, Opaque;.... -- the path to the root.... internet OBJECT IDENTIFIER ::= { iso org(3) dod(6) 1 }.... directory OBJECT IDENTIFIER ::= { internet 1 }.... mgmt OBJECT IDENTIFIER ::= { internet 2 }.... experimental OBJECT IDENTIFIER ::= { internet 3 }.... private OBJECT IDENTIFIER ::= { internet 4 }.. enterprises OBJECT IDENTIFIER ::= { private 1 }.... -- definition of object types.... OBJECT-TYPE MACRO ::=.. BEGIN.. TYPE NOTATION ::= "SYNTAX" type (TYPE ObjectSyntax).. "ACCESS" Access.. "STATUS" Status.. VALUE NOTATION ::= value (VALUE ObjectName).... Access ::= "read-only".. | "read-write"..
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):82280
                                                    Entropy (8bit):4.591495576375216
                                                    Encrypted:false
                                                    SSDEEP:768:VTg3ukHviySCgdWw4qVE3OpBDrTeaZdm+7Uwhv2u1ba8IpdiJylzlsUvBI:0vBjOpBDrpdm+7UFmF
                                                    MD5:679E11BCE447A4FF4F554790038DF315
                                                    SHA1:CFC5D8EA851E8D73D94F8588D0A8F2259300D5D3
                                                    SHA-256:25817FC8C4A21C5AB56DF8CEAFC79761D41C3F770464C853A6EBE16EA8990B87
                                                    SHA-512:F9DA290AC9AC33CA19FEC81C6BC901B1DB6E9B66162B355ED8270D46D704185A17E0B697BE784256B2C3EC07B9997DF5B60A17415408462F6A0ADF954BBA08E0
                                                    Malicious:false
                                                    Preview:RFC1213-MIB DEFINITIONS ::= BEGIN....IMPORTS.. mgmt, NetworkAddress, IpAddress, Counter, Gauge,.. TimeTicks.. FROM RFC1155-SMI.. OBJECT-TYPE.. FROM RFC-1212;....-- This MIB module uses the extended OBJECT-TYPE macro as..-- defined in [14];....-- MIB-II (same prefix as MIB-I)....mib-2 OBJECT IDENTIFIER ::= { mgmt 1 }....-- textual conventions....DisplayString ::=.. OCTET STRING..-- This data type is used to model textual information taken..-- from the NVT ASCII character set. By convention, objects..-- with this syntax are declared as having....--..-- SIZE (0..255)....PhysAddress ::=.. OCTET STRING..-- This data type is used to model media addresses. For many..-- types of media, this will be in a binary representation...-- For example, an ethernet address would be represented as..-- a string of 6 octets.....-- groups in MIB-II....system OBJECT IDENTIFIER ::= { mib-2 1 }....interfaces OBJECT IDENTIFIER ::
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):151802
                                                    Entropy (8bit):4.648317006676539
                                                    Encrypted:false
                                                    SSDEEP:768:sKckUj/wAaz0XXos9QfFqM3TO2KTXwvbb1DhtyZRfOEitWIIOv:tA609QgUKTgvbb1N0ZEbXv
                                                    MD5:73BF37EDD18290C8D8E2FED79C97892E
                                                    SHA1:BE8DBC0CEC2D7C186F684726A65783FD5E18B4A9
                                                    SHA-256:0B6055CD97547623D5EAA521FD94173CCE3B0E0F93987B8DEF727EFA4FBEC580
                                                    SHA-512:F0947D2185750987A84B4E722C9A50864F39249F7E16A04EF8E28465369AB9A9083106B25DDF7ED52420318D681AB4672869E9D6CBFB418BEDC11438FD631F7B
                                                    Malicious:false
                                                    Preview:RMON-MIB DEFINITIONS ::= BEGIN.... IMPORTS.. MODULE-IDENTITY, OBJECT-TYPE, OBJECT-IDENTITY,.. NOTIFICATION-TYPE, mib-2, Counter32,.. Integer32, TimeTicks FROM SNMPv2-SMI.... TEXTUAL-CONVENTION, DisplayString FROM SNMPv2-TC.... MODULE-COMPLIANCE, OBJECT-GROUP,.. NOTIFICATION-GROUP FROM SNMPv2-CONF;....-- Remote Network Monitoring MIB....rmonMibModule MODULE-IDENTITY.. LAST-UPDATED "200005110000Z" -- 11 May, 2000.. ORGANIZATION "IETF RMON MIB Working Group".. CONTACT-INFO.. "Steve Waldbusser.. Phone: +1-650-948-6500.. Fax: +1-650-745-0671.. Email: waldbusser@nextbeacon.com".. DESCRIPTION.. "Remote network monitoring devices, often called.. monitors or probes, are instruments that exist for.. the purpose of managing a network. This MIB defines.. objects for managing remote network monitoring devices.".... REVISION "200005110000Z
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):4753
                                                    Entropy (8bit):4.53150999994129
                                                    Encrypted:false
                                                    SSDEEP:48:irYFkO+SRf8RIM3j+AjmfBJNBVA6IzZe6xcqM33+AjmfBJNJL:dFkOGhc5BVZSZe6xcnw5JL
                                                    MD5:543F1B75CBCB483907ADC7D4FA56C2F2
                                                    SHA1:E20BEA1739A979287F80CD9ADDB2F3E22039A88C
                                                    SHA-256:371C965D38543B48008D9D3D8720EF93C6B06E66FE28CC0C0CE243BCDC31089C
                                                    SHA-512:05C65341886828CE11A66AC849D7EF10EF3272C16D2E7B31777A79B374BC95740F40ED4A792AC9AB2A99E8A664063562814823F1345DFDF3E2120EA391E0EC89
                                                    Malicious:false
                                                    Preview:SMUX-MIB DEFINITIONS ::= BEGIN....IMPORTS.. enterprises.. FROM RFC1155-SMI.. OBJECT-TYPE.. FROM RFC1212;....unix OBJECT IDENTIFIER ::= { enterprises 4 }....smux OBJECT IDENTIFIER ::= { unix 4 }....smuxPeerTable OBJECT-TYPE.. SYNTAX SEQUENCE OF SmuxPeerEntry.. ACCESS not-accessible.. STATUS mandatory.. DESCRIPTION.. "The SMUX peer table.".. ::= { smux 1 }....smuxPeerEntry OBJECT-TYPE.. SYNTAX SmuxPeerEntry.. ACCESS not-accessible.. STATUS mandatory.. DESCRIPTION.. "An entry in the SMUX peer table.".. INDEX { smuxPindex }.. ::= { smuxPeerTable 1}....SmuxPeerEntry ::=.. SEQUENCE {.. smuxPindex.. INTEGER,.. smuxPidentity.. OBJECT IDENTIFIER,.. smuxPdescription.. DisplayString,.. smuxPstatus.. INTEGER.. }....smuxPindex OBJECT-TYPE.. SYNTAX INT
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):15919
                                                    Entropy (8bit):4.704141866989306
                                                    Encrypted:false
                                                    SSDEEP:192:TbpsQBnMvnW+dAWor/vlOmxXvG39eGUW60AclKzWczia5cXj71GnaC9rkTdmPyzN:1uoTvk1zlKycea5cT78naC9rk4k
                                                    MD5:AECAAA7181E17F9B203157842BA8A936
                                                    SHA1:FC1193D5B2A25A6600927EC31D31B4C394702B77
                                                    SHA-256:5938BDA85EA908082117A9B211FC233B8601BDD65CAE91327FB7DCAFEF19F1DE
                                                    SHA-512:F75E7914E0A5A09D03DE1296A65F5BC471D6286C6F8538278047803AA3C8B0588A8A76FC57A28C5EFE79F29D4630CF57B4F9C552D6245C76AF5C650155441DD7
                                                    Malicious:false
                                                    Preview:SNMP-COMMUNITY-MIB DEFINITIONS ::= BEGIN....IMPORTS.. IpAddress,.. MODULE-IDENTITY,.. OBJECT-TYPE,.. Integer32,.. snmpModules.. FROM SNMPv2-SMI.. RowStatus,.. StorageType.. FROM SNMPv2-TC.. SnmpAdminString,.. SnmpEngineID.. FROM SNMP-FRAMEWORK-MIB.. SnmpTagValue,.. snmpTargetAddrEntry.. FROM SNMP-TARGET-MIB.. MODULE-COMPLIANCE,.. OBJECT-GROUP.. FROM SNMPv2-CONF;....snmpCommunityMIB MODULE-IDENTITY.. LAST-UPDATED "200003060000Z" -- 6 Mar 2000, midnight.. ORGANIZATION "SNMPv3 Working Group".. CONTACT-INFO "WG-email: snmpv3@lists.tislabs.com.. Subscribe: majordomo@lists.tislabs.com.. In msg body: subscribe snmpv3.... Chair: Russ Mundy.. TIS Labs at Network Associates.. Postal: 3060 Washington Rd.. Glenwood MD 21738.. USA.
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):22868
                                                    Entropy (8bit):4.180558928203465
                                                    Encrypted:false
                                                    SSDEEP:192:8JNpeOWV10SkI09dGbqabXGU27PST9wb9PXVbnQuiGc/2M15JssRirMogzWUSEBU:WW0SkICdGbljv66qb5XV4pPbDaNVL
                                                    MD5:B8DAFEF8DDC384E8CB759F2BE9AC7A6E
                                                    SHA1:449DDF2B634FB564C0F7134C7F3F8E687B105BB0
                                                    SHA-256:789DAF7E977A98E1783C24DA18F84619277F136A5B48A2674CC384023ADF1FDA
                                                    SHA-512:C7731F100F161EB2E21E363336CDE533FDD4A1BC946206E4000C73879475D0CD1B3FF8A7B934B8955412AF7C39EA9F530E567E0819CBFF65E2412D266A140C7F
                                                    Malicious:false
                                                    Preview:SNMP-FRAMEWORK-MIB DEFINITIONS ::= BEGIN....IMPORTS.. MODULE-IDENTITY, OBJECT-TYPE,.. OBJECT-IDENTITY,.. snmpModules FROM SNMPv2-SMI.. TEXTUAL-CONVENTION FROM SNMPv2-TC.. MODULE-COMPLIANCE, OBJECT-GROUP FROM SNMPv2-CONF;....snmpFrameworkMIB MODULE-IDENTITY.. LAST-UPDATED "200210140000Z".. ORGANIZATION "SNMPv3 Working Group".. CONTACT-INFO "WG-EMail: snmpv3@lists.tislabs.com.. Subscribe: snmpv3-request@lists.tislabs.com.... Co-Chair: Russ Mundy.. Network Associates Laboratories.. postal: 15204 Omega Drive, Suite 300.. Rockville, MD 20850-4601.. USA.. EMail: mundy@tislabs.com.. phone: +1 301-947-7107.... Co-Chair &.. Co-editor: David Harrington.. Enterasys Network
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):5641
                                                    Entropy (8bit):4.485071710159333
                                                    Encrypted:false
                                                    SSDEEP:96:ELyAeOvV10vVUjoX9UL0aLMEPRMbQ4wA5rK5ZM85GnGc1q3Y4sf:ELpeOvV10tUjoX+0ARZMEzgrCZMEQGc7
                                                    MD5:3DA9E97A77EFD724537902B3CB5C5E20
                                                    SHA1:D92C1EE613622B5E29E46E0682B530A828E234B4
                                                    SHA-256:2740E273E158221082C39F1BF6B9279762CD45D0FEC5DB42F02C0856ADC0BDA9
                                                    SHA-512:BB83D727048F2488E4D4917FAC38C787DFC7ECFBFE2F9235313E3BCDB1DA277FD1E9AB5FE2A08EE24EBF236EBFF3F8FA52E16F55B02663C22DB9125DF2191D54
                                                    Malicious:false
                                                    Preview:SNMP-MPD-MIB DEFINITIONS ::= BEGIN....IMPORTS.. MODULE-COMPLIANCE, OBJECT-GROUP FROM SNMPv2-CONF.. MODULE-IDENTITY, OBJECT-TYPE,.. snmpModules, Counter32 FROM SNMPv2-SMI;....snmpMPDMIB MODULE-IDENTITY.. LAST-UPDATED "200210140000Z".. ORGANIZATION "SNMPv3 Working Group".. CONTACT-INFO "WG-EMail: snmpv3@lists.tislabs.com.. Subscribe: snmpv3-request@lists.tislabs.com.... Co-Chair: Russ Mundy.. Network Associates Laboratories.. postal: 15204 Omega Drive, Suite 300.. Rockville, MD 20850-4601.. USA.... EMail: mundy@tislabs.com.. phone: +1 301-947-7107.... Co-Chair &.. Co-editor: David Harrington.. Enterasys Networks.. postal: 35 Industrial Way.. P. O
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):20603
                                                    Entropy (8bit):4.69964201936874
                                                    Encrypted:false
                                                    SSDEEP:384:A+Ga2BLzfqgwAD7GTeL7OiymN3Z5QQpX8p8xqqs:ABtqgw5efQQpX++a
                                                    MD5:517238BD0341827EFB4E7E3ED9FC83EF
                                                    SHA1:A365D904CB7E9327FD38740822466B67DD1F277F
                                                    SHA-256:6D3DDC70A544685ADA041B875C795DF2514AD0FBE833FCE94D6E450C9DBDBA6E
                                                    SHA-512:1A5F210278F38792857E587C9204DFA43D7BAB7D1D3C7B1223B1D13141CCA5E3F28526BB872C68EBBC0853794F66B97BA84341C33F0DD5A50DDDB2BD5EFA33E1
                                                    Malicious:false
                                                    Preview:SNMP-NOTIFICATION-MIB DEFINITIONS ::= BEGIN....IMPORTS.. MODULE-IDENTITY,.. OBJECT-TYPE,.. snmpModules.. FROM SNMPv2-SMI.... RowStatus,.. StorageType.. FROM SNMPv2-TC.... SnmpAdminString.. FROM SNMP-FRAMEWORK-MIB.... SnmpTagValue,.. snmpTargetParamsName.. FROM SNMP-TARGET-MIB.... MODULE-COMPLIANCE,.. OBJECT-GROUP.. FROM SNMPv2-CONF;....snmpNotificationMIB MODULE-IDENTITY.. LAST-UPDATED "200210140000Z".. ORGANIZATION "IETF SNMPv3 Working Group".. CONTACT-INFO.. "WG-email: snmpv3@lists.tislabs.com.. Subscribe: majordomo@lists.tislabs.com.. In message body: subscribe snmpv3.... Co-Chair: Russ Mundy.. Network Associates Laboratories.. Postal: 15204 Omega Drive, Suite 300.. Rockville, MD 20850-4601.. USA.. EMail: mundy@tislabs.com.. Phone: +1 301-947-7107.... Co-Cha
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):9400
                                                    Entropy (8bit):4.74639358384122
                                                    Encrypted:false
                                                    SSDEEP:192:dnz0O+DQHax0BLzznp/qHzua2XeaPY2jxjVETorv8QF:X+Ga2BLz4H0bAUVExK
                                                    MD5:6F09A6427041D09307F9DEFB682EABEC
                                                    SHA1:01E643941525CF80B4AA24928FA3A6AE33D02602
                                                    SHA-256:DCA5F7EEC540DF1A6F9F09D40DDD16F10B1411A6C6935A7B9404963F16DE52F1
                                                    SHA-512:478A282B7DB93D7C4BDEE17613B50AB633AFE3B17F1066582915174299FA1103EDD54315682042A7EE716114BBC30DD886C74205143AB8FF2EE2AC6EF92B957E
                                                    Malicious:false
                                                    Preview:SNMP-PROXY-MIB DEFINITIONS ::= BEGIN....IMPORTS.. MODULE-IDENTITY,.. OBJECT-TYPE,.. snmpModules.. FROM SNMPv2-SMI.... RowStatus,.. StorageType.. FROM SNMPv2-TC.... SnmpEngineID,.. SnmpAdminString.. FROM SNMP-FRAMEWORK-MIB.... SnmpTagValue.. FROM SNMP-TARGET-MIB.... MODULE-COMPLIANCE,.. OBJECT-GROUP.. FROM SNMPv2-CONF;....snmpProxyMIB MODULE-IDENTITY.. LAST-UPDATED "200210140000Z".. ORGANIZATION "IETF SNMPv3 Working Group".. CONTACT-INFO.. "WG-email: snmpv3@lists.tislabs.com.. Subscribe: majordomo@lists.tislabs.com.. In message body: subscribe snmpv3.... Co-Chair: Russ Mundy.. Network Associates Laboratories.. Postal: 15204 Omega Drive, Suite 300.. Rockville, MD 20850-4601.. USA.. EMail: mundy@tislabs.com.. Phone: +1 301-947-7107.... Co-Chair: David Harrington
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):23429
                                                    Entropy (8bit):4.651915301830482
                                                    Encrypted:false
                                                    SSDEEP:192:oJz0O+DQHax0BOPu4q/4QpoY4fFQpk4jaeDrUT2YbeB7sqo5OKloAHKL2Y2IN2rp:a+Ga2BOFnWf4fFWk49DrFnZEOQ5Gs
                                                    MD5:67EC17553A539DEBD54B532E5C03227C
                                                    SHA1:80C065AFEC94A1ABFCCFDCF066D7D3632AC59FDA
                                                    SHA-256:205CA244735D9EB927C1231515AD8447A91F43AFC6918349F50176284AF13C48
                                                    SHA-512:2989DADB95867AA74A028F0118C0DF0E2982FA19901FBADD3A5DF387A511DDCAE695167E678AD1A5014F194759A8680D6B46B2A087B7762A63F05E48FA57B9A6
                                                    Malicious:false
                                                    Preview:SNMP-TARGET-MIB DEFINITIONS ::= BEGIN....IMPORTS.. MODULE-IDENTITY,.. OBJECT-TYPE,.. snmpModules,.. Counter32,.. Integer32.. FROM SNMPv2-SMI.... TEXTUAL-CONVENTION,.. TDomain,.. TAddress,.. TimeInterval,.. RowStatus,.. StorageType,.. TestAndIncr.. FROM SNMPv2-TC.... SnmpSecurityModel,.. SnmpMessageProcessingModel,.. SnmpSecurityLevel,.. SnmpAdminString.. FROM SNMP-FRAMEWORK-MIB.... MODULE-COMPLIANCE,.. OBJECT-GROUP.. FROM SNMPv2-CONF;....snmpTargetMIB MODULE-IDENTITY.. LAST-UPDATED "200210140000Z".. ORGANIZATION "IETF SNMPv3 Working Group".. CONTACT-INFO.. "WG-email: snmpv3@lists.tislabs.com.. Subscribe: majordomo@lists.tislabs.com.. In message body: subscribe snmpv3.... Co-Chair: Russ Mundy.. Network Associates Laboratories.. Postal: 15204 Omega Drive, Suite 300.. Rockville, MD 20850-4601..
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):40113
                                                    Entropy (8bit):4.329409003803699
                                                    Encrypted:false
                                                    SSDEEP:768:h6p3zfMzoTkIuuI08bi0VMqLAWRkknuNK:i31zlI08biWJkK
                                                    MD5:6CF361FA1B4C8E2406C30AD42BBA9833
                                                    SHA1:94EED38C64E25EB864955EE4D23582CB565CD12F
                                                    SHA-256:EE6837C845C8D60D92CD0543E30BC012F2BA82A2DA5ABCAA7B6812C2FABAEE8D
                                                    SHA-512:73142F9C3D467BDC65A381F648626A09818A2CFCAE643F0E363777128F0F4AA7269757B160218A4F540A1CF4DF762E868163F083420A3EEC68B87E97CFFF2D5A
                                                    Malicious:false
                                                    Preview:SNMP-USER-BASED-SM-MIB DEFINITIONS ::= BEGIN....IMPORTS.. MODULE-IDENTITY, OBJECT-TYPE,.. OBJECT-IDENTITY,.. snmpModules, Counter32 FROM SNMPv2-SMI.. TEXTUAL-CONVENTION, TestAndIncr,.. RowStatus, RowPointer,.. StorageType, AutonomousType FROM SNMPv2-TC.. MODULE-COMPLIANCE, OBJECT-GROUP FROM SNMPv2-CONF.. SnmpAdminString, SnmpEngineID,.. snmpAuthProtocols, snmpPrivProtocols FROM SNMP-FRAMEWORK-MIB;....snmpUsmMIB MODULE-IDENTITY.. LAST-UPDATED "200210160000Z" -- 16 Oct 2002, midnight.. ORGANIZATION "SNMPv3 Working Group".. CONTACT-INFO "WG-email: snmpv3@lists.tislabs.com.. Subscribe: majordomo@lists.tislabs.com.. In msg body: subscribe snmpv3.... Chair: Russ Mundy.. Network Associates Laboratories.. postal: 15204 Omega Drive, Suite 300.. Rockville, MD 20850-4601
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2267
                                                    Entropy (8bit):4.527920368353163
                                                    Encrypted:false
                                                    SSDEEP:48:+DDchBx6+0M7NVWTP9PLd6QtdRAybwooUSHSM:+vchH6+DZ4T6QOybwodm
                                                    MD5:1F032E2031F631B9252E578E2588A20F
                                                    SHA1:00F07B16314E6D9E88EDDFAEA7CECD0F2A9351DD
                                                    SHA-256:BED1767309D094C9F4644467BE3FA6309D59A082BDAAEB5EEEEEFF3B05527A5D
                                                    SHA-512:9BE35DEB262338162848D499CE57A1FE3492962F9D745C72BC374CCB23D8F7F4F9ECA65A8D6A7F11885C9D194F83C515A8792EBF65A435C8F939FA5695C9B73C
                                                    Malicious:false
                                                    Preview:SNMP-USM-AES-MIB DEFINITIONS ::= BEGIN.. IMPORTS.. MODULE-IDENTITY, OBJECT-IDENTITY,.. snmpModules FROM SNMPv2-SMI -- [RFC2578].. snmpPrivProtocols FROM SNMP-FRAMEWORK-MIB; -- [RFC3411]....snmpUsmAesMIB MODULE-IDENTITY.. LAST-UPDATED "200406140000Z".. ORGANIZATION "IETF".. CONTACT-INFO "Uri Blumenthal.. Lucent Technologies / Bell Labs.. 67 Whippany Rd... 14D-318.. Whippany, NJ 07981, USA.. 973-386-2163.. uri@bell-labs.com.... Fabio Maino.. Andiamo Systems, Inc... 375 East Tasman Drive.. San Jose, CA 95134, USA.. 408-853-7530.. fmaino@andiamo.com.... Keith McCloghrie.. Cisco Systems, Inc... 170 West Tasman Drive.. San Jose, CA 95134-1706, USA....
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):21643
                                                    Entropy (8bit):4.863466003584518
                                                    Encrypted:false
                                                    SSDEEP:384:w6jX0qZf5TsstsTpI7nussHPbP4PKtPW8:rjkAf5Tssc3pTgW
                                                    MD5:C25578F4CFB480B1901C923183839F44
                                                    SHA1:FFFF931DA4464404467B4EE861236CEF1ABCC9A1
                                                    SHA-256:1AC7924954F8BBAA4B3E4B8163A4365D2885991F9AA4D13A34603B33C07E5747
                                                    SHA-512:E194CD3078C934FCE3D2F4B8BEAF6B1797D191864435B437869E861DFA130AB58E02FA5B11C9F6DB782A7B005C7230F5918EC3B35D5B8E474F26FD18867B4C7E
                                                    Malicious:false
                                                    Preview:SNMP-USM-DH-OBJECTS-MIB DEFINITIONS ::= BEGIN....IMPORTS.. MODULE-IDENTITY, OBJECT-TYPE,.. -- OBJECT-IDENTITY,.. experimental, Integer32.. FROM SNMPv2-SMI.. TEXTUAL-CONVENTION.. FROM SNMPv2-TC.. MODULE-COMPLIANCE, OBJECT-GROUP.. FROM SNMPv2-CONF.. usmUserEntry.. FROM SNMP-USER-BASED-SM-MIB.. SnmpAdminString.. FROM SNMP-FRAMEWORK-MIB;....snmpUsmDHObjectsMIB MODULE-IDENTITY.. LAST-UPDATED "200003060000Z" -- 6 March 2000, Midnight.. ORGANIZATION "Excite@Home".. CONTACT-INFO "Author: Mike StJohns.. Postal: Excite@Home.. 450 Broadway.. Redwood City, CA 94063.. Email: stjohns@corp.home.net.. Phone: +1-650-556-5368".... DESCRIPTION.. "The management information definitions for providing forward.. secrecy for key changes for the usmUserTable, and for providing a.. method for 'kickstarting' access to the agent vi
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):34992
                                                    Entropy (8bit):4.408047697337799
                                                    Encrypted:false
                                                    SSDEEP:384:WOPSAA/l5htnZdCGHNR1JWMcVHFOClZ/QMJVVvT5g5GdlyCPj6VV03eK:WOVAtHdCGHN7YMmQCjQMJH75gfS6H0OK
                                                    MD5:ADC8C65A8076B81C061934F1322480F8
                                                    SHA1:5F29A2458010126EE48E65FCE297A7B458A18836
                                                    SHA-256:86A73263497996532E68AF4DF60C8D5EFE9A36F480E7A21140596D5287963FEF
                                                    SHA-512:F0F0267338C5EDFB5C683CB0D5C73C4E81EAE28FD85C1A534FF51F31D57A1C8A677175252B9772FCECBC092F04FFD9C4FF90CD2083510E6D7891B133F2A47169
                                                    Malicious:false
                                                    Preview:SNMP-VIEW-BASED-ACM-MIB DEFINITIONS ::= BEGIN....IMPORTS.. MODULE-COMPLIANCE, OBJECT-GROUP FROM SNMPv2-CONF.. MODULE-IDENTITY, OBJECT-TYPE,.. snmpModules FROM SNMPv2-SMI.. TestAndIncr,.. RowStatus, StorageType FROM SNMPv2-TC.. SnmpAdminString,.. SnmpSecurityLevel,.. SnmpSecurityModel FROM SNMP-FRAMEWORK-MIB;....snmpVacmMIB MODULE-IDENTITY.. LAST-UPDATED "200210160000Z" -- 16 Oct 2002, midnight.. ORGANIZATION "SNMPv3 Working Group".. CONTACT-INFO "WG-email: snmpv3@lists.tislabs.com.. Subscribe: majordomo@lists.tislabs.com.. In message body: subscribe snmpv3.... Co-Chair: Russ Mundy.. Network Associates Laboratories.. postal: 15204 Omega Drive, Suite 300.. Rockville, MD 20850-4601.. USA..
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8585
                                                    Entropy (8bit):4.071308844131724
                                                    Encrypted:false
                                                    SSDEEP:96:BM8UABZ49F8+0UZ4NGXmre8dVVoIz9AVuzgOGrgrRAenNz9AVuojndoUewm:3nM9S+0fo2re8EuzCErRAruox7ewm
                                                    MD5:0B06190D90E169FB58292B383E85C30D
                                                    SHA1:51DA77AB35FC7C2BA5FE023C4D16F1A6486E4611
                                                    SHA-256:57BBCEF54A74D2EA467FC821E30F4769081504DCE157DEC1D8A41BE771D65983
                                                    SHA-512:B4418C16E8EE0FFDFDDCD719405FD0881B1A398E8DB75045C63A9DA832005BA3AAD6CCAE51B2EBBBDCF21BBD4BD155A9BF35C8D22B4C521865BA6FEEF7D2BFD7
                                                    Malicious:false
                                                    Preview:SNMPv2-CONF DEFINITIONS ::= BEGIN....IMPORTS ObjectName, NotificationName, ObjectSyntax.. FROM SNMPv2-SMI;....-- definitions for conformance groups....OBJECT-GROUP MACRO ::=..BEGIN.. TYPE NOTATION ::=.. ObjectsPart.. "STATUS" Status.. "DESCRIPTION" Text.. ReferPart.... VALUE NOTATION ::=.. value(VALUE OBJECT IDENTIFIER).... ObjectsPart ::=.. "OBJECTS" "{" Objects "}".. Objects ::=.. Object.. | Objects "," Object.. Object ::=.... value(ObjectName).... Status ::=.. "current".. | "deprecated".. | "obsolete".... ReferPart ::=.. "REFERENCE" Text.. | empty.... -- a character string as defined in [2].. Text ::= value(IA5String)..END....-- more definitions for conformance groups....NOTIFICATION-G
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):30159
                                                    Entropy (8bit):4.706685041824469
                                                    Encrypted:false
                                                    SSDEEP:384:MP+sJ2Y10pwkDRa8Dfufp7n8YD4BlEcU+m41c:MPwM0pRda8Dfufp78YDwEcU+m4e
                                                    MD5:F1382CD3AE375D57C0DA4FACD4A772A6
                                                    SHA1:C991931B91C11C369600BA6D9EFA78526C6B1011
                                                    SHA-256:07F239D8858E31165E22CFC29E9FB0A9919A642DC22ED0117EC19731A703FF1B
                                                    SHA-512:0C88C62A60303104FBE67755D5D17779035C0748AD5D9424401BF6B69F4965E9614409A2D9430F2B29F9AAD71DF7A8E0CD2F518B0C295C146CC6C0C55F471695
                                                    Malicious:false
                                                    Preview:SNMPv2-MIB DEFINITIONS ::= BEGIN....IMPORTS.. MODULE-IDENTITY, OBJECT-TYPE, NOTIFICATION-TYPE,.. TimeTicks, Counter32, snmpModules, mib-2.. FROM SNMPv2-SMI.. DisplayString, TestAndIncr, TimeStamp.... FROM SNMPv2-TC.. MODULE-COMPLIANCE, OBJECT-GROUP, NOTIFICATION-GROUP.. FROM SNMPv2-CONF;....snmpMIB MODULE-IDENTITY.. LAST-UPDATED "200210160000Z".. ORGANIZATION "IETF SNMPv3 Working Group".. CONTACT-INFO.. "WG-EMail: snmpv3@lists.tislabs.com.. Subscribe: snmpv3-request@lists.tislabs.com.... Co-Chair: Russ Mundy.. Network Associates Laboratories.. postal: 15204 Omega Drive, Suite 300.. Rockville, MD 20850-4601.. USA.. EMail: mundy@tislabs.com.. phone: +1 301 947-7107.... Co-Chair: David Harrington.. Enterasys Networks.. postal: 35 Indus
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):9268
                                                    Entropy (8bit):4.637059109025311
                                                    Encrypted:false
                                                    SSDEEP:192:xgaWIcP6f3y+kbSTCNC37RGh9olTChiuTmoeKPSaPo:xBWoCSU7hioL3Q
                                                    MD5:503EB55D4ED1352C69EE32699426DFF5
                                                    SHA1:05B917507E1C359174B1D31DABED785E31F39593
                                                    SHA-256:97816AEE70C1CD365F7487560F7D3925969F9A28B60CDAA4EFC1376FDBE2D38A
                                                    SHA-512:4140A11110B0840E7989DE9F311473C062E7D85D2451B41C8061A0AA159556C634DFA5552AD25280BE1A9571F99BE412F444A98F3622F71C4DD6AFDD7889D1A6
                                                    Malicious:false
                                                    Preview:SNMPv2-SMI DEFINITIONS ::= BEGIN....-- the path to the root....org OBJECT IDENTIFIER ::= { iso 3 } -- "iso" = 1..dod OBJECT IDENTIFIER ::= { org 6 }..internet OBJECT IDENTIFIER ::= { dod 1 }....directory OBJECT IDENTIFIER ::= { internet 1 }....mgmt OBJECT IDENTIFIER ::= { internet 2 }..mib-2 OBJECT IDENTIFIER ::= { mgmt 1 }..transmission OBJECT IDENTIFIER ::= { mib-2 10 }....experimental OBJECT IDENTIFIER ::= { internet 3 }....private OBJECT IDENTIFIER ::= { internet 4 }..enterprises OBJECT IDENTIFIER ::= { private 1 }....security OBJECT IDENTIFIER ::= { internet 5 }....snmpV2 OBJECT IDENTIFIER ::= { internet 6 }....-- transport domains..snmpDomains OBJECT IDENTIFIER ::= { snmpV2 1 }....-- transport proxies..snmpProxys OBJECT IDENTIFIER ::= { snmpV2 2 }....-- module identities..snmpModules OBJECT IDENTIFIER ::= { snmpV2 3 }....-- Extended UTCTime, to allow dates with four-digit years..-- (Note t
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):38806
                                                    Entropy (8bit):4.210804090324533
                                                    Encrypted:false
                                                    SSDEEP:768:8pi8FDF9djsUzEFrquLZDdkk0yHFrSCLZDMGHc7u5U:8ddjwVZHlH46u
                                                    MD5:E02F8727805D92729F93DE2BFFCE917F
                                                    SHA1:AD905E7F1C2F9515535E7B47917F6E71BF093029
                                                    SHA-256:42A0DB2CB7E93DDF766B669E4CF1BEBF0F22BC1F18AF4DC2DB50FD57270E532C
                                                    SHA-512:D813ECCB19E9733318114F59B21184CB1A96DD2E1116FD9C86F096602BF8876F8C3C3D2220231A984FD0FB3CAE384E05DFAE5C72C588649EDF4CF007397FF8C1
                                                    Malicious:false
                                                    Preview:SNMPv2-TC DEFINITIONS ::= BEGIN....IMPORTS.. TimeTicks FROM SNMPv2-SMI;....-- definition of textual conventions....TEXTUAL-CONVENTION MACRO ::=....BEGIN.. TYPE NOTATION ::=.. DisplayPart.. "STATUS" Status.. "DESCRIPTION" Text.. ReferPart.. "SYNTAX" Syntax.... VALUE NOTATION ::=.. value(VALUE Syntax) -- adapted ASN.1.... DisplayPart ::=.. "DISPLAY-HINT" Text.. | empty.... Status ::=.. "current".. | "deprecated".. | "obsolete".... ReferPart ::=.. "REFERENCE" Text.. | empty.... -- a character string as defined in [2].. Text ::= value(IA5String).... Syntax ::= -- Must be one of the following:.. -- a base type (or its refinement), or.. -- a BITS pseudo-type.. type..
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):5951
                                                    Entropy (8bit):4.564036185908307
                                                    Encrypted:false
                                                    SSDEEP:48:KTWZBxYA5Vbjm+SzQYrF2TVmNLyd9NeepxYL3RhML1G86ZLgPMFqdMFs8Pm6q8Mo:KQHYALO+4QYrF2TULnOq2JMDJ6mR
                                                    MD5:BDB9510C0C05FBBB78D63C061680FDC7
                                                    SHA1:4FD12E058AD63F41B4E178F22F9DD377BE4B982C
                                                    SHA-256:1801ED28D368ADFF9CB8EF25683F6D03CA9B30378E0AB30A515D7CCA284D3C17
                                                    SHA-512:D03B4812FE232BF9950A9FAD4E4596EC090E73A156CC7A57FA605AB8713A1C0FEB5754788F95A18B785AB8F7072968AA8533E949E6DCE5733236D70C8EDE99CC
                                                    Malicious:false
                                                    Preview:SNMPv2-TM DEFINITIONS ::= BEGIN....IMPORTS.. MODULE-IDENTITY, OBJECT-IDENTITY,.. snmpModules, snmpDomains, snmpProxys.. FROM SNMPv2-SMI.. TEXTUAL-CONVENTION.. FROM SNMPv2-TC;....snmpv2tm MODULE-IDENTITY.. LAST-UPDATED "200210160000Z".. ORGANIZATION "IETF SNMPv3 Working Group".. CONTACT-INFO.. "WG-EMail: snmpv3@lists.tislabs.com.. Subscribe: snmpv3-request@lists.tislabs.com.... Co-Chair: Russ Mundy.. Network Associates Laboratories.. postal: 15204 Omega Drive, Suite 300.. Rockville, MD 20850-4601.. USA.. EMail: mundy@tislabs.com.. phone: +1 301 947-7107.... Co-Chair: David Harrington.. Enterasys Networks.. postal: 35 Industrial Way.. P. O. Box 5005.. Rochester, NH 03866-5005..
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):29349
                                                    Entropy (8bit):4.574471290564408
                                                    Encrypted:false
                                                    SSDEEP:384:FEoO20bbYzCHdqEgcTxT+7hmyb+zyHnFhNB8HFA0PyHZ7JYqwb:FEtbYzCHdqEgcVC7hmytnFhUlzecqs
                                                    MD5:F148B1B4FF2B1335D2CCFFC39B667707
                                                    SHA1:1510E7F2323D7449D5FD029137377F30D680C49D
                                                    SHA-256:19DDD9268F0297FC3BD35E124CFF6E0D38992752ED4072959150A82D8FC18D5A
                                                    SHA-512:43292087575163DDBBA2CF9F259102A0E55FC2090E09633E23282B662A27184F779CE1462BC590836E6214D912F193866E14233BE2A69D30FC277DD071B5A4BE
                                                    Malicious:false
                                                    Preview:TCP-MIB DEFINITIONS ::= BEGIN....IMPORTS.. MODULE-IDENTITY, OBJECT-TYPE, Integer32, Unsigned32,.. Gauge32, Counter32, Counter64, IpAddress, mib-2.. FROM SNMPv2-SMI.. MODULE-COMPLIANCE, OBJECT-GROUP FROM SNMPv2-CONF.. InetAddress, InetAddressType,.. InetPortNumber FROM INET-ADDRESS-MIB;....tcpMIB MODULE-IDENTITY.. LAST-UPDATED "200502180000Z" -- 18 February 2005.. ORGANIZATION.. "IETF IPv6 MIB Revision Team.. http://www.ietf.org/html.charters/ipv6-charter.html".. CONTACT-INFO.. "Rajiv Raghunarayan (editor).... Cisco Systems Inc... 170 West Tasman Drive.. San Jose, CA 95134.... Phone: +1 408 853 9612.. Email: <raraghun@cisco.com>.... Send comments to <ipv6@ietf.org>".. DESCRIPTION.. "The MIB module for managing TCP implementations..... Copyright (C) The Internet Society (2005). This v
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):16831
                                                    Entropy (8bit):4.665842161338394
                                                    Encrypted:false
                                                    SSDEEP:192:nyz82TBS3+1SxBiRwykySv+1vurPCrgr+Iq8c9FCOEjCNNetXM1Q+QgXIvHLLX+:l9GZYt81FHGH3O
                                                    MD5:7AB5E0346708DF798FB715C0AB979943
                                                    SHA1:CEE303134DE3CB04F2236000D923544244661BA6
                                                    SHA-256:597EA5CDD5DF800509918D1A1A179A40297452DACD04544322343291546EE3F7
                                                    SHA-512:792C1882B7A84F2496F8B72DB65732DBFE4EACE57E249A9AFEB2B8097F5EAC3B9339B928DD64ED0FC4EB08D6A9F400B67E6CEB169C4B697090BF332409DC9646
                                                    Malicious:false
                                                    Preview:TRANSPORT-ADDRESS-MIB DEFINITIONS ::= BEGIN....IMPORTS.. MODULE-IDENTITY, OBJECT-IDENTITY, mib-2 FROM SNMPv2-SMI.. TEXTUAL-CONVENTION FROM SNMPv2-TC;....transportAddressMIB MODULE-IDENTITY.. LAST-UPDATED "200211010000Z".. ORGANIZATION.. "IETF Operations and Management Area".. CONTACT-INFO.. "Juergen Schoenwaelder (Editor).. TU Braunschweig.. Bueltenweg 74/75.. 38106 Braunschweig, Germany.. Phone: +49 531 391-3289.. EMail: schoenw@ibr.cs.tu-bs.de.... Send comments to <mibs@ops.ietf.org>.".. DESCRIPTION.. "This MIB module provides commonly used transport.. address definitions..... Copyright (C) The Internet Society (2002). This version of.. this MIB module is part of RFC 3419; see the RFC itself for.. full legal notices.".... -- Revision log.... REVISION "200211010000Z".. DESCRIPTION.. "Initial version, published as RFC 341
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):13244
                                                    Entropy (8bit):4.568252560746691
                                                    Encrypted:false
                                                    SSDEEP:192:L7cQdYUJep2qy+iISfwDr7VZwCbrroLIivcoQnYYCKygu/5EN7dHjkIUwS3:fJxcvPfhvLBPWI1E
                                                    MD5:22A19F0F869F76F8A8B2F853FF5A41CE
                                                    SHA1:F4B317A24EDD069734E31837489E16520040E202
                                                    SHA-256:0173F565D3EEBCFFCBAF1202023F3F846FCE437F0C2870406974AC07A0838DD3
                                                    SHA-512:53207BB65AA727E5F609654BEDAA596C2DC45751A123059BBE197806B5B78D734E89059CD825A21AEF9BFC677EFDC5347F7F789124A2CD480C54A7FE2D25E350
                                                    Malicious:false
                                                    Preview:TUNNEL-MIB DEFINITIONS ::= BEGIN....IMPORTS.. MODULE-IDENTITY, OBJECT-TYPE, transmission,.. Integer32, IpAddress FROM SNMPv2-SMI.. RowStatus FROM SNMPv2-TC.. MODULE-COMPLIANCE, OBJECT-GROUP FROM SNMPv2-CONF.. ifIndex, InterfaceIndexOrZero FROM IF-MIB;....tunnelMIB MODULE-IDENTITY.. LAST-UPDATED "9908241200Z" -- August 24, 1999.. ORGANIZATION "IETF Interfaces MIB Working Group".. CONTACT-INFO.. " Dave Thaler.. Microsoft Corporation.. One Microsoft Way.. Redmond, WA 98052-6399.. EMail: dthaler@dthaler.microsoft.com".. DESCRIPTION.. "The MIB module for management of IP Tunnels, independent of.. the specific encapsulation scheme in use.".. REVISION "9908241200Z" -- August 24, 1999.. DESCRIPTION.. "Initial version, published as RFC 2667.".. ::= { transmission 131 }....tunnelMIBObjects OBJECT IDENTIFIER ::= { tunnelMIB
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):275
                                                    Entropy (8bit):5.012485659256184
                                                    Encrypted:false
                                                    SSDEEP:6:HjK5AS3Fc15U4x9UAyK15jLG5IrrFIECZJKzcQyGf+CzrIRVu9:HJSyp9bFjLGeN5CqcQyGfFr2K
                                                    MD5:F83DFF25C6426621EDB005A1EF9A531C
                                                    SHA1:0B49A19B1B8ADEFF5AFE44F4461C7DF38FB36E42
                                                    SHA-256:6B664F546C88F0709C8CB725D9EE047AD31B9B0C4AB3C31772E6CFA7592E5392
                                                    SHA-512:346985291217A98BCF0993C937F492E1452E6A283947D9F556F59CC4C030BAF5AA4E849A9FBA82D19311C2C28CE4A810CC7651AAFF86AB4F318F556A61E37B19
                                                    Malicious:false
                                                    Preview:-- input include file for smicng.....#condInclude "SNMPv2-SMI.inc" -- SNMPv2-SMI (SNMPv2 SMI)..#condInclude "SNMPv2-TC.inc" -- SNMPv2-TC (SNMPv2 TC macro and base TCs)..#condInclude "UCD-SNMP-MIB.inc"....#pushOpt..#addOpt "CM"..#condInclude "UCD-DEMO-MIB.txt"..#popOpt....
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2237
                                                    Entropy (8bit):5.254618308254092
                                                    Encrypted:false
                                                    SSDEEP:24:tHjAGXuv36aw1z6QDj1GVbQr7KiGK48J8gCqESDKSYK9vKVgPxwv9KIMkK8bKLR8:tJj16QDjIVba6lq57YArwv9xN2XRfh4
                                                    MD5:ED40E14BCCAC62CE7FACC141577B66E7
                                                    SHA1:2D6A8942C6F408033C659045DCCB867C6A4D2721
                                                    SHA-256:C3E2207331F525E1284B5D2ABD2942573BBC181436B887D9EF651E9E795062B2
                                                    SHA-512:58C907986F854CCA5D7A5250AED243FF0AA7B3697C3CD4B3FF7C6045090817A2C8831276140B7B8584AF27D792B14B2D0E1C8AE35DA9164C243CE10504C2188A
                                                    Malicious:false
                                                    Preview:UCD-DEMO-MIB DEFINITIONS ::= BEGIN....IMPORTS.. MODULE-IDENTITY, OBJECT-TYPE, Integer32.FROM SNMPv2-SMI.. ucdavis.....FROM UCD-SNMP-MIB;....ucdDemoMIB MODULE-IDENTITY.. LAST-UPDATED "9912090000Z".. ORGANIZATION "University of California, Davis".. CONTACT-INFO..."This mib is no longer being maintained by the University of... California and is now in life-support-mode and being... maintained by the net-snmp project. The best place to write... for public questions about the net-snmp-coders mailing list... at net-snmp-coders@lists.sourceforge.net..... postal: Wes Hardaker.. P.O. Box 382.. Davis CA 95617.... email: net-snmp-coders@lists.sourceforge.net.. ".. DESCRIPTION..."The UCD-SNMP Demonstration MIB.".. REVISION. "9912090000Z".. DESCRIPTION..."SMIv2 version converted from older MIB definitions.".. ::= { ucdavis 14 }....ucdDemoMIBObjects OBJECT IDENTIFIER ::= { ucdDemoMIB 1 }....ucdDemoPublic OBJ
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):277
                                                    Entropy (8bit):5.012181775821575
                                                    Encrypted:false
                                                    SSDEEP:6:HjK5AS3Fc15U4x9UAyK15jLG5IrrFIECZJKzcQyGf+CzRIRVu9:HJSyp9bFjLGeN5CqcQyGfFR2K
                                                    MD5:2E33C0AEB8385BB88AF235DA6117A9E5
                                                    SHA1:400928DCD581D66DF470BD587BB3285DBB52F4DE
                                                    SHA-256:51A6A532FEBE61DB61200BAB7435764E67DF8330B1CC702FC00D85E065962CCB
                                                    SHA-512:B11BC0DF22B705743F9A17C94BBAFAB444987EFC0EDCD342376940D71C8A6305EB014B7FE5FD3CC351DE1BD0968D6940ADE4D8F2B6C36C692696006B7D98A48C
                                                    Malicious:false
                                                    Preview:-- input include file for smicng.....#condInclude "SNMPv2-SMI.inc" -- SNMPv2-SMI (SNMPv2 SMI)..#condInclude "SNMPv2-TC.inc" -- SNMPv2-TC (SNMPv2 TC macro and base TCs)..#condInclude "UCD-SNMP-MIB.inc"....#pushOpt..#addOpt "CM"..#condInclude "UCD-DISKIO-MIB.txt"..#popOpt....
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):4564
                                                    Entropy (8bit):4.94119794918604
                                                    Encrypted:false
                                                    SSDEEP:48:QTl3pR+2tz16QD4ybuuMFunIUjVBSq0Jm8hJhHYJ1:G9bDtz1624/uMFYMq0JZZ6
                                                    MD5:58A92AB5DE120F4ADDC3765F8110F948
                                                    SHA1:D60C50767AF9788918252E1819A856696E31A533
                                                    SHA-256:76EDD511187B0527849EB9E20C8B0BA9F2B09AA8533DAE80F425E981CCC8494E
                                                    SHA-512:A1DDA47788A82CDCA6894C582B5B9028F116B51F806AE3201C331A956A4270155F9439939662A998FDD54348ACD26A8F7FFBF1EAE42FB41EC41CFAD9B5C2D1E0
                                                    Malicious:false
                                                    Preview:UCD-DISKIO-MIB DEFINITIONS ::= BEGIN....--..-- Derived from the original VEST-INTERNETT-MIB. Open issues:..--..-- (a) where to register this MIB?..-- (b) use not-accessible for diskIOIndex?..--......IMPORTS.. MODULE-IDENTITY, OBJECT-TYPE, Integer32, Counter32, Counter64.. FROM SNMPv2-SMI.. DisplayString.. FROM SNMPv2-TC.. ucdExperimental.. FROM UCD-SNMP-MIB;....ucdDiskIOMIB MODULE-IDENTITY.. LAST-UPDATED "200001260000Z".. ORGANIZATION "University of California, Davis".. CONTACT-INFO ..."This mib is no longer being maintained by the University of... California and is now in life-support-mode and being... maintained by the net-snmp project. The best place to write... for public questions about the net-snmp-coders mailing list... at net-snmp-coders@lists.sourceforge.net..... postal: Wes Hardaker.. P.O. Box 382.. Davis CA 95617.... email: net-snmp-coders@lists.sourceforge.net.. "..
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):237
                                                    Entropy (8bit):4.973951899485554
                                                    Encrypted:false
                                                    SSDEEP:6:6sl15U4x9UAyK15jLG5IrrFIECZJKzcQyGf+CzXnGLVIRVuA:6Ip9bFjLGeN5CqcQyGfF3Gx2f
                                                    MD5:5C0560D275354E7E4BC83568D4DE9BFA
                                                    SHA1:217503D90ED1064A321F948DCD01C76913EF895E
                                                    SHA-256:CFC05E54DA3353D230F6D9D11477A82EFC7DD286294CC5FB255FACD34FF00B9F
                                                    SHA-512:08A9D6B6524F5745B3872B0C3445C2FE49E88DEBF027C5307DA79EF3B25CFEE35E3B4CECCE55B4592519ABE93BD52C597736E102B95AFB55F6AC2D72AC00BE0D
                                                    Malicious:false
                                                    Preview:#condInclude "SNMPv2-SMI.inc" -- SNMPv2-SMI (SNMPv2 SMI)..#condInclude "SNMPv2-TC.inc" -- SNMPv2-TC (SNMPv2 TC macro and base TCs)..#condInclude "UCD-SNMP-MIB.inc"....#pushOpt..#addOpt "CM"..#condInclude "UCD-DLMOD-MIB.txt"..#popOpt..
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):3129
                                                    Entropy (8bit):5.197737450541993
                                                    Encrypted:false
                                                    SSDEEP:48:Z+qxx034Hz16QDeCVbUZadlb6xreC/eDKhXdRVjz1kin:Z+Sy+z162eC2w36T2DaDVPq8
                                                    MD5:39E5C398E690F410D461C8FE752C6D46
                                                    SHA1:F04C0682E4AEBEA4C89358FAC4E4E8C53BE778F1
                                                    SHA-256:EDDCA15A163DDC9DA5322E808428BDCAC02B2F5F7C1D9E3F3A508E1F9D80B7BD
                                                    SHA-512:09CB32D298C6431620B975FDCADE3A20F720C8E22FC75CE55AEF198478A82539796FBA499EFDEF83C2A59476A2667AB38DC430AE9805D4CAA90A285852F0BF3C
                                                    Malicious:false
                                                    Preview:UCD-DLMOD-MIB DEFINITIONS ::= BEGIN....-- Why do we have dlmodNextIndex if the dlmodTable is read-write?..-- What exactly is the dlmodName and dlmodPath?..-- Should there not be a timestamp associated with dlmodError?..-- What exactly do the dlmodStatus enumerations mean?....IMPORTS.. OBJECT-TYPE, MODULE-IDENTITY, Integer32.FROM SNMPv2-SMI.. DisplayString....FROM SNMPv2-TC.. ucdExperimental....FROM UCD-SNMP-MIB;....ucdDlmodMIB MODULE-IDENTITY.. LAST-UPDATED "9912100000Z".. ORGANIZATION "University of California, Davis".. CONTACT-INFO ..."This mib is no longer being maintained by the University of... California and is now in life-support-mode and being... maintained by the net-snmp project. The best place to write... for public questions about the net-snmp-coders mailing list... at net-snmp-coders@lists.sourceforge.net..... postal: Wes Hardaker.. P.O. Box 382.. Davis CA 95617.... email: net-snmp-coders@lists
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):240
                                                    Entropy (8bit):5.015866580808246
                                                    Encrypted:false
                                                    SSDEEP:6:6sl15U4x9UAyK15jLG5IrrFIECZJKzcQyGf+CzDIRVuA:6Ip9bFjLGeN5CqcQyGfFD2f
                                                    MD5:079E3BD6992A972DAC27DFB9465E7BE6
                                                    SHA1:8B0C37120DAE3E3045B40E9E463D021CF6BD6922
                                                    SHA-256:7CD6A7270169959D314F6E2F02DA9344A88782041ED54F4120E3D4598CAC229D
                                                    SHA-512:5023AB809A5ED7637B61E4D6AD790778BCD4E2F19D2223C268C57C66AA55733017A1A274D2E00380599F3E2DD0DEE402214032771BEA427A06D8B49C7C76B6BD
                                                    Malicious:false
                                                    Preview:#condInclude "SNMPv2-SMI.inc" -- SNMPv2-SMI (SNMPv2 SMI)..#condInclude "SNMPv2-TC.inc" -- SNMPv2-TC (SNMPv2 TC macro and base TCs)..#condInclude "UCD-SNMP-MIB.inc"....#pushOpt..#addOpt "CM"..#condInclude "UCD-IPFILTER-MIB.txt"..#popOpt..
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):6655
                                                    Entropy (8bit):5.208511952965189
                                                    Encrypted:false
                                                    SSDEEP:96:i1bz162KaoTJEJW5jYSXYCgkpNJvA2qjlY4x05n1hJCcYCfxoYg+pQYOu0tyXFe:+bsXdTJJ5tgOi2KuL8F5BQFe
                                                    MD5:B50A57B79159DB1DB84681B08BDBED1B
                                                    SHA1:B5E89BD3600C55DFEFE48D39D86FA984B46322E3
                                                    SHA-256:29E75F4059055674212FD2BEB8C3CB2B462D92611DC92F5C1AC7D83B133ECFBF
                                                    SHA-512:148DEBA96C3EF6C61DFA169B7C3AFA8EF3D94EC80115011C745313494D3C9F209358D38455C0090DD1EB396EF84BEF1134F6A8F72DB1F926196013BFF8163ED8
                                                    Malicious:false
                                                    Preview:UCD-IPFILTER-MIB DEFINITIONS ::= BEGIN....IMPORTS.. OBJECT-TYPE, MODULE-IDENTITY, Counter32, Integer32...FROM SNMPv2-SMI.. ucdExperimental...FROM UCD-SNMP-MIB;....ucdIpFilter MODULE-IDENTITY.. LAST-UPDATED "9912150000Z".. ORGANIZATION "University of California, Davis".. CONTACT-INFO ..."This mib is no longer being maintained by the University of... California and is now in life-support-mode and being... maintained by the net-snmp project. The best place to write... for public questions about the net-snmp-coders mailing list... at net-snmp-coders@lists.sourceforge.net..... postal: Wes Hardaker.. P.O. Box 382.. Davis CA 95617.... email: net-snmp-coders@lists.sourceforge.net.. ".. DESCRIPTION..."This module defines MIB components for reading information ... from the IP Filter. This would let you only read its rules ... and counters..... IP Filter by Darren Reed <darrenr@pobox.com>.. IP F
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):278
                                                    Entropy (8bit):5.037323624935918
                                                    Encrypted:false
                                                    SSDEEP:6:HjK5AS3Fc15U4x9UAyK15jLG5IrrFIECZJKzcQyGf+CzFfIRVu9:HJSyp9bFjLGeN5CqcQyGfFFf2K
                                                    MD5:C16A7DF90ECF0CE222F4936E7630CB2F
                                                    SHA1:DDBBCDF5E3037FCF8E7940D4E99A9D80FAB470FC
                                                    SHA-256:E83612284E8B7A4E88D169AC06989DB5550F008340762B9C284E9C87829E090F
                                                    SHA-512:13F61BC22E5B4EF3057DBE8FA0F92D7EBB6B27AD51822B2FD47A45663E41562E9D82CEF6F3199EE7DEEEAD941D946FE4FFECC372AC3C2565FC2F1D842767365A
                                                    Malicious:false
                                                    Preview:-- input include file for smicng.....#condInclude "SNMPv2-SMI.inc" -- SNMPv2-SMI (SNMPv2 SMI)..#condInclude "SNMPv2-TC.inc" -- SNMPv2-TC (SNMPv2 TC macro and base TCs)..#condInclude "UCD-SNMP-MIB.inc"....#pushOpt..#addOpt "CM"..#condInclude "UCD-IPFWACC-MIB.txt"..#popOpt....
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):8445
                                                    Entropy (8bit):5.180019111866859
                                                    Encrypted:false
                                                    SSDEEP:96:sTGsLz162Kb623+wE4js5y8rF7RwC7N5DLyV2Rm7rfIQ3Cr61NZV:bKsXb623+wsy8rF1wYjRcf1yQ
                                                    MD5:46CD01277A905E60E42B29500BBD8D1A
                                                    SHA1:ABEF44BE673C8DA9A6EBE2C9723FF95F3952A8A4
                                                    SHA-256:345B50E98B00DE6A6994526F33CB33FFF3F7A9357984CD0E9BBF1C9496FEA72E
                                                    SHA-512:22BF58015E33E664B1E4BBAD87B293A6608E79D3FB396109F100FF7B458410584F65988C3B4EEE3147E9719CD2FAAA6B55AF25F888AF84FBF9245836F6CAB2BF
                                                    Malicious:false
                                                    Preview:UCD-IPFWACC-MIB DEFINITIONS ::= BEGIN....IMPORTS.. OBJECT-TYPE, MODULE-IDENTITY, IpAddress, Integer32, Counter32...FROM SNMPv2-SMI.. DisplayString...FROM SNMPv2-TC.. ucdExperimental...FROM UCD-SNMP-MIB;....ucdIpFwAccMIB MODULE-IDENTITY.. LAST-UPDATED "9912160000Z".. ORGANIZATION "University of California, Davis".. CONTACT-INFO ..."This mib is no longer being maintained by the University of... California and is now in life-support-mode and being... maintained by the net-snmp project. The best place to write... for public questions about the net-snmp-coders mailing list... at net-snmp-coders@lists.sourceforge.net..... postal: Wes Hardaker.. P.O. Box 382.. Davis CA 95617.... email: net-snmp-coders@lists.sourceforge.net.. ".. DESCRIPTION..."This module defines MIB components for reading information.. from the accounting rules IP Firewall. This would typically.. let you read the rules a
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):19018
                                                    Entropy (8bit):5.1356892397895315
                                                    Encrypted:false
                                                    SSDEEP:384:+xy/NFmEqdFvjYJy/AF1JhdGY9xlUjWb7boVJIq8/Ln2nmz5V:ys/9xlUj0b2UV
                                                    MD5:15D29165FBCDFD164BCC0D70CD516BB7
                                                    SHA1:87BAD15CCBC91758A101B3FAEBD521BA4F405683
                                                    SHA-256:ED0C5755A844421479058D51E1C4FC504FECD181229CE5C5AB24E1DED00F0C25
                                                    SHA-512:CA0D3038D28D4EE3410FEC2AB0675260DFD96033E3AF2A5045ECF3C376E3C90CB5BDBA5E481EB9BA8E9273CACD65EC55F1CE079E8E8ACF83162045BBDC389531
                                                    Malicious:false
                                                    Preview:UCD-SNMP-MIB-OLD DEFINITIONS ::= BEGIN....--..-- This mib is a badly created mib which has been replaced by a more..-- properly created UCD-SNMP-MIB. Use that mib instead. This file..-- exists for historical purposes only and for use by people that..-- need to support both agent versions...--....IMPORTS...ucdavis... FROM UCD-SNMP-MIB.. OBJECT-TYPE ....... FROM SNMPv2-SMI...DisplayString ....... FROM SNMPv2-TC...Integer32.. FROM SNMPv2-SMI;....-- private. OBJECT IDENTIFIER ::= { internet 4 }..-- enterprises OBJECT IDENTIFIER ::= { private 1 }..-- ucdavis OBJECT IDENTIFIER ::= { enterprises 2021 }..-- processes OBJECT IDENTIFIER ::= { ucdavis 1 }..-- exec OBJECT IDENTIFIER ::= { ucdavis 3 }..-- memory OBJECT IDENTIFIER ::= { ucdavis 4 }..-- lockd OBJECT IDENTIFIER ::= { ucdavis 5 }..-- disk OBJECT IDENTIFIER ::= { ucdavis 6 }..-- load OBJECT IDENTIFIER ::= { ucdavis 7 }..-- version OB
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):240
                                                    Entropy (8bit):4.985194134753753
                                                    Encrypted:false
                                                    SSDEEP:6:HjK5AS3Fc15U4x9UAyK15jLG5IrrFIEC3KRf+CzcxIRVuA:HJSyp9bFjLGeN5C3KRfFcx2f
                                                    MD5:3D9811A1E39EF81F3AD5AC48F4EDC6BA
                                                    SHA1:F2172CFE20B2350F6941603DEF4E0C313C05F0CC
                                                    SHA-256:0DB7F19C20D065B544C47E57E4ACF825072141E2BA1CE29455BDAB158949327A
                                                    SHA-512:EA39821630CD70F8FF40011B9C531BECFB4E868A6CF208EFD7D359341B60507E3056FF336F1BB8EDF0C8DAC7533EF9CA3A8524A1D2E16557B00F0C9A00906B16
                                                    Malicious:false
                                                    Preview:-- input include file for smicng.....#condInclude "SNMPv2-SMI.inc" -- SNMPv2-SMI (SNMPv2 SMI)..#condInclude "SNMPv2-TC.inc" -- SNMPv2-TC (SNMPv2 TC macro and base TCs)....#pushOpt..#addOpt "CM"..#condInclude "UCD-SNMP-MIB.txt"..#popOpt..
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):36651
                                                    Entropy (8bit):5.1686237696388195
                                                    Encrypted:false
                                                    SSDEEP:768:a9C+qTZQQB0XPh9DPM3H0dN16Jw8UcnK0CazC5UBc:MCpVw9DPhy6Fk7c
                                                    MD5:5D55496EF525DFDC3779E1D8F715FD88
                                                    SHA1:BB98847EA02A34C48CD493FB03AD8F900516D08A
                                                    SHA-256:AF5607DE2825C321B129D46DCAFA34F44ECB82023AF27518E3F9FE2C37A6EE73
                                                    SHA-512:7F7F867FAB4322530A79C5E5F5C5650AA2442F7D38953633D4C320C02DBC2EDDA6C6DCDB22B655A13B0D3B17C59FDE5D785A89A982BD889574D1B896453FDBD9
                                                    Malicious:false
                                                    Preview:UCD-SNMP-MIB DEFINITIONS ::= BEGIN....-- Design notes:..--..-- The design of this mib may seem unusual in parts, as it was..-- designed for ease of numerical management routines...-- ..-- In that light, most sub-sections of this mib have four common..-- numerical oid consistencies:..--..-- 2021.ID.1 : an integer index value. In scalers, this is always..-- of value 1. In tables it is a row index...-- 2021.ID.2 : a name of the script, process, etc. that this row represents...-- 2021.ID.100 : An error flag indicating if an error is present on..-- that row (a threshold value was crossed, etc)...-- 2021.ID.101 : An error string describing why the error flag is non-0...--..-- These conventions enable managers to easy examine portions of the..-- mib by setting the ID to the sub-section they are interested in..-- monitoring, and then scanning the .100 value to check for an..-- error(s), and get a more specific error message from .101 for the..-- named check fo
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):21431
                                                    Entropy (8bit):4.603937133146871
                                                    Encrypted:false
                                                    SSDEEP:384:r3NnxX6tg3od1Weo8I8b13PJtPvtC/dR1FG:r3NnxX6tg3oqY3T+g
                                                    MD5:20D651515B215C85D0A23DAE092522D4
                                                    SHA1:95B7DCAF64B21D12D1129A80A252A487A2BCADA9
                                                    SHA-256:F1EEAA7B03F38F8C95DD1F6B23B3D04F71BE4C35E358E7629F3CFB36E9C989BB
                                                    SHA-512:C17F233AD7E44C825CCF6803ECD311B66F3F91D4847C090DA5811DED5141DAC5A3FF73D7615EC24FF3B6D41559A71AA2564D1CCF83788B15CC7090D941A9F189
                                                    Malicious:false
                                                    Preview:UDP-MIB DEFINITIONS ::= BEGIN....IMPORTS.. MODULE-IDENTITY, OBJECT-TYPE, Integer32, Counter32, Counter64,.. Unsigned32, IpAddress, mib-2 FROM SNMPv2-SMI.. MODULE-COMPLIANCE, OBJECT-GROUP FROM SNMPv2-CONF.. InetAddress, InetAddressType,.. InetPortNumber FROM INET-ADDRESS-MIB;....udpMIB MODULE-IDENTITY.. LAST-UPDATED "200505200000Z" -- May 20, 2005.. ORGANIZATION.. "IETF IPv6 Working Group.. http://www.ietf.org/html.charters/ipv6-charter.html".. CONTACT-INFO.. "Bill Fenner (editor).... AT&T Labs -- Research.. 75 Willow Rd... Menlo Park, CA 94025.... Phone: +1 650 330-7893.. Email: <fenner@research.att.com>.... John Flick (editor).... Hewlett-Packard Company.. 8000 Foothills Blvd. M/S 5557.. Roseville, CA 95747.... Phone: +1 916 785 4018.. Email: <john.flick@hp.com>.... Send
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):421
                                                    Entropy (8bit):5.069523008231174
                                                    Encrypted:false
                                                    SSDEEP:6:SDnb8Cvj/loRSTgy602XbxG5+XCYdGjV7xovuIlbt+IosnyZLRy14VM8DJfoVnn:i8sj/loigy60ubxi+XCYkWFbH0VpdCn
                                                    MD5:43C2586B2291D0DA2E2E1E0CBEF97B7B
                                                    SHA1:E7E5156732A86D2E36C2204A5C7F7F9431F74AE5
                                                    SHA-256:23C44B98019A0AFA8E98B195A945589859AD902537BCD769604C16017302E567
                                                    SHA-512:EF14B0EB954B6415B20D5153A457EFC7CD89ECE76D939DF74CB57805D6B8FF69DB8E47B91E4EB779E35F7244361838BE4C76D0D4BF8463C91640B98B407CF5E7
                                                    Malicious:false
                                                    Preview:# updated 2005-01-06..ianaiftype-mib...IANAifType-MIB..ianalanguage-mib..IANA-LANGUAGE-MIB..ianaaddressfamilynumbers-mib.IANA-ADDRESS-FAMILY-NUMBERS-MIB..ianaiprouteprotocol-mib..IANA-RTPROTO-MIB..ianatn3270etc-mib..IANATn3270eTC-MIB..ianamalloc-mib...IANA-MALLOC-MIB..ianacharset-mib...IANA-CHARSET-MIB..ianaprinter-mib...IANA-PRINTER-MIB..ianafinisher-mib..IANA-FINISHER-MIB..ianaitualarmtc-mib..IANA-ITU-ALARM-TC-MIB..
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:Perl script text executable
                                                    Category:dropped
                                                    Size (bytes):2647
                                                    Entropy (8bit):5.229283454799936
                                                    Encrypted:false
                                                    SSDEEP:48:d0mYuREUVwHk2EK5HjRkkRA5OvKvDWuOGD53tbABBCO5z+D8wgYQgHJyhiAmD8:d0L5tLxjRF9vEHOGJOBBv5zDeD8
                                                    MD5:7626B7342F997805C495B4E1454726FE
                                                    SHA1:4B1C3B6BE1D11EEC37FFC667A3870B3CD80F62AB
                                                    SHA-256:4EC4559837B1D7DBA4A14A68C64EFCF41D92B6FC97126F2919ECCE6EC59FC871
                                                    SHA-512:D03F5CE5FA64C3CA1EAA916590350601DE49CECA7F1EAEC79137D310C5E57EEE40A8E43043B39D0DE13352B49E09B9F6E159C5ABD2E4B8DA11092BA5C2DFF2BC
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:#!/usr/bin/perl....use SNMP;....use Getopt::Std;....%opts = ( M => ".",... D => "html");....getopts("M:D:WH:", \%opts) || die "usage: makehtml.pl -W [-M MIBDIR] [-D OUTDIR] files > index.html";....$SNMP::save_descriptions = 1;....$ENV{'MIBDIRS'} = $opts{'M'};..$ENV{'SNMPCONFPATH'} = 'bogus';....if (-f "rfclist") {.. open(I,"rfclist");.. while (<I>) {...if (/^(\d+)\s+([-:\w]+)\s*$/) {... my $mib = $2;... my $rfc = $1;... my @mibs = split(/:/,$mib);... foreach my $i (@mibs) {....$mibs{$i} = $rfc; ... }...}.. }.. close(I);..}....if (-f "nodemap") {.. open(I,"nodemap");.. while (<I>) {...if (/^([-\w]+)\s+(\w+)\s*$/) {... $nodemap{$1} = $2;...}.. }.. close(I);..}....if ($opts{'W'}) {.. print '<p class="SectionTitle">..Net-SNMP Distributed MIBs..</p>....<p>The following are the MIB files distributed with Net-SNMP. Note that because they are distributed with Net-SNMP does not mean the agent implements them all. Another good place for finding other
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:POSIX shell script, ASCII text executable, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1001
                                                    Entropy (8bit):4.858268029207609
                                                    Encrypted:false
                                                    SSDEEP:24:dHPGBSZOGTyoMJCr48kU1QGF6++OCFnATDaYw1wvW9+:dHPGvJ248kU1ns+2AfM9+
                                                    MD5:26300E108349EBD2A84C05D2C0262EA0
                                                    SHA1:2FACC16D12F73217437F1B7F0ECB2D3B0547050E
                                                    SHA-256:2994EA0EF22595DCB2113E33A0DB2CEFFA631DEE7DA50F0D4B68563E64E7F98B
                                                    SHA-512:EA497DFF3CA843C22580031ECF7C63C32A0C46714409C723E01D3FF75DA41EE982C44321B81616191FE2CE1FDB915F71BCAEB25443328B0AC38EAF973AD5E47F
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:#!/bin/sh....# Usage: mibfetch [ -d outdir ] host directory rfc [mibs]..#..# If "rfc" contains a "." it is expected to be a complete file name,..# otherwise it is assumed to be just the rfc number...# If "mibs" is specified, it is a ":" separated list of mibs to extract,..# otherwise all mibs are extracted...#..# The script fetches the file from the givn directory on the given..# host, and then runs the file through smistrip to extract the mibs.....exact=0..verbose=....while getopts xvd: c..do.. case $c in.. d).mdir="-d $OPTARG".. .;;.. x).exact=1.. .;;.. v).verbose=-v.. .;;.. \?).exit 2.. .;;.. esac..done....shift `expr $OPTIND - 1`....set -e....host=$1..dir=$2..rfc=$3....if [ $exact = 0 -a `echo $rfc | sed 's/\.//'` = $rfc ]; then.. file=rfc$rfc.txt..else.. file=$rfc..fi....if [ -n "$4" ]; then.. mibs="-m $4"..fi....# ncftpget -FV ftp://$host/$dir/$file..wget -O - -q -nv $host/$dir/$file | \...tr -d \\r | \..../smistrip $verbose -x .txt $mdir $mibs -.
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):110
                                                    Entropy (8bit):4.693377700878361
                                                    Encrypted:false
                                                    SSDEEP:3:UAAS8fqnhrWMh2v29XPoBxsWo16fn:UlZ0lh2vM/oBx82n
                                                    MD5:6E3A9614C90E3672F0313314820ED249
                                                    SHA1:AC2B7320648AE4E113490A4DEBBFA564DCD92F87
                                                    SHA-256:135B5DE9CA9F58C6F77B1011D2D196C8A52A0DE6D1225117C147466B8EBCD450
                                                    SHA-512:30226E8B3C749E43B20EFD500E4D59F1290C07FAEC15B2370A9E7C340C7F67A8BFF442779FF7BA88A80B9C8B3767D497BA7F66A728337BFE7BAB4A53D92A5087
                                                    Malicious:false
                                                    Preview:EtherLike-MIB..dot3..HOST-RESOURCES-MIB.host..IP-MIB...ip..IF-MIB...interfaces..UDP-MIB...udp..TCP-MIB...tcp..
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):4119
                                                    Entropy (8bit):4.929545839132799
                                                    Encrypted:false
                                                    SSDEEP:96:ly/TgrJEq20+rA3w5wLPRwMh7zS+1TwEO6sfcTCN3eACRtFet:lyrgrJL++w5wznDTP1sfcTCNgRzet
                                                    MD5:1F473B8772D452808E6660424889D068
                                                    SHA1:1A532B9AD14343DA2A027D8461CBC44ECEED60B4
                                                    SHA-256:0A080BACBD45031FCCD0957EB3AE82F5CC8FCD7619341746FB193551DEFCA35C
                                                    SHA-512:932BE6605CB8D70C21425C983AE1AB8F48DDC6A3856E63169D0960380E33C10524C36BF4555972E068B6EBA05FD89165E4EBF03AE1169E00ACBF27447D84C15E
                                                    Malicious:false
                                                    Preview:# updated 2005-03-14..1155.RFC1155-SMI..1213.RFC1213-MIB..1227.SMUX-MIB..1238.CLNS-MIB..1381.RFC1381-MIB..1382.RFC1382-MIB..1414.RFC1414-MIB..1461.MIOX25-MIB..1471.PPP-LCP-MIB..1472.PPP-SEC-MIB..1473.PPP-IP-NCP-MIB..1474.PPP-BRIDGE-NCP-MIB..1512.FDDI-SMT73-MIB..1513.TOKEN-RING-RMON-MIB..1525.SOURCE-ROUTING-MIB..1559.DECNET-PHIV-MIB..1567.DSA-MIB..1611.DNS-SERVER-MIB..1612.DNS-RESOLVER-MIB..1628.UPS-MIB..1657.BGP4-MIB..1658.CHARACTER-MIB..1659.RS-232-MIB..1660.PARALLEL-MIB..1666.SNA-NAU-MIB..1694.SIP-MIB..1696.Modem-MIB..1697.RDBMS-MIB..1724.RIPv2-MIB..1742.APPLETALK-MIB..1747.SNA-SDLC-MIB..1748.TOKENRING-MIB..1749.TOKENRING-STATION-SR-MIB..1792.TCPIPX-MIB..1850.OSPF-MIB:OSPF-TRAP-MIB..2006.MIP-MIB..2020.DOT12-IF-MIB..2021.RMON2-MIB..2024.DLSW-MIB..2051.APPC-MIB..2108.SNMP-REPEATER-MIB..2115.FRAME-RELAY-DTE-MIB..2127.ISDN-MIB..2128.DIAL-CONTROL-MIB..2206.RSVP-MIB..2213.INTEGRATED-SERVICES-MIB..2214.INTEGRATED-SERVICES-GUARANTEED-MIB..2232.APPN-DLUR-MIB..2238.HPR-MIB..2266.DOT12-RPTR-MIB
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:unified diff output, ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):21515
                                                    Entropy (8bit):4.976366118138985
                                                    Encrypted:false
                                                    SSDEEP:96:BD2zt2VQ2LA1qaOWjmBXSmkZDsiuFTLMk1CQbbmod1WPnU6p6nU6pwwGmenQfuyJ:BKzM41qajszO3c3O5nQfliUmAGqR1
                                                    MD5:7237A2000168D729A0B46FBB386617A4
                                                    SHA1:89959AE75DB6B5BF264A420FB6EF23B67D680DDF
                                                    SHA-256:D95F55C9CEC3A341211C5FC6743921F465021C6DA95080A22123AD53399DB427
                                                    SHA-512:D1D25F0B80C98CBC3BAD09A9C945D0D44CF690ECDB7852B2CB4FA4269D634E367D7B17FE573799DE508DA8DF66193B74EB358EB3F8C4785D2B84E945B280931B
                                                    Malicious:false
                                                    Preview:Only in /usr/local/share/snmp/rfc: .index..diff -ru /usr/local/share/snmp/rfc.orig/ADSL-LINE-MIB.txt /usr/local/share/snmp/rfc/ADSL-LINE-MIB.txt..--- /usr/local/share/snmp/rfc.orig/ADSL-LINE-MIB.txt.Sat Mar 3 17:27:00 2001..+++ /usr/local/share/snmp/rfc/ADSL-LINE-MIB.txt.Tue Jan 23 00:42:41 2001..@@ -3379,7 +3379,6 @@.. static profiles are implemented.".. .. OBJECT adslAtucConfMinSnrMgn..- MIN-ACCESS read-wr.. MIN-ACCESS read-write.. DESCRIPTION.. "Read-write access is applicable when..diff -ru /usr/local/share/snmp/rfc.orig/DLSW-MIB.txt /usr/local/share/snmp/rfc/DLSW-MIB.txt..--- /usr/local/share/snmp/rfc.orig/DLSW-MIB.txt.Sat Mar 3 17:18:28 2001..+++ /usr/local/share/snmp/rfc/DLSW-MIB.txt.Tue Jan 23 00:13:40 2001..@@ -7,7 +7,7 @@.. .. Counter32, Gauge32, TimeTicks,.. OBJECT-TYPE, MODULE-IDENTITY,..- NOTIFICATION-TYPE FROM SNMPv2-SMI..+ NOTIFICATION-TYPE, mib-2
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:POSIX shell script, ASCII text executable, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):3848
                                                    Entropy (8bit):5.168047024403546
                                                    Encrypted:false
                                                    SSDEEP:96:PA3ESb+2G2QU9tKYzZ10ePm2wOgN3HiqEKj1lQ5iv:iJf9tKG/mwgN3HiBK7h
                                                    MD5:BF4EC212880DBC98D95C1FC57620E311
                                                    SHA1:67309EBDDCB2C79FE0209B37A3A34C5E9603D01F
                                                    SHA-256:FA1903625F62FAF92FFF921BF391D708352DD77F36DF19A62EE8C422C2A7995E
                                                    SHA-512:19977703012CAE958874F49D653F53A4D8513AF978BF12E81D292FD15679ED12864F0186A728EE877961ADB98BF7D8F8609F07A8D80E4C4A2E833D369C99A238
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:#!/bin/sh..#..# smistrip --..#..#.Extract MIB modules from text files, like RFCs or I-Ds...#..# This is variant of smistrip from libsmi-0.2, modified to be somewhat..# more aggressive in suppressing blank lines, and support the -x option...#..# Copyright (c) 1999 Frank Strauss, Technical University of Braunschweig...# Modified by Niels Baggesen..#..# See the file "COPYING" for information on usage and redistribution..# of this file, and for a DISCLAIMER OF ALL WARRANTIES...#..# $Id: smistrip,v 5.3 2005/02/08 20:06:34 nba Exp $..#..# NOTE, that this script relies on awk (tested with GNU awk) and getopts..# (shell builtin like in bash or standalone)...#....AWK=awk..[ `uname` != SunOS ] || AWK=/usr/bin/nawk..GETOPTS=getopts..VERSION=0.3-cvs......do_version () {.. echo "smistrip $VERSION"..}........do_usage () {.. echo "Usage: smistrip [-Vhn] [-d dir] [-s suffix] [-m modules] file ...".. echo "-V show version and license information".. echo "-v verbose".. ech
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1402
                                                    Entropy (8bit):5.26932800001929
                                                    Encrypted:false
                                                    SSDEEP:24:Wxv0Rk8Q8LUhz/Ar88mDv9UKRUGuxav0PBr6k0TX:WFOkZZwHmDvacjc5r6kK
                                                    MD5:C71F98F344B76D8C1BE38B795329545D
                                                    SHA1:5847C338E8C92EABC3D235D7A4C86C36E3A38643
                                                    SHA-256:42458D745C46368C2A41EB617C53D81ACD7A61D9887C8238594CA9478156761D
                                                    SHA-512:6A34C575A33259E26F8F713D2F53F738E8E265114E8F2CA4812802B122D3B54A7B9C22196090BD2FF573996B94CD4D57A6BF9DA08866092CEBD1033B4CF1DA12
                                                    Malicious:false
                                                    Preview:' Pandora FMS Agent Inventory Plugin for Microsoft Windows (All platfforms)..' (c) 2015 Borja Sanchez <fborja.sanchez@artica.es>..' This plugin extends agent inventory feature. Only enterprise version..' --------------------------------------------------------------------------..'WMI mobo info....strComputer = "."..Set objWMIService = GetObject("winmgmts:" & "{impersonationLevel=impersonate}!\\" & strComputer & "\root\cimv2")..'Set colMobos = objWMIService.ExecQuery("Select name,product,manufacturer from Win32_baseboard")..Set colMobos2 = objWMIService.ExecQuery("Select manufacturer,model,OEMStringArray from Win32_computersystem")....on error resume next..flag = colItems.Count..If (err.number <> 0) Then.. flag = true..Else.. flag = false..End If..on error goto 0 ....'Print only when there's results..If (NOT flag) Then...Wscript.StdOut.WriteLine "<inventory>"...Wscript.StdOut.WriteLine "<inventory_module>"...Wscript.StdOut.WriteLine "<name>Motherboard</name>"...Wscript.StdOut.WriteLin
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1348
                                                    Entropy (8bit):5.2402056112862185
                                                    Encrypted:false
                                                    SSDEEP:24:Wxv0Rk8Q8W2Uhz/ArUB2+gtqsLyDv9UKRUVxav03TTV1/3lV1utTX:WFOk1DZwq+tqsWDvaYcDQ1
                                                    MD5:2F50C78B60B3167EF34B6DCDDB758101
                                                    SHA1:2BB9F115E22BA4E39FE1A977985909736150EE20
                                                    SHA-256:0660172F85545EBF41DFFBEAD210401074208CA0939B1B40982212F8F7120EC2
                                                    SHA-512:4374996065CDE6E54DCF84EE8846764DE0458411F070AF5E61FCEAE432BA959D012D09450B533380C7750E2090F029E5F76A5FCD764A5DED056F67E18BD24018
                                                    Malicious:false
                                                    Preview:' Pandora FMS Agent Inventory Plugin for Microsoft Windows (All platfforms)..' (c) 2015 Borja Sanchez <fborja.sanchez@artica.es>..' This plugin extends agent inventory feature. Only enterprise version..' --------------------------------------------------------------------------..'WMI monitorsinfo....strComputer = "."..Set objWMIService = GetObject("winmgmts:" & "{impersonationLevel=impersonate}!\\" & strComputer & "\root\cimv2")..Set colDisplays = objWMIService.ExecQuery("Select caption,pnpdeviceid from win32_desktopmonitor")....on error resume next..flag = colDisplays.Count..If (err.number <> 0) Then.. flag = true..Else.. flag = false..End If..on error goto 0 ....'Print only when there's results..If (NOT flag) Then...Wscript.StdOut.WriteLine "<inventory>"...Wscript.StdOut.WriteLine "<inventory_module>"...Wscript.StdOut.WriteLine "<name>Monitors</name>"...Wscript.StdOut.WriteLine "<type><![CDATA[generic_data_string </type>"...Wscript.StdOut.WriteLine "<datalist>".....For Each displ
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text
                                                    Category:dropped
                                                    Size (bytes):1103
                                                    Entropy (8bit):5.093197784678948
                                                    Encrypted:false
                                                    SSDEEP:24:2QmVuAx8SQz5LC+qAuDIYcc7BpLUfKY8M84:AoAxzQz5LC+q7cSDUfKNG
                                                    MD5:C68D28346571D388FD7DC1A1C8FB882E
                                                    SHA1:388E24191C799CF2630CE8FD6FB013E3EA264571
                                                    SHA-256:D935B74E8E1F3D44C7268916CD70866C46516129ED5B048CC49B8521DA431574
                                                    SHA-512:A82062C5DE34628C53D1D43E261BAE8D03EF7AD9DD0E12AFA6AC7D5DA470219FA7A2FC528CB96823A814BB9454390B308CF28CFA15857B12E75A1C936B460EF9
                                                    Malicious:false
                                                    Preview:' Agent Plugin to get detailed network information per network interface.' Execute as module_plugin cscript //B network.vbs..Option Explicit..Dim colAdapters, objAdapter, NicDescription, strFileName, objFS, objTS, colAdapters2, objAdapter2..Dim totalNetworkUsage..totalNetworkUsage=0..Set colAdapters2 = GetObject("winmgmts:{impersonationLevel=impersonate}").ExecQuery("SELECT * FROM Win32_PerfRawData_Tcpip_NetworkInterface WHERE Name != 'isatap.localdomain'").For Each objAdapter2 in colAdapters2 ..totalNetworkUsage = totalNetworkUsage + objAdapter2.BytesTotalPersec.Next . . Wscript.StdOut.WriteLine "<module>"..Wscript.StdOut.WriteLine " <name>Network_Usage_Bytes</name>"..Wscript.StdOut.WriteLine " <description>Total bytes/sec transfered in this system</description>"..Wscript.StdOut.WriteLine " <type>generic_data_inc</type>"..Wscript.StdOut.WriteLine " <data>" & totalNetworkUsage & "</data>"..Wscript.StdOut.WriteLine " <unit>bytes/sec</unit>"..Wscript.StdOut.Write
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):16557020
                                                    Entropy (8bit):7.5088332074370365
                                                    Encrypted:false
                                                    SSDEEP:196608:jFBTFFMYS7vuj70BSqRi8FfxCnlKk6fV1UY2Ox/ifaBlA89oIAI0fOITOv:vTFDS7mH09jJsl4Lx6farA8+W0fOn
                                                    MD5:891092A6F1C5FD063EF82A9FD33A3A38
                                                    SHA1:6BA3F4856D1688889316FB6E708A74DE9679CB28
                                                    SHA-256:AD4D006CF2662A57F2E062B5ADBFE8702D2147EC4C4D3DC9A1019938FE7D5B22
                                                    SHA-512:37D750C3F7D215C95781D4B0A5F7113BC6482BF77EE2A55975FEFF77C5677BD22F2B7E2069B794C916A89E4752EC931C04017CA39A5C0CE5E80F8C50D84A181F
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....xd........../.... .....VK...............@..............................PL......K....... ...............................................K...... L.h&...0K..............................................#K.(...................h.K..............................text..............................`.P`.data....`J......bJ.................@.`..rdata..P.... K.......K.............@.`@.pdata.......0K.......K.............@.0@.xdata.......@K.......K.............@.0@.bss.........PK.......................`..idata........K...... K.............@.0..CRT....h.....L.......K.............@.@..tls..........L......0K.............@.@..rsrc...h&... L..(...2K.............@.0.................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1207
                                                    Entropy (8bit):5.227567094091267
                                                    Encrypted:false
                                                    SSDEEP:24:Wxv0Rk8Q8CUhz/ArAFIfPDv9UKRUgxav0Y9CVJT2:WFOkwZwAWfPDvavcbVs
                                                    MD5:37D0905BF8B7250E92254BC5FF1A2461
                                                    SHA1:710D94B929C2E3994CBDBA914B33E4D33F4F8B02
                                                    SHA-256:D8371011F50EAF1FF0EF0D60E70B812971858E9FC7B64D6ACA8DAD073862309D
                                                    SHA-512:1C637B530C2A4BFA46AF2395FC4F9AE5CB73EBB4096A23EFA466F52420AC0303E7A51FAD7BD91E12AD54F02D4CE057F318AD79B349D46FF5DF65D61934634E46
                                                    Malicious:false
                                                    Preview:' Pandora FMS Agent Inventory Plugin for Microsoft Windows (All platfforms)..' (c) 2015 Borja Sanchez <fborja.sanchez@artica.es>..' This plugin extends agent inventory feature. Only enterprise version..' --------------------------------------------------------------------------..'WMI OS version....strComputer = "."..Set objWMIService = GetObject("winmgmts:" & "{impersonationLevel=impersonate}!\\" & strComputer & "\root\cimv2")..Set cols = objWMIService.ExecQuery("SELECT version from win32_operatingsystem")....on error resume next..flag = cols.Count..If (err.number <> 0) Then.. flag = true..Else.. flag = false..End If..on error goto 0 ....'Print only when there's results..If (NOT flag) Then...Wscript.StdOut.WriteLine "<inventory>"...Wscript.StdOut.WriteLine "<inventory_module>"...Wscript.StdOut.WriteLine "<name>OSVersion</name>"...Wscript.StdOut.WriteLine "<type><![CDATA[generic_data_string </type>"...Wscript.StdOut.WriteLine "<datalist>".....For Each data In cols... Wscript.StdOut
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):4780642
                                                    Entropy (8bit):7.9878095255475765
                                                    Encrypted:false
                                                    SSDEEP:98304:mY8BC/IgyJxB6IREAyhCTJdpHpceg2EQgY/iwYHFxBDTRdR7VJqcVk+Qw:XyCAgyc23p2lxdTYc
                                                    MD5:C586E2E13D4AB81AA11B9438E4E0012D
                                                    SHA1:BA0912109EB64821CBB73D0C128D75C80992BA21
                                                    SHA-256:B5C954A39865A1DF484C752AD0B050F3B160EC35CA39DB390F8D05E0645D8C80
                                                    SHA-512:4F873ECDC86393CAC796194A4FDA5598DFAE593588405523A49A9510F48AE483477C78A98D44FEF4614891BE83A0B1AECA26E0DB650825531AFB7BA45E0175AA
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 3%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.............T...T...T...U..T...U<..T...U..T}..T...T}..U..T}..U..T}..U..T...U...T...T...Ts..U..Ts..U...TRich...T................PE..L...{.cc.........."....!.N..........p........`....@..........................`......[KI...@.................................$1..<....`.......................@..p...p!............................... ..@............`...............................text....M.......N.................. ..`.rdata..l....`.......R..............@..@.data........@......................@....reloc..p....@.......:..............@..B.rsrc........`.......X..............@..@........................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):4859595
                                                    Entropy (8bit):7.987737028938873
                                                    Encrypted:false
                                                    SSDEEP:98304:FtXE8LqzT6/IgyJxB6IREAPpHpceg2EQgY/iwYHFxBDTRNVuqjtQ0pntcRCo:o+a+Agyc2Pp2lxd1TjVm
                                                    MD5:CF9BDCE023A2CAE6E819B3430E589F14
                                                    SHA1:8E8E542BC5D2482247BB5F17806B3AD9BAA1D174
                                                    SHA-256:520619D823DD5396CC90DE59E745D9AB3872D25D85358C9ABB4890987B5F5426
                                                    SHA-512:EF79067606BB928B9297CBC79732BA001B71A1E34A758A244D988BCF27CB4C7FCD59A73CD082D0F7662280DF91C2ACBB249708A5D4450A5CF3C4878A25D945B6
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 13%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........c...c...c......c.....Yc......c...._..c.......c.......c.......c......c...c..c......c......c..Rich.c..........PE..L...V~.e.........."....%.d........................@.................................O.J...@..................................P..P....................................A...............................@..@............................................text....c.......d.................. ..`.rdata...............h..............@..@.data...D(...`.......D..............@....reloc........... ...P..............@..B.rsrc................p..............@..@................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):4411482
                                                    Entropy (8bit):7.990943019976054
                                                    Encrypted:true
                                                    SSDEEP:98304:pjO8qNABexKwmeS2kjD0EwtxRzQU93GC6GdYmG73:k8qNABexKw+1hkzfGOYmo3
                                                    MD5:AFD42E3F57F210E0DF11CF42F21C9399
                                                    SHA1:156C75B179814FB66A0EC6B05574BB7D287DC0C9
                                                    SHA-256:1C26EEF4BE3D59C81EE6A89D3E4A44BC665610AD1ADD34A203BC29DA8D653E69
                                                    SHA-512:30ECB3EE49642BDC32C93878FFD5B02AF95279052EEED9F42990B64D0DF6BFB7ADE1CA02DF8B942F763BE90B443857F04A815B5CC6634F7E2F9FE30052F989B1
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......d.5. .[. .[. .[.U.$.[.O.Q.+.[.O._.".[. .Z.N.[.B.H.&.[.[.W.,.[. .[.$.[.&.Q./.[..].!.[.Rich .[.........PE..L....,YL......................B.....J.............@..........................PC......qC.........................................x.......@IB..........................................................................................................text...P........................... ..`.rdata..X........ ..................@..@.data............ ..................@....rsrc...@IB......PB.................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:Unicode text, UTF-8 text
                                                    Category:dropped
                                                    Size (bytes):266
                                                    Entropy (8bit):4.397153248281428
                                                    Encrypted:false
                                                    SSDEEP:6:ppFdklQ+SpFdszMpDpFszKm4HpSpFsz5pFFMG4SpFF605:p1klQ+S1szMZypipSy5dMG4Sd3
                                                    MD5:6439F7133C16D39683E7FF7B8B62A05B
                                                    SHA1:0350EB60B58BB4FF0E0027FBA77CCD089DE7C556
                                                    SHA-256:F298F6C812CEE5203B34D3E39066C41DDF6B59C0B034890DFDA33AF373942392
                                                    SHA-512:F7CB1107E009E52D570414FCE9FB69C329EB51FD600CDFD389763E16E9DC1BB6BD003756B0256A15E9E44F56C28787C9837D858F9D91EFBC9748AB93CB6748FE
                                                    Malicious:false
                                                    Preview:auditpol_logon_category = Logon.#auditpol_logon_category = Inicio de sesi.n..auditpol_logon_success_conf = Success and Failure.#auditpol_logon_success_conf = Aciertos y errores..auditpol_logon_noaudit_conf = No Auditing.#auditpol_logon_noaudit_conf = Sin auditor.a
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):7735667
                                                    Entropy (8bit):7.993362041248269
                                                    Encrypted:true
                                                    SSDEEP:196608:TR+sbcUdUnYc0o5Gd7+Tza+Agyc2sp2vfxdSeTxo7G:5bPmYRQK7+Tza+As2Y+ZNxo
                                                    MD5:0CDB81A93D8ACC37CAC5AB989B167A0D
                                                    SHA1:1E700C9CE281F1550B1DFB42E1256D678FEC53A4
                                                    SHA-256:293DC77D39C303793A73BF83A2698C5886331F24B8ABED4A40566474A64E3F60
                                                    SHA-512:26571EAF281051123A983571BD6B77F22F493A659E1440BFC5681001CA738BFB5B35BEF0F44AA780AC1AE80E60B1BE7B128482CC26C380E8A1CEC993157441EF
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 11%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........dAL../.../.../..},.../..}*.../..}+.../......./...*.../...+.../...,.../..}..../......./..+.../..-.../.Rich../.........PE..L....3.f.........."....&.f.......................@.................................8.v...@..................................P..P....................................A...............................@..@............................................text....e.......f.................. ..`.rdata...............j..............@..@.data....(...`.......F..............@....reloc........... ...R..............@..B.rsrc................r..............@..@................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1290330
                                                    Entropy (8bit):7.968447648495047
                                                    Encrypted:false
                                                    SSDEEP:24576:pzFCWDxWMLhBG29DBrHVS2bySXrxwLCa0QIprtlkBbRAgUHLhNwUUycr:pzBlWMWgDB7VTmdLCvXRMRAzhGpJr
                                                    MD5:054DE53F006DF040515328FDC3F201A7
                                                    SHA1:FAC30CB84C35EAADA82E73D191EE6E1F65EE6C2F
                                                    SHA-256:815117B7FA89060961E5132BD73CF94AEF47D1F704AEF7A8E6E9DDFBCB193A5D
                                                    SHA-512:354C8395A8828742F93F778AEED384AE5A0C554258D5E0B8BE1DF58CDB35FE679F352B1283C677B8E98AC6900F63EEA7D19D9CF99685E3D55F04EB9D21F6845E
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......d.5. .[. .[. .[.U.$.[.O.Q.+.[.O._.".[. .Z.N.[.B.H.&.[.[.W.,.[. .[.$.[.&.Q./.[..].!.[.Rich .[.........PE..L....,YL............................J.............@.................................wE..........................................x....................................................................................................................text...P........................... ..`.rdata..X........ ..................@..@.data............ ..................@....rsrc...............................@..@........................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2390
                                                    Entropy (8bit):5.234251766006443
                                                    Encrypted:false
                                                    SSDEEP:48:WFOkIpI5cI0f9w7DvaScraLB92AYfjGho7acOuyxAp81:Wsk/cjODCvSBcAjhaU
                                                    MD5:5C5CDEA9EC4B247B200E81DFC6880AEB
                                                    SHA1:FF22F48C0B5F9CB043F8746C99DFA96A8B01A6ED
                                                    SHA-256:505273AE2F86FB7664D0A9049480FAB6038CDBF6E1D09991A10B2C9B9C77AF21
                                                    SHA-512:4C73714BE7C6B1CC7534E7BCC26A68621E4FA3889AB4FCED8FD9741715A675D89F04BB53AE034554B9FE230BC03D1AAB2AB46D031B6CDA4A9B08BEA4CB59694F
                                                    Malicious:false
                                                    Preview:' Pandora FMS Agent Inventory Plugin for Microsoft Windows (All platfforms)..' (c) 2015 Borja Sanchez <fborja.sanchez@artica.es>..' This plugin extends agent inventory feature. Only enterprise version..' --------------------------------------------------------------------------..'WMI printers attached....function validPort(port)...if strComp(port,"SHRFAX:") = 0 then....validPort = false...elseif strComp(port,"nul:") = 0 then....validPort = false...elseif strComp(port,"PORTPROMPT:") = 0 then....validPort = false...elseif strComp(port,"XPSPort:") = 0 then....validPort = false...elseif strComp(port,"PDF:") = 0 then....validPort = false...else....validPort = true...end if..end function....Set oWMI = GetObject("winmgmts:\\" & "." & "\root\cimv2")..Set colPrinters = oWMI.ExecQuery("Select * from Win32_Printer",,48)....on error resume next..flag = colPrinters.Count..If (err.number <> 0) Then.. flag = true..Else.. flag = false..End If..on error goto 0 ....'Print only when there's results..If
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1042
                                                    Entropy (8bit):5.191966966078285
                                                    Encrypted:false
                                                    SSDEEP:24:Tc7xv0hQV4KAEVnFKCNhM4rpuzayka+Lk4:47FP1VsCNhM4rpu+yka+Lk4
                                                    MD5:EE8E29D3C6B6F277700456C5F4100642
                                                    SHA1:0225D4D2F6DF3DD45610FD0642D73E5A7FACE08B
                                                    SHA-256:48A41B238A5BA8C6362C7654827F002661259BF59072530100DB504FE89988FF
                                                    SHA-512:57D0CB7D86F0F477DDCF66311032934155DF9185136B5CA23499954B87154A3EC4CB5BDEC61C7684349D00A90AF6584E1E13ABA487E8639703B07EA0DD6BF73D
                                                    Malicious:false
                                                    Preview:' windows_product_key.vbs..' Pandora FMS Agent Inventory Plugin for Microsoft Windows (All platfforms)..' (c) 2021 Sancho Lerena <slerena@artica.es>..' This plugin extends agent inventory feature. Only enterprise version..' ----------------------------------------------------------------....Set oShell = WScript.CreateObject ("WScript.Shell")..Set objExec = oShell.Exec("cmd.exe /C wmic os get ""SerialNumber"" | find /v ""SerialNumber"" ")....Do.. line = objExec.StdOut.ReadLine().. s = s & line ..Loop While Not objExec.Stdout.atEndOfStream....Wscript.StdOut.WriteLine "<inventory>"..Wscript.StdOut.WriteLine "<inventory_module>"..Wscript.StdOut.WriteLine "<name>product_ID</name>"..Wscript.StdOut.WriteLine "<type><![CDATA[generic_data_string </type>"..Wscript.StdOut.WriteLine "<datalist>"..Wscript.StdOut.WriteLine "<data><![CDATA[" & Replace(Replace(s, chr(013), ""), chr(010), "") & " </data>"..Wscript.StdOut.WriteLine "</datalist>"..Wscript.StdOut.WriteLine "</inventory_module>".
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1263
                                                    Entropy (8bit):5.231367723688468
                                                    Encrypted:false
                                                    SSDEEP:24:Tc7xv0hQKUhz/ArYjd0OuTDv9UKRUTfxav0dYe0KS0ST2:47FZZwYjdFuTDvatEcKeEw
                                                    MD5:B352E6BA27360CF6D009F359EB285C70
                                                    SHA1:44119310DEC61ED0BA61985A076E1908F755D8E9
                                                    SHA-256:A2854D50425B8DBBA4E52CB4CA5BED9A00B2B1D375CF576FF1E80944FDFE9202
                                                    SHA-512:B17DDFE688D23328E4F9DB4A1132F22D0BA60BBA5CD3DAED37CD5242CC21E47A0E57C08F90658844D6A9B115036E1FA5728AA98515F76AF8D33586CFEF643CC3
                                                    Malicious:false
                                                    Preview:' windows_product_key.vbs..' Pandora FMS Agent Inventory Plugin for Microsoft Windows (All platfforms)..' (c) 2021 Sancho Lerena <slerena@artica.es>..' This plugin extends agent inventory feature. Only enterprise version..' ----------------------------------------------------------------....strComputer = "."..Set objWMIService = GetObject("winmgmts:" & "{impersonationLevel=impersonate}!\\" & strComputer & "\root\cimv2")..Set colProducts = objWMIService.ExecQuery("Select OA3xOriginalProductKey from SoftwareLicensingService")....on error resume next..flag = colProducts.Count..If (err.number <> 0) Then.. flag = true..Else.. flag = false..End If..on error goto 0 ....'Print only when there's results..If (NOT flag) Then...Wscript.StdOut.WriteLine "<inventory>"...Wscript.StdOut.WriteLine "<inventory_module>"...Wscript.StdOut.WriteLine "<name>product_key</name>"...Wscript.StdOut.WriteLine "<type><![CDATA[generic_data_string </type>"...Wscript.StdOut.WriteLine "<datalist>".....For Each prod
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF, LF line terminators
                                                    Category:dropped
                                                    Size (bytes):1166
                                                    Entropy (8bit):5.276416252329456
                                                    Encrypted:false
                                                    SSDEEP:12:eA33HUWdtFKc0ZVwci3vAqThYPK/yEaHMMAtpEeRTtPvn1n5P2FOw7gQRPWgXQum:eIHV+U/AwAVHnAXdnncFOw9vYqYoryn
                                                    MD5:8F7FDD867C6A1931489974DCB976E9F7
                                                    SHA1:3B8B46F3D90C3B6C454110909D091BAF1CFD075D
                                                    SHA-256:741084C53D981710EECFC53328652EA8F8FC3F77C5F1D06A520271206746A7B3
                                                    SHA-512:15C5E15015D4684D231DEDBDEECB8DA85CD6EDA8563E504C098FA150415CD0299807A8B82182B1A1F6940F3184F4E34F3601E8270083B7526969B0EA756AEC66
                                                    Malicious:false
                                                    Preview:' ps.vbs..' Returns the status of the given processes...' -----------------------------------------....Option Explicit..'On Error Resume Next....' Variables..Dim objWMIService, objItem, colItems, argc, ps, i....' Get and hash process information..Set objWMIService = GetObject ("winmgmts:\\.\root\cimv2")..Set colItems = objWMIService.ExecQuery ("Select * from Win32_Process")..Set ps = CreateObject("Scripting.Dictionary")..For Each objItem in colItems...if Not ps.Exists(objItem.Name) Then....ps.Add objItem.Name, 1...End If..Next....' Parse command line parameters and check each process..argc = Wscript.Arguments.Count..For i = 0 To argc - 1...Wscript.StdOut.WriteLine "<module>"...Wscript.StdOut.WriteLine " <name><![CDATA[" & Wscript.Arguments(i) & " </name>"...Wscript.StdOut.WriteLine " <description><![CDATA[Process " & Wscript.Arguments(i) & " status </description>"...If argc = 0 Or ps.Exists(Wscript.Arguments(i)) Then....Wscript.StdOut.WriteLine " <data><![CDATA[" & 1 & "]]
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):159744
                                                    Entropy (8bit):6.76762688202511
                                                    Encrypted:false
                                                    SSDEEP:3072:2l+SFAAVcwlzl2p/WM3TXNspgwd++XsoXWQe:2kSiYvNWTXNsphEQ
                                                    MD5:76E59B0D2321C46056D49BF7DD97F701
                                                    SHA1:0BAF1A8642930475986DD758F37FC39FE5F162CC
                                                    SHA-256:20EFF99E60F94644BFBC6AA2DD4E1B76B1B3B70442FF0BEC442C4D7FB2D697FF
                                                    SHA-512:C381DEB2539BE3F811243983F004AEFB08FB102F7B86E28C5931B8C318D3D77DEC15E779E80998CD666871B81841D2ABDE15D461E3137AC8C047FFCE918240D7
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......2.b.v...v...v.......w.......c...v...p...v..........}......w...........Richv...........PE..L......A.............................Q............@.......................................................................... ..x....p...............................................................................................................text............................... ..`.rdata...y..........................@..@.data....:...0... ...0..............@....rsrc........p... ...P..............@..@........................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1332
                                                    Entropy (8bit):5.3338476948030165
                                                    Encrypted:false
                                                    SSDEEP:24:Wxv0Rk8Q8wUhz/ArpNrcXDv9UKRUGxav0416MD1bQvdTX:WFOkYZwpNQXDvaZc4vD1bQ
                                                    MD5:D5AB421119A9A389CCB4D691B7B04EF4
                                                    SHA1:4B2BB2E4F0BF4FFB03120D85AC473156F5C4724C
                                                    SHA-256:E8D557349D3129FF16D932AB8F6D1B21832C42760859520EF81AA9393CDD65F7
                                                    SHA-512:4C2F917ECB202FF90D47DC45E681057CF9875788D22ABBD0E1BE686CF48237A9639120DAF7E0806438D337BFEDB44E2E5D364732DA135AFF8EDA6ADA218658FA
                                                    Malicious:false
                                                    Preview:' Pandora FMS Agent Inventory Plugin for Microsoft Windows (All platfforms)..' (c) 2015 Borja Sanchez <fborja.sanchez@artica.es>..' This plugin extends agent inventory feature. Only enterprise version..' --------------------------------------------------------------------------..'WMI raminfo....strComputer = "."..Set objWMIService = GetObject("winmgmts:" & "{impersonationLevel=impersonate}!\\" & strComputer & "\root\cimv2")..Set colRAMs = objWMIService.ExecQuery("Select deviceLocator,capacity,speed from Win32_PhysicalMemory")....on error resume next..flag = colRAMs.Count..If (err.number <> 0) Then.. flag = true..Else.. flag = false..End If..on error goto 0 ....'Print only when there's results..If (NOT flag) Then...Wscript.StdOut.WriteLine "<inventory>"...Wscript.StdOut.WriteLine "<inventory_module>"...Wscript.StdOut.WriteLine "<name>RAM</name>"...Wscript.StdOut.WriteLine "<type><![CDATA[generic_data_string </type>"...Wscript.StdOut.WriteLine "<datalist>".....For Each ram In colRAMs
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):1146368
                                                    Entropy (8bit):7.974799729683869
                                                    Encrypted:false
                                                    SSDEEP:24576:LRitTKejoJXD2ywPsVcKmrqoBqzkXfEpB5SCpfix0Gqohl/PP63dA:dATxoJXD2yesVkrqoBqzkvW5/fyi+JXz
                                                    MD5:36C8D65325EA3282F2860FF2B24E6469
                                                    SHA1:5EA92004B2816FC9DD9212DF995AD4089FB05A0D
                                                    SHA-256:13AF3EE5D0C31D794F82D8AD53B29A8239F157C4F60F5C278B5CA977C81B0314
                                                    SHA-512:A798F883D9C71D5CF3F0E426B570B74448EAF30CB98F447DBE321042253570E4519249E66D71BDE56701F9AC9FFF043F27CF169E9A6DC0F2153BAF56229E69F9
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....V.....................z............... ....@..................................p...............................................................................................................................................................text...............................`.P`.data........ ......................@.`..rdata...?...0...@..................@.`@.bss.........p........................`..idata...............P..............@.0..CRT....4............^..............@.0..tls.... ............`..............@.0..rsrc................b..............@.0.................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):278528
                                                    Entropy (8bit):6.390054344636633
                                                    Encrypted:false
                                                    SSDEEP:6144:gPusxLJf2sSzOAltOKE8LrNV21Qg3YqmYqbJlnqqaPWdvHwJnx85t1ugLJ9sQRMK:gPusxLJf2sSzOAltOKE8LrNV21Qg3Yqk
                                                    MD5:46808595676EA16489DC759B9682AC07
                                                    SHA1:5822D3220E636073525D844B73C31CF2676019E3
                                                    SHA-256:3278EA0EA4CFA74732073A83D0BF87328F23F0267DB2627307B5235C77157ED1
                                                    SHA-512:13CD7F7E6A5D3062A4B16BB4AFEC73E17D6D4D9E50BC6139ECEF06B6009DC7E48A984FD86A98DB3B92BF963FF1EE122C23705C5DB3B60370162D0F74122D6B2B
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 4%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........ql@....................2.......Y.......................Y.......Rich....................PE..L....E.................p...........y............@.......................... ..................................................d....................................................................................................................text...0k.......p.................. ..`.rdata..............................@..@.data...............................@...................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:Ruby script, ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):4504
                                                    Entropy (8bit):5.1160166548672725
                                                    Encrypted:false
                                                    SSDEEP:96:WskJwtO1DXu08FDd76D4J5qVwZRIq7vXp+HvgmobGvRgVvlRUTqaL9jrUrr:mUID+3RdQOgVwocvZofL5wzUuz
                                                    MD5:4EB48C8F77A2A0A6B4EB76C323B652B1
                                                    SHA1:71CD568E7B0CAC09E2C75089F18214524A0FA506
                                                    SHA-256:80AE8C679ABFEF3AF24ADE0DAB86FFCA0D6450042A5E6E651AE6CFF74F36A828
                                                    SHA-512:EC7B3162B37A1D8712E07A859866F66048319EBE3F60C1C7D14941856784C4375E64196596A750473BA2B554E4A3E087B9671C7453EBE6A201D893344C45CF2F
                                                    Malicious:false
                                                    Preview:' Pandora FMS Agent Inventory Plugin for Microsoft Windows (All platfforms)..' (c) 2021 Sancho Lerena <slerena@artica.es>..' (c) 2015 Borja Sanchez <fborja.sanchez@artica.es>..' This plugin extends agent inventory feature. Only enterprise version..' --------------------------------------------------------------------------..'on error resume next....Class ObjectList.. Public List.... Sub Class_Initialize().. Set List = CreateObject("Scripting.Dictionary").. End Sub.... Sub Class_Terminate().. Set List = Nothing.. End Sub.... Function Append(Anything) .. List.Add CStr(List.Count + 1), Anything .. Set Append = Anything.. End Function.... Function Item(id) .. If List.Exists(CStr(id)) Then.. Set Item = List(CStr(id)).. Else.. Set Item = Nothing.. End If.. End Function..End Class....class AppClass .. dim InstallDate,Caption,Version,Vendor..end class....'------ Checks if an item exists on the main collection..function isItemInArray(objeto,coleccion)..
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):38400
                                                    Entropy (8bit):6.367635381582048
                                                    Encrypted:false
                                                    SSDEEP:384:TE71g/Wv+JU84V1zZ4Oj3UKI18nRD9u1H7bgL3R36ruiVszeEBeU4MTy6KrXlVGD:k8WGm423q8WHfgNCuiOzeYeZu03GKKy
                                                    MD5:81E47BCA760F328966888D6A600CC557
                                                    SHA1:0BE37750001A4C608C90E19BFA5383CB7DA11DD6
                                                    SHA-256:F821393D4226EFFA4ED508E9D0B5C9C3D601F493817B8BBA3871E2EA5D18D0E6
                                                    SHA-512:D33A5619BA1A56D44F8A3190AB01C3A4C95D3F14396F610AE9D0CF2BFFFB15CA128D9F5B4B60011226BF3E93AB732DC6225E50E5CFDE0DAC2D1A00130DA22E1E
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 3%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......7...............7..........................@.............................................................................p....................................................................................................................text............................... ..`.data...t...........................@....bss.....................................idata..p...........................@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):35328
                                                    Entropy (8bit):6.144881856058755
                                                    Encrypted:false
                                                    SSDEEP:384:hOBY/wIFBiVpb0EGLiS7tkuiXkECIG9E1t/+/DkGjMfHLMs39u/3XxprRzskcB/:JnBiz0EGFkn0ECL9Et/8YGjMfrY/TS
                                                    MD5:7460B4BAB940E2234A3A278BB0D8435B
                                                    SHA1:41FBCF756522E86941E34D6E819502CE727EBDEE
                                                    SHA-256:CA301CDE5B700EF7160CDF1F3ACC6710DA59958B8613DBE0ABD2FD8120DFC0ED
                                                    SHA-512:B4BA514E5862C57B59ED6305F5FF5318E344F2155BE5A6D74553A44DC6C022EC7BBBCF1204BB1B5D9E75911CEEEC97F6F0510482F8DF421424330D9ECF8A0E27
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 3%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......7...............7.|........................@..................................................................................................................................................................................................text...4z.......|.................. ..`.data...............................@....bss.....................................idata..............................@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):6848000
                                                    Entropy (8bit):7.997064561861586
                                                    Encrypted:true
                                                    SSDEEP:196608:qYyE7Pebw05fRVoSXerD6AKFi+TgCIXmp0Bd4yrRziXgX7vy:q1M43oSurD69Fi+TNIS0cc7
                                                    MD5:C48D41A6BF6A9131AE71CE8EFB2E38D4
                                                    SHA1:31C3F2BA100A15A35E9518767A99A8327D5A9BD3
                                                    SHA-256:384EEF00B549C8900E5597832E378167C8E04683E7D6B47B6081CAFB8B3B0F9E
                                                    SHA-512:9D7892ABE94460EFDC307C72F5C0B3C02DF2A5F663A8B5847297E61E3476F7BD44FF6ADB25AC27D1135EECC3F7E39123717D80D33AD1688EF93D838A75DBEC58
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....V.....................zh.............. ....@...........................h.......h...................................................g..........................................................................................................text...............................`.P`.data........ ......................@.`..rdata...?...0...@..................@.`@.bss.........p........................`..idata...............P..............@.0..CRT....4............^..............@.0..tls.... ............`..............@.0..rsrc.....g.......g..b..............@.0.................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):6980608
                                                    Entropy (8bit):7.995793313575621
                                                    Encrypted:true
                                                    SSDEEP:196608:UXZRG6hlR9bK4Ph2/1ZOMK3i06j7zUaSNaQAGVFKQ:UJPbR2aMKgDGzAK
                                                    MD5:FF5A98ABCB286C73CAA6C7F16511CF85
                                                    SHA1:42FF6A0B43B67CE3809BD584F7F381AA377F07C6
                                                    SHA-256:654DA30AE33580EAEA8F0E6A254C6D88D027E59C5DD4A077DD2E85FC0B6DABAD
                                                    SHA-512:2483A45F5117F76A80E45C97813316333ADEA8E0F2AF02F93B83431F92EAC21AB366432901D58037532CBB90C4BE3C6AE1C10969A2DF77850ED0F4EB8D2E21B0
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 4%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....V......................j.............. ....@...........................j.......j.................................................P i..........................................................................................................text...............................`.P`.data........ ......................@.`..rdata...?...0...@..................@.`@.bss.........p........................`..idata...............P..............@.0..CRT....4............^..............@.0..tls.... ............`..............@.0..rsrc...P i......"i..b..............@.0.................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):33280
                                                    Entropy (8bit):6.206169693523498
                                                    Encrypted:false
                                                    SSDEEP:384:KzQdbEUFfs5x+i6Toba/BmLyhLdlaOlUbEVDQdyBZFtGiUZ6fBJit4j0faNY8sPz:doUFfsL2To2phLdYAWEDQIvDGiUZYX
                                                    MD5:4D3417B47936BBDD31D7278B7397778F
                                                    SHA1:CBAB359993C37D9F02CD444BF4F072DD574F186A
                                                    SHA-256:6CE74B29611094549D0B939A728062F2252BAC1286BE742494492E4FFF8F0A9B
                                                    SHA-512:2094D95A6000654CFBC0979219945F8B8D921E98D48B40577A56470D1BD1B78ABF85E7FE20E9D0DEAA500DD26A0041FDA812E08DC4E7D3643AB5514812170C1F
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 4%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......7...............7.t........................@..................................................................................................................................................................................................text....r.......t.................. ..`.data...|............x..............@....bss.....................................idata...............z..............@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):164864
                                                    Entropy (8bit):6.360014758507702
                                                    Encrypted:false
                                                    SSDEEP:3072:lzJ+lM+sEvWfROJLhfJpreQ00ws/R3b/rz3qh:CWROJNhpeBUDnq
                                                    MD5:FECF803F7D84D4CFA81277298574D6E6
                                                    SHA1:0FD9A61BF9A361F87661DE295E70A9C6795FE6A1
                                                    SHA-256:81046F943D26501561612A629D8BE95AF254BC161011BA8A62D25C34C16D6D2A
                                                    SHA-512:A4E2E2DFC98A874F7EC8318C40500B0E481FA4476D75D559F2895CE29FBE793A889FB2390220A25AB919DEAC477ADA0C904B30F002324529285BDA94292B48A4
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......B...............8.Z...................p....@...............3........................... ......................................................................................................................................................text...$X.......Z..................`..`.data........p.......^..............@....bss.....................................idata...............`..............@....rsrc................t..............@...........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):2208
                                                    Entropy (8bit):5.326834447991209
                                                    Encrypted:false
                                                    SSDEEP:48:WFOkTkHYkxyW90lEu7b0Z+5HzMhdnR4rp+y4xULkM:Wsk4JvO1k+Zo1U1
                                                    MD5:4ABDE505716333DE1F5A041ACCAEA239
                                                    SHA1:AD5B8D09704E5236301A59F7A5951A8D86B14DC0
                                                    SHA-256:2E5712DFB212392C3C3C5D36EF04180B24D3E8674A0974F7ABA55DA410E4E9E0
                                                    SHA-512:E6383FCA71404CFE26F2118493A661EB2066653A416DD5B336730F2E4C3C8FEADDD64276AF97644184A4D2B19C43366A5857EF322ED79E3758FA8531B358D4BC
                                                    Malicious:false
                                                    Preview:' Pandora FMS Agent Inventory Plugin for Microsoft Windows (All platfforms)..' (c) 2015 Borja Sanchez <fborja.sanchez@artica.es>..' This plugin extends agent inventory feature. Only enterprise version..' --------------------------------------------------------------------------..on error resume next..' Lista todos los usuarios del equipo que han iniciado procesos....dim loggedUsers(),i..i=0..Sub insertIfNotExists(sDomain,sUser)...For Each lUser in loggedUsers....If StrComp(sDomain & "\" & sUser, lUser) = 0 Then.....Exit Sub....End If...Next...redim preserve loggedUsers(i)...i=i+1...loggedUsers (i-1)=sDomain & "\" & sUser..End Sub....Function CheckRealUser(sHost, sUser, sDomain)...Dim oWMI,realUsers...Set oWmi = GetObject("winmgmts:{impersonationLevel=impersonate,(debug)}!\\" _....& sHost & "\root\cimv2")...Set realUsers = oWmi.ExecQuery("SELECT * FROM Win32_UserAccount WHERE Domain='" & sDomain & "' OR Name='" & sUser & "'")...If (realUsers.count=0) Then....CheckRealUser = False...Else
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):1462
                                                    Entropy (8bit):5.289716391143609
                                                    Encrypted:false
                                                    SSDEEP:24:Wxv0Rk8Q8BUhz/ArTQDv9UKRU/xav0iUxGF+bDQnTX:WFOk7ZwTQDva2cS+bW
                                                    MD5:AF7DDEA4DA813ACD636BD673742A1326
                                                    SHA1:95EB5524FDBC8F16A62519B81F1370C7A006E271
                                                    SHA-256:395865447A4A31CCDF7E9FD8889B795C22C081481BF9C3D68507CFD6CC5DF3A4
                                                    SHA-512:ABFCE55A74E3FCC4EBCC31217548BD251BA229AE24EEE298BD02C00C097B64ABED74B13F8BBDE761D7D3460A7D748CDC63D18F36E55A2233EA055EE376ECA23A
                                                    Malicious:false
                                                    Preview:' Pandora FMS Agent Inventory Plugin for Microsoft Windows (All platfforms)..' (c) 2015 Borja Sanchez <fborja.sanchez@artica.es>..' This plugin extends agent inventory feature. Only enterprise version..' --------------------------------------------------------------------------..'WMI video_card_info....strComputer = "."..Set objWMIService = GetObject("winmgmts:" & "{impersonationLevel=impersonate}!\\" & strComputer & "\root\cimv2")..Set colVideoCards = objWMIService.ExecQuery("Select caption,AdapterRAM,PNPDeviceID from win32_videocontroller")....on error resume next..flag = colVideoCards.Count..If (err.number <> 0) Then.. flag = true..Else.. flag = false..End If..on error goto 0 ....'Print only when there's results..If (NOT flag) Then...Wscript.StdOut.WriteLine "<inventory>"...Wscript.StdOut.WriteLine "<inventory_module>"...Wscript.StdOut.WriteLine "<name>Video</name>"...Wscript.StdOut.WriteLine "<type><![CDATA[generic_data_string </type>"...Wscript.StdOut.WriteLine "<datalist>"...
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:PE32 executable (console) Intel 80386, for MS Windows
                                                    Category:dropped
                                                    Size (bytes):29696
                                                    Entropy (8bit):6.118305105783509
                                                    Encrypted:false
                                                    SSDEEP:384:2Dvd48l1bkedqMn3HDXTnj30ZsE4g+D/ic3a7tmGr1TgleyQsIDzcABItJu/I3cV:gt/AspFD/ilkGr10yt/I+QfDC
                                                    MD5:D4F05A27C3C2BFC97792B47158097ADD
                                                    SHA1:016D8B597B72CB5146775B99690CC7E32552BE4B
                                                    SHA-256:9822EF1FF90DE685FC78D0061B27F9F15676BCAB9D6C21383DC027FA5066FD8B
                                                    SHA-512:1ED0E3D9047CA77AAA87EF76F3B7CA43E4B976E4CD1F86AA7F4B50359E893FAC6DC14C6FD048E896F964B3081AB29DD92C5442AE2B72C13571882E9BA1E8D82A
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 4%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......7...............7.f........................@..................................................................................................................................................................................................text....d.......f.................. ..`.data...h............j..............@....bss.....................................idata...............l..............@...................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Mon Oct 28 09:39:08 2024, mtime=Mon Oct 28 09:39:08 2024, atime=Mon Oct 28 09:39:08 2024, length=63, window=hide
                                                    Category:modified
                                                    Size (bytes):1932
                                                    Entropy (8bit):3.3371166371266523
                                                    Encrypted:false
                                                    SSDEEP:24:8P4cudttviVFi7u+Av9jd3XsZund3/d3cAJrntpfd3c6pIIBm:8gVdqe7AFjdHsZwdvdJJfdbIa
                                                    MD5:F5CAC22BDF1419F1A502C8EA38B4E478
                                                    SHA1:0B4F177CCA4B6B3ACDC5603A66BCE9258502710A
                                                    SHA-256:BB4EAE5E280AA661164FFBD4DC6C4ADFDA950845E3A641212CB4D68130810AE3
                                                    SHA-512:E3ED2EAB4C5838F2CCC8B28836244AD24249EDE6D50EE7D8E47BED37C554124C45DD44EA496367E2E7D3F12C9F02A12E9D886F4B6EA6AC9A123C9D423BE2990F
                                                    Malicious:false
                                                    Preview:L..................F.".. .....h.%)....h.%)....h.%)..?............................P.O. .:i.....+00.../C:\.....................1.....\Y.T..PROGRA~1..t......O.I\Y.T....B...............J.....#...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....d.1.....\Y.T..PANDOR~1..L......\Y.T\Y.T....d+......................;.p.a.n.d.o.r.a._.a.g.e.n.t.....V.1.....\Y.T..scripts.@......\Y.T\Y.T....~:........................s.c.r.i.p.t.s.....v.2.?...\Y.T .EDIT_C~1.BAT..Z......\Y.T\Y.T.....:.....................J..e.d.i.t._.c.o.n.f.i.g._.f.i.l.e...b.a.t.......j...............-.......i............m^......C:\Program Files\pandora_agent\scripts\edit_config_file.bat..J.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.p.a.n.d.o.r.a._.a.g.e.n.t.\.s.c.r.i.p.t.s.\.e.d.i.t._.c.o.n.f.i.g._.f.i.l.e...b.a.t...C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.p.a.n.d.o.r.a._.a.g.e.n.t.+.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.p.a.n.d.o.r.a._.a.g.e.n.t.\.\.p.a.n.d.o.r.a...i.c.o.........%SystemDrive%\Pro
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Wed Aug 14 08:14:00 2024, mtime=Mon Oct 28 09:39:08 2024, atime=Wed Aug 14 08:14:00 2024, length=26, window=hide
                                                    Category:modified
                                                    Size (bytes):1947
                                                    Entropy (8bit):3.3159804916554205
                                                    Encrypted:false
                                                    SSDEEP:24:8GLWcudttvifPs658uLEUA29RMd3XsWRiuLnd3/d3cAJrntpfd3c6ut9tIBm:8GiVdqfU6etjCRMdHs2ikdvdJJfdgLa
                                                    MD5:B3ECE252D7C10448E1DA4F47549D00E4
                                                    SHA1:086D82B29EF36BA1BDE60C0AD5348A7FD9B41A8F
                                                    SHA-256:42D98E498B68DF48C1B2FCD3ED3D3671B1905620E5237AA11B8242667F672401
                                                    SHA-512:CC193E1D30B1E9DA00259B0FA076FB6F8C2002CE2AA7A47BE90128354F83D01479577D5C41E0229AE6C6EE16CA98F1FA4780C71B9EFA2EE9E75EE7434ED98B26
                                                    Malicious:false
                                                    Preview:L..................F.".. .....zL*.....h.%)....zL*................................P.O. .:i.....+00.../C:\.....................1.....\Y.T..PROGRA~1..t......O.I\Y.T....B...............J.....#...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....d.1.....\Y.T..PANDOR~1..L......\Y.T\Y.T....d+......................;.p.a.n.d.o.r.a._.a.g.e.n.t.....V.1.....\Y.T..scripts.@......\Y.T\Y.T....~:........................s.c.r.i.p.t.s.....|.2......Y.I .START_~1.BAT..`.......Y.I\Y.T.....:........................s.t.a.r.t._.p.a.n.d.o.r.a._.a.g.e.n.t...b.a.t.......m...............-.......l............m^......C:\Program Files\pandora_agent\scripts\start_pandora_agent.bat..M.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.p.a.n.d.o.r.a._.a.g.e.n.t.\.s.c.r.i.p.t.s.\.s.t.a.r.t._.p.a.n.d.o.r.a._.a.g.e.n.t...b.a.t...C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.p.a.n.d.o.r.a._.a.g.e.n.t.+.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.p.a.n.d.o.r.a._.a.g.e.n.t.\.\.p.a.n.d.o.r.a...i.c.o.........%S
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0, Archive, ctime=Wed Aug 14 08:14:00 2024, mtime=Mon Oct 28 09:39:08 2024, atime=Wed Aug 14 08:14:00 2024, length=25, window=hide
                                                    Category:modified
                                                    Size (bytes):1942
                                                    Entropy (8bit):3.317413222899848
                                                    Encrypted:false
                                                    SSDEEP:24:8W3cudttviCDT5HLEAyy9Zd3XsWRTLnd3/d3cAJrntpfd3c6PBm:8W3VdqCDTB3ZdHs2PdvdJJfdH
                                                    MD5:2067AFAB54B4003110F56FC78DEADA11
                                                    SHA1:7F9DE5EC9283C312E23C4A87F92215851367845F
                                                    SHA-256:27C8D7CE72141CE0AFBD7DAC4F2B8DEBD9885F597AEEBB313BBC83ACCB7FF02D
                                                    SHA-512:614E6B24AB61DC59F9834BECC2ED4794B8B95C439B8539B98FD1630E79C14C6F2BACFA34950E3833D3F10C6EF88ECD70D256CF9289A3A7975170C28518A1411F
                                                    Malicious:false
                                                    Preview:L..................F.".. .....zL*...W3k.%)....zL*................................P.O. .:i.....+00.../C:\.....................1.....\Y.T..PROGRA~1..t......O.I\Y.T....B...............J.....#...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....d.1.....\Y.T..PANDOR~1..L......\Y.T\Y.T....d+......................;.p.a.n.d.o.r.a._.a.g.e.n.t.....V.1.....\Y.T..scripts.@......\Y.T\Y.T....~:........................s.c.r.i.p.t.s.....z.2......Y.I .STOP_P~1.BAT..^.......Y.I\Y.T.....:........................s.t.o.p._.p.a.n.d.o.r.a._.a.g.e.n.t...b.a.t.......l...............-.......k............m^......C:\Program Files\pandora_agent\scripts\stop_pandora_agent.bat..L.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.p.a.n.d.o.r.a._.a.g.e.n.t.\.s.c.r.i.p.t.s.\.s.t.o.p._.p.a.n.d.o.r.a._.a.g.e.n.t...b.a.t...C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.p.a.n.d.o.r.a._.a.g.e.n.t.+.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.p.a.n.d.o.r.a._.a.g.e.n.t.\.\.p.a.n.d.o.r.a...i.c.o.........%System
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Wed Aug 14 08:14:00 2024, mtime=Mon Oct 28 09:39:08 2024, atime=Wed Aug 14 08:14:00 2024, length=15956, window=hide
                                                    Category:dropped
                                                    Size (bytes):894
                                                    Entropy (8bit):4.5537577818845625
                                                    Encrypted:false
                                                    SSDEEP:12:8msE120YXch92c8bdpF4IN/f7Plx+AKT5YdXWjAl9XWbdpCwPlUbdpCwPljUknBc:8mfQcudtHiT5OqAl9XSd3Sd3lUknBm
                                                    MD5:C674E833A4A179D44F39CCB6383E2D12
                                                    SHA1:8C756A0FFEBE823B07106CA719E935A7C2A397F4
                                                    SHA-256:E89274BAE1075DF3C8F93EB5A5C2486119AE32512B3BD145CA5D9E7809C89961
                                                    SHA-512:2E2C6E44C23F63E66F9CFDD5EC54A9C46DAFB31E42EF3A94472720F0AD5A61822D90AEF191D8A735129ECA47A9D81AB0D5D80EE338CD769950B8153A704C80EA
                                                    Malicious:false
                                                    Preview:L..................F.... .....zL*....a.%)....zL*...T>...........................P.O. .:i.....+00.../C:\.....................1.....\Y.T..PROGRA~1..t......O.I\Y.T....B...............J.....#...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....d.1.....\Y.T..PANDOR~1..L......\Y.T\Y.T....d+......................;.p.a.n.d.o.r.a._.a.g.e.n.t.....`.2.T>...Y.I .README.txt..F.......Y.I\Y.T....}:........................R.E.A.D.M.E...t.x.t.......X...............-.......W............m^......C:\Program Files\pandora_agent\README.txt..8.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.p.a.n.d.o.r.a._.a.g.e.n.t.\.R.E.A.D.M.E...t.x.t...C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.p.a.n.d.o.r.a._.a.g.e.n.t.`.......X.......932923...........hT..CrF.f4... ...T..b...,.......hT..CrF.f4... ...T..b...,......E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:25:52 1600, mtime=Sun Dec 31 23:25:52 1600, atime=Sun Dec 31 23:25:52 1600, length=0, window=hide
                                                    Category:dropped
                                                    Size (bytes):609
                                                    Entropy (8bit):2.8354316500192986
                                                    Encrypted:false
                                                    SSDEEP:12:8wl0VkXXdpyoPlaK4KbdpCwPlZRtbdpCwPl+:8OHd/D4ud3bXd34
                                                    MD5:9A5D51F41E4F2A40186C7D506416BE11
                                                    SHA1:E0300E04E410536DD9220AF94D2D106BFD4E03F7
                                                    SHA-256:82BFA995CA3EF53ABA6AC1BF614AE77C9034B69D11096CA38F11F82F9A0CC939
                                                    SHA-512:94AFA0D7618396D78921A2714CA4252B9437A49445B503238A0A80A0869521DD4CE66AA29499F422E1C64ED21FE0D60E64B2293D6EE38A70708E32D53E0B75EC
                                                    Malicious:false
                                                    Preview:L..................F........................................................_....P.O. .:i.....+00.../C:\...................h.1...........Program Files.L............................................P.r.o.g.r.a.m. .F.i.l.e.s.....h.1...........pandora_agent.L............................................p.a.n.d.o.r.a._.a.g.e.n.t.....`.2...........uninst.exe..F............................................u.n.i.n.s.t...e.x.e.......8.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.p.a.n.d.o.r.a._.a.g.e.n.t.\.u.n.i.n.s.t...e.x.e...C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.p.a.n.d.o.r.a._.a.g.e.n.t.....
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Mon Oct 28 09:39:13 2024, mtime=Mon Oct 28 09:39:13 2024, atime=Mon Oct 28 09:39:13 2024, length=51, window=hide
                                                    Category:dropped
                                                    Size (bytes):946
                                                    Entropy (8bit):4.531746550000899
                                                    Encrypted:false
                                                    SSDEEP:12:8mKWG40YXch92c8bdpF4IN/L+PlNiCsWcDyajAX9u/bdpCwPlTyw0bdpCwPljYL3:8m7/cudQWCmymAX9uzd3Zynd3lYLgBm
                                                    MD5:288D2403307459137F1DA7473C6E3044
                                                    SHA1:C57791D76791421D9B916D07BAE9BB9B602830BA
                                                    SHA-256:A962D8F54396A6045ADC5B2A0A991EB37807BBF885DE2386F34553FDE03125C9
                                                    SHA-512:BB58B6C1966BF46D0374D7EA156C3C225C775BF6D7FBC99C2C28F6F5B6E538211C791902F194FF39A81B400A6BD2C7F9428C4C41F276E93A6EA586F367FDBA55
                                                    Malicious:false
                                                    Preview:L..................F.... ...F.h.%)..F.h.%)..F.h.%)..3............................P.O. .:i.....+00.../C:\.....................1.....\Y.T..PROGRA~1..t......O.I\Y.T....B...............J.....#...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....d.1.....\Y.T..PANDOR~1..L......\Y.T\Y.T....d+.....................8..p.a.n.d.o.r.a._.a.g.e.n.t.....v.2.3...\Y.T .PANDOR~1.URL..Z......\Y.T\Y.T.....G......................;.P.a.n.d.o.r.a.F.M.S._.A.g.e.n.t...u.r.l.......b...............-.......a............m^......C:\Program Files\pandora_agent\PandoraFMS_Agent.url..B.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.p.a.n.d.o.r.a._.a.g.e.n.t.\.P.a.n.d.o.r.a.F.M.S._.A.g.e.n.t...u.r.l...C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.p.a.n.d.o.r.a._.a.g.e.n.t.`.......X.......932923...........hT..CrF.f4... ..T..b...,.......hT..CrF.f4... ..T..b...,......E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):7168
                                                    Entropy (8bit):4.587688007809552
                                                    Encrypted:false
                                                    SSDEEP:96:Gv8dTrjZ9CJ2KFLy3CvUQ5SEEyI8itL7UlPVng14G7oJoiNcp:b7vwL5U4m5LsPdILsqi2
                                                    MD5:5BF7D04824AC42BAD8263E5CEDA265C5
                                                    SHA1:7B714893EB1FE451F6E8AF310ECFAC8447610C40
                                                    SHA-256:DFCFC47116FA2A8EB598D89DDC3E2BF4FAC44D62E670FE615425E7300F43F860
                                                    SHA-512:E13FBB51254B99C834408AA5F0B794ABFCCD86E619BA075726A3BCE3723980F0B43606A684E40502B6751BCF29075850B07DFAE08FE1BD650D1F0EB293AE65C3
                                                    Malicious:true
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..... W...........#..............................o................................?......... ......................@..I....P.......`..X....................p.......................................................P..d............................text............................... .0`.rdata..T.... ......................@.0@.bss....l....0........................`..edata..I....@......................@.0@.idata.......P......................@.0..rsrc...X....`......................@.0..reloc.......p......................@.0B........................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):24064
                                                    Entropy (8bit):5.931807565128868
                                                    Encrypted:false
                                                    SSDEEP:384:TsuiXfwnOEFMUgKWSeMPe3+6a+A6PcPpntKfh00g509nj:efwnLFMUGMPenA6Yuh9Xj
                                                    MD5:8643641707FF1E4A3E1DFDA207B2DB72
                                                    SHA1:F6D766CAA9CAFA533A04DD00E34741D276325E13
                                                    SHA-256:D1B94797529C414B9D058C17DBD10C989EEF59B1FA14EEA7F61790D7CFA7FD25
                                                    SHA-512:CC8E07395419027914A6D4B3842AC7D4F14E3EC8BE319BFE5C81F70BCF757F8C35F0AAEB985C240B6ECC71FC3E71B9F697CCDA6E71F84AC4930ADF5EAC801181
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..... W...........#.....<...Z.......3.......P....\n.................................P........ .................................4...................................................................................<................................text....:.......<..................`.P`.data...4....P.......@..............@.0..rdata.......`.......B..............@.0@.bss.........p........................`..edata...............J..............@.0@.idata..4............L..............@.0..CRT....,............T..............@.0..tls.... ............V..............@.0..reloc...............X..............@.0B........................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:PC bitmap, Windows 3.x format, 164 x 314 x 24, image size 154488, resolution 4724 x 4724 px/m, cbSize 154542, bits offset 54
                                                    Category:dropped
                                                    Size (bytes):154542
                                                    Entropy (8bit):7.334316012178696
                                                    Encrypted:false
                                                    SSDEEP:3072:cjs/2int3rn2sCj3JEAsAdE563uXmvKa/DnF4beFHEh7U0WwmPj:cjC2idrSj3J3E63u2iuDYeFHEhI0WwG
                                                    MD5:4F22F89EA4727F2BBD5A6F4332A73AF4
                                                    SHA1:69899A43FAC387323A4E5C6E70875D9ECCAE11C5
                                                    SHA-256:2442B4828CE145B60FDDB66E13C422561E8AD37C417C8FE2488AE3C48D59B246
                                                    SHA-512:F44F2D58EF9DB0ABFDCAB21FCA5468FB199876A94C8B613F14C39FF39065E336A3D855270A6F6227266BDFCE310831471291C04CCB46401A0C8F5A952F3420EB
                                                    Malicious:false
                                                    Preview:BM.[......6...(.......:...........x[..t...t...........O*.P+.Q4.T>.U?.U?.U?.U?.U?.U?.U?.U?.U?.U?.U?.U?.U?.U?.U?.U?.U?.U?.U?.U?.S?.U?.U?.U?.U?.U?.U?.U?.U?.U?.U?.U?.U?.U?.U?.S?.S?.S?.S?.S?.H..C..E..E..R>.Q@.Q@.Q@.S@.Q9.A..@..?..?..>..>..?..?..?..?..?..?..?..?..?..?..?..?..?..?..?..?..?..?..?..?..>..>..>..>..>..>..?..=..=..:..E..U%+U#'U")T%(U")U")S$'T%(U")U")U")U")R"(R"(T"&R"(R"(Q"%O #O #O #O+.TA.S@.TA.S@.TA.V@.TA.TA.TA.TA.TA.TA.TA.TA.TA.TA.TA.TA.TA.TA.TA.TA.UB.O7.B..A..?..?..?..A..?..A..@..eW.e^.nl...)..j|.4y.$..O..;s~!..b|.(~.0..ev~!..K..Fq.#P+.P+.Q4.U?.T>.U?.U?.U?.U?.U?.U?.U?.U?.U?.U?.U?.U?.U?.U?.U?.U?.U?.U?.U?.S?.U?.U?.U?.U?.U?.U?.U?.U?.U?.U?.U?.U?.U?.U?.S?.S?.S?.S?.S?.H..C..E..E..Q?.R?.Q@.Q@.S@.Q9.A..@..?..?..>..>..>..>..>..>..>..>..>..>..>..>..>..>..>..>..>..>..>..>..>..>..>..>..>..>..>..>..?..=..=..<..C..U%+U")S#)V$(U")S#)Q$'S$'S#)S#)S#)R"(R"(R"(T!(R"(R"(Q!'O #O #O.%Q*.U@.S@.S@.S@.S@.S@.Q@.TA.TA.TA.TA.TA.TA.TA.TA.TA.TA.TA.TA.TA.TA.TA.UB.P8.C..B..@..@..@..B..@..A..<..cX.e].qm...&..i.
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
                                                    Category:dropped
                                                    Size (bytes):11264
                                                    Entropy (8bit):5.4910696778053065
                                                    Encrypted:false
                                                    SSDEEP:192:rAki5P7AA9Xm2Y3KkdMG95Kt0qk+PdIgb9rdTiUdH7hs:Ekg7TNm2GdMG9ISx+P99rd+aH9
                                                    MD5:79A0BDE19E949A8D90DF271CA6E79CD2
                                                    SHA1:946AD18A59C57A11356DD9841BEC29903247BB98
                                                    SHA-256:8353F495064AAF30B32B02F5D935C21F86758F5A99D8EE5E8BF8077B907FAD90
                                                    SHA-512:2A65A48F5DD453723146BABCA8D047E112AB023A589C57FCF5441962F2846A262C2AD25A2985DBA4F2246CDC21D973CBF5E426D4B75DD49A083635400F908A3E
                                                    Malicious:false
                                                    Antivirus:
                                                    • Antivirus: ReversingLabs, Detection: 0%
                                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..... W...........#................l"........L....n.................................k........ ......................`..k....p......................................................................................xq...............................text............................... .0`.rdata..<....0......................@.0@.bss....0....@........................`..edata..k....`......................@.0@.idata.......p....... ..............@.0..rsrc................(..............@.0..reloc...............*..............@.0B........................................................................................................................................................................................................................................................................................................................................................
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Wed Aug 14 08:14:00 2024, mtime=Mon Oct 28 09:39:08 2024, atime=Wed Aug 14 08:14:00 2024, length=15956, window=hide
                                                    Category:dropped
                                                    Size (bytes):894
                                                    Entropy (8bit):4.545978566624625
                                                    Encrypted:false
                                                    SSDEEP:24:8mfQcudC6+HiT5OqAl9XSd3Sd3lUknBm:8mfQVd9TQZDCdCdv
                                                    MD5:AC98BB6C7FB33AA2C54F399249ABC68B
                                                    SHA1:8024116306065C04136E0963C238707D74290BDF
                                                    SHA-256:01A6FB5C07236663648F27708CC61749FC2F2AA51A26F4D15627E0A96E835EBD
                                                    SHA-512:1AC6D31B5ECF48720D389C8564614A93C381925D976730B3BE585E92C69078F2FBDE45D064B1A07D101AEA06FA6B03B81E71A2B49F4E6835D1717ED144638D9F
                                                    Malicious:false
                                                    Preview:L..................F.... .....zL*....a.%)....zL*...T>...........................P.O. .:i.....+00.../C:\.....................1.....\Y.T..PROGRA~1..t......O.I\Y.T....B...............J.....#...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....d.1.....\Y.T..PANDOR~1..L......\Y.T\Y.T....d+....................b...p.a.n.d.o.r.a._.a.g.e.n.t.....`.2.T>...Y.I .README.txt..F.......Y.I\Y.T....}:........................R.E.A.D.M.E...t.x.t.......X...............-.......W............m^......C:\Program Files\pandora_agent\README.txt..8.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.p.a.n.d.o.r.a._.a.g.e.n.t.\.R.E.A.D.M.E...t.x.t...C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.p.a.n.d.o.r.a._.a.g.e.n.t.`.......X.......932923...........hT..CrF.f4... ...T..b...,.......hT..CrF.f4... ...T..b...,......E.......9...1SPS..mD..pH.H@..=x.....h....H.....K...YM...?................
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Wed Aug 14 08:14:00 2024, mtime=Mon Oct 28 09:39:08 2024, atime=Wed Aug 14 08:14:00 2024, length=26, window=hide
                                                    Category:dropped
                                                    Size (bytes):1099
                                                    Entropy (8bit):4.438756941377821
                                                    Encrypted:false
                                                    SSDEEP:24:8mDLWcudIP1tvkfPs658uLEUA29Ud3XsWRiuLm4d3XVut9tIBm:8mDiVdDfU6etjCUdHs2isdHsLa
                                                    MD5:5C9399B593766DE6B8BB91A9A5B1EF70
                                                    SHA1:81677E186E3782BE84B5212041764BE481B3DF36
                                                    SHA-256:B49D68DC19857CEC022EEDF27EAB1B580E08BE4E667C3E9ECED18F6C9F7A177B
                                                    SHA-512:4BF5737684E5F1BB0BDA9E5453E602216A007218F54970C34CCAD73DD2A6D3506A063DE7E051C38434BA53265B301D137304DA41F274A20FE2E5CE65A5E5D890
                                                    Malicious:false
                                                    Preview:L..................F.... .....zL*.....h.%)....zL*................................P.O. .:i.....+00.../C:\.....................1.....\Y.T..PROGRA~1..t......O.I\Y.T....B...............J.....#...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....d.1.....\Y.T..PANDOR~1..L......\Y.T\Y.T....d+........................p.a.n.d.o.r.a._.a.g.e.n.t.....V.1.....\Y.T..scripts.@......\Y.T\Y.T....~:........................s.c.r.i.p.t.s.....|.2......Y.I .START_~1.BAT..`.......Y.I\Y.T.....:........................s.t.a.r.t._.p.a.n.d.o.r.a._.a.g.e.n.t...b.a.t.......m...............-.......l............m^......C:\Program Files\pandora_agent\scripts\start_pandora_agent.bat..S.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.p.a.n.d.o.r.a._.a.g.e.n.t.\.s.c.r.i.p.t.s.\.s.t.a.r.t._.p.a.n.d.o.r.a._.a.g.e.n.t...b.a.t.&.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.p.a.n.d.o.r.a._.a.g.e.n.t.\.s.c.r.i.p.t.s.`.......X.......932923...........hT..CrF.f4... ...T..b...,.......hT..C
                                                    Process:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Wed Aug 14 08:14:00 2024, mtime=Mon Oct 28 09:39:08 2024, atime=Wed Aug 14 08:14:00 2024, length=25, window=hide
                                                    Category:dropped
                                                    Size (bytes):1094
                                                    Entropy (8bit):4.451163124839149
                                                    Encrypted:false
                                                    SSDEEP:24:8mj3cudIP1tvYCDT5HLEAyy93d3XsWRTLm4d3XVPBm:8mj3VdXCDTB33dHs2XdHz
                                                    MD5:B186C18402A1E58BDB50EADF87850AFD
                                                    SHA1:FC32ED803E9479C5644466AAF1711771281802C6
                                                    SHA-256:8C03EFEAA4EAF5B1E6F5B39A3B296482B653DB9463846926375346119C554951
                                                    SHA-512:7B40AA0ED207372912216D195A08E99FF57E13BE096FD8F6A6479F4641AD2B959837C4808C5B59F92A6B0B6ECF9E769DAE7A0474450DC3E7BE4721DA29AE3660
                                                    Malicious:false
                                                    Preview:L..................F.... .....zL*...W3k.%)....zL*................................P.O. .:i.....+00.../C:\.....................1.....\Y.T..PROGRA~1..t......O.I\Y.T....B...............J.....#...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....d.1.....\Y.T..PANDOR~1..L......\Y.T\Y.T....d+........................p.a.n.d.o.r.a._.a.g.e.n.t.....V.1.....\Y.T..scripts.@......\Y.T\Y.T....~:.....................J..s.c.r.i.p.t.s.....z.2......Y.I .STOP_P~1.BAT..^.......Y.I\Y.T.....:........................s.t.o.p._.p.a.n.d.o.r.a._.a.g.e.n.t...b.a.t.......l...............-.......k............m^......C:\Program Files\pandora_agent\scripts\stop_pandora_agent.bat..R.....\.....\.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s.\.p.a.n.d.o.r.a._.a.g.e.n.t.\.s.c.r.i.p.t.s.\.s.t.o.p._.p.a.n.d.o.r.a._.a.g.e.n.t...b.a.t.&.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.p.a.n.d.o.r.a._.a.g.e.n.t.\.s.c.r.i.p.t.s.`.......X.......932923...........hT..CrF.f4... .).T..b...,.......hT..CrF.f4
                                                    Process:C:\Program Files\pandora_agent\PandoraAgent.exe
                                                    File Type:ASCII text, with CRLF line terminators
                                                    Category:dropped
                                                    Size (bytes):210
                                                    Entropy (8bit):4.85999138992323
                                                    Encrypted:false
                                                    SSDEEP:3:xoFu7MZsVLUBnngwoF8DIuRsscWdZjd1KUwA7SfgwoF2G58+8UBUKdAP4Ekry:xokg6QBgwoX2UanSIwoga8LoUKdbry
                                                    MD5:AE02717466D6E7F8B244F460FEDC4495
                                                    SHA1:229150B5843F39D25BBA9C3EB48A7E08AA7E1744
                                                    SHA-256:099E6C2AB5F48E7AD0689F1D37696D80877411F52837EE39B04D5F99BF95CFD1
                                                    SHA-512:25B48CAAF1D73A7319B3D44A1CF6000BAB079C554105A6CC2F1B68EC6453ABD84C3A29D474EFFF9941F338BAEBD1B68736A6EFC22FB25B34798719D253D7B4A8
                                                    Malicious:false
                                                    Preview: [SERVICE] Attempting to install the service... [SERVICE] The full path to the binary is: "C:\Program Files\pandora_agent\PandoraAgent.exe".. [SERVICE] Successfully added the service to the Services database...
                                                    File type:PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows, Nullsoft Installer self-extracting archive
                                                    Entropy (8bit):7.998832699326698
                                                    TrID:
                                                    • Win32 Executable (generic) a (10002005/4) 99.96%
                                                    • Generic Win/DOS Executable (2004/3) 0.02%
                                                    • DOS Executable Generic (2002/1) 0.02%
                                                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                    File name:PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    File size:62'120'984 bytes
                                                    MD5:850a59f9c158b9d953ee6a75f55f7f8a
                                                    SHA1:00112195c957667f320fa4565966827a8570c168
                                                    SHA256:324f914c6e630516c2d2565cbd0b63e33eb6dc171f26aeaadf4f920636b16dc0
                                                    SHA512:42ac0753dd6f4ac8103f323408b1ee106f52d210c5db92ed3bbe221af3326e992f7842b0dc7bb6e5b09ffcc66cfe3e89de6682b514267b94dd83d9d1ae88e0ef
                                                    SSDEEP:1572864:LaFQsS0vyofU4Ss9d2tPDHorC6wf1Il4N4LSWKno9z2:LXAU4SMItPboW6UN4U+z2
                                                    TLSH:85D733146B295ECAFA05F271C3858ED56C89CCA9B1B14933B79D373328BDE9007BB815
                                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L..... W.........................Z..gA............@..........................P......:......... ............................
                                                    Icon Hash:1761c99c96ca6117
                                                    Entrypoint:0x404167
                                                    Entrypoint Section:.text
                                                    Digitally signed:true
                                                    Imagebase:0x400000
                                                    Subsystem:windows gui
                                                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE, DEBUG_STRIPPED
                                                    DLL Characteristics:TERMINAL_SERVER_AWARE
                                                    Time Stamp:0x57201597 [Wed Apr 27 01:27:51 2016 UTC]
                                                    TLS Callbacks:
                                                    CLR (.Net) Version:
                                                    OS Version Major:4
                                                    OS Version Minor:0
                                                    File Version Major:4
                                                    File Version Minor:0
                                                    Subsystem Version Major:4
                                                    Subsystem Version Minor:0
                                                    Import Hash:187b3ae62ff818788b8c779ef7bc3d1c
                                                    Signature Valid:true
                                                    Signature Issuer:CN=Sectigo Public Code Signing CA EV R36, O=Sectigo Limited, C=GB
                                                    Signature Validation Error:The operation completed successfully
                                                    Error Number:0
                                                    Not Before, Not After
                                                    • 11/04/2024 01:00:00 11/07/2027 00:59:59
                                                    Subject Chain
                                                    • CN=Pandora FMS SL, O=Pandora FMS SL, S=Madrid, C=ES, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=ES, SERIALNUMBER=B84491109
                                                    Version:3
                                                    Thumbprint MD5:CADD05AE46AB8A1E1EE59C0F3536D556
                                                    Thumbprint SHA-1:5CE88AB48F2B88A258E1E2201F33E08303D10EE6
                                                    Thumbprint SHA-256:B5E623CAC465D69117849F998190946490AD859B7AE04F8990F3C369669A13B1
                                                    Serial:0478F96DD975F8E17D1E67123536784D
                                                    Instruction
                                                    push ebp
                                                    mov ebp, esp
                                                    push edi
                                                    push esi
                                                    push ebx
                                                    sub esp, 000001ACh
                                                    mov dword ptr [esp], 00008001h
                                                    call dword ptr [00438434h]
                                                    push ecx
                                                    call dword ptr [004383FCh]
                                                    cmp ax, 0006h
                                                    je 00007F5A1D17BA2Dh
                                                    mov dword ptr [esp], 00000000h
                                                    call 00007F5A1D17F905h
                                                    test eax, eax
                                                    push edx
                                                    je 00007F5A1D17BA1Ch
                                                    mov dword ptr [esp], 00000C00h
                                                    call eax
                                                    push edi
                                                    mov ebx, 0040B300h
                                                    cmp byte ptr [ebx], 00000000h
                                                    je 00007F5A1D17BA2Bh
                                                    mov dword ptr [esp], ebx
                                                    call 00007F5A1D17F859h
                                                    push ecx
                                                    mov dword ptr [esp], ebx
                                                    call dword ptr [00438464h]
                                                    lea ebx, dword ptr [ebx+eax+01h]
                                                    push esi
                                                    jmp 00007F5A1D17B9F4h
                                                    mov dword ptr [esp], 0000000Dh
                                                    call 00007F5A1D17F8C7h
                                                    push ebx
                                                    mov dword ptr [esp], 0000000Bh
                                                    call 00007F5A1D17F8BAh
                                                    push esi
                                                    mov dword ptr [004369A0h], eax
                                                    call dword ptr [00438354h]
                                                    mov dword ptr [esp], 00000000h
                                                    call dword ptr [00438474h]
                                                    mov dword ptr [00436918h], eax
                                                    push edi
                                                    lea eax, dword ptr [ebp-00000178h]
                                                    mov dword ptr [esp+10h], 00000000h
                                                    mov dword ptr [esp+0Ch], 00000160h
                                                    mov dword ptr [esp+08h], eax
                                                    mov dword ptr [esp+04h], 00000000h
                                                    mov dword ptr [esp], 0040B2BDh
                                                    call dword ptr [00000088h]
                                                    NameVirtual AddressVirtual Size Is in Section
                                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x380000x127c.idata
                                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x5b0000x290f0.rsrc
                                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x3b3b5500x2ec8
                                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                    .text0x10000x89700x8a002ec988133e621c870cc7b5a3cd9c0a46False0.5525928442028986data6.0272270031273925IMAGE_SCN_CNT_CODE, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                    .data0xa0000xe80x2001f81afc91794a293205881d6e53e0b0fFalse0.2109375data1.6306147921130418IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .rdata0xb0000x6b040x6c007bdb471d068123a70155b53231331703False0.7160734953703703data7.230628468311125IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ
                                                    .bss0x120000x25a000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .idata0x380000x127c0x1400c9e9e4693c2aa9c86bd5fec6ae143093False0.3708984375data5.180334996596523IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .ndata0x3a0000x210000x4000f343b0931126a20f133d67c2b018a3bFalse0.0166015625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    .rsrc0x5b0000x290f00x292001346926b31570de576cbb3f1665c87e0False0.038587575987841946data2.523130603513166IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                                    RT_ICON0x5b3100x25e4cDevice independent bitmap graphic, 194 x 386 x 32, image size 149768EnglishUnited States0.03080947349431745
                                                    RT_ICON0x811600xea8dataEnglishUnited States0.007196162046908316
                                                    RT_ICON0x820080x8a8dataEnglishUnited States0.01128158844765343
                                                    RT_ICON0x828b00x568dataEnglishUnited States0.014450867052023121
                                                    RT_ICON0x82e180x468dataEnglishUnited States0.015957446808510637
                                                    RT_ICON0x832800x2e8dataEnglishUnited States0.020161290322580645
                                                    RT_ICON0x835680x128dataEnglishUnited States0.04391891891891892
                                                    RT_DIALOG0x836900xb4dataEnglishUnited States0.6166666666666667
                                                    RT_DIALOG0x837480x144dataEnglishUnited States0.5339506172839507
                                                    RT_DIALOG0x838900x23edataEnglishUnited States0.39198606271777003
                                                    RT_DIALOG0x83ad00x104dataEnglishUnited States0.6076923076923076
                                                    RT_DIALOG0x83bd80xeedataEnglishUnited States0.6092436974789915
                                                    RT_GROUP_ICON0x83cc80x68dataEnglishUnited States0.9230769230769231
                                                    RT_MANIFEST0x83d300x3c0XML 1.0 document, ASCII text, with very long lines (960), with no line terminatorsEnglishUnited States0.5197916666666667
                                                    DLLImport
                                                    ADVAPI32.dllRegCloseKey, RegCreateKeyExA, RegDeleteKeyA, RegDeleteValueA, RegEnumKeyA, RegEnumValueA, RegOpenKeyExA, RegQueryValueExA, RegSetValueExA, SetFileSecurityA
                                                    COMCTL32.DLLImageList_AddMasked, ImageList_Create, ImageList_Destroy, InitCommonControls
                                                    GDI32.dllCreateBrushIndirect, CreateFontIndirectA, DeleteObject, GetDeviceCaps, SelectObject, SetBkColor, SetBkMode, SetTextColor
                                                    KERNEL32.dllCloseHandle, CompareFileTime, CopyFileA, CreateDirectoryA, CreateFileA, CreateProcessA, CreateThread, DeleteFileA, ExitProcess, ExpandEnvironmentStringsA, FindClose, FindFirstFileA, FindNextFileA, FreeLibrary, GetCommandLineA, GetCurrentProcess, GetDiskFreeSpaceA, GetExitCodeProcess, GetFileAttributesA, GetFileSize, GetFullPathNameA, GetLastError, GetModuleFileNameA, GetModuleHandleA, GetPrivateProfileStringA, GetProcAddress, GetShortPathNameA, GetSystemDirectoryA, GetTempFileNameA, GetTempPathA, GetTickCount, GetVersion, GetWindowsDirectoryA, GlobalAlloc, GlobalFree, GlobalLock, GlobalUnlock, LoadLibraryExA, MoveFileA, MulDiv, MultiByteToWideChar, ReadFile, RemoveDirectoryA, SearchPathA, SetCurrentDirectoryA, SetErrorMode, SetFileAttributesA, SetFilePointer, SetFileTime, Sleep, WaitForSingleObject, WriteFile, WritePrivateProfileStringA, lstrcatA, lstrcmpA, lstrcmpiA, lstrcpynA, lstrlenA
                                                    ole32.dllCoCreateInstance, CoTaskMemFree, OleInitialize, OleUninitialize
                                                    SHELL32.dllSHBrowseForFolderA, SHFileOperationA, SHGetFileInfoA, SHGetPathFromIDListA, SHGetSpecialFolderLocation, ShellExecuteA
                                                    USER32.dllAppendMenuA, BeginPaint, CallWindowProcA, CharNextA, CharPrevA, CheckDlgButton, CloseClipboard, CreateDialogParamA, CreatePopupMenu, CreateWindowExA, DefWindowProcA, DestroyWindow, DialogBoxParamA, DispatchMessageA, DrawTextA, EmptyClipboard, EnableMenuItem, EnableWindow, EndDialog, EndPaint, ExitWindowsEx, FillRect, FindWindowExA, GetClassInfoA, GetClientRect, GetDC, GetDlgItem, GetDlgItemTextA, GetMessagePos, GetSysColor, GetSystemMenu, GetSystemMetrics, GetWindowLongA, GetWindowRect, InvalidateRect, IsWindow, IsWindowEnabled, IsWindowVisible, LoadBitmapA, LoadCursorA, LoadImageA, MessageBoxIndirectA, OpenClipboard, PeekMessageA, PostQuitMessage, RegisterClassA, ScreenToClient, SendMessageA, SendMessageTimeoutA, SetClassLongA, SetClipboardData, SetCursor, SetDlgItemTextA, SetForegroundWindow, SetTimer, SetWindowLongA, SetWindowPos, SetWindowTextA, ShowWindow, SystemParametersInfoA, TrackPopupMenu, wsprintfA
                                                    Language of compilation systemCountry where language is spokenMap
                                                    EnglishUnited States
                                                    No network behavior found

                                                    Click to jump to process

                                                    Click to jump to process

                                                    Click to dive into process behavior distribution

                                                    Click to jump to process

                                                    Target ID:0
                                                    Start time:06:38:52
                                                    Start date:28/10/2024
                                                    Path:C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe"
                                                    Imagebase:0x400000
                                                    File size:62'120'984 bytes
                                                    MD5 hash:850A59F9C158B9D953EE6A75F55F7F8A
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:low
                                                    Has exited:false

                                                    Target ID:1
                                                    Start time:06:39:05
                                                    Start date:28/10/2024
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:cmd.exe /c net stop pandoraFMSagent
                                                    Imagebase:0x240000
                                                    File size:236'544 bytes
                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:2
                                                    Start time:06:39:05
                                                    Start date:28/10/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff7699e0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:3
                                                    Start time:06:39:05
                                                    Start date:28/10/2024
                                                    Path:C:\Windows\SysWOW64\net.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:net stop pandoraFMSagent
                                                    Imagebase:0xd10000
                                                    File size:47'104 bytes
                                                    MD5 hash:31890A7DE89936F922D44D677F681A7F
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:4
                                                    Start time:06:39:05
                                                    Start date:28/10/2024
                                                    Path:C:\Windows\SysWOW64\net1.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:C:\Windows\system32\net1 stop pandoraFMSagent
                                                    Imagebase:0x5d0000
                                                    File size:139'776 bytes
                                                    MD5 hash:2EFE6ED4C294AB8A39EB59C80813FEC1
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:6
                                                    Start time:06:39:12
                                                    Start date:28/10/2024
                                                    Path:C:\Windows\SysWOW64\cmd.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:cmd.exe /c PandoraAgent.exe --install
                                                    Imagebase:0x240000
                                                    File size:236'544 bytes
                                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:7
                                                    Start time:06:39:12
                                                    Start date:28/10/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff7699e0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:8
                                                    Start time:06:39:12
                                                    Start date:28/10/2024
                                                    Path:C:\Program Files\pandora_agent\PandoraAgent.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:PandoraAgent.exe --install
                                                    Imagebase:0x400000
                                                    File size:7'811'449 bytes
                                                    MD5 hash:D885123606524EA6542E5AC351FB3529
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Antivirus matches:
                                                    • Detection: 0%, ReversingLabs
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:11
                                                    Start time:06:39:13
                                                    Start date:28/10/2024
                                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:schtasks /Create /TN pandora_agent_restart /TR "\"C:\Program Files\pandora_agent\scripts\restart_pandora_agent.bat\"" /SC DAILY /ST 00:00:00 /F /RU SYSTEM
                                                    Imagebase:0xc20000
                                                    File size:187'904 bytes
                                                    MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:12
                                                    Start time:06:39:13
                                                    Start date:28/10/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff7699e0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:13
                                                    Start time:06:39:13
                                                    Start date:28/10/2024
                                                    Path:C:\Windows\SysWOW64\schtasks.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:schtasks /Change /TN pandora_agent_restart /TR "\"C:\Program Files\pandora_agent\scripts\restart_pandora_agent.bat\""
                                                    Imagebase:0xc20000
                                                    File size:187'904 bytes
                                                    MD5 hash:48C2FE20575769DE916F48EF0676A965
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:14
                                                    Start time:06:39:13
                                                    Start date:28/10/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff7699e0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Reputation:high
                                                    Has exited:true

                                                    Target ID:15
                                                    Start time:06:39:13
                                                    Start date:28/10/2024
                                                    Path:C:\Program Files\pandora_agent\util\ShortElev.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Program Files\pandora_agent\util\ShortElev.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\PandoraFMS_Agent_v7.0NG.777.1\Edit Config File.lnk"
                                                    Imagebase:0x400000
                                                    File size:111'404 bytes
                                                    MD5 hash:0137DF9F792F635269E6FFF74F238C95
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Antivirus matches:
                                                    • Detection: 0%, ReversingLabs
                                                    Reputation:low
                                                    Has exited:true

                                                    Target ID:16
                                                    Start time:06:39:13
                                                    Start date:28/10/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff7699e0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:17
                                                    Start time:06:39:14
                                                    Start date:28/10/2024
                                                    Path:C:\Program Files\pandora_agent\util\ShortElev.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Program Files\pandora_agent\util\ShortElev.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\PandoraFMS_Agent_v7.0NG.777.1\PandoraFMS_Agent_start.lnk"
                                                    Imagebase:0x400000
                                                    File size:111'404 bytes
                                                    MD5 hash:0137DF9F792F635269E6FFF74F238C95
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:18
                                                    Start time:06:39:15
                                                    Start date:28/10/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff7699e0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:19
                                                    Start time:06:39:15
                                                    Start date:28/10/2024
                                                    Path:C:\Program Files\pandora_agent\util\ShortElev.exe
                                                    Wow64 process (32bit):true
                                                    Commandline:"C:\Program Files\pandora_agent\util\ShortElev.exe" "C:\ProgramData\Microsoft\Windows\Start Menu\Programs\PandoraFMS_Agent_v7.0NG.777.1\PandoraFMS_Agent_stop.lnk"
                                                    Imagebase:0x400000
                                                    File size:111'404 bytes
                                                    MD5 hash:0137DF9F792F635269E6FFF74F238C95
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:20
                                                    Start time:06:39:15
                                                    Start date:28/10/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff7699e0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:21
                                                    Start time:06:39:15
                                                    Start date:28/10/2024
                                                    Path:C:\Windows\System32\cmd.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\SYSTEM32\cmd.exe /c ""C:\Program Files\pandora_agent\scripts\restart_pandora_agent.bat""
                                                    Imagebase:0x7ff65f0e0000
                                                    File size:289'792 bytes
                                                    MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:22
                                                    Start time:06:39:15
                                                    Start date:28/10/2024
                                                    Path:C:\Windows\System32\conhost.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                    Imagebase:0x7ff7699e0000
                                                    File size:862'208 bytes
                                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:23
                                                    Start time:06:39:15
                                                    Start date:28/10/2024
                                                    Path:C:\Windows\System32\net.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:net stop PandoraFMSAgent
                                                    Imagebase:0x7ff708870000
                                                    File size:59'904 bytes
                                                    MD5 hash:0BD94A338EEA5A4E1F2830AE326E6D19
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:24
                                                    Start time:06:39:15
                                                    Start date:28/10/2024
                                                    Path:C:\Windows\System32\net1.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\net1 stop PandoraFMSAgent
                                                    Imagebase:0x7ff7ca220000
                                                    File size:183'808 bytes
                                                    MD5 hash:55693DF2BB3CBE2899DFDDF18B4EB8C9
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:25
                                                    Start time:06:39:15
                                                    Start date:28/10/2024
                                                    Path:C:\Windows\System32\net.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:net start PandoraFMSAgent
                                                    Imagebase:0x7ff708870000
                                                    File size:59'904 bytes
                                                    MD5 hash:0BD94A338EEA5A4E1F2830AE326E6D19
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:26
                                                    Start time:06:39:15
                                                    Start date:28/10/2024
                                                    Path:C:\Windows\System32\net1.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:C:\Windows\system32\net1 start PandoraFMSAgent
                                                    Imagebase:0x7ff7ca220000
                                                    File size:183'808 bytes
                                                    MD5 hash:55693DF2BB3CBE2899DFDDF18B4EB8C9
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:true

                                                    Target ID:27
                                                    Start time:06:39:15
                                                    Start date:28/10/2024
                                                    Path:C:\Program Files\pandora_agent\PandoraAgent.exe
                                                    Wow64 process (32bit):false
                                                    Commandline:"C:\Program Files\pandora_agent\PandoraAgent.exe"
                                                    Imagebase:0x400000
                                                    File size:7'811'449 bytes
                                                    MD5 hash:D885123606524EA6542E5AC351FB3529
                                                    Has elevated privileges:true
                                                    Has administrator privileges:true
                                                    Programmed in:C, C++ or other language
                                                    Has exited:false

                                                    Reset < >

                                                      Execution Graph

                                                      Execution Coverage:23.3%
                                                      Dynamic/Decrypted Code Coverage:11.2%
                                                      Signature Coverage:14.8%
                                                      Total number of Nodes:1935
                                                      Total number of Limit Nodes:65
                                                      execution_graph 6519 6e5c3b5c 6520 6e5c3b60 6519->6520 6523 6e5c4220 6520->6523 6522 6e5c3b78 6524 6e5c42b0 6523->6524 6525 6e5c4231 6523->6525 6528 6e5c42b9 6524->6528 6529 6e5c42d0 InitializeCriticalSection 6524->6529 6526 6e5c4250 6525->6526 6527 6e5c4233 6525->6527 6531 6e5c425d 6526->6531 6532 6e5c4090 4 API calls 6526->6532 6530 6e5c4245 6527->6530 6536 6e5c4090 EnterCriticalSection 6527->6536 6528->6522 6529->6528 6530->6522 6531->6530 6534 6e5c4270 free 6531->6534 6535 6e5c4281 DeleteCriticalSection 6531->6535 6532->6531 6534->6534 6534->6535 6535->6530 6537 6e5c40e5 LeaveCriticalSection 6536->6537 6539 6e5c40bd 6536->6539 6537->6530 6538 6e5c40c0 TlsGetValue GetLastError 6538->6539 6539->6537 6539->6538 6540 6e5c135c 6541 6e5c1360 6540->6541 6542 6e5c13d5 6541->6542 6543 6e5c1365 6541->6543 6544 6e5c33b8 VirtualProtect 6542->6544 6573 6e5c39e0 6543->6573 6549 6e5c12ae 6544->6549 6546 6e5c136a 6577 6e5c33b8 6546->6577 6553 6e5c12dc 6549->6553 6555 6e5c1040 6549->6555 6550 6e5c33b8 VirtualProtect 6552 6e5c139f 6550->6552 6554 6e5c1040 7 API calls 6552->6554 6554->6549 6556 6e5c104e 6555->6556 6558 6e5c10c0 6555->6558 6557 6e5c10ae 6556->6557 6560 6e5c108f 6556->6560 6561 6e5c1070 Sleep 6556->6561 6557->6553 6558->6557 6559 6e5c1102 6558->6559 6562 6e5c10e8 Sleep 6558->6562 6564 6e5c1112 6559->6564 6565 6e5c1233 _amsg_exit 6559->6565 6563 6e5c109d _amsg_exit 6560->6563 6570 6e5c1180 6560->6570 6561->6556 6562->6558 6563->6557 6566 6e5c111f 6564->6566 6567 6e5c1210 _initterm 6564->6567 6568 6e5c1244 _initterm 6565->6568 6566->6568 6572 6e5c112d 6566->6572 6567->6553 6569 6e5c11d4 6569->6553 6570->6569 6571 6e5c11b8 free 6570->6571 6571->6569 6572->6553 6575 6e5c3990 6573->6575 6575->6546 6580 6e5c3940 6575->6580 6578 6e5c33cc VirtualProtect 6577->6578 6579 6e5c137e 6577->6579 6578->6579 6579->6550 6579->6553 6583 6e5c3880 6580->6583 6582 6e5c394f 6582->6546 6584 6e5c3891 6583->6584 6585 6e5c389e _lock 6584->6585 6586 6e5c3920 _onexit 6584->6586 6587 6e5c38b7 6585->6587 6586->6582 6588 6e5c38c8 __dllonexit 6587->6588 6589 6e5c38f6 6588->6589 6590 6e5c3907 _unlock 6589->6590 6590->6582 5169 403141 5172 4079f8 5169->5172 5173 403155 CloseHandle 5172->5173 5174 402541 5175 40254d 5174->5175 5176 402578 EnableWindow 5175->5176 5177 40256d ShowWindow 5175->5177 5178 4037d4 5176->5178 5177->5178 6591 401e43 6592 401e4f 6591->6592 6593 401400 18 API calls 6592->6593 6594 401e71 6593->6594 6596 401ee6 6594->6596 6601 407ace lstrlenA 6594->6601 6602 403747 6603 403753 6602->6603 6604 4037a0 6603->6604 6606 4036cd 6603->6606 6607 402a3c 6603->6607 6605 407bf6 18 API calls 6604->6605 6604->6607 6605->6607 6606->6607 6608 407bf6 18 API calls 6606->6608 6608->6607 5471 402e4b 5472 402e51 5471->5472 5473 401400 18 API calls 5472->5473 5474 402e74 5473->5474 5475 401400 18 API calls 5474->5475 5476 402e87 RegCreateKeyExA 5475->5476 5477 402ee4 5476->5477 5478 403677 5476->5478 5479 402f06 5477->5479 5480 402ee9 5477->5480 5483 402f54 RegSetValueExA 5479->5483 5485 403af7 30 API calls 5479->5485 5487 402f02 5479->5487 5481 401400 18 API calls 5480->5481 5482 402ef5 5481->5482 5488 407ace lstrlenA 5482->5488 5486 40307b RegCloseKey 5483->5486 5485->5487 5486->5478 5487->5483 5489 40174c 5490 401456 5489->5490 5491 401758 Sleep 5490->5491 5492 40219b 5491->5492 5493 40194e 5494 401400 18 API calls 5493->5494 5495 40195a 5494->5495 5496 407f13 2 API calls 5495->5496 5497 401963 5496->5497 6609 401f51 6610 401400 18 API calls 6609->6610 6611 401f5d ExpandEnvironmentStringsA 6610->6611 6612 401f8a 6611->6612 6614 401f7c 6611->6614 6613 401f97 lstrcmpA 6612->6613 6612->6614 6613->6614 5565 db1bcc GetProcessHeap HeapAlloc 5566 db1c0a 5565->5566 5567 db1c1c 5565->5567 5624 db23ef 5566->5624 5599 db238d 5567->5599 5571 db1fd7 5572 db1c86 5575 db23ef 2 API calls 5572->5575 5576 db1c92 GetProcessHeap 5575->5576 5578 db1fbf HeapFree 5576->5578 5577 db1c3f 5579 db2630 2 API calls 5577->5579 5578->5571 5580 db1c47 5579->5580 5607 db13ce GetClientRect 5580->5607 5582 db1c6a 5583 db238d 2 API calls 5582->5583 5584 db1c80 5583->5584 5584->5572 5585 db1c9a GetProcessHeap HeapReAlloc lstrcmpiA 5584->5585 5586 db1d0e lstrcmpiA 5585->5586 5597 db1cf9 5585->5597 5587 db1d36 lstrcmpiA 5586->5587 5586->5597 5588 db1d5e lstrcmpiA 5587->5588 5587->5597 5590 db1d86 lstrcmpiA 5588->5590 5588->5597 5589 db1e51 lstrcmpiA CreateWindowExA SetPropA SendMessageA SendMessageA 5591 db1f8b SetWindowLongA 5589->5591 5592 db1fb0 5589->5592 5593 db1dab lstrcmpiA 5590->5593 5590->5597 5591->5592 5627 db2668 wsprintfA 5592->5627 5595 db1dd0 lstrcmpiA 5593->5595 5593->5597 5595->5597 5598 db1df5 lstrcmpiA 5595->5598 5597->5589 5598->5597 5600 db23a9 5599->5600 5601 db1c2e 5599->5601 5600->5601 5602 db23d3 GlobalFree 5600->5602 5603 db23b3 lstrcpynA 5600->5603 5601->5572 5604 db2630 5601->5604 5602->5601 5603->5602 5605 db238d 2 API calls 5604->5605 5606 db2650 5605->5606 5606->5577 5608 db238d 2 API calls 5607->5608 5609 db1416 5608->5609 5623 db141c 5609->5623 5630 db1304 lstrlenA CharPrevA 5609->5630 5612 db238d 2 API calls 5613 db1452 5612->5613 5614 db1304 3 API calls 5613->5614 5613->5623 5615 db146c 5614->5615 5616 db238d 2 API calls 5615->5616 5617 db1484 5616->5617 5618 db1304 3 API calls 5617->5618 5617->5623 5619 db149e 5618->5619 5620 db238d 2 API calls 5619->5620 5621 db14b6 5620->5621 5622 db1304 3 API calls 5621->5622 5621->5623 5622->5623 5623->5582 5625 db23f8 GlobalAlloc lstrcpynA 5624->5625 5626 db1c16 5624->5626 5625->5626 5626->5571 5628 db23ef 2 API calls 5627->5628 5629 db1fb8 GetProcessHeap 5628->5629 5629->5578 5631 db133a 5630->5631 5632 db1373 MapDialogRect 5631->5632 5633 db1345 5631->5633 5632->5633 5633->5612 6619 6e5c3840 wsprintfA 6622 6e5c35c7 6619->6622 6623 6e5c3627 6622->6623 6624 6e5c35d0 GlobalAlloc lstrcpynA 6622->6624 6624->6623 6625 6e5c1440 6626 6e5c144f GetModuleHandleA 6625->6626 6627 6e5c147e 6625->6627 6626->6627 6629 6e5c1468 GetProcAddress 6626->6629 6628 6e5c3940 4 API calls 6627->6628 6630 6e5c1497 6628->6630 6629->6627 6631 db16c6 6632 db172c GetDlgItem 6631->6632 6633 db16e2 6631->6633 6664 db1607 GetPropA 6632->6664 6634 db1706 6633->6634 6635 db16e4 6633->6635 6640 db19ea SendMessageA 6634->6640 6643 db1727 6634->6643 6637 db1802 6635->6637 6638 db16f6 6635->6638 6663 db1843 6635->6663 6642 db1607 GetPropA 6637->6642 6638->6643 6648 db1a11 RemovePropA 6638->6648 6639 db1607 GetPropA 6641 db1874 6639->6641 6640->6643 6641->6643 6644 db1881 GetWindowTextA DrawTextA 6641->6644 6645 db180c 6642->6645 6649 db190d 6644->6649 6645->6643 6656 db2668 3 API calls 6645->6656 6646 db1768 6646->6643 6650 db2668 3 API calls 6646->6650 6648->6638 6651 db1927 GetWindowLongA 6649->6651 6652 db19b4 6649->6652 6650->6643 6654 db198e DrawTextA 6651->6654 6655 db1972 SetTextColor 6651->6655 6652->6643 6660 db19d1 DrawFocusRect 6652->6660 6653 db1793 6653->6643 6657 db2668 3 API calls 6653->6657 6654->6652 6655->6654 6658 db182c 6656->6658 6657->6643 6659 db2668 3 API calls 6658->6659 6661 db1838 6659->6661 6660->6643 6662 db2668 3 API calls 6661->6662 6662->6663 6663->6639 6665 db162b 6664->6665 6665->6643 6665->6646 6665->6653 5773 401860 5774 401400 18 API calls 5773->5774 5775 40186c 5774->5775 5776 407725 3 API calls 5775->5776 5789 401879 5776->5789 5777 407694 CharNextA 5777->5789 5778 401942 5781 40163b 23 API calls 5778->5781 5787 403677 5778->5787 5779 40190e 5780 40163b 23 API calls 5779->5780 5782 40191a 5780->5782 5781->5787 5803 407aa6 lstrcpynA 5782->5803 5786 40192b SetCurrentDirectoryA 5786->5787 5788 4018dd GetFileAttributesA 5788->5789 5789->5777 5789->5788 5791 401902 5789->5791 5792 4080db 5789->5792 5795 4074a0 CreateDirectoryA 5789->5795 5800 40753b CreateDirectoryA 5789->5800 5791->5778 5791->5779 5793 408089 5 API calls 5792->5793 5794 4080ed 5793->5794 5794->5789 5796 407500 5795->5796 5797 407504 GetLastError 5795->5797 5796->5789 5797->5796 5798 407513 SetFileSecurityA 5797->5798 5798->5796 5799 40752f GetLastError 5798->5799 5799->5796 5801 407565 5800->5801 5802 40755f GetLastError 5800->5802 5801->5789 5802->5801 5803->5786 5804 402860 5805 402869 5804->5805 5806 402970 5804->5806 5807 401400 18 API calls 5805->5807 5809 40163b 23 API calls 5806->5809 5808 402875 5807->5808 5810 401400 18 API calls 5808->5810 5814 402a3b 5809->5814 5811 402884 5810->5811 5812 402890 LoadLibraryExA 5811->5812 5813 4028b8 GetModuleHandleA 5811->5813 5812->5806 5815 4028b6 5812->5815 5813->5812 5816 4028c8 GetProcAddress 5813->5816 5815->5816 5817 40292d 5816->5817 5818 4028dd 5816->5818 5819 406dbb 23 API calls 5817->5819 5820 4028e7 5818->5820 5821 4028fe KiUserCallbackDispatcher 5818->5821 5823 4028ef 5819->5823 5822 40163b 23 API calls 5820->5822 5821->5823 5822->5823 5823->5814 5824 402962 FreeLibrary 5823->5824 5824->5814 5871 403164 5872 401400 18 API calls 5871->5872 5873 403170 5872->5873 5883 407868 GetFileAttributesA CreateFileA 5873->5883 5875 40318d 5876 402530 5875->5876 5877 403199 5875->5877 5884 4079d3 wsprintfA 5876->5884 5885 4079d3 wsprintfA 5877->5885 5880 40253c 5881 40347d 5886 407aa6 lstrcpynA 5881->5886 5883->5875 5884->5880 5885->5881 5886->5880 5939 404167 SetErrorMode GetVersion 5940 404199 5939->5940 5941 40418d 5939->5941 5943 4041cb 5940->5943 5944 407ffe 3 API calls 5940->5944 5942 408089 5 API calls 5941->5942 5942->5940 5945 408089 5 API calls 5943->5945 5946 4041ba lstrlenA 5944->5946 5947 4041d7 5945->5947 5946->5940 5948 408089 5 API calls 5947->5948 5949 4041e4 InitCommonControls OleInitialize SHGetFileInfoA 5948->5949 6034 407aa6 lstrcpynA 5949->6034 5951 404249 GetCommandLineA 6035 407aa6 lstrcpynA 5951->6035 5953 404261 GetModuleHandleA 5954 404286 5953->5954 5955 407694 CharNextA 5954->5955 5956 40429e CharNextA 5955->5956 5965 4042b0 5956->5965 5957 404352 GetTempPathA 6036 4040cc 5957->6036 5960 404372 DeleteFileA 6045 403db2 GetTickCount GetModuleFileNameA 5960->6045 5961 404399 GetWindowsDirectoryA 6135 407ad8 lstrcatA 5961->6135 5962 407694 CharNextA 5962->5965 5965->5957 5965->5962 5967 404315 5965->5967 6134 407aa6 lstrcpynA 5967->6134 5972 40438c 5975 407694 CharNextA 5972->5975 5980 4043cf 5972->5980 6009 40444d 5972->6009 5974 40432f 5974->5957 5979 4043fa 5975->5979 5977 404636 5982 404628 ExitProcess 5977->5982 5983 408089 5 API calls 5977->5983 5978 404618 5981 407626 MessageBoxIndirectA 5978->5981 5985 404454 5979->5985 5988 40440e 5979->5988 6139 404126 5980->6139 5981->5982 5986 40464f 5983->5986 5987 4080db 5 API calls 5985->5987 5989 408089 5 API calls 5986->5989 5990 404459 5987->5990 5992 407f4b 17 API calls 5988->5992 5991 40465e 5989->5991 6138 407ad8 lstrcatA 5990->6138 5994 408089 5 API calls 5991->5994 5995 40441c 5992->5995 5997 40466d 5994->5997 5995->5980 6136 407aa6 lstrcpynA 5995->6136 6003 404693 GetCurrentProcess 5997->6003 6013 4046b0 5997->6013 6000 408089 5 API calls 6014 404731 6000->6014 6003->6013 6004 40443b 6137 407aa6 lstrcpynA 6004->6137 6007 404736 ExitWindowsEx 6007->5982 6010 404783 6007->6010 6073 405eed 6009->6073 6015 403903 2 API calls 6010->6015 6013->6000 6014->6007 6014->6010 6015->5982 6034->5951 6035->5953 6037 407b27 5 API calls 6036->6037 6039 4040de 6037->6039 6038 404122 6038->5960 6038->5961 6039->6038 6040 407ae2 3 API calls 6039->6040 6041 404100 6040->6041 6042 40753b 2 API calls 6041->6042 6043 40410d 6042->6043 6044 4078c4 2 API calls 6043->6044 6044->6038 6146 407868 GetFileAttributesA CreateFileA 6045->6146 6047 403e07 6072 403ec0 6047->6072 6147 407aa6 lstrcpynA 6047->6147 6049 403e33 6050 4076be 2 API calls 6049->6050 6051 403e41 6050->6051 6148 407aa6 lstrcpynA 6051->6148 6053 403e52 GetFileSize 6070 403e7c 6053->6070 6054 403f58 6149 4039e1 6054->6149 6055 403a7d ReadFile 6055->6070 6058 403eb4 6060 4039e1 6 API calls 6058->6060 6059 404002 GlobalAlloc 6159 403ac5 SetFilePointer 6059->6159 6060->6072 6063 40402a 6066 403af7 30 API calls 6063->6066 6064 4039e1 6 API calls 6064->6070 6065 403fd6 6067 403a7d ReadFile 6065->6067 6069 40404a 6066->6069 6068 403fea 6067->6068 6068->6059 6068->6072 6071 404079 SetFilePointer 6069->6071 6069->6072 6070->6054 6070->6055 6070->6058 6070->6064 6070->6072 6071->6072 6072->5972 6074 408089 5 API calls 6073->6074 6075 405f07 6074->6075 6076 405f26 6075->6076 6077 405f0c 6075->6077 6078 40792a 3 API calls 6076->6078 6176 4079d3 wsprintfA 6077->6176 6079 405f5c 6078->6079 6083 40792a 3 API calls 6079->6083 6084 405f94 6079->6084 6082 405f21 6160 4048d0 6082->6160 6083->6084 6177 407ad8 lstrcatA 6084->6177 6087 407f4b 17 API calls 6088 405fd5 6087->6088 6089 4060ac 6088->6089 6091 40792a 3 API calls 6088->6091 6090 407f4b 17 API calls 6089->6090 6092 4060ba 6090->6092 6094 406018 6091->6094 6093 4060d7 LoadImageA 6092->6093 6095 407bf6 18 API calls 6092->6095 6096 4061f5 6093->6096 6097 40611f RegisterClassA 6093->6097 6094->6089 6101 40604a 6094->6101 6104 407694 CharNextA 6094->6104 6098 4060d5 6095->6098 6100 403903 2 API calls 6096->6100 6099 406164 SystemParametersInfoA CreateWindowExA 6097->6099 6133 40615d 6097->6133 6098->6093 6099->6096 6103 406201 6100->6103 6178 407ace lstrlenA 6101->6178 6108 4048d0 19 API calls 6103->6108 6103->6133 6104->6101 6111 406211 6108->6111 6114 406303 6111->6114 6115 40621e ShowWindow 6111->6115 6169 4049fd OleInitialize 6114->6169 6119 407ffe 3 API calls 6115->6119 6122 406242 6119->6122 6121 40630f 6124 406331 6121->6124 6125 406314 6121->6125 6123 406254 GetClassInfoA 6122->6123 6126 407ffe 3 API calls 6122->6126 6128 40627a GetClassInfoA RegisterClassA 6123->6128 6129 4062ae DialogBoxParamA 6123->6129 6127 403903 2 API calls 6124->6127 6132 403903 2 API calls 6125->6132 6125->6133 6130 406253 6126->6130 6127->6133 6128->6129 6131 403903 2 API calls 6129->6131 6130->6123 6131->6133 6132->6133 6133->5980 6134->5974 6136->6004 6137->6009 6140 404136 CloseHandle 6139->6140 6141 40414a 6139->6141 6140->6141 6180 4047ca 6141->6180 6144 4083a8 63 API calls 6145 404163 OleUninitialize 6144->6145 6145->5977 6145->5978 6146->6047 6147->6049 6148->6053 6150 403a0c 6149->6150 6151 4039ed 6149->6151 6153 403a24 GetTickCount 6150->6153 6154 403a15 6150->6154 6152 4039f6 DestroyWindow 6151->6152 6156 403a00 6151->6156 6152->6156 6155 403a32 CreateDialogParamA ShowWindow 6153->6155 6153->6156 6157 408638 2 API calls 6154->6157 6155->6156 6156->6059 6156->6072 6158 403ac5 SetFilePointer 6156->6158 6157->6156 6158->6065 6159->6063 6161 4048e5 6160->6161 6179 4079d3 wsprintfA 6161->6179 6163 404963 6164 407bf6 18 API calls 6163->6164 6165 404979 SetWindowTextA 6164->6165 6166 40499d 6165->6166 6167 4049bf 6166->6167 6168 407bf6 18 API calls 6166->6168 6167->6087 6168->6166 6170 4049c7 SendMessageA 6169->6170 6171 404a31 6170->6171 6173 403845 2 API calls 6171->6173 6175 404a54 6171->6175 6172 4049c7 SendMessageA 6174 404a71 OleUninitialize 6172->6174 6173->6171 6174->6121 6175->6172 6176->6082 6179->6163 6181 4047e4 6180->6181 6182 40414f 6181->6182 6183 4047e9 FreeLibrary GlobalFree 6181->6183 6182->6144 6183->6181 6666 401968 6667 401400 18 API calls 6666->6667 6668 401974 6667->6668 6669 401400 18 API calls 6668->6669 6670 401983 6669->6670 6671 401400 18 API calls 6670->6671 6672 401992 MoveFileA 6671->6672 6673 4019b2 6672->6673 6674 4019a6 6672->6674 6675 407f13 2 API calls 6673->6675 6678 402a3c 6673->6678 6676 40163b 23 API calls 6674->6676 6674->6678 6677 4019c7 6675->6677 6676->6678 6677->6678 6679 408101 39 API calls 6677->6679 6679->6674 6680 40236a 6681 402376 6680->6681 6682 402385 GetDlgItem 6681->6682 6683 402530 6682->6683 6686 4079d3 wsprintfA 6683->6686 6685 40253c 6686->6685 6687 6e5c1177 6689 6e5c1180 6687->6689 6688 6e5c11d4 6689->6688 6690 6e5c11b8 free 6689->6690 6690->6688 6691 6e5c4177 6692 6e5c41a0 EnterCriticalSection 6691->6692 6693 6e5c4191 6691->6693 6694 6e5c41d1 LeaveCriticalSection 6692->6694 6696 6e5c41ba 6692->6696 6695 6e5c41e1 6694->6695 6696->6694 6698 6e5c41c0 free LeaveCriticalSection 6696->6698 6698->6695 6699 401771 SetForegroundWindow 6700 40219b 6699->6700 6701 db1fe8 6702 db25f8 2 API calls 6701->6702 6703 db1ff4 IsWindow 6702->6703 6704 db2004 6703->6704 6705 db1607 GetPropA 6704->6705 6706 db2015 6705->6706 6707 db202d 6706->6707 6708 db238d 2 API calls 6706->6708 6708->6707 6709 403376 6710 403394 6709->6710 6711 40339f SetFilePointer 6710->6711 6712 4033c9 6711->6712 6713 4036eb 6712->6713 6714 407bf6 18 API calls 6712->6714 6714->6713 6715 40247c GetDC GetDeviceCaps 6716 401456 6715->6716 6717 4024ad MulDiv 6716->6717 6718 4024d9 6717->6718 6719 407bf6 18 API calls 6718->6719 6720 402520 CreateFontIndirectA 6719->6720 6721 40252f 6720->6721 6724 4079d3 wsprintfA 6721->6724 6723 40253c 6724->6723 6725 40367d 6726 403689 6725->6726 6727 4036ca 6726->6727 6728 4036b0 6726->6728 6731 402a3c 6726->6731 6729 407bf6 18 API calls 6727->6729 6727->6731 6732 407aa6 lstrcpynA 6728->6732 6729->6731 6732->6731 6733 401000 6734 401032 BeginPaint GetClientRect 6733->6734 6735 401017 DefWindowProcA 6733->6735 6737 401078 6734->6737 6740 401212 6735->6740 6738 401130 6737->6738 6739 401084 CreateBrushIndirect FillRect DeleteObject 6737->6739 6741 40113a CreateFontIndirectA 6738->6741 6742 4011db EndPaint 6738->6742 6739->6737 6741->6742 6743 401151 6 API calls 6741->6743 6742->6740 6743->6742 6744 401803 6745 40181c 6744->6745 6746 40180d ShowWindow 6744->6746 6747 40256d ShowWindow 6745->6747 6748 4037d4 6745->6748 6746->6745 6747->6748 6749 406404 GetDlgItem GetDlgItem 6750 406461 7 API calls 6749->6750 6755 4067c1 6749->6755 6751 406587 DeleteObject 6750->6751 6752 406567 SendMessageA 6750->6752 6753 4065a0 6751->6753 6752->6751 6756 407bf6 18 API calls 6753->6756 6759 40660b 6753->6759 6754 4068e3 6757 406920 6754->6757 6758 4069e6 6754->6758 6755->6754 6781 406846 6755->6781 6802 406347 SendMessageA 6755->6802 6762 4065c9 SendMessageA SendMessageA 6756->6762 6763 4067bb 6757->6763 6768 406939 SendMessageA 6757->6768 6760 406a18 6758->6760 6761 4069ef SendMessageA 6758->6761 6764 404b55 18 API calls 6759->6764 6766 406a21 6760->6766 6779 406a6a 6760->6779 6761->6763 6762->6753 6770 404cff 8 API calls 6763->6770 6769 40662e 6764->6769 6765 4068c0 SendMessageA 6765->6754 6772 406a34 6766->6772 6773 406a2a ImageList_Destroy 6766->6773 6768->6763 6775 40696b SendMessageA 6768->6775 6776 404b55 18 API calls 6769->6776 6771 406cba 6770->6771 6772->6763 6777 406a3d GlobalFree 6772->6777 6773->6772 6774 406c4e 6774->6763 6780 406c63 ShowWindow GetDlgItem ShowWindow 6774->6780 6778 406991 6775->6778 6787 40664d 6776->6787 6777->6763 6783 4069af SendMessageA 6778->6783 6779->6774 6786 403903 2 API calls 6779->6786 6795 406a9f 6779->6795 6780->6763 6781->6754 6781->6765 6781->6779 6782 40675b 6784 406761 GetWindowLongA SetWindowLongA 6782->6784 6785 40678f 6782->6785 6783->6779 6784->6785 6789 4067b3 6785->6789 6790 406795 ShowWindow 6785->6790 6786->6795 6787->6782 6788 4066a2 SendMessageA 6787->6788 6791 4066f2 SendMessageA 6787->6791 6792 406716 SendMessageA 6787->6792 6788->6787 6801 404a86 SendMessageA 6789->6801 6790->6789 6791->6787 6792->6787 6794 406bfa InvalidateRect 6794->6774 6796 406c21 6794->6796 6797 406add SendMessageA 6795->6797 6798 406b07 6795->6798 6800 404b92 21 API calls 6796->6800 6797->6798 6798->6794 6799 406b94 SendMessageA SendMessageA 6798->6799 6799->6798 6800->6774 6801->6763 6803 406385 GetMessagePos ScreenToClient SendMessageA 6802->6803 6804 4063cb 6802->6804 6803->6804 6804->6781 5179 401e05 5180 401e0c 5179->5180 5185 401400 5180->5185 5233 407bf6 5185->5233 5188 40144b 5190 4083a8 5188->5190 5272 407f4b 5190->5272 5193 4083e3 5195 401e24 5193->5195 5197 4085bd 5193->5197 5286 407aa6 lstrcpynA 5193->5286 5194 4083c6 DeleteFileA 5194->5195 5323 407f13 FindFirstFileA 5197->5323 5198 408415 5200 408420 5198->5200 5201 408438 5198->5201 5287 407ad8 lstrcatA 5200->5287 5288 4076be lstrlenA 5201->5288 5205 408434 5207 40844f 5205->5207 5209 408461 lstrlenA FindFirstFileA 5205->5209 5292 407ad8 lstrcatA 5207->5292 5213 4085a6 5209->5213 5231 408497 5209->5231 5211 407836 2 API calls 5214 4085db RemoveDirectoryA 5211->5214 5213->5195 5213->5197 5215 4085ea 5214->5215 5216 40861c 5214->5216 5215->5195 5218 4085f0 5215->5218 5219 406dbb 23 API calls 5216->5219 5217 407694 CharNextA 5217->5231 5330 406dbb 5218->5330 5219->5195 5222 408101 39 API calls 5224 408612 5222->5224 5224->5195 5225 40857f FindNextFileA 5226 40859c FindClose 5225->5226 5225->5231 5226->5213 5228 4083a8 56 API calls 5228->5231 5230 406dbb 23 API calls 5230->5231 5231->5217 5231->5225 5231->5228 5231->5230 5293 407aa6 lstrcpynA 5231->5293 5294 407836 GetFileAttributesA 5231->5294 5297 408101 5231->5297 5247 407c06 5233->5247 5234 407ce9 5235 40143a 5234->5235 5265 407aa6 lstrcpynA 5234->5265 5235->5188 5250 407b27 5235->5250 5237 407d15 GetVersion 5237->5247 5238 407cd3 lstrlenA 5238->5247 5240 407dab GetSystemDirectoryA 5240->5247 5243 407dd1 GetWindowsDirectoryA 5243->5247 5244 407bf6 11 API calls 5244->5247 5245 407b27 5 API calls 5245->5247 5246 407df2 SHGetSpecialFolderLocation 5246->5247 5248 407e59 SHGetPathFromIDListA CoTaskMemFree 5246->5248 5247->5234 5247->5237 5247->5238 5247->5240 5247->5243 5247->5244 5247->5245 5247->5246 5259 40792a RegOpenKeyExA 5247->5259 5264 4079d3 wsprintfA 5247->5264 5266 407aa6 lstrcpynA 5247->5266 5267 407ad8 lstrcatA 5247->5267 5248->5247 5257 407b38 5250->5257 5251 407bce CharPrevA 5252 407bc5 5251->5252 5252->5251 5253 407bec 5252->5253 5253->5188 5254 407bb7 CharNextA 5254->5257 5256 407b8c CharNextA 5256->5257 5257->5252 5257->5254 5257->5256 5258 407ba8 CharNextA 5257->5258 5268 407694 5257->5268 5258->5254 5260 407971 RegQueryValueExA 5259->5260 5261 4079cc 5259->5261 5262 4079ac RegCloseKey 5260->5262 5261->5247 5262->5261 5264->5247 5265->5235 5266->5247 5269 4076a1 5268->5269 5270 4076b7 5269->5270 5271 4076ab CharNextA 5269->5271 5270->5257 5271->5269 5344 407aa6 lstrcpynA 5272->5344 5274 407f66 5345 407725 CharNextA CharNextA 5274->5345 5277 407f79 5277->5193 5277->5194 5278 407b27 5 API calls 5284 407f87 5278->5284 5279 407fa7 lstrlenA 5280 407fda 5279->5280 5279->5284 5282 407ae2 3 API calls 5280->5282 5281 407f13 2 API calls 5281->5284 5283 407fdf GetFileAttributesA 5282->5283 5283->5277 5284->5277 5284->5279 5284->5281 5285 4076be 2 API calls 5284->5285 5285->5284 5286->5198 5289 4076d4 5288->5289 5290 4076d9 CharPrevA 5289->5290 5291 4076ec 5289->5291 5290->5289 5290->5291 5291->5205 5293->5231 5295 407861 DeleteFileA 5294->5295 5296 40784f SetFileAttributesA 5294->5296 5295->5231 5296->5295 5351 408089 GetModuleHandleA 5297->5351 5299 4081a5 GetShortPathNameA 5301 4081c5 5299->5301 5302 408398 5299->5302 5301->5302 5305 4081d0 wsprintfA 5301->5305 5302->5231 5304 40816d CloseHandle GetShortPathNameA 5304->5302 5306 408135 5304->5306 5307 407bf6 18 API calls 5305->5307 5306->5299 5306->5302 5308 408213 5307->5308 5358 407868 GetFileAttributesA CreateFileA 5308->5358 5310 408231 5310->5302 5311 40823f GetFileSize GlobalAlloc 5310->5311 5312 408278 ReadFile 5311->5312 5313 40838e CloseHandle 5311->5313 5312->5313 5314 4082a3 5312->5314 5313->5302 5314->5313 5359 4077a4 lstrlenA 5314->5359 5317 4082c2 5364 407aa6 lstrcpynA 5317->5364 5318 4082de 5319 4077a4 3 API calls 5318->5319 5321 4082d8 5319->5321 5322 408337 SetFilePointer WriteFile GlobalFree 5321->5322 5322->5313 5324 407f45 5323->5324 5325 407f36 FindClose 5323->5325 5324->5195 5326 407ae2 lstrlenA CharPrevA 5324->5326 5325->5324 5327 407b0c 5326->5327 5328 407b1c 5326->5328 5368 407ad8 lstrcatA 5327->5368 5328->5211 5331 406dd2 5330->5331 5340 406ee3 5330->5340 5332 406df2 5331->5332 5333 407bf6 18 API calls 5331->5333 5369 407ace lstrlenA 5332->5369 5333->5332 5340->5222 5344->5274 5346 40774a 5345->5346 5347 407694 CharNextA 5346->5347 5350 407766 5346->5350 5348 40777a 5347->5348 5349 407694 CharNextA 5348->5349 5348->5350 5349->5350 5350->5277 5350->5278 5352 4080ab 5351->5352 5353 4080bc GetProcAddress 5351->5353 5365 407ffe GetSystemDirectoryA 5352->5365 5355 4080d2 5353->5355 5355->5302 5355->5306 5357 407868 GetFileAttributesA CreateFileA 5355->5357 5356 4080b3 5356->5353 5356->5355 5357->5304 5358->5310 5360 4077c4 5359->5360 5361 4077f5 5360->5361 5362 4077cf lstrcmpiA 5360->5362 5361->5317 5361->5318 5362->5361 5363 4077f9 CharNextA 5362->5363 5363->5360 5364->5321 5366 40802c wsprintfA LoadLibraryExA 5365->5366 5366->5356 5370 401b06 5371 401400 18 API calls 5370->5371 5372 401b12 5371->5372 5373 401b2b 5372->5373 5374 401b3d 5372->5374 5435 407aa6 lstrcpynA 5373->5435 5436 407aa6 lstrcpynA 5374->5436 5377 401b3b 5381 407b27 5 API calls 5377->5381 5378 401b51 5379 407ae2 3 API calls 5378->5379 5380 401b5b 5379->5380 5437 407ad8 lstrcatA 5380->5437 5383 401b76 5381->5383 5384 407f13 2 API calls 5383->5384 5385 401ba9 5383->5385 5386 401b88 5384->5386 5387 407836 2 API calls 5385->5387 5390 401cce 5385->5390 5392 401c05 5385->5392 5394 407aa6 lstrcpynA 5385->5394 5401 407bf6 18 API calls 5385->5401 5410 401ca5 5385->5410 5415 407868 GetFileAttributesA CreateFileA 5385->5415 5438 407626 5385->5438 5386->5385 5388 401b91 CompareFileTime 5386->5388 5387->5385 5388->5385 5391 406dbb 23 API calls 5390->5391 5393 401cde 5391->5393 5395 406dbb 23 API calls 5392->5395 5416 403af7 5393->5416 5394->5385 5399 401c15 5395->5399 5398 401d25 SetFileTime 5400 401d47 CloseHandle 5398->5400 5400->5399 5402 401d59 5400->5402 5401->5385 5403 401d86 5402->5403 5404 401d5e 5402->5404 5406 407bf6 18 API calls 5403->5406 5405 407bf6 18 API calls 5404->5405 5407 401d72 5405->5407 5412 401cc9 5406->5412 5442 407ad8 lstrcatA 5407->5442 5410->5399 5413 406dbb 23 API calls 5410->5413 5411 407626 MessageBoxIndirectA 5411->5412 5412->5399 5412->5411 5414 407bf6 18 API calls 5412->5414 5413->5412 5414->5412 5415->5385 5417 403b33 5416->5417 5418 403b25 5416->5418 5444 403a7d ReadFile 5417->5444 5443 403ac5 SetFilePointer 5418->5443 5422 401d08 5422->5398 5422->5400 5423 403b5c GetTickCount 5429 403bbb 5423->5429 5424 403d1d 5425 403d8f 5424->5425 5430 403d21 5424->5430 5426 403a7d ReadFile 5425->5426 5426->5422 5427 403a7d ReadFile 5427->5429 5428 403a7d ReadFile 5428->5430 5429->5422 5429->5427 5432 403c4e MulDiv wsprintfA 5429->5432 5433 403cb7 WriteFile 5429->5433 5430->5422 5430->5428 5431 403d28 WriteFile 5430->5431 5431->5422 5431->5430 5434 406dbb 23 API calls 5432->5434 5433->5422 5433->5429 5434->5429 5435->5377 5436->5378 5439 407640 5438->5439 5440 407645 MessageBoxIndirectA 5438->5440 5439->5440 5441 407690 5439->5441 5440->5441 5441->5385 5443->5417 5445 403ab6 5444->5445 5445->5422 5445->5423 5445->5424 6815 401f08 6816 401400 18 API calls 6815->6816 6817 401f14 6816->6817 6818 401400 18 API calls 6817->6818 6819 401f23 6818->6819 6820 401f34 lstrcmpiA 6819->6820 6821 401f3c lstrcmpA 6819->6821 6822 401f42 6820->6822 6821->6822 6823 6e5c120c 6824 6e5c1210 _initterm 6823->6824 5498 db218a SendMessageA ShowWindow 5499 db21d6 5498->5499 5500 db21df KiUserCallbackDispatcher IsDialogMessageA 5499->5500 5501 db2247 SetWindowLongA 5499->5501 5500->5499 5502 db221d IsDialogMessageA 5500->5502 5502->5499 5503 db2231 TranslateMessage DispatchMessageA 5502->5503 5503->5499 5534 402613 5535 401400 18 API calls 5534->5535 5536 40261f 5535->5536 5537 406dbb 23 API calls 5536->5537 5538 402632 5537->5538 5549 407569 CreateProcessA 5538->5549 5540 40263c 5541 4026b1 CloseHandle 5540->5541 5543 402656 WaitForSingleObject 5540->5543 5544 402a3c 5540->5544 5552 408638 5540->5552 5541->5544 5543->5540 5545 40267b GetExitCodeProcess 5543->5545 5545->5541 5546 402699 5545->5546 5556 4079d3 wsprintfA 5546->5556 5550 4075e5 5549->5550 5551 4075d5 CloseHandle 5549->5551 5550->5540 5551->5550 5553 40864d PeekMessageA 5552->5553 5554 408671 DispatchMessageA 5553->5554 5555 40867d 5553->5555 5554->5553 5555->5540 5556->5541 5557 401714 5558 40171c 5557->5558 5561 403845 5558->5561 5563 403854 5561->5563 5562 40172e 5563->5562 5564 4038a0 MulDiv SendMessageA 5563->5564 5564->5563 6825 6e5c3808 6828 6e5c3565 6825->6828 6827 6e5c3828 6829 6e5c35c0 6828->6829 6830 6e5c3581 6828->6830 6829->6827 6830->6829 6831 6e5c35ab GlobalFree 6830->6831 6832 6e5c358b lstrcpynA 6830->6832 6831->6829 6832->6831 6833 db2280 6834 db25f8 2 API calls 6833->6834 6835 db228b 6834->6835 6836 6e5c1000 malloc 6837 6e5c101a 6836->6837 6838 6e5c4100 6839 6e5c4109 6838->6839 6840 6e5c4110 calloc 6838->6840 6841 6e5c412e EnterCriticalSection LeaveCriticalSection 6840->6841 6842 6e5c416b 6840->6842 6841->6842 6843 db20b8 6844 db25f8 2 API calls 6843->6844 6845 db20c3 KillTimer 6844->6845 6846 401e29 6847 401400 18 API calls 6846->6847 6848 401e35 6847->6848 6853 407ace lstrlenA 6848->6853 6854 40342b 6855 401400 18 API calls 6854->6855 6856 403437 FindFirstFileA 6855->6856 6857 403452 6856->6857 6862 4079d3 wsprintfA 6857->6862 6859 40347d 6863 407aa6 lstrcpynA 6859->6863 6861 4036c5 6862->6859 6863->6861 6864 40392c 6865 403941 SetTimer 6864->6865 6866 403967 6864->6866 6867 40396e MulDiv wsprintfA SetWindowTextA 6865->6867 6866->6867 6868 4039d3 6866->6868 6870 4075eb SetDlgItemTextA 6867->6870 6184 6e5c3231 6185 6e5c3268 6184->6185 6226 6e5c22b5 6185->6226 6187 6e5c3276 6188 6e5c33b0 6187->6188 6189 6e5c328e 6187->6189 6190 6e5c3286 6187->6190 6258 6e5c2e88 6189->6258 6276 6e5c2ba2 6190->6276 6193 6e5c3296 6199 6e5c32ad 6193->6199 6200 6e5c32a7 6193->6200 6207 6e5c32b2 6193->6207 6216 6e5c32ab 6193->6216 6194 6e5c3307 6196 6e5c330d 6194->6196 6197 6e5c334f 6194->6197 6195 6e5c32e3 6289 6e5c2c49 6195->6289 6202 6e5c1e70 3 API calls 6196->6202 6203 6e5c2c49 24 API calls 6197->6203 6206 6e5c32d2 6199->6206 6199->6207 6204 6e5c32b9 6200->6204 6200->6216 6208 6e5c332e 6202->6208 6210 6e5c3357 6203->6210 6204->6216 6280 6e5c1a07 6204->6280 6205 6e5c32eb 6312 6e5c1e70 6205->6312 6283 6e5c30a6 6206->6283 6207->6216 6270 6e5c174c 6207->6270 6213 6e5c2c49 24 API calls 6208->6213 6214 6e5c339d 6210->6214 6323 6e5c2bf9 6210->6323 6218 6e5c3346 6213->6218 6214->6188 6217 6e5c33a6 GlobalFree 6214->6217 6216->6194 6216->6195 6217->6188 6218->6210 6223 6e5c3387 6223->6214 6327 6e5c1dc3 wsprintfA 6223->6327 6225 6e5c337d FreeLibrary 6225->6223 6330 6e5c1a84 GlobalAlloc 6226->6330 6228 6e5c22c7 6331 6e5c1a84 GlobalAlloc 6228->6331 6230 6e5c22cf 6332 6e5c1ac3 6230->6332 6232 6e5c24ed 6233 6e5c24ef GlobalFree GlobalFree GlobalFree 6232->6233 6234 6e5c2518 6233->6234 6252 6e5c256b 6233->6252 6236 6e5c2535 6234->6236 6242 6e5c253e 6234->6242 6234->6252 6235 6e5c238e GlobalAlloc 6255 6e5c22d7 6235->6255 6243 6e5c25bd GetModuleHandleA 6236->6243 6236->6252 6237 6e5c2497 lstrcpyA 6237->6255 6238 6e5c283b 6246 6e5c2687 6238->6246 6342 6e5c1a84 GlobalAlloc 6238->6342 6239 6e5c275c 6239->6238 6244 6e5c2772 6239->6244 6239->6246 6256 6e5c2805 6239->6256 6240 6e5c241e GlobalFree 6240->6255 6241 6e5c271b 6241->6246 6251 6e5c2734 lstrcpyA 6241->6251 6242->6252 6339 6e5c1aa4 6242->6339 6248 6e5c25e8 GetProcAddress 6243->6248 6249 6e5c25d4 LoadLibraryA 6243->6249 6254 6e5c1aa4 2 API calls 6244->6254 6245 6e5c28fd GlobalFree 6245->6246 6246->6187 6248->6252 6253 6e5c2613 lstrcatA GetProcAddress 6248->6253 6249->6248 6249->6252 6251->6246 6252->6187 6253->6252 6254->6256 6255->6232 6255->6233 6255->6235 6255->6237 6255->6239 6255->6240 6255->6241 6255->6246 6337 6e5c1e25 GlobalSize GlobalAlloc 6255->6337 6256->6245 6256->6246 6266 6e5c2ea3 6258->6266 6259 6e5c1ac3 3 API calls 6259->6266 6261 6e5c3077 GlobalFree 6261->6266 6269 6e5c309e 6261->6269 6262 6e5c304a lstrlenA 6262->6261 6267 6e5c3046 6262->6267 6263 6e5c2f96 GlobalAlloc MultiByteToWideChar 6265 6e5c3000 GlobalAlloc CLSIDFromString GlobalFree 6263->6265 6263->6267 6264 6e5c1aa4 GlobalAlloc lstrcpyA 6264->6266 6265->6261 6266->6259 6266->6261 6266->6262 6266->6263 6266->6264 6266->6269 6345 6e5c1b78 6266->6345 6267->6261 6267->6262 6349 6e5c2e10 6267->6349 6269->6193 6272 6e5c175e 6270->6272 6271 6e5c1803 LoadImageA 6273 6e5c1821 6271->6273 6272->6271 6274 6e5c191d 6273->6274 6275 6e5c1912 GetLastError 6273->6275 6274->6216 6275->6274 6277 6e5c2bb6 6276->6277 6278 6e5c2bf1 6277->6278 6279 6e5c2bc9 GlobalAlloc 6277->6279 6278->6189 6279->6277 6281 6e5c1a12 6280->6281 6282 6e5c1a52 GlobalFree 6281->6282 6284 6e5c30c4 6283->6284 6285 6e5c30ed GlobalAlloc 6284->6285 6286 6e5c3111 6284->6286 6287 6e5c3121 6285->6287 6286->6287 6288 6e5c3115 GlobalSize 6286->6288 6287->6216 6288->6287 6290 6e5c2c6a 6289->6290 6292 6e5c2f96 GlobalAlloc MultiByteToWideChar 6290->6292 6293 6e5c2c8f lstrcpyA 6290->6293 6294 6e5c2cc8 lstrlenA lstrcpynA 6290->6294 6295 6e5c304a lstrlenA 6290->6295 6296 6e5c2d0b StringFromGUID2 6290->6296 6298 6e5c2d7d WideCharToMultiByte 6290->6298 6299 6e5c2d99 wsprintfA 6290->6299 6301 6e5c2dc9 GlobalFree 6290->6301 6303 6e5c2df6 GlobalFree 6290->6303 6305 6e5c1b12 2 API calls 6290->6305 6310 6e5c2ea3 6290->6310 6353 6e5c1a84 GlobalAlloc 6290->6353 6354 6e5c1b9f 6290->6354 6302 6e5c3000 GlobalAlloc CLSIDFromString GlobalFree 6292->6302 6292->6310 6293->6290 6294->6290 6297 6e5c3077 GlobalFree 6295->6297 6295->6310 6296->6298 6308 6e5c309e 6297->6308 6297->6310 6298->6290 6299->6290 6300 6e5c1aa4 GlobalAlloc lstrcpyA 6300->6310 6301->6290 6302->6297 6303->6290 6304 6e5c2e08 6303->6304 6304->6205 6305->6290 6306 6e5c2e10 VirtualAlloc 6306->6310 6308->6205 6309 6e5c1ac3 3 API calls 6309->6310 6310->6292 6310->6295 6310->6297 6310->6300 6310->6306 6310->6308 6310->6309 6311 6e5c1b78 2 API calls 6310->6311 6311->6310 6358 6e5c1a84 GlobalAlloc 6312->6358 6314 6e5c1e80 6315 6e5c1e89 lstrcpyA 6314->6315 6317 6e5c1ead 6314->6317 6318 6e5c1ecb 6315->6318 6317->6318 6319 6e5c1eb0 wsprintfA 6317->6319 6320 6e5c1b12 6318->6320 6319->6318 6321 6e5c1b6f GlobalFree 6320->6321 6322 6e5c1b26 GlobalAlloc lstrcpynA 6320->6322 6321->6210 6322->6321 6324 6e5c2c11 6323->6324 6325 6e5c2c42 6324->6325 6326 6e5c2c28 GlobalFree 6324->6326 6325->6223 6325->6225 6326->6324 6328 6e5c1b12 2 API calls 6327->6328 6329 6e5c1df3 6328->6329 6329->6214 6330->6228 6331->6230 6333 6e5c1acf 6332->6333 6334 6e5c1b0b 6332->6334 6333->6334 6343 6e5c1a84 GlobalAlloc 6333->6343 6334->6255 6336 6e5c1ae2 lstrcpyA GlobalFree 6336->6334 6338 6e5c1e5f 6337->6338 6338->6255 6344 6e5c1a84 GlobalAlloc 6339->6344 6341 6e5c1aaf lstrcpyA 6341->6252 6342->6256 6343->6336 6344->6341 6346 6e5c1aa4 6345->6346 6352 6e5c1a84 GlobalAlloc 6346->6352 6348 6e5c1aaf lstrcpyA 6348->6266 6350 6e5c2e7d 6349->6350 6351 6e5c2e23 VirtualAlloc 6349->6351 6350->6267 6351->6350 6352->6348 6353->6290 6355 6e5c1bb0 6354->6355 6356 6e5c1bd1 6354->6356 6355->6356 6357 6e5c1bb5 lstrcpyA 6355->6357 6356->6303 6357->6356 6358->6314 6871 40322e 6874 40323c 6871->6874 6872 4032d8 6873 40326b ReadFile 6873->6872 6873->6874 6874->6872 6874->6873 6875 4032bf 6874->6875 6877 4032ef 6874->6877 6879 4079d3 wsprintfA 6875->6879 6877->6872 6878 4032fb SetFilePointer 6877->6878 6878->6872 6879->6872 6880 40552f 6881 405549 6880->6881 6887 405582 6880->6887 6882 404b55 18 API calls 6881->6882 6884 405560 6882->6884 6883 404cff 8 API calls 6885 405598 6883->6885 6888 4075eb SetDlgItemTextA 6884->6888 6887->6883 6359 405a34 6360 405a7f 6359->6360 6361 405a5f 6359->6361 6363 405a8c GetDlgItem 6360->6363 6370 405b50 6360->6370 6429 4075f5 GetDlgItemTextA 6361->6429 6365 405aac 6363->6365 6364 405a6f 6367 407b27 5 API calls 6364->6367 6369 405ac7 SetWindowTextA 6365->6369 6373 407725 3 API calls 6365->6373 6366 405a79 6424 405ebd 6366->6424 6431 4075f5 GetDlgItemTextA 6366->6431 6367->6366 6375 404b55 18 API calls 6369->6375 6370->6366 6374 407bf6 18 API calls 6370->6374 6371 405ca6 6377 407f4b 17 API calls 6371->6377 6372 404cff 8 API calls 6378 405ee0 6372->6378 6379 405ab9 6373->6379 6380 405bc9 SHBrowseForFolderA 6374->6380 6376 405afb 6375->6376 6382 404b55 18 API calls 6376->6382 6383 405cb0 6377->6383 6379->6369 6387 407ae2 3 API calls 6379->6387 6380->6366 6381 405bea CoTaskMemFree 6380->6381 6384 407ae2 3 API calls 6381->6384 6385 405b1b 6382->6385 6432 407aa6 lstrcpynA 6383->6432 6388 405bfc 6384->6388 6430 404a86 SendMessageA 6385->6430 6391 405ac6 6387->6391 6392 405c55 6388->6392 6397 407bf6 18 API calls 6388->6397 6390 405ccb 6394 408089 5 API calls 6390->6394 6391->6369 6446 4075eb SetDlgItemTextA 6392->6446 6393 405b26 6395 408089 5 API calls 6393->6395 6403 405cd9 6394->6403 6398 405b33 6395->6398 6399 405c24 lstrcmpiA 6397->6399 6398->6366 6400 405b3c SHAutoComplete 6398->6400 6399->6392 6404 405c41 6399->6404 6400->6366 6401 405ce2 6447 407aa6 lstrcpynA 6401->6447 6402 405d0a GetDiskFreeSpaceExA 6402->6403 6414 405d35 6402->6414 6403->6401 6403->6402 6408 4076be 2 API calls 6403->6408 6445 407ad8 lstrcatA 6404->6445 6407 405cf2 6409 407725 3 API calls 6407->6409 6408->6403 6410 405d00 6409->6410 6411 405d05 6410->6411 6412 405d77 GetDiskFreeSpaceA 6410->6412 6411->6412 6413 405da9 MulDiv 6412->6413 6412->6414 6413->6414 6415 405e50 6414->6415 6433 404b92 6414->6433 6417 405e89 6415->6417 6419 403903 2 API calls 6415->6419 6449 404b34 KiUserCallbackDispatcher 6417->6449 6419->6417 6421 405e55 6448 4075eb SetDlgItemTextA 6421->6448 6422 405e2e 6425 404b92 21 API calls 6422->6425 6423 405eaa 6423->6424 6427 405eb8 6423->6427 6424->6372 6425->6415 6450 404af5 SendMessageA 6427->6450 6429->6364 6430->6393 6431->6371 6432->6390 6434 404ba5 6433->6434 6435 407bf6 18 API calls 6434->6435 6436 404c2c 6435->6436 6437 407bf6 18 API calls 6436->6437 6438 404c41 6437->6438 6439 407bf6 18 API calls 6438->6439 6440 404c55 6439->6440 6451 407ace lstrlenA 6440->6451 6442 404c65 wsprintfA 6443 4075eb SetDlgItemTextA 6442->6443 6444 404cab 6443->6444 6444->6421 6444->6422 6447->6407 6449->6423 6450->6424 6889 402d34 6890 401400 18 API calls 6889->6890 6891 402d4a 6890->6891 6892 401400 18 API calls 6891->6892 6893 402d59 6892->6893 6894 401400 18 API calls 6893->6894 6895 402d6c GetPrivateProfileStringA 6894->6895 6896 402dab 6895->6896 6900 4036c5 6896->6900 6901 4079d3 wsprintfA 6896->6901 6898 40347d 6902 407aa6 lstrcpynA 6898->6902 6901->6898 6902->6900 6903 6e5c1429 6904 6e5c1430 6903->6904 6936 6e5c3a00 6904->6936 6906 6e5c1416 6909 6e5c1270 6906->6909 6910 6e5c1287 6909->6910 6911 6e5c1300 6909->6911 6913 6e5c12dc 6910->6913 6940 6e5c3de0 6910->6940 6912 6e5c3de0 9 API calls 6911->6912 6915 6e5c1305 6912->6915 6916 6e5c1295 6915->6916 6917 6e5c1318 6915->6917 6919 6e5c33b8 VirtualProtect 6916->6919 6918 6e5c1040 7 API calls 6917->6918 6920 6e5c131d 6918->6920 6921 6e5c12a9 6919->6921 6920->6913 6922 6e5c133d 6920->6922 6923 6e5c1360 6920->6923 6921->6913 6924 6e5c1040 7 API calls 6921->6924 6922->6913 6927 6e5c1040 7 API calls 6922->6927 6925 6e5c13d5 6923->6925 6926 6e5c1365 6923->6926 6924->6913 6928 6e5c33b8 VirtualProtect 6925->6928 6929 6e5c39e0 4 API calls 6926->6929 6927->6913 6928->6921 6930 6e5c136a 6929->6930 6931 6e5c33b8 VirtualProtect 6930->6931 6932 6e5c137e 6931->6932 6932->6913 6933 6e5c33b8 VirtualProtect 6932->6933 6934 6e5c139f 6933->6934 6935 6e5c1040 7 API calls 6934->6935 6935->6921 6937 6e5c3a32 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 6936->6937 6938 6e5c3a23 6936->6938 6939 6e5c3a88 6937->6939 6938->6906 6939->6906 6941 6e5c3de9 6940->6941 6943 6e5c3df0 6940->6943 6941->6916 6942 6e5c3ee3 6942->6916 6943->6942 6944 6e5c3ef0 6943->6944 6946 6e5c3e7e 6943->6946 6944->6942 6955 6e5c3ca0 6944->6955 6946->6942 6948 6e5c3c40 fwrite vfprintf abort 6946->6948 6949 6e5c3ca0 6948->6949 6950 6e5c3d0e VirtualQuery 6949->6950 6952 6e5c3d7f 6949->6952 6951 6e5c3d3d 6950->6951 6950->6952 6951->6952 6953 6e5c3d51 VirtualProtect 6951->6953 6952->6942 6953->6952 6954 6e5c3d94 GetLastError 6953->6954 6954->6952 6956 6e5c3cb4 6955->6956 6957 6e5c3dca 6956->6957 6960 6e5c3d0e VirtualQuery 6956->6960 6964 6e5c3d7f 6956->6964 6958 6e5c3c40 6 API calls 6957->6958 6959 6e5c3dda 6958->6959 6961 6e5c3d3d 6960->6961 6962 6e5c3daa 6960->6962 6961->6964 6965 6e5c3d51 VirtualProtect 6961->6965 6963 6e5c3c40 6 API calls 6962->6963 6963->6957 6964->6944 6965->6964 6966 6e5c3d94 GetLastError 6965->6966 6967 6e5c3c40 6 API calls 6966->6967 6967->6962 6968 401737 6969 406dbb 23 API calls 6968->6969 6970 401747 6969->6970 6971 402339 6972 401456 6971->6972 6973 402345 IsWindow 6972->6973 6974 40234f 6973->6974 6975 40183b 6976 401400 18 API calls 6975->6976 6977 401847 SetFileAttributesA 6976->6977 6978 401aff 6977->6978 6979 6e5c1927 6980 6e5c193f 6979->6980 6981 6e5c1e25 2 API calls 6980->6981 6982 6e5c195a 6981->6982 6983 40483c 6984 40484e 6983->6984 6985 404858 GlobalAlloc 6984->6985 6986 404876 6984->6986 6985->6986 6987 406cc7 6988 406ce1 6987->6988 6989 406cfb 6987->6989 6988->6989 6990 406ce7 6988->6990 6991 406d03 IsWindowVisible 6989->6991 6992 406d21 6989->6992 6993 4049c7 SendMessageA 6990->6993 6994 406d11 6991->6994 6995 406d8d CallWindowProcA 6991->6995 6992->6995 7006 407aa6 lstrcpynA 6992->7006 6996 406cf3 6993->6996 6997 406347 4 API calls 6994->6997 6995->6996 6997->6992 6999 406d56 7007 4079d3 wsprintfA 6999->7007 7001 406d68 7002 403903 2 API calls 7001->7002 7003 406d76 7002->7003 7008 407aa6 lstrcpynA 7003->7008 7005 406d8b 7005->6995 7006->6999 7007->7001 7008->7005 7009 6e5c1ed4 7010 6e5c1ac3 3 API calls 7009->7010 7011 6e5c1ef5 7010->7011 7012 6e5c1ac3 3 API calls 7011->7012 7013 6e5c1f00 7012->7013 7014 6e5c1ac3 3 API calls 7013->7014 7017 6e5c1f4f 7013->7017 7015 6e5c1f23 7014->7015 7016 6e5c1f31 GlobalFree 7015->7016 7016->7017 7018 6e5c1b12 2 API calls 7017->7018 7019 6e5c21fc GlobalFree GlobalFree 7018->7019 7020 4023c9 GetDlgItem GetClientRect 7021 401400 18 API calls 7020->7021 7022 402419 LoadImageA SendMessageA 7021->7022 7023 40246e DeleteObject 7022->7023 7024 40382f 7022->7024 7023->7024 7028 6e5c35d0 GlobalAlloc lstrcpynA 7029 6e5c3627 7028->7029 7030 6e5c2ad2 7031 6e5c2b08 7030->7031 7032 6e5c22b5 19 API calls 7031->7032 7033 6e5c2b16 7032->7033 7034 6e5c2b5a 7033->7034 7035 6e5c2b37 7033->7035 7037 6e5c1e70 3 API calls 7034->7037 7047 6e5c2b8a 7034->7047 7036 6e5c1dc3 3 API calls 7035->7036 7038 6e5c2b3f 7036->7038 7040 6e5c2b68 7037->7040 7039 6e5c1e70 3 API calls 7038->7039 7041 6e5c2b47 7039->7041 7042 6e5c1b12 2 API calls 7040->7042 7043 6e5c1b12 2 API calls 7041->7043 7044 6e5c2b70 GlobalFree 7042->7044 7045 6e5c2b4f GlobalFree 7043->7045 7046 6e5c2b85 GlobalFree 7044->7046 7044->7047 7045->7047 7046->7047 7048 4033cf FindClose 7049 db214b 7052 db20d9 7049->7052 7053 db25f8 2 API calls 7052->7053 7054 db20e6 7053->7054 7055 db25f8 2 API calls 7054->7055 7056 db20ed IsWindow 7055->7056 7057 db20fd 7056->7057 7058 db2105 7056->7058 7059 db1607 GetPropA 7057->7059 7059->7058 7060 db1649 7061 db1607 GetPropA 7060->7061 7062 db165f 7061->7062 7063 db16bd 7062->7063 7064 db166d LoadCursorA SetCursor 7062->7064 7065 db1695 CallWindowProcA 7062->7065 7064->7063 7065->7063 7066 4026d3 7067 401400 18 API calls 7066->7067 7068 4026df 7067->7068 7069 407f13 2 API calls 7068->7069 7070 4026e8 7069->7070 7072 402704 7070->7072 7073 4079d3 wsprintfA 7070->7073 7073->7072 7074 4016d4 7075 401cc4 7074->7075 7076 406dbb 23 API calls 7075->7076 7077 401cc9 7076->7077 7078 407bf6 18 API calls 7077->7078 7079 402cb4 7077->7079 7080 407626 MessageBoxIndirectA 7077->7080 7078->7077 7080->7077 7081 402bd6 7082 401400 18 API calls 7081->7082 7083 402be2 7082->7083 7084 401400 18 API calls 7083->7084 7085 402bf1 7084->7085 7086 401400 18 API calls 7085->7086 7087 402c00 7086->7087 7088 407f13 2 API calls 7087->7088 7089 402c0b 7088->7089 7090 402c8d 7089->7090 7099 407ace lstrlenA 7089->7099 7092 406dbb 23 API calls 7090->7092 7096 402ca1 7092->7096 5634 4037d8 SendMessageA 5635 40380d InvalidateRect 5634->5635 5636 40382c 5634->5636 5635->5636 7100 6e5c15c4 7101 6e5c15fb 7100->7101 7102 6e5c1ac3 3 API calls 7101->7102 7106 6e5c1609 7102->7106 7103 6e5c1739 GlobalFree 7104 6e5c165e GlobalAlloc 7104->7106 7105 6e5c1b78 2 API calls 7105->7106 7106->7103 7106->7104 7106->7105 7107 6e5c1ac3 3 API calls 7106->7107 7108 6e5c1b12 2 API calls 7106->7108 7109 6e5c1728 GlobalFree 7106->7109 7110 6e5c1b9f lstrcpyA 7106->7110 7111 6e5c16c4 GlobalFree 7106->7111 7107->7106 7108->7106 7109->7106 7110->7109 7111->7106 5637 db1a41 5638 db1a7a 5637->5638 5647 db25f8 5638->5647 5640 db1a90 GetDlgItem GetWindowRect MapWindowPoints CreateDialogParamA 5641 db1b15 SetWindowPos SetWindowLongA GetProcessHeap HeapAlloc 5640->5641 5642 db1b04 5640->5642 5644 db2668 3 API calls 5641->5644 5643 db23ef 2 API calls 5642->5643 5645 db1b10 5643->5645 5646 db1bc4 5644->5646 5645->5646 5648 db238d 2 API calls 5647->5648 5649 db2618 5648->5649 5649->5640 5650 404ddd 5651 404e03 5650->5651 5652 404df7 5650->5652 5654 404e15 GetDlgItem GetDlgItem 5651->5654 5655 404e8d 5651->5655 5652->5651 5653 40534f 5652->5653 5658 405354 SetWindowPos 5653->5658 5659 405396 5653->5659 5718 404b55 5654->5718 5657 404eb1 5655->5657 5669 403845 2 API calls 5655->5669 5673 404f24 5657->5673 5721 4049c7 5657->5721 5662 405498 5658->5662 5663 40539b ShowWindow 5659->5663 5664 4053bf 5659->5664 5660 404e61 SetClassLongA 5667 403903 MulDiv SendMessageA 5660->5667 5734 404cff 5662->5734 5663->5662 5665 4053e1 5664->5665 5666 4053c7 KiUserCallbackDispatcher 5664->5666 5671 4053e6 SetWindowLongA 5665->5671 5672 40540c 5665->5672 5670 4051d3 5666->5670 5667->5655 5674 404edf 5669->5674 5670->5673 5681 40532d ShowWindow 5670->5681 5671->5673 5672->5662 5675 405418 GetDlgItem 5672->5675 5674->5657 5676 404ee5 SendMessageA 5674->5676 5679 405440 SendMessageA IsWindowEnabled 5675->5679 5680 405431 5675->5680 5676->5673 5678 40516a DestroyWindow EndDialog 5678->5670 5679->5680 5682 405478 5679->5682 5684 405483 5680->5684 5685 4054a1 5680->5685 5686 4054e7 SendMessageA 5680->5686 5692 405437 5680->5692 5681->5673 5682->5673 5683 407bf6 18 API calls 5709 404ebd 5683->5709 5684->5686 5684->5692 5688 4054c3 5685->5688 5689 4054aa 5685->5689 5686->5662 5691 403903 2 API calls 5688->5691 5690 403903 2 API calls 5689->5690 5690->5692 5691->5692 5692->5662 5728 404ab8 5692->5728 5693 404b55 18 API calls 5693->5709 5694 404b55 18 API calls 5695 404fac GetDlgItem 5694->5695 5696 404fd7 ShowWindow KiUserCallbackDispatcher 5695->5696 5697 404fce 5695->5697 5724 404b34 KiUserCallbackDispatcher 5696->5724 5697->5696 5699 40501c KiUserCallbackDispatcher 5699->5709 5700 40504a EnableMenuItem SendMessageA 5701 40509f SendMessageA 5700->5701 5700->5709 5701->5709 5704 4051b8 KiUserCallbackDispatcher 5704->5670 5705 4051f7 CreateDialogParamA 5704->5705 5705->5670 5706 405238 5705->5706 5708 404b55 18 API calls 5706->5708 5710 40524f GetDlgItem GetWindowRect ScreenToClient SetWindowPos 5708->5710 5709->5673 5709->5678 5709->5683 5709->5693 5709->5694 5709->5700 5709->5704 5711 407bf6 18 API calls 5709->5711 5725 404a86 SendMessageA 5709->5725 5726 407aa6 lstrcpynA 5709->5726 5727 407ace lstrlenA 5709->5727 5731 403903 5709->5731 5712 403845 2 API calls 5710->5712 5713 405104 SetWindowTextA 5711->5713 5714 4052de 5712->5714 5715 403845 2 API calls 5713->5715 5714->5673 5716 4052ed ShowWindow 5714->5716 5715->5709 5717 4049c7 SendMessageA 5716->5717 5717->5670 5719 407bf6 18 API calls 5718->5719 5720 404b7c 5719->5720 5722 4049d0 SendMessageA 5721->5722 5723 4049fa 5721->5723 5722->5723 5723->5709 5724->5699 5725->5709 5726->5709 5729 404ac6 5728->5729 5730 404acc SendMessageA 5728->5730 5729->5730 5730->5662 5732 403845 2 API calls 5731->5732 5733 403925 5732->5733 5733->5709 5735 404d1e GetWindowLongA 5734->5735 5744 404d17 5734->5744 5736 404d3a 5735->5736 5735->5744 5737 404d42 GetSysColor 5736->5737 5738 404d4c 5736->5738 5737->5738 5739 404d61 SetBkMode 5738->5739 5740 404d52 SetTextColor 5738->5740 5741 404d8c 5739->5741 5742 404d7f GetSysColor 5739->5742 5740->5739 5743 404d92 SetBkColor 5741->5743 5745 404da4 5741->5745 5742->5741 5743->5745 5744->5673 5745->5744 5746 404dc1 CreateBrushIndirect 5745->5746 5747 404db7 DeleteObject 5745->5747 5746->5744 5747->5746 5825 4020e0 5826 40216e 5825->5826 5830 4020f0 5825->5830 5827 4021a1 GlobalAlloc 5826->5827 5828 402172 5826->5828 5829 407bf6 18 API calls 5827->5829 5836 40219b 5828->5836 5845 407aa6 lstrcpynA 5828->5845 5829->5836 5833 40212e 5830->5833 5841 402101 5830->5841 5832 407bf6 18 API calls 5832->5841 5843 407aa6 lstrcpynA 5833->5843 5834 402189 GlobalFree 5834->5836 5837 402141 5844 407aa6 lstrcpynA 5837->5844 5838 407626 MessageBoxIndirectA 5838->5841 5840 402157 5846 407aa6 lstrcpynA 5840->5846 5841->5832 5841->5836 5841->5838 5843->5837 5844->5840 5845->5834 5846->5836 5853 4021e3 5854 4021ef 5853->5854 5855 402216 5854->5855 5856 401400 18 API calls 5854->5856 5857 40222e 5855->5857 5859 401400 18 API calls 5855->5859 5856->5855 5858 4022c6 5857->5858 5862 402245 5857->5862 5860 401400 18 API calls 5858->5860 5859->5857 5861 4022cb 5860->5861 5863 401400 18 API calls 5861->5863 5865 4022a9 SendMessageA 5862->5865 5866 402269 SendMessageTimeoutA 5862->5866 5864 4022de FindWindowExA 5863->5864 5868 402308 5864->5868 5865->5868 5866->5868 5867 402332 5868->5867 5870 4079d3 wsprintfA 5868->5870 5870->5867 7112 6e5c12f9 7113 6e5c1300 7112->7113 7114 6e5c3de0 9 API calls 7113->7114 7115 6e5c1305 7114->7115 7116 6e5c1318 7115->7116 7117 6e5c12a4 7115->7117 7118 6e5c1040 7 API calls 7116->7118 7119 6e5c33b8 VirtualProtect 7117->7119 7121 6e5c131d 7118->7121 7122 6e5c12a9 7119->7122 7120 6e5c12dc 7121->7120 7123 6e5c133d 7121->7123 7124 6e5c1360 7121->7124 7122->7120 7125 6e5c1040 7 API calls 7122->7125 7123->7120 7128 6e5c1040 7 API calls 7123->7128 7126 6e5c13d5 7124->7126 7127 6e5c1365 7124->7127 7125->7120 7129 6e5c33b8 VirtualProtect 7126->7129 7130 6e5c39e0 4 API calls 7127->7130 7128->7120 7129->7122 7131 6e5c136a 7130->7131 7132 6e5c33b8 VirtualProtect 7131->7132 7133 6e5c137e 7132->7133 7133->7120 7134 6e5c33b8 VirtualProtect 7133->7134 7135 6e5c139f 7134->7135 7136 6e5c1040 7 API calls 7135->7136 7136->7122 7137 6e5c13f9 7138 6e5c1430 7137->7138 7142 6e5c1416 7137->7142 7140 6e5c3a00 5 API calls 7138->7140 7139 6e5c1270 21 API calls 7141 6e5c1423 7139->7141 7140->7142 7142->7139 5930 401ae6 5931 401400 18 API calls 5930->5931 5932 401af2 5931->5932 5933 401aff 5932->5933 5935 4078c4 5932->5935 5936 4078d8 5935->5936 5937 407917 5936->5937 5938 4078db GetTickCount GetTempFileNameA 5936->5938 5937->5933 5938->5936 5938->5937 7143 6e5c14f4 7144 6e5c1ac3 3 API calls 7143->7144 7146 6e5c1512 7144->7146 7145 6e5c1595 7146->7145 7148 6e5c152f 7146->7148 7157 6e5c1d90 7146->7157 7149 6e5c1d90 4 API calls 7148->7149 7150 6e5c1544 7149->7150 7151 6e5c154b GlobalSize 7150->7151 7152 6e5c1557 7150->7152 7151->7152 7153 6e5c155b GlobalAlloc 7152->7153 7155 6e5c1578 7152->7155 7154 6e5c1dc3 3 API calls 7153->7154 7154->7155 7156 6e5c158b GlobalFree 7155->7156 7156->7145 7158 6e5c1ac3 3 API calls 7157->7158 7159 6e5c1d9d 7158->7159 7160 6e5c1dbc 7159->7160 7161 6e5c1dae GlobalFree 7159->7161 7160->7148 7161->7160 7162 db2471 7163 db249a 7162->7163 7164 db247e 7162->7164 7164->7163 7165 db2483 lstrcpyA 7164->7165 7165->7163 7166 4019ea 7167 401400 18 API calls 7166->7167 7168 4019f6 GetFullPathNameA 7167->7168 7169 401a25 7168->7169 7175 401a58 7168->7175 7172 407f13 2 API calls 7169->7172 7169->7175 7170 401a7b GetShortPathNameA 7171 403831 7170->7171 7173 401a3e 7172->7173 7173->7175 7176 407aa6 lstrcpynA 7173->7176 7175->7170 7175->7171 7176->7175 7177 db2077 7178 db25f8 2 API calls 7177->7178 7179 db2083 7178->7179 7180 db25f8 2 API calls 7179->7180 7181 db208a 7180->7181 7182 db20b3 7181->7182 7183 db2092 SetTimer 7181->7183 7183->7182 7184 6e5c3df0 7186 6e5c3e08 7184->7186 7185 6e5c3ee3 7186->7185 7187 6e5c3ef0 7186->7187 7189 6e5c3e7e 7186->7189 7187->7185 7188 6e5c3ca0 9 API calls 7187->7188 7188->7187 7189->7185 7190 6e5c3c40 6 API calls 7189->7190 7190->7185 7191 db2175 7194 db211d 7191->7194 7195 db25f8 2 API calls 7194->7195 7196 db2128 7195->7196 7197 6e5c42ec 7198 6e5c42f0 7197->7198 7199 6e5c4090 4 API calls 7198->7199 7200 6e5c425d 7199->7200 7201 6e5c4245 7200->7201 7202 6e5c4270 free 7200->7202 7203 6e5c4281 DeleteCriticalSection 7200->7203 7202->7202 7202->7203 7203->7201 7208 4033f2 7209 403401 7208->7209 7210 403429 7208->7210 7211 40340f FindNextFileA 7209->7211 7213 40347d 7210->7213 7216 4079d3 wsprintfA 7210->7216 7211->7210 7217 407aa6 lstrcpynA 7213->7217 7215 4036c5 7216->7213 7217->7215 7218 6e5c41e9 7219 6e5c41f0 free LeaveCriticalSection 7218->7219 7221 6e5c41e1 7219->7221 7222 4017f7 7223 402530 7222->7223 7226 4079d3 wsprintfA 7223->7226 7225 40253c 7226->7225 6457 406efb 6458 407195 6457->6458 6473 406f1c 6457->6473 6459 4071f4 6458->6459 6460 40719d GetDlgItem CreateThread CloseHandle 6458->6460 6462 4071fc 6459->6462 6463 40723f 6459->6463 6461 4072aa 6460->6461 6507 4049fd 5 API calls 6460->6507 6465 40747b 6461->6465 6471 4072bd SendMessageA 6461->6471 6464 407208 ShowWindow ShowWindow 6462->6464 6462->6465 6463->6461 6466 407263 ShowWindow 6463->6466 6479 407250 6463->6479 6506 404a86 SendMessageA 6464->6506 6467 404cff 8 API calls 6465->6467 6470 407284 6466->6470 6466->6479 6472 407477 6467->6472 6469 407239 6469->6465 6474 406dbb 23 API calls 6470->6474 6471->6472 6476 4072ec CreatePopupMenu 6471->6476 6504 404a86 SendMessageA 6473->6504 6474->6479 6475 404ab8 SendMessageA 6475->6461 6477 407bf6 18 API calls 6476->6477 6480 407308 AppendMenuA 6477->6480 6479->6475 6482 407330 GetWindowRect 6480->6482 6483 40734a 6480->6483 6481 406fa9 6485 406fb6 GetClientRect GetSystemMetrics SendMessageA SendMessageA 6481->6485 6484 407354 TrackPopupMenu 6482->6484 6483->6484 6484->6472 6486 40738e 6484->6486 6487 407037 SendMessageA SendMessageA 6485->6487 6488 40706f 6485->6488 6491 4073b4 SendMessageA 6486->6491 6492 4073dc OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 6486->6492 6487->6488 6489 407075 SendMessageA 6488->6489 6490 407098 6488->6490 6489->6490 6493 404b55 18 API calls 6490->6493 6491->6486 6494 40741a SendMessageA 6492->6494 6495 4070b5 6493->6495 6494->6494 6498 407454 GlobalUnlock SetClipboardData CloseClipboard 6494->6498 6496 4070c1 ShowWindow 6495->6496 6497 40710c SendMessageA 6495->6497 6499 4070e4 ShowWindow 6496->6499 6500 4070f5 6496->6500 6497->6472 6503 407155 SendMessageA SendMessageA 6497->6503 6498->6472 6499->6500 6505 404a86 SendMessageA 6500->6505 6503->6472 6504->6481 6505->6497 6506->6469 7230 6e5c159d 7231 6e5c1d90 4 API calls 7230->7231 7232 6e5c15b8 GlobalFree 7231->7232 7233 402583 7234 401400 18 API calls 7233->7234 7235 40258f 7234->7235 7236 401400 18 API calls 7235->7236 7237 40259e 7236->7237 7238 401400 18 API calls 7237->7238 7239 4025ad 7238->7239 7240 401400 18 API calls 7239->7240 7241 4025bc 7240->7241 7242 40163b 23 API calls 7241->7242 7243 4025c9 ShellExecuteA 7242->7243 7244 6e5c4199 7245 6e5c41a0 EnterCriticalSection 7244->7245 7246 6e5c41d1 LeaveCriticalSection 7245->7246 7248 6e5c41ba 7245->7248 7247 6e5c41e1 7246->7247 7248->7246 7250 6e5c41c0 free LeaveCriticalSection 7248->7250 7250->7247 5446 402988 5447 401400 18 API calls 5446->5447 5448 402994 5447->5448 5449 401400 18 API calls 5448->5449 5450 4029a7 5449->5450 5451 401400 18 API calls 5450->5451 5452 4029b6 5451->5452 5453 401400 18 API calls 5452->5453 5454 4029c9 5453->5454 5455 401400 18 API calls 5454->5455 5457 4029d8 5455->5457 5456 4029f9 CoCreateInstance 5459 402a2f 5456->5459 5466 402a46 5456->5466 5457->5456 5458 401400 18 API calls 5457->5458 5460 4029f8 5458->5460 5468 40163b 5459->5468 5460->5456 5462 402a3b 5463 402b7c 5463->5459 5464 402bc5 5463->5464 5465 40163b 23 API calls 5464->5465 5465->5462 5466->5463 5467 402b39 MultiByteToWideChar 5466->5467 5467->5463 5469 406dbb 23 API calls 5468->5469 5470 401654 5469->5470 5470->5462 7251 403089 7252 4015b0 19 API calls 7251->7252 7253 403095 7252->7253 7254 4030e5 RegEnumValueA 7253->7254 7255 4030c7 RegEnumKeyA 7253->7255 7257 402a3c 7253->7257 7256 40312b RegCloseKey 7254->7256 7254->7257 7255->7256 7256->7257 7258 6e5c398c 7260 6e5c3990 7258->7260 7259 6e5c3940 4 API calls 7261 6e5c39bb 7259->7261 7260->7259 5504 403491 5505 401400 18 API calls 5504->5505 5507 40349d 5505->5507 5506 4034b9 5509 407836 2 API calls 5506->5509 5507->5506 5508 401400 18 API calls 5507->5508 5508->5506 5510 4034c2 5509->5510 5532 407868 GetFileAttributesA CreateFileA 5510->5532 5512 4034db 5513 403500 GlobalAlloc 5512->5513 5514 4034e7 DeleteFileA 5512->5514 5516 403644 CloseHandle 5513->5516 5517 40352f 5513->5517 5515 40366f 5514->5515 5520 40163b 23 API calls 5515->5520 5523 403677 5515->5523 5516->5514 5518 403668 5516->5518 5533 403ac5 SetFilePointer 5517->5533 5518->5515 5520->5523 5521 40353b 5522 403a7d ReadFile 5521->5522 5524 40354e GlobalAlloc 5522->5524 5525 40356b 5524->5525 5526 4035dd WriteFile GlobalFree 5524->5526 5528 403af7 30 API calls 5525->5528 5527 403af7 30 API calls 5526->5527 5529 40363f 5527->5529 5531 40358f 5528->5531 5529->5516 5530 4035d3 GlobalFree 5530->5526 5531->5530 5532->5512 5533->5521 7262 6e5c3b89 7263 6e5c3ba1 7262->7263 7264 6e5c4220 7 API calls 7263->7264 7265 6e5c3bb5 7263->7265 7264->7265 7266 40239a 7267 401456 7266->7267 7268 4023ae SetWindowLongA 7267->7268 7269 40382c 7268->7269 7270 db1000 7271 db100c SendMessageA 7270->7271 7272 db1032 7270->7272 7271->7272 7273 40599b 7274 4059b1 7273->7274 7275 4059d9 7273->7275 7283 4075f5 GetDlgItemTextA 7274->7283 7276 405a29 7275->7276 7277 4059de SHGetPathFromIDListA 7275->7277 7279 4059f4 7277->7279 7282 4059c1 SendMessageA 7277->7282 7281 403903 2 API calls 7279->7281 7281->7282 7282->7276 7283->7282 7284 6e5c4380 strlen 7285 6e5c43a5 7284->7285 7287 6e5c439a 7284->7287 7286 6e5c43ea strncmp 7286->7287 7288 6e5c4402 7286->7288 7287->7285 7287->7286 7289 6e5c4410 7287->7289 5748 402f9d 5759 4015b0 5748->5759 5750 402fa9 5751 401400 18 API calls 5750->5751 5752 402fbc 5751->5752 5753 402fd1 RegQueryValueExA 5752->5753 5756 402a3c 5752->5756 5754 403015 5753->5754 5755 403025 RegCloseKey 5753->5755 5754->5755 5763 4079d3 wsprintfA 5754->5763 5755->5756 5760 401400 18 API calls 5759->5760 5761 4015cc RegOpenKeyExA 5760->5761 5761->5750 5763->5755 5764 40319e 5765 4031c0 5764->5765 5766 4031a7 5764->5766 5767 401400 18 API calls 5765->5767 5770 403831 5766->5770 5771 4031f8 WriteFile 5766->5771 5768 4031cc 5767->5768 5772 407ace lstrlenA 5768->5772 5771->5770 7290 401a9e 7291 401400 18 API calls 7290->7291 7292 401aaa SearchPathA 7291->7292 7294 402dab 7292->7294 7293 4036c5 7294->7293 7298 4079d3 wsprintfA 7294->7298 7296 40347d 7299 407aa6 lstrcpynA 7296->7299 7298->7296 7299->7293 5847 db153a 5848 db1559 CallWindowProcA 5847->5848 5849 db1555 5847->5849 5850 db15fb 5848->5850 5851 db1589 5848->5851 5849->5848 5849->5850 5851->5850 5852 db158d DestroyWindow GetProcessHeap HeapFree 5851->5852 5852->5850 7300 db1038 7301 db238d 2 API calls 7300->7301 7302 db1072 7301->7302 7303 db1078 7302->7303 7305 db238d 2 API calls 7302->7305 7304 db23ef 2 API calls 7303->7304 7307 db1084 7304->7307 7306 db109f 7305->7306 7306->7303 7308 db10a5 SHBrowseForFolderA 7306->7308 7308->7303 7309 db1108 SHGetPathFromIDListA 7308->7309 7310 db111b 7309->7310 7311 db23ef 2 API calls 7310->7311 7312 db112c CoTaskMemFree 7311->7312 7312->7307 5887 6e5c33b8 5888 6e5c33cc VirtualProtect 5887->5888 5889 6e5c3434 5887->5889 5888->5889 7313 db113f 7314 db238d 2 API calls 7313->7314 7315 db11a7 7314->7315 7316 db238d 2 API calls 7315->7316 7317 db11bd 7316->7317 7318 db238d 2 API calls 7317->7318 7319 db11d3 lstrcmpiA GetFileAttributesA 7318->7319 7320 db1229 7319->7320 7321 db1200 7319->7321 7323 db1249 7320->7323 7324 db1232 lstrcpyA 7320->7324 7321->7320 7322 db1204 lstrcpyA 7321->7322 7322->7320 7325 db126b GetCurrentDirectoryA 7323->7325 7326 db125f CharNextA 7323->7326 7324->7323 7327 db128d GetSaveFileNameA 7325->7327 7328 db1295 GetOpenFileNameA 7325->7328 7326->7323 7329 db129b 7327->7329 7328->7329 7330 db12ae CommDlgExtendedError 7329->7330 7331 db12a5 7329->7331 7330->7331 7332 db12bb 7330->7332 7335 db23ef 2 API calls 7331->7335 7333 db12c9 GetSaveFileNameA 7332->7333 7334 db12d1 GetOpenFileNameA 7332->7334 7333->7331 7334->7331 7336 db12ed SetCurrentDirectoryA 7335->7336 5890 4055a5 5891 4055c0 5890->5891 5892 40576b 5890->5892 5895 404b55 18 API calls 5891->5895 5893 405777 5892->5893 5894 4057fb 5892->5894 5897 405969 5893->5897 5900 4057a0 GetDlgItem SendMessageA 5893->5900 5896 405804 GetDlgItem 5894->5896 5894->5897 5898 40562a 5895->5898 5902 405827 5896->5902 5904 4058f2 5896->5904 5899 404cff 8 API calls 5897->5899 5901 404b55 18 API calls 5898->5901 5903 40598a 5899->5903 5928 404b34 KiUserCallbackDispatcher 5900->5928 5907 405647 CheckDlgButton 5901->5907 5902->5904 5908 405855 SendMessageA 5902->5908 5904->5897 5905 405904 5904->5905 5909 405933 5905->5909 5910 40590a SendMessageA 5905->5910 5925 404b34 KiUserCallbackDispatcher 5907->5925 5916 405892 SetCursor ShellExecuteA 5908->5916 5909->5903 5913 40593e SendMessageA 5909->5913 5910->5909 5911 4057f0 5929 404af5 SendMessageA 5911->5929 5913->5903 5915 405670 GetDlgItem 5926 404a86 SendMessageA 5915->5926 5920 4058ea SetCursor 5916->5920 5917 4057f6 5917->5897 5919 405691 SendMessageA 5921 4056d0 SendMessageA SendMessageA 5919->5921 5922 4056c4 GetSysColor 5919->5922 5920->5904 5927 407ace lstrlenA 5921->5927 5922->5921 5924 40571e SendMessageA SendMessageA 5924->5903 5925->5915 5926->5919 5928->5911 5929->5917 7337 db233c 7338 db2386 7337->7338 7339 db2355 7337->7339 7339->7338 7340 db235f lstrcpyA 7339->7340 7341 db2371 GlobalFree 7339->7341 7340->7341 7341->7338 7342 402ca8 7344 402cb4 7342->7344 7346 402101 7342->7346 7343 407bf6 18 API calls 7343->7346 7345 407626 MessageBoxIndirectA 7345->7346 7346->7342 7346->7343 7346->7345 7347 6e5c10b7 7349 6e5c10c0 7347->7349 7348 6e5c10ae 7349->7348 7350 6e5c1102 7349->7350 7351 6e5c10e8 Sleep 7349->7351 7352 6e5c1112 7350->7352 7353 6e5c1233 _amsg_exit 7350->7353 7351->7349 7354 6e5c111f 7352->7354 7355 6e5c1210 _initterm 7352->7355 7356 6e5c1244 _initterm 7353->7356 7354->7356 7357 6e5c112d 7354->7357 7358 4027ab 7360 4027c6 7358->7360 7359 4027e5 GlobalFree 7365 403677 7359->7365 7360->7359 7366 4079d3 wsprintfA 7360->7366 7363 40282d 7367 4079d3 wsprintfA 7363->7367 7366->7363 7367->7359 7368 6e5c14b0 7369 6e5c1d90 4 API calls 7368->7369 7370 6e5c14cb 7369->7370 7371 6e5c14d8 GlobalAlloc 7370->7371 7372 6e5c14cf wsprintfA 7370->7372 7371->7372 7374 6e5c1b12 2 API calls 7372->7374 7375 6e5c1df3 7374->7375 7376 6e5c3ab0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess abort 7377 6e5c3b4c 7376->7377 7378 6e5c4220 7 API calls 7377->7378 7379 6e5c3b50 7377->7379 7380 6e5c3b78 7378->7380 7381 db2136 7382 db20d9 4 API calls 7381->7382 7383 db2148 7382->7383 7384 4020ae 7385 401400 18 API calls 7384->7385 7386 4020ba 7385->7386 7387 4020c9 wsprintfA 7386->7387 7388 40382f 7387->7388 7389 4015ae 7390 4015b0 7389->7390 7391 401400 18 API calls 7390->7391 7392 4015cc RegOpenKeyExA 7391->7392 7394 db2034 7395 db25f8 2 API calls 7394->7395 7396 db2040 IsWindow 7395->7396 7397 db2059 7396->7397 7398 db2050 7396->7398 7399 db1607 GetPropA 7397->7399 7400 db23ef 2 API calls 7398->7400 7399->7398 7401 db2071 7400->7401 7402 6e5c3aac 7403 6e5c3ab0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess abort 7402->7403 7404 6e5c3b4c 7403->7404 7405 6e5c4220 7 API calls 7404->7405 7406 6e5c3b50 7404->7406 7407 6e5c3b78 7405->7407 7408 401db0 7409 401e0c 7408->7409 7410 401400 18 API calls 7409->7410 7411 401e11 7410->7411 7412 4083a8 63 API calls 7411->7412 7413 401e24 7412->7413 7414 402db6 7415 402e00 7414->7415 7416 402dbf 7414->7416 7418 401400 18 API calls 7415->7418 7417 4015b0 19 API calls 7416->7417 7419 402dcb 7417->7419 7420 402a3c 7418->7420 7419->7420 7421 401400 18 API calls 7419->7421 7422 402de2 RegDeleteValueA RegCloseKey 7421->7422 7422->7420 7423 404cb8 lstrcpynA 7426 407ace lstrlenA 7423->7426 6452 401db9 6453 401400 18 API calls 6452->6453 6454 401dc5 6453->6454 6455 407626 MessageBoxIndirectA 6454->6455 6456 401dd8 6455->6456 7427 6e5c42a7 7428 6e5c42b0 7427->7428 7429 6e5c42b9 7428->7429 7430 6e5c42d0 InitializeCriticalSection 7428->7430 7430->7429 7431 6e5c3fa7 7432 6e5c3fb0 7431->7432 7435 6e5c3ef0 7432->7435 7436 6e5c3e83 7432->7436 7433 6e5c3ee3 7434 6e5c3ca0 9 API calls 7434->7435 7435->7433 7435->7434 7436->7433 7437 6e5c3c40 6 API calls 7436->7437 7437->7433 6508 402cbf 6509 402cd1 6508->6509 6510 402cc5 6508->6510 6512 401400 18 API calls 6509->6512 6514 402ceb 6509->6514 6511 401400 18 API calls 6510->6511 6511->6509 6512->6514 6513 402d05 6516 401400 18 API calls 6513->6516 6514->6513 6515 401400 18 API calls 6514->6515 6515->6513 6517 402d14 WritePrivateProfileStringA 6516->6517 6518 402d2d 6517->6518

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 0 406efb-406f16 1 407195-40719b 0->1 2 406f1c-407035 call 404a86 call 404898 GetClientRect GetSystemMetrics SendMessageA * 2 0->2 3 4071f4-4071fa 1->3 4 40719d-4071ef GetDlgItem CreateThread CloseHandle 1->4 42 407037-40706c SendMessageA * 2 2->42 43 40706f-407073 2->43 7 4071fc-407202 3->7 8 40723f-407245 3->8 6 4072aa 4->6 10 4072ab-4072ae 6->10 11 407208-40723a ShowWindow * 2 call 404a86 7->11 12 40747b-407491 call 404cff 7->12 9 407247-40724e 8->9 8->10 14 407250-407261 9->14 15 407263-407282 ShowWindow 9->15 10->12 16 4072b4-4072b7 10->16 11->12 30 407494-40749b 12->30 20 4072a5 call 404ab8 14->20 21 407284-40729d call 406dbb 15->21 22 40729e 15->22 16->12 23 4072bd-4072e6 SendMessageA 16->23 20->6 21->22 22->20 28 407477-407479 23->28 29 4072ec-40732e CreatePopupMenu call 407bf6 AppendMenuA 23->29 28->30 36 407330-407348 GetWindowRect 29->36 37 40734a-407351 29->37 39 407354-407388 TrackPopupMenu 36->39 37->39 39->28 41 40738e-4073a9 39->41 44 4073ae-4073b2 41->44 42->43 45 407075-407095 SendMessageA 43->45 46 407098-4070bf call 404b55 43->46 47 4073b4-4073da SendMessageA 44->47 48 4073dc-407418 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 44->48 45->46 52 4070c1-4070e2 ShowWindow 46->52 53 40710d-40714f SendMessageA 46->53 47->44 50 40741a-407452 SendMessageA 48->50 50->50 54 407454-407471 GlobalUnlock SetClipboardData CloseClipboard 50->54 55 4070e4-4070f3 ShowWindow 52->55 56 4070f5 52->56 53->28 60 407155-407190 SendMessageA * 2 53->60 54->28 57 4070ff-40710c call 404a86 55->57 56->57 57->53 60->28
                                                      APIs
                                                      Strings
                                                      • Pandora FMS Agent 7.0NG.777.1 Setup, xrefs: 0040739B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Window$ClipboardShow$GlobalMenu$CloseCreatePopupRect$AllocAppendClientDataEmptyHandleItemLockMetricsOpenSystemThreadTrackUnlock
                                                      • String ID: Pandora FMS Agent 7.0NG.777.1 Setup
                                                      • API String ID: 1085758737-3452433673
                                                      • Opcode ID: 25d348634834151432b54fdb596b7f303cc37177b6efe9d9cc04adb1a8260883
                                                      • Instruction ID: 49c7b1b4b1f97c7edd1c7ce86704a302a6a03c20b73fff38b97e2b4f4d48fb51
                                                      • Opcode Fuzzy Hash: 25d348634834151432b54fdb596b7f303cc37177b6efe9d9cc04adb1a8260883
                                                      • Instruction Fuzzy Hash: D2F1C1B0808305AFD710EF68D98866EBFF4FB84314F01892EE899A7391D7799845CF56

                                                      Control-flow Graph

                                                      APIs
                                                      • GetProcessHeap.KERNEL32 ref: 00DB1BE6
                                                      • HeapAlloc.KERNEL32 ref: 00DB1BF7
                                                      • GetProcessHeap.KERNEL32(?), ref: 00DB1C93
                                                      • HeapFree.KERNEL32 ref: 00DB1FCE
                                                        • Part of subcall function 00DB23EF: GlobalAlloc.KERNEL32 ref: 00DB2412
                                                        • Part of subcall function 00DB23EF: lstrcpynA.KERNEL32 ref: 00DB2432
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4163042955.0000000000DB1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00DB0000, based on PE: true
                                                      • Associated: 00000000.00000002.4163017212.0000000000DB0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163067709.0000000000DB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163092635.0000000000DB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163118887.0000000000DB7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163144543.0000000000DB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_db0000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: Heap$AllocProcess$FreeGloballstrcpyn
                                                      • String ID: 0$BUTTON$COMBOBOX$EDIT$LINK$LISTBOX$NSIS: nsControl pointer property$RICHEDIT_CLASS$RichEdit$STATIC$error
                                                      • API String ID: 1913068523-2191183267
                                                      • Opcode ID: eaa3bf1f783b890188824ca9f9c04665baf6cb1dc56847890d5241e7452447d7
                                                      • Instruction ID: 21373395b53b4b40d12eb3e743df7c46e3c0cc4158277714235d60529d37af60
                                                      • Opcode Fuzzy Hash: eaa3bf1f783b890188824ca9f9c04665baf6cb1dc56847890d5241e7452447d7
                                                      • Instruction Fuzzy Hash: F3C1D4B4908304DFD710EFA9D984AAEBBF4EF88700F40892DE88997314D774D9459FA2

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 217 404167-40418b SetErrorMode GetVersion 218 4041a8 217->218 219 40418d-40419c call 408089 217->219 221 4041ad-4041b0 218->221 219->218 227 40419e-4041a7 219->227 222 4041b2-4041b5 call 407ffe 221->222 223 4041cb-404284 call 408089 * 2 InitCommonControls OleInitialize SHGetFileInfoA call 407aa6 GetCommandLineA call 407aa6 GetModuleHandleA 221->223 228 4041ba-4041c9 lstrlenA 222->228 237 404290-4042aa call 407694 CharNextA 223->237 238 404286-40428b 223->238 227->218 228->221 241 4042b0-4042b3 237->241 238->237 242 404352-404370 GetTempPathA call 4040cc 241->242 243 4042b9-4042be 241->243 250 404372-404391 DeleteFileA call 403db2 242->250 251 404399-4043cd GetWindowsDirectoryA call 407ad8 call 4040cc 242->251 244 4042c0-4042c1 243->244 245 4042c3-4042cb 243->245 244->243 247 4042d3-4042d6 245->247 248 4042cd-4042ce 245->248 252 404335-40434d call 407694 247->252 253 4042d8-4042df 247->253 248->247 264 404397-4043e0 250->264 265 404609-404616 call 404126 OleUninitialize 250->265 251->250 277 4043cf-4043d4 251->277 252->241 256 4042e1-4042ef 253->256 257 4042f2-4042f9 253->257 256->257 261 4042fb-404309 257->261 262 40430c-404313 257->262 261->262 266 404333 262->266 267 404315-404331 call 407aa6 262->267 273 4045f4-4045fe call 405eed 264->273 274 4043e6-4043fb call 407694 264->274 280 404636-40463d 265->280 281 404618-404631 call 407626 265->281 266->252 267->242 286 404603-404605 273->286 289 4043fc-404401 274->289 282 404607 277->282 284 404790-40479b 280->284 285 404643-404680 call 408089 * 3 280->285 291 40479e ExitProcess 281->291 282->265 284->291 311 404725-404734 call 408089 285->311 312 404686-40468d 285->312 286->265 292 404403-404409 289->292 293 404454-404473 call 4080db call 407ad8 289->293 296 40440b-40440c 292->296 297 40440e-40441f call 407f4b 292->297 309 404475-40448a call 407ad8 293->309 310 40448b-4044ba call 407ad8 lstrcmpiA 293->310 296->289 307 404421-404426 297->307 308 40442b-40444f call 407aa6 * 2 297->308 307->282 308->273 309->310 310->307 325 4044c0-4044c9 310->325 323 404753-404781 311->323 324 404736-40474f ExitWindowsEx 311->324 312->311 317 404693-4046b5 GetCurrentProcess 312->317 317->311 332 4046b7-404722 317->332 323->324 329 404783-40478f call 403903 323->329 328 404751 324->328 324->329 330 4044d2 call 40753b 325->330 331 4044cb-4044d0 call 4074a0 325->331 328->284 329->284 337 4044d7-4044ed SetCurrentDirectoryA 330->337 331->337 332->311 341 404505-404527 call 407aa6 337->341 342 4044ef-404504 call 407aa6 337->342 348 404530-404559 call 407bf6 DeleteFileA 341->348 342->341 351 40455b-40457d CopyFileA 348->351 352 4045cf-4045d6 348->352 351->352 354 40457f-4045c1 call 408101 call 407bf6 call 407569 351->354 352->348 353 4045dc-4045f2 call 408101 352->353 353->282 354->352 363 4045c3-4045ce CloseHandle 354->363 363->352
                                                      APIs
                                                      • SetErrorMode.KERNELBASE ref: 0040417A
                                                      • GetVersion.KERNEL32 ref: 00404181
                                                      • lstrlenA.KERNEL32 ref: 004041BE
                                                      • InitCommonControls.COMCTL32(?,UXTHEME), ref: 004041EA
                                                      • OleInitialize.OLE32 ref: 004041F7
                                                      • SHGetFileInfoA.SHELL32 ref: 0040422C
                                                      • GetCommandLineA.KERNEL32(00000000,00000000), ref: 0040424B
                                                      • GetModuleHandleA.KERNEL32(00000000,00000000), ref: 0040426A
                                                      • CharNextA.USER32 ref: 004042A3
                                                        • Part of subcall function 00408089: GetModuleHandleA.KERNEL32(?,?,004041D7), ref: 0040809E
                                                        • Part of subcall function 00408089: GetProcAddress.KERNEL32 ref: 004080CA
                                                      • GetTempPathA.KERNEL32(00000001,00000001), ref: 00404361
                                                      • DeleteFileA.KERNELBASE ref: 0040437F
                                                      • GetWindowsDirectoryA.KERNEL32 ref: 004043A8
                                                      • OleUninitialize.OLE32(?,00000000), ref: 0040460E
                                                      • ExitProcess.KERNEL32 ref: 0040479E
                                                        • Part of subcall function 00407694: CharNextA.USER32 ref: 004076AE
                                                      • GetCurrentProcess.KERNEL32(?,?,00000000,?,00000000), ref: 00404693
                                                      • ExitWindowsEx.USER32 ref: 00404745
                                                        • Part of subcall function 00407AA6: lstrcpynA.KERNEL32(?,?,?,?,?,?,00404249), ref: 00407AC1
                                                        • Part of subcall function 00405EED: lstrcmpiA.KERNEL32 ref: 0040606B
                                                        • Part of subcall function 00405EED: GetFileAttributesA.KERNEL32 ref: 0040607A
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: File$CharExitHandleModuleNextProcessWindows$AddressAttributesCommandCommonControlsCurrentDeleteDirectoryErrorInfoInitInitializeLineModePathProcTempUninitializeVersionlstrcmpilstrcpynlstrlen
                                                      • String ID: /D=$ _?=$"C:\Users\user\Desktop\PandoraFMS_One_Agent_Windows-lts.x86_64.exe"$%$($Error launching installer$Error writing temporary file. Make sure your temp folder is valid.$NCRC$Pandora FMS Agent 7.0NG.777.1 Setup$UXTHEME
                                                      • API String ID: 3796326152-3126813970
                                                      • Opcode ID: 16e2d105e1e81dca3616bae2cf266dd5659bcaed10084d06e587fe896da9ccc2
                                                      • Instruction ID: eb74305c9b10c5c00dffd21d6ef9cb394942a1f4084aa912111b1a794379fd43
                                                      • Opcode Fuzzy Hash: 16e2d105e1e81dca3616bae2cf266dd5659bcaed10084d06e587fe896da9ccc2
                                                      • Instruction Fuzzy Hash: 7AF152F0908305AFD310AF65C94872FBAE4EF85704F05987EE9C4A7291D7BD88458B6B

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 491 405a34-405a5d 492 405a7f-405a86 491->492 493 405a5f-405a6a call 4075f5 491->493 495 405b50-405b57 492->495 496 405a8c-405aaf GetDlgItem call 4076f7 492->496 497 405a6f-405a7a call 407b27 493->497 499 405c80-405c87 495->499 500 405b5d-405b66 495->500 510 405ab1-405abc call 407725 496->510 511 405ac7-405b36 SetWindowTextA call 404b55 * 2 call 404a86 call 408089 496->511 497->499 505 405c96-405cde call 4075f5 call 407f4b call 407aa6 call 408089 499->505 506 405c89-405c90 499->506 503 405b85-405b8a 500->503 504 405b68-405b73 500->504 503->499 513 405b90-405be4 call 407bf6 SHBrowseForFolderA 503->513 507 405ec7-405eea call 404cff 504->507 512 405b79-405b80 504->512 547 405ce0 505->547 506->505 506->507 510->511 528 405abe-405ac6 call 407ae2 510->528 511->499 550 405b3c-405b4b SHAutoComplete 511->550 512->505 524 405c79 513->524 525 405bea-405c0e CoTaskMemFree call 407ae2 513->525 524->499 537 405c10-405c12 525->537 538 405c57-405c77 call 4075eb 525->538 528->511 537->538 541 405c14-405c3f call 407bf6 lstrcmpiA 537->541 538->499 541->538 555 405c41-405c56 call 407ad8 541->555 551 405ce2-405d03 call 407aa6 call 407725 547->551 552 405d0a-405d33 GetDiskFreeSpaceExA 547->552 550->499 570 405d05-405d08 551->570 571 405d77-405da7 GetDiskFreeSpaceA 551->571 553 405d35-405d48 552->553 554 405d4d-405d4f 552->554 557 405dd4 553->557 558 405d51 554->558 559 405d56-405d72 call 4076be 554->559 555->538 564 405dd9-405de8 call 404898 557->564 558->559 559->547 573 405dea-405dee 564->573 574 405dfb-405e05 564->574 570->571 571->564 572 405da9-405dd1 MulDiv 571->572 572->557 573->574 577 405df0-405df8 573->577 575 405e73-405e7b 574->575 576 405e07-405e2c call 404b92 574->576 579 405e8c-405ead call 404b34 575->579 580 405e7d-405e8a call 403903 575->580 584 405e55-405e70 call 4075eb 576->584 585 405e2e-405e4b call 404b92 576->585 577->574 588 405ebd 579->588 589 405eaf-405eb6 579->589 580->579 584->575 593 405e50-405e53 585->593 588->507 589->588 592 405eb8 call 404af5 589->592 592->588 593->575
                                                      APIs
                                                      • GetDlgItem.USER32 ref: 00405A9A
                                                      • SetWindowTextA.USER32 ref: 00405AD6
                                                      • SHAutoComplete.SHLWAPI ref: 00405B47
                                                        • Part of subcall function 004075F5: GetDlgItemTextA.USER32 ref: 00407619
                                                        • Part of subcall function 00407B27: CharNextA.USER32(?,?,?,?,?,?,00000000,?,?,?,004040DE), ref: 00407B8F
                                                        • Part of subcall function 00407B27: CharNextA.USER32(?,?,?,?,?,00000000,?,?,?,004040DE), ref: 00407BAE
                                                        • Part of subcall function 00407B27: CharNextA.USER32(?,?,?,00000000,?,?,?,004040DE), ref: 00407BBA
                                                        • Part of subcall function 00407B27: CharPrevA.USER32(?,?,00000000,?,?,?,004040DE), ref: 00407BD5
                                                      • GetDiskFreeSpaceExA.KERNELBASE(?,?,?,?,00000000,00000000), ref: 00405D29
                                                      • GetDiskFreeSpaceA.KERNEL32(00000000,?,?,?,?,?,?,00000000,00000000), ref: 00405D9C
                                                      • MulDiv.KERNEL32 ref: 00405DC2
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: Char$Next$DiskFreeItemSpaceText$AutoCompletePrevWindow
                                                      • String ID: A$C:\Program Files\$Pandora FMS Agent 7.0NG.777.1 Setup$The agent group name is required
                                                      • API String ID: 1185163393-1257382930
                                                      • Opcode ID: bc669f08d38e00ed445a01ca0662e1a51689882b3815cdbc4e4efe51941f4daf
                                                      • Instruction ID: 50933381639441572775808517c91c7d5cd6498f4c29c03278e00cac73b22eed
                                                      • Opcode Fuzzy Hash: bc669f08d38e00ed445a01ca0662e1a51689882b3815cdbc4e4efe51941f4daf
                                                      • Instruction Fuzzy Hash: 18D10AB0908705AFDB10AF69C58466FBBF4FF44314F01893EE888A7391D77899458F5A

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 733 4083a8-4083c4 call 407f4b 736 4083e3-4083f1 733->736 737 4083c6-4083de DeleteFileA 733->737 739 4083f3-4083f5 736->739 740 408405-40841e call 407aa6 736->740 738 40862e-408635 737->738 741 408614-40861a 739->741 742 4083fb-4083ff 739->742 747 408420-408436 call 407ad8 740->747 748 408438-408440 call 4076be 740->748 741->738 742->740 744 4085bd-4085c8 call 407f13 742->744 744->738 752 4085ca-4085e8 call 407ae2 call 407836 RemoveDirectoryA 744->752 755 408441-408444 747->755 748->755 767 4085ea-4085ee 752->767 768 40861c-408627 call 406dbb 752->768 757 408446-40844d 755->757 758 40844f-408460 call 407ad8 755->758 757->758 760 408461-408491 lstrlenA FindFirstFileA 757->760 758->760 764 4085a6-4085ad 760->764 765 408497-4084b2 call 407694 760->765 764->738 769 4085af-4085bb 764->769 776 4084c2-4084c7 765->776 777 4084b4-4084c0 765->777 767->741 771 4085f0-408612 call 406dbb call 408101 767->771 775 40862c-40862d 768->775 769->741 769->744 771->775 775->738 776->777 780 4084c9 776->780 779 4084cc-4084cf 777->779 782 4084d1-4084d6 779->782 783 4084eb-408506 call 407aa6 779->783 780->779 786 4084dc-4084df 782->786 787 40857f-408596 FindNextFileA 782->787 791 408524-408539 call 407836 DeleteFileA 783->791 792 408508-408511 783->792 786->783 790 4084e1-4084e5 786->790 787->765 789 40859c-4085a5 FindClose 787->789 789->764 790->783 790->787 798 40853b-40853f 791->798 799 40856d-408578 call 406dbb 791->799 792->787 793 408513-408522 call 4083a8 792->793 801 40857d-40857e 793->801 802 408541-408563 call 406dbb call 408101 798->802 803 408565-40856b 798->803 799->801 801->787 802->801 803->787
                                                      APIs
                                                      • DeleteFileA.KERNELBASE ref: 004083C9
                                                      • lstrlenA.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00408464
                                                      • FindFirstFileA.KERNEL32 ref: 00408484
                                                      • FindNextFileA.KERNEL32(?,?,?,?,?,?,?,00000000,00000000), ref: 0040858C
                                                      • FindClose.KERNEL32(?,?,?,?,?,?,?,?,?,00000000,00000000), ref: 0040859F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: FileFind$CloseDeleteFirstNextlstrlen
                                                      • String ID: ?
                                                      • API String ID: 3200608346-1684325040
                                                      • Opcode ID: f38dab7ad5a18fd262bbf36a96acdf371c0faf3aad6a8aed571961b49b276aa8
                                                      • Instruction ID: 0b1800b3c3c92838a6642b0624ead7eb0a374eaa8f440694a798770d669b91d1
                                                      • Opcode Fuzzy Hash: f38dab7ad5a18fd262bbf36a96acdf371c0faf3aad6a8aed571961b49b276aa8
                                                      • Instruction Fuzzy Hash: 447157B0808745AED710AF25CD44BAEBBF8EF45714F05997EE4C5A7282DB3D8844CB1A
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: Find$CloseFileFirst
                                                      • String ID: @=C$@=C
                                                      • API String ID: 2295610775-2754048464
                                                      • Opcode ID: 2bfd9462e1cbc59ee4524f8163dbe6c09f6051e8e628da1b15a5deab74850d34
                                                      • Instruction ID: fd1819d0dc8791f7f0960ff396f270f12c07c9b33f1db7e237ffee342856c2a2
                                                      • Opcode Fuzzy Hash: 2bfd9462e1cbc59ee4524f8163dbe6c09f6051e8e628da1b15a5deab74850d34
                                                      • Instruction Fuzzy Hash: 00E012B15043006FC700AF7C9C4841BBAE9AB84B25F14D53DB995CB390DB3CD8518799
                                                      APIs
                                                      • CoCreateInstance.OLE32 ref: 00402A22
                                                      • MultiByteToWideChar.KERNEL32(00000000), ref: 00402B6F
                                                      Strings
                                                      • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\PandoraFMS_Agent_v7.0NG.777.1\README.lnk, xrefs: 00402B4C, 00402B8C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: ByteCharCreateInstanceMultiWide
                                                      • String ID: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\PandoraFMS_Agent_v7.0NG.777.1\README.lnk
                                                      • API String ID: 123533781-979741191
                                                      • Opcode ID: 925994f22ea13129775b72d8296ddd030c081ccbde0db1921cdb94c616346c40
                                                      • Instruction ID: fc97ed377ac8ae46bcbdcee05bf509fc8879884bc4961f0e359422effc0f113a
                                                      • Opcode Fuzzy Hash: 925994f22ea13129775b72d8296ddd030c081ccbde0db1921cdb94c616346c40
                                                      • Instruction Fuzzy Hash: A4612CB09087119FD710EF69C9886AABBF4FF48314F008AADE58897391D7749885CF55

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 62 404ddd-404df5 63 404e03-404e0f 62->63 64 404df7-404dfd 62->64 66 404e15-404e88 GetDlgItem * 2 call 404b55 SetClassLongA call 403903 63->66 67 404e9d-404eaf 63->67 64->63 65 40534f-405352 64->65 71 405354-405391 SetWindowPos 65->71 72 405396-405399 65->72 91 404e8d-404e93 66->91 69 404eb1-404ebe call 4049c7 67->69 70 404ec3-404eca 67->70 92 405134-405152 69->92 75 404ecc-404eda call 403845 70->75 76 404f1f-404f22 70->76 77 40550b-40551e call 404cff 71->77 78 40539b-4053ba ShowWindow 72->78 79 4053bf-4053c5 72->79 94 404edf-404ee3 75->94 76->69 80 404f24-404f26 76->80 99 405521 77->99 78->77 81 4053e1-4053e4 79->81 82 4053c7-4053dc KiUserCallbackDispatcher 79->82 87 405523-40552c 80->87 89 4053e6-405407 SetWindowLongA 81->89 90 40540c-405412 81->90 88 405312-40531a 82->88 88->80 98 405320-405327 88->98 89->87 90->77 97 405418-40542f GetDlgItem 90->97 91->67 95 405158-405165 call 403903 92->95 96 404f2b-404f32 92->96 94->76 100 404ee5-404f1a SendMessageA 94->100 95->96 102 404f38-404f43 96->102 103 40516a-405197 DestroyWindow EndDialog 96->103 104 405440-405476 SendMessageA IsWindowEnabled 97->104 105 405431-405435 97->105 98->80 106 40532d-40534a ShowWindow 98->106 99->87 100->99 102->103 108 404f49-404fcc call 407bf6 call 404b55 * 3 GetDlgItem 102->108 103->88 104->105 111 405478 104->111 109 405437-40543e 105->109 110 40547d-405481 105->110 106->87 136 404fd7-405042 ShowWindow KiUserCallbackDispatcher call 404b34 KiUserCallbackDispatcher 108->136 137 404fce-404fd4 108->137 113 405493 call 404ab8 109->113 114 405483-40548a 110->114 115 40549b-40549f 110->115 111->80 124 405498-405499 113->124 117 4054e7-405508 SendMessageA 114->117 119 40548c 114->119 116 4054a1-4054a8 115->116 115->117 121 4054c3-4054d2 call 403903 116->121 122 4054aa-4054c1 call 403903 116->122 117->77 119->113 121->77 132 4054d4 121->132 131 4054de-4054e5 122->131 124->77 131->113 132->131 140 405048-40509d EnableMenuItem SendMessageA 136->140 141 40519c-4051a0 136->141 137->136 144 4050c4-405127 call 404a86 call 407aa6 call 407ace call 407bf6 SetWindowTextA call 403845 140->144 145 40509f-4050c1 SendMessageA 140->145 147 4051ad-4051b0 141->147 169 40512c-405132 144->169 145->144 147->92 149 4051b2-4051b6 147->149 151 4051d8-4051df 149->151 152 4051b8-4051d1 KiUserCallbackDispatcher 149->152 151->80 156 4051e5-4051ec 151->156 154 4051d3 152->154 155 4051f7-405232 CreateDialogParamA 152->155 154->88 155->88 157 405238-4052e7 call 404b55 GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 403845 155->157 156->92 159 4051f2 156->159 157->87 168 4052ed-40530c ShowWindow call 4049c7 157->168 159->80 171 405311 168->171 169->92 169->147 171->88
                                                      APIs
                                                      • GetDlgItem.USER32 ref: 00404E2C
                                                      • GetDlgItem.USER32(?,?), ref: 00404E40
                                                      • SetClassLongA.USER32 ref: 00404E78
                                                      • SendMessageA.USER32 ref: 00404F05
                                                      • GetDlgItem.USER32 ref: 00404FBA
                                                      • ShowWindow.USER32 ref: 00404FE6
                                                      • KiUserCallbackDispatcher.NTDLL(00000000,00000000), ref: 00405008
                                                      • KiUserCallbackDispatcher.NTDLL(00000000,00000000), ref: 0040502C
                                                      • EnableMenuItem.USER32(?,?), ref: 0040505F
                                                      • SendMessageA.USER32 ref: 0040508C
                                                      • SendMessageA.USER32 ref: 004050BA
                                                      • SetWindowTextA.USER32 ref: 00405111
                                                      • SetWindowPos.USER32 ref: 00405388
                                                        • Part of subcall function 00403845: MulDiv.KERNEL32 ref: 004038C0
                                                        • Part of subcall function 00403845: SendMessageA.USER32 ref: 004038E0
                                                      • DestroyWindow.USER32 ref: 00405172
                                                      • EndDialog.USER32 ref: 0040518F
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: ItemMessageSendWindow$CallbackDispatcherUser$ClassDestroyDialogEnableLongMenuShowText
                                                      • String ID: Pandora FMS Agent 7.0NG.777.1 Setup$Pandora FMS Agent 7.0NG.777.1 Setup
                                                      • API String ID: 1385508163-3158380625
                                                      • Opcode ID: 5806da81ce91792c391f69b538ee8f59b76048d0b74514085517e7a4e7cb337c
                                                      • Instruction ID: c751d76a42d38eac7d7d2fbd7e62f42486d07c1e0712d5779d85113246baba5d
                                                      • Opcode Fuzzy Hash: 5806da81ce91792c391f69b538ee8f59b76048d0b74514085517e7a4e7cb337c
                                                      • Instruction Fuzzy Hash: EC12FCF0808701EFD710AF68D98876BBBF4EB84315F11992EE98497390D7B89844DF5A

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 364 4055a5-4055ba 365 4055c0-4055c5 364->365 366 40576b-405771 364->366 369 4055d1-4056c2 call 404b55 * 2 CheckDlgButton call 404b34 GetDlgItem call 404a86 SendMessageA 365->369 370 4055c7-4055ce 365->370 367 405777-40577d 366->367 368 4057fb-4057fe 366->368 374 405783-40578a 367->374 375 405977-40598d call 404cff 367->375 372 405804-405821 GetDlgItem 368->372 373 405969-40596f 368->373 404 4056d0-405766 SendMessageA * 2 call 407ace SendMessageA * 2 369->404 405 4056c4-4056cf GetSysColor 369->405 370->369 378 4058f2-4058f9 372->378 379 405827-40582e 372->379 373->375 377 405971 373->377 374->375 381 405790-40579a 374->381 391 40598f-405998 375->391 377->375 378->375 386 4058fb-405902 378->386 379->378 384 405834-40584f 379->384 381->375 382 4057a0-4057f6 GetDlgItem SendMessageA call 404b34 call 404af5 381->382 382->375 384->378 390 405855-4058f1 SendMessageA SetCursor ShellExecuteA SetCursor 384->390 386->375 387 405904-405908 386->387 392 405933-40593c 387->392 393 40590a-405930 SendMessageA 387->393 390->378 392->391 396 40593e-405967 SendMessageA 392->396 393->392 396->391 404->391 405->404
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Item$Cursor$ButtonCheckColorExecuteShell
                                                      • String ID: #$The agent group name is required
                                                      • API String ID: 3348721118-989462616
                                                      • Opcode ID: f7a3d64372b7d8bde8e7adad68eba0ab3536f607a6f6adde86479ffdd78ee6fe
                                                      • Instruction ID: 05f5593a509bd663a9e4b5bdd9f7dfbe71385a192a08d6ac50d5965b98471ac6
                                                      • Opcode Fuzzy Hash: f7a3d64372b7d8bde8e7adad68eba0ab3536f607a6f6adde86479ffdd78ee6fe
                                                      • Instruction Fuzzy Hash: 99B1E6B0908705AFDB00EF69D58876EBBF0FB44314F00892EE99997391D7789844CF96

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 408 405eed-405f0a call 408089 411 405f26-405f66 call 40792a 408->411 412 405f0c-405f21 call 4079d3 408->412 417 405f97-405fa6 call 407ad8 411->417 418 405f68-405f94 call 40792a 411->418 422 405fab-405fd8 call 4048d0 call 407f4b 412->422 417->422 418->417 428 4060ae-4060bd call 407f4b 422->428 429 405fde-405fe3 422->429 434 4060d7-406119 LoadImageA 428->434 435 4060bf-4060d0 call 407bf6 428->435 429->428 430 405fe9-406013 call 40792a 429->430 436 406018-406022 430->436 438 4061f5-406206 call 403903 434->438 439 40611f-40615b RegisterClassA 434->439 441 4060d5-4060d6 435->441 436->428 440 406028-40602f 436->440 452 40632a-40632f 438->452 453 40620c-406218 call 4048d0 438->453 442 406164-4061f0 SystemParametersInfoA CreateWindowExA 439->442 443 40615d-40615f 439->443 445 406031-40604c call 407694 440->445 446 40604f-40605e call 407ace 440->446 441->434 442->438 448 40633e-406346 443->448 445->446 455 406060-406075 lstrcmpiA 446->455 456 406093-4060ad call 407ae2 call 407aa6 446->456 452->448 464 406303-40630a call 4049fd 453->464 465 40621e-406245 ShowWindow call 407ffe 453->465 455->456 458 406077-406084 GetFileAttributesA 455->458 456->428 461 406086-406088 458->461 462 40608a-406092 call 4076be 458->462 461->456 461->462 462->456 472 40630f-406312 464->472 474 406254-406278 GetClassInfoA 465->474 475 406247-406253 call 407ffe 465->475 476 406331-406338 call 403903 472->476 477 406314-40631b 472->477 480 40627a-4062ad GetClassInfoA RegisterClassA 474->480 481 4062ae-4062ef DialogBoxParamA call 403903 474->481 475->474 484 40633d 476->484 477->452 482 40631d-406329 call 403903 477->482 480->481 488 4062f4-406301 call 4047a4 481->488 482->452 484->448 488->484
                                                      APIs
                                                        • Part of subcall function 00408089: GetModuleHandleA.KERNEL32(?,?,004041D7), ref: 0040809E
                                                        • Part of subcall function 00408089: GetProcAddress.KERNEL32 ref: 004080CA
                                                      • lstrcmpiA.KERNEL32 ref: 0040606B
                                                      • GetFileAttributesA.KERNEL32 ref: 0040607A
                                                        • Part of subcall function 004079D3: wsprintfA.USER32 ref: 004079EE
                                                      • LoadImageA.USER32(?,?,00000000,00000000), ref: 00406107
                                                      • RegisterClassA.USER32 ref: 00406151
                                                      • SystemParametersInfoA.USER32 ref: 00406182
                                                      • CreateWindowExA.USER32 ref: 004061E7
                                                      • ShowWindow.USER32 ref: 0040622E
                                                      • GetClassInfoA.USER32(?,00000000), ref: 00406271
                                                      • GetClassInfoA.USER32 ref: 00406291
                                                      • RegisterClassA.USER32 ref: 004062A7
                                                      • DialogBoxParamA.USER32 ref: 004062DD
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: Class$Info$RegisterWindow$AddressAttributesCreateDialogFileHandleImageLoadModuleParamParametersProcShowSystemlstrcmpiwsprintf
                                                      • String ID: Pandora FMS Agent 7.0NG.777.1 Setup$The agent group name is required$_Nb$g
                                                      • API String ID: 3995538257-263436448
                                                      • Opcode ID: a1fe59d6cbcf6897000ab74353cfe111201098247bf4fbf17288a58c0d9973a7
                                                      • Instruction ID: dcf3d0c3349278bc68356ae28d9a2fc86fcef50f5e41ea6b43324dcf94f26e8c
                                                      • Opcode Fuzzy Hash: a1fe59d6cbcf6897000ab74353cfe111201098247bf4fbf17288a58c0d9973a7
                                                      • Instruction Fuzzy Hash: 30B1F6B0808305AFD710AF69D94472FBBE4EF44308F01992EE8D9A7291D7BD94448F9A

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 596 403db2-403e19 GetTickCount GetModuleFileNameA call 407868 599 4040c0-4040c7 596->599 600 403e1f-403e75 call 407aa6 call 4076be call 407aa6 GetFileSize 596->600 607 403e7c-403e7e 600->607 608 403e84-403ea9 call 403a7d 607->608 609 403f58-403f6b call 4039e1 607->609 612 403eae-403eb2 608->612 616 403fc3-403fc7 609->616 617 403f6d 609->617 614 403eb4-403ec0 call 4039e1 612->614 615 403ec5-403ecc 612->615 621 403ff8-403ffd 614->621 622 403ed2-403ef8 call 407813 615->622 623 403f7f-403f83 615->623 618 404002-404050 GlobalAlloc call 403ac5 call 403af7 616->618 619 403fc9-403fe5 call 403ac5 call 403a7d 616->619 617->621 618->621 644 404052-404063 618->644 643 403fea-403fee 619->643 621->599 628 403f91-403f97 622->628 637 403efe-403f05 622->637 623->628 629 403f85-403f8c call 4039e1 623->629 633 403fb6-403fbe 628->633 634 403f99-403fb3 call 408688 628->634 629->628 633->607 634->633 637->628 641 403f0b-403f12 637->641 641->628 645 403f14-403f1b 641->645 643->621 646 403ff0-403ff6 643->646 647 404065 644->647 648 40406b 644->648 645->628 649 403f1d-403f24 645->649 646->618 646->621 647->648 650 404070-404071 648->650 649->628 651 403f26-403f46 649->651 652 404073-404077 650->652 653 404079-4040b6 SetFilePointer call 407813 650->653 651->621 654 403f4c-403f50 651->654 652->650 658 4040bb-4040bd 653->658 655 403f72-403f7d 654->655 656 403f52-403f56 654->656 655->628 656->609 656->655 658->599
                                                      APIs
                                                      • GetTickCount.KERNEL32 ref: 00403DBB
                                                      • GetModuleFileNameA.KERNEL32(?,?,?,?,00000000,?,74DF3160,?,0040438C,00000000), ref: 00403DE2
                                                        • Part of subcall function 00407868: GetFileAttributesA.KERNELBASE ref: 00407875
                                                        • Part of subcall function 00407868: CreateFileA.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00000000,?,00403E07), ref: 004078B4
                                                        • Part of subcall function 00407AA6: lstrcpynA.KERNEL32(?,?,?,?,?,?,00404249), ref: 00407AC1
                                                        • Part of subcall function 004076BE: lstrlenA.KERNEL32 ref: 004076CB
                                                        • Part of subcall function 004076BE: CharPrevA.USER32 ref: 004076E0
                                                      • GetFileSize.KERNEL32(74DF3160,74DF3160,00000000,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00403E5F
                                                        • Part of subcall function 00403A7D: ReadFile.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00403B47), ref: 00403AA9
                                                      • GlobalAlloc.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,00000000,?,74DF3160), ref: 00404010
                                                      • SetFilePointer.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00000000), ref: 00404097
                                                        • Part of subcall function 004039E1: DestroyWindow.USER32 ref: 004039F9
                                                      Strings
                                                      • Null, xrefs: 00403F1D
                                                      • Error launching installer, xrefs: 00403E14
                                                      • soft, xrefs: 00403F14
                                                      • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00403FF8
                                                      • @, xrefs: 004040A3
                                                      • Inst, xrefs: 00403F0B
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: File$AllocAttributesCharCountCreateDestroyGlobalModuleNamePointerPrevReadSizeTickWindowlstrcpynlstrlen
                                                      • String ID: @$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                                      • API String ID: 2393166194-693753142
                                                      • Opcode ID: 059f8bdd00346d24186a84b23d6a6c8312db8ac0fb8c52d8f76367e301e78c20
                                                      • Instruction ID: 485a20e40ad0c1c467606b95e4aeff4f213eeaa5736fc5abe555033e036e0a0c
                                                      • Opcode Fuzzy Hash: 059f8bdd00346d24186a84b23d6a6c8312db8ac0fb8c52d8f76367e301e78c20
                                                      • Instruction Fuzzy Hash: B18159B0808305AFDB10AF69D58975EBFF4FB80349F11893EE984A7290D7798944CF5A

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 659 407bf6-407c04 660 407c11-407c2b 659->660 661 407c06-407c0e 659->661 662 407c31-407c3b 660->662 663 407cdf-407ce3 660->663 661->660 662->663 664 407c40-407c4e 663->664 665 407ce9-407cf5 663->665 664->665 668 407c54-407c56 664->668 666 407f09-407f10 665->666 667 407cfb-407d10 call 407aa6 665->667 667->666 670 407eeb-407eee 668->670 671 407c5c-407c9d 668->671 672 407ef0-407efa 670->672 673 407eff-407f04 670->673 675 407d15-407d22 GetVersion 671->675 676 407c9f-407ca1 671->676 672->663 673->663 677 407d24-407d28 675->677 678 407d3d-407d52 675->678 679 407ca7-407cab 676->679 680 407ecb-407ecd 676->680 677->678 685 407d2a-407d3a 677->685 686 407d54-407d84 call 40792a 678->686 687 407da6-407da9 678->687 681 407cb1-407ccd call 4079d3 679->681 682 407e84-407e9b call 407aa6 679->682 683 407cd3-407cdd lstrlenA 680->683 684 407ed3-407ee6 call 407bf6 680->684 681->683 703 407ebd-407ec5 call 407b27 681->703 701 407ea0-407ea3 682->701 683->663 684->683 685->678 700 407d89-407d8f 686->700 690 407dab-407dbc GetSystemDirectoryA 687->690 691 407dbe-407dc1 687->691 696 407de2-407de4 690->696 697 407dd1-407ddc GetWindowsDirectoryA 691->697 698 407dc3-407dcf 691->698 696->701 697->696 704 407e1b-407e20 698->704 700->701 702 407d95-407da4 call 407bf6 700->702 701->703 706 407ea5-407ea9 701->706 702->696 703->680 707 407e22 704->707 708 407de9-407df0 704->708 706->703 714 407eab-407ebc call 407ad8 706->714 707->701 712 407df2-407e13 SHGetSpecialFolderLocation 708->712 713 407e24-407e28 708->713 715 407e15-407e18 712->715 716 407e59-407e80 SHGetPathFromIDListA CoTaskMemFree 712->716 713->712 718 407e2a-407e4b 713->718 714->703 715->704 716->715 719 407e82 716->719 721 407e50-407e55 718->721 719->701 721->712 722 407e57 721->722 722->701
                                                      APIs
                                                      • lstrlenA.KERNEL32(?,?), ref: 00407CD6
                                                      • GetVersion.KERNEL32 ref: 00407D15
                                                      • GetSystemDirectoryA.KERNEL32 ref: 00407DB6
                                                      • GetWindowsDirectoryA.KERNEL32 ref: 00407DDC
                                                      • SHGetSpecialFolderLocation.SHELL32 ref: 00407E08
                                                      • SHGetPathFromIDListA.SHELL32 ref: 00407E63
                                                      • CoTaskMemFree.OLE32 ref: 00407E74
                                                        • Part of subcall function 004079D3: wsprintfA.USER32 ref: 004079EE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrlenwsprintf
                                                      • String ID: .$The agent group name is required
                                                      • API String ID: 3880481140-1930598983
                                                      • Opcode ID: 626b9dde99611f96630d4a920575274c5aca16d6444f8a4f6d5701c3e652136e
                                                      • Instruction ID: f7814a4fa3dfb8eebec29bc577ef516e180b647921a8881e017fb00342220db3
                                                      • Opcode Fuzzy Hash: 626b9dde99611f96630d4a920575274c5aca16d6444f8a4f6d5701c3e652136e
                                                      • Instruction Fuzzy Hash: 55918FB1D0D2559FDB209F68C8806AEBBF4BF48304F14847EE494A7381D338A841DB9B

                                                      Control-flow Graph

                                                      APIs
                                                      • GetDlgItem.USER32 ref: 00DB1A97
                                                      • GetWindowRect.USER32 ref: 00DB1AA6
                                                      • MapWindowPoints.USER32(00000000,00000000), ref: 00DB1AC5
                                                      • CreateDialogParamA.USER32 ref: 00DB1AF2
                                                      • SetWindowPos.USER32 ref: 00DB1B48
                                                      • SetWindowLongA.USER32 ref: 00DB1B64
                                                      • GetProcessHeap.KERNEL32 ref: 00DB1B86
                                                      • HeapAlloc.KERNEL32 ref: 00DB1B9F
                                                        • Part of subcall function 00DB23EF: GlobalAlloc.KERNEL32 ref: 00DB2412
                                                        • Part of subcall function 00DB23EF: lstrcpynA.KERNEL32 ref: 00DB2432
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4163042955.0000000000DB1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00DB0000, based on PE: true
                                                      • Associated: 00000000.00000002.4163017212.0000000000DB0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163067709.0000000000DB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163092635.0000000000DB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163118887.0000000000DB7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163144543.0000000000DB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_db0000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: Window$AllocHeap$CreateDialogGlobalItemLongParamPointsProcessRectlstrcpyn
                                                      • String ID: error
                                                      • API String ID: 1928716940-1574812785
                                                      • Opcode ID: 9aad2bfbb3415bcb33827fe1a137bbaa4ea9c02016a1d22b5b610bb27e8faba4
                                                      • Instruction ID: fff39973830e9b81d34ce5f90b50fa07e75b1a91138f6116145993a0f73b5a25
                                                      • Opcode Fuzzy Hash: 9aad2bfbb3415bcb33827fe1a137bbaa4ea9c02016a1d22b5b610bb27e8faba4
                                                      • Instruction Fuzzy Hash: E9419DB5808704DFD700EF68E98879ABBF4FB88354F408A1DE889D7364D77594488FA6

                                                      Control-flow Graph

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4163042955.0000000000DB1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00DB0000, based on PE: true
                                                      • Associated: 00000000.00000002.4163017212.0000000000DB0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163067709.0000000000DB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163092635.0000000000DB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163118887.0000000000DB7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163144543.0000000000DB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_db0000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: Message$DialogWindow$CallbackDispatchDispatcherLongSendShowTranslateUser
                                                      • String ID:
                                                      • API String ID: 4159918924-0
                                                      • Opcode ID: 102ade7be5c0b8850a5001b688c8f9c28a94538ac82eb0667414446cd899c4cb
                                                      • Instruction ID: 8a1f60dab2d4c0c27c3389a8fe4beef03aab912d01d732bdec4e7a324f0d8c77
                                                      • Opcode Fuzzy Hash: 102ade7be5c0b8850a5001b688c8f9c28a94538ac82eb0667414446cd899c4cb
                                                      • Instruction Fuzzy Hash: 0C21B5B1809704EFD700AF69E988B6ABBF4FB84744F018A1DF985C7350E77498448BA6

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 814 403af7-403b23 815 403b34-403b4b call 403a7d 814->815 816 403b25-403b2e call 403ac5 814->816 821 403d81-403d86 815->821 822 403b51-403b56 815->822 819 403b33 816->819 819->815 823 403da8-403daf 821->823 824 403b5c-403bb8 GetTickCount 822->824 825 403d1d-403d1f 822->825 828 403bbb-403bc0 824->828 826 403d21-403d26 825->826 827 403d8f-403da4 call 403a7d 825->827 832 403d5d-403d62 826->832 827->821 836 403da6 827->836 829 403d15-403d18 828->829 830 403bc6-403be7 call 403a7d 828->830 829->823 830->821 840 403bed-403bfa 830->840 835 403d64-403d7f call 403a7d 832->835 832->836 835->821 841 403d28-403d51 WriteFile 835->841 836->823 842 403c00-403c20 call 408c4f 840->842 844 403d53-403d56 841->844 845 403d88-403d8d 841->845 848 403c26-403c3c 842->848 849 403d0b-403d10 842->849 844->845 847 403d58-403d5b 844->847 845->823 847->832 851 403cab-403cad 848->851 852 403c3e-403c46 848->852 849->823 851->828 853 403cb3-403cb5 851->853 854 403c48-403c4c 852->854 855 403c4e-403c9b MulDiv wsprintfA call 406dbb 852->855 856 403cf3-403cf9 853->856 857 403cb7-403cdf WriteFile 853->857 854->851 854->855 861 403ca0-403ca8 855->861 860 403cff-403d03 856->860 857->845 859 403ce5-403ce8 857->859 859->845 862 403cee-403cf1 859->862 860->842 863 403d09 860->863 861->851 862->860 863->829
                                                      APIs
                                                      • GetTickCount.KERNEL32 ref: 00403B62
                                                      • MulDiv.KERNEL32 ref: 00403C69
                                                      • wsprintfA.USER32 ref: 00403C87
                                                      • WriteFile.KERNELBASE(00000000,00000000), ref: 00403CD4
                                                        • Part of subcall function 00403AC5: SetFilePointer.KERNELBASE ref: 00403AEA
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: File$CountPointerTickWritewsprintf
                                                      • String ID: d
                                                      • API String ID: 525128815-2564639436
                                                      • Opcode ID: c66ba6d3189ae84549c3526c7db8e10c11fd0718d577fcddd028653b7f00e62e
                                                      • Instruction ID: 81e4adff5a5540c60624bdb037fd79efe9836bde96949377459c037f7e0969f7
                                                      • Opcode Fuzzy Hash: c66ba6d3189ae84549c3526c7db8e10c11fd0718d577fcddd028653b7f00e62e
                                                      • Instruction Fuzzy Hash: F07135B1A083189FDB10DFA9D98466EBBF8FF84705F10853EE858A7390D73899458F49

                                                      Control-flow Graph

                                                      APIs
                                                      • DeleteFileA.KERNEL32(74DF05F0), ref: 004034EF
                                                      • GlobalAlloc.KERNELBASE ref: 0040351C
                                                      • CloseHandle.KERNEL32 ref: 00403653
                                                        • Part of subcall function 00403AC5: SetFilePointer.KERNELBASE ref: 00403AEA
                                                        • Part of subcall function 00403A7D: ReadFile.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00403B47), ref: 00403AA9
                                                      • GlobalAlloc.KERNEL32(00000000,00000000,00000000), ref: 00403561
                                                      • GlobalFree.KERNEL32 ref: 004035D6
                                                      • WriteFile.KERNELBASE ref: 00403606
                                                      • GlobalFree.KERNELBASE ref: 00403612
                                                        • Part of subcall function 00403AF7: GetTickCount.KERNEL32 ref: 00403B62
                                                        • Part of subcall function 00403AF7: MulDiv.KERNEL32 ref: 00403C69
                                                        • Part of subcall function 00403AF7: wsprintfA.USER32 ref: 00403C87
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: FileGlobal$AllocFree$CloseCountDeleteHandlePointerReadTickWritewsprintf
                                                      • String ID:
                                                      • API String ID: 3668496186-0
                                                      • Opcode ID: 61638a83f5c90cb0c6e547c9dfb278eb43bfb33e0155546a5027b14609c085c7
                                                      • Instruction ID: 130394bcdb93704e2bf1dadb98659cc31cff70cb4eba6e4357c8c30b01566d60
                                                      • Opcode Fuzzy Hash: 61638a83f5c90cb0c6e547c9dfb278eb43bfb33e0155546a5027b14609c085c7
                                                      • Instruction Fuzzy Hash: EB510CB19087019FD710EF29C844B6AFBF4AF88314F01896EF498A7391E7399981CF56

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 904 401b06-401b29 call 401400 call 4076f7 909 401b2b-401b3b call 407aa6 904->909 910 401b3d-401b63 call 407aa6 call 407ae2 call 407ad8 904->910 915 401b68-401b7a call 407b27 909->915 910->915 921 401bba-401bbc 915->921 922 401b7c-401b8f call 407f13 915->922 924 401bd2-401bda 921->924 925 401bbe-401bc5 call 407836 921->925 929 401b91-401ba8 CompareFileTime 922->929 930 401ba9-401bb7 922->930 928 401bdb-401bfb call 407868 924->928 931 401bca-401bd0 925->931 934 401c01-401c03 928->934 935 401cce-401d1a call 406dbb call 403af7 928->935 929->930 930->921 931->928 937 401c05-401c22 call 406dbb 934->937 938 401c27-401c9f call 407aa6 * 2 call 407bf6 call 407aa6 call 407626 934->938 949 401d25-401d44 SetFileTime 935->949 950 401d1c-401d23 935->950 945 403831 937->945 938->925 971 401ca5-401ca8 938->971 948 403837-403842 945->948 953 401d47-401d53 CloseHandle 949->953 950->949 950->953 955 401d59-401d5c 953->955 956 40382f 953->956 958 401d86-401d95 call 407bf6 955->958 959 401d5e-401d84 call 407bf6 call 407ad8 955->959 956->945 966 401d9a-401dab 958->966 959->966 967 402122 966->967 972 402127-402cae 967->972 973 402122 call 407626 967->973 974 401cb5-401cc9 call 406dbb 971->974 975 401caa-401cb0 971->975 981 402101-40211f call 407bf6 972->981 982 402cb4-402cba 972->982 973->972 974->972 975->948 981->967 982->956
                                                      APIs
                                                      • CompareFileTime.KERNEL32(?,00000000), ref: 00401BA1
                                                        • Part of subcall function 00407AA6: lstrcpynA.KERNEL32(?,?,?,?,?,?,00404249), ref: 00407AC1
                                                        • Part of subcall function 00407626: MessageBoxIndirectA.USER32 ref: 00407689
                                                        • Part of subcall function 00406DBB: SetWindowTextA.USER32 ref: 00406E51
                                                        • Part of subcall function 00406DBB: SendMessageA.USER32 ref: 00406E91
                                                        • Part of subcall function 00406DBB: SendMessageA.USER32 ref: 00406EBF
                                                        • Part of subcall function 00406DBB: SendMessageA.USER32 ref: 00406EDE
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: Message$Send$CompareFileIndirectTextTimeWindowlstrcpyn
                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsiBE5B.tmp\System.dll$Call
                                                      • API String ID: 645384303-2260928074
                                                      • Opcode ID: b0df0291a9070bbb4d2ac7a6184e9e6745ad714c47b761d9512c75da916e61c5
                                                      • Instruction ID: 2d2fd0f640650eb3c35c22094d486e88ecc348134081fa4b8d4fc57698f19ca0
                                                      • Opcode Fuzzy Hash: b0df0291a9070bbb4d2ac7a6184e9e6745ad714c47b761d9512c75da916e61c5
                                                      • Instruction Fuzzy Hash: 806150B0908701AED710BF65C945A6FBAF8EF44714F118A2FF4D4A3291D7BC98819B1B
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$TextWindow
                                                      • String ID: Skipped: C:\Users\user\AppData\Local\Temp\nsiBE5B.tmp\System.dll
                                                      • API String ID: 1596935084-1377648789
                                                      • Opcode ID: 7f77599a27076a50306d64517219d7e9aaea05d32a1fadf2d7d14ff907811c50
                                                      • Instruction ID: 1465eee4a19d2b0a462d5854eefcbc7eed4554794f3d063c3fee55a466b1f068
                                                      • Opcode Fuzzy Hash: 7f77599a27076a50306d64517219d7e9aaea05d32a1fadf2d7d14ff907811c50
                                                      • Instruction Fuzzy Hash: A1313BB1D08304ABDB10AFA9C44879EBBF4EF84754F05C82EE8889B340D7789854CF96
                                                      APIs
                                                      • LoadLibraryExA.KERNELBASE ref: 004028A3
                                                      • GetModuleHandleA.KERNELBASE ref: 004028BB
                                                      • GetProcAddress.KERNEL32 ref: 004028CF
                                                      • KiUserCallbackDispatcher.NTDLL ref: 00402927
                                                      • FreeLibrary.KERNELBASE(00000000), ref: 00402965
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: Library$AddressCallbackDispatcherFreeHandleLoadModuleProcUser
                                                      • String ID:
                                                      • API String ID: 2164570674-0
                                                      • Opcode ID: 304363fbe489e1a9be6b7d21d99f627d145809fd3dec65ab09b55abc88bcafee
                                                      • Instruction ID: b3b58c58da4d34fb64e348894598cc2978b341e5b4db3fa9d57455c3f14ebc65
                                                      • Opcode Fuzzy Hash: 304363fbe489e1a9be6b7d21d99f627d145809fd3dec65ab09b55abc88bcafee
                                                      • Instruction Fuzzy Hash: BB3181B16083009FD3106F25894876FBAE8BB84754F11893FF495A33D0D7798846DB1A
                                                      APIs
                                                      • GlobalFree.KERNEL32 ref: 6E5C32FE
                                                      • FreeLibrary.KERNEL32 ref: 6E5C3380
                                                      • GlobalFree.KERNEL32 ref: 6E5C33A9
                                                        • Part of subcall function 6E5C2BA2: GlobalAlloc.KERNEL32 ref: 6E5C2BE1
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4163482141.000000006E5C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E5C0000, based on PE: true
                                                      • Associated: 00000000.00000002.4163465602.000000006E5C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163502457.000000006E5C6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163520313.000000006E5C8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163537978.000000006E5C9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163555114.000000006E5CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_6e5c0000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: FreeGlobal$AllocLibrary
                                                      • String ID:
                                                      • API String ID: 2026276162-3916222277
                                                      • Opcode ID: e50a3df83c9c9d396becf93056ff62442dc811a5dd6735ca0dfafcc189cc6d06
                                                      • Instruction ID: d2d0d13964b77b9e941d5dc559994bc9f9487aa14ea101d7f24345dfc97b0a17
                                                      • Opcode Fuzzy Hash: e50a3df83c9c9d396becf93056ff62442dc811a5dd6735ca0dfafcc189cc6d06
                                                      • Instruction Fuzzy Hash: 16412D70104A09CBDB40AFE4C9AC6A97BE8FF45F08F058CADD9948B255DB749486CB93
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: MessageSend$Timeout
                                                      • String ID: !
                                                      • API String ID: 1777923405-2657877971
                                                      • Opcode ID: 40388564f909119710120cef62e952463421c5c53386c7a56e5f6cb966679a26
                                                      • Instruction ID: 06e4065d49d095f77ad9425923b4761041be1df8d1ba028cdb5a98dba015adb3
                                                      • Opcode Fuzzy Hash: 40388564f909119710120cef62e952463421c5c53386c7a56e5f6cb966679a26
                                                      • Instruction Fuzzy Hash: EA4132B18083159FD714AF6AC84539EFBF4AF84345F11C4AEF489A3291D7788981CF56
                                                      APIs
                                                        • Part of subcall function 00406DBB: SetWindowTextA.USER32 ref: 00406E51
                                                        • Part of subcall function 00406DBB: SendMessageA.USER32 ref: 00406E91
                                                        • Part of subcall function 00406DBB: SendMessageA.USER32 ref: 00406EBF
                                                        • Part of subcall function 00406DBB: SendMessageA.USER32 ref: 00406EDE
                                                        • Part of subcall function 00407569: CreateProcessA.KERNELBASE ref: 004075C6
                                                        • Part of subcall function 00407569: CloseHandle.KERNEL32 ref: 004075DB
                                                      • WaitForSingleObject.KERNEL32 ref: 00402661
                                                      • GetExitCodeProcess.KERNELBASE ref: 00402688
                                                        • Part of subcall function 00408638: PeekMessageA.USER32 ref: 00408668
                                                        • Part of subcall function 00408638: DispatchMessageA.USER32 ref: 00408674
                                                      • CloseHandle.KERNELBASE ref: 004026C8
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: Message$Send$CloseHandleProcess$CodeCreateDispatchExitObjectPeekSingleTextWaitWindow
                                                      • String ID: d
                                                      • API String ID: 3753073698-2564639436
                                                      • Opcode ID: 5e4665b6b7fedc1ef13a96b95e587289213e731baef5cd124458f6640e3bf6c2
                                                      • Instruction ID: 341f0019eac798eba97503d0cc358f98f06cceaaddc433da9f359427ade5de81
                                                      • Opcode Fuzzy Hash: 5e4665b6b7fedc1ef13a96b95e587289213e731baef5cd124458f6640e3bf6c2
                                                      • Instruction Fuzzy Hash: F72181B1508300DFD750AF25CD88BAEB7E5EB84315F11887EF489A3380D6795981CF2A
                                                      APIs
                                                      • RegOpenKeyExA.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,The agent group name is required,?,00407D89), ref: 00407964
                                                      • RegQueryValueExA.KERNELBASE ref: 0040799F
                                                      • RegCloseKey.KERNELBASE ref: 004079C5
                                                      Strings
                                                      • The agent group name is required, xrefs: 0040792D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: CloseOpenQueryValue
                                                      • String ID: The agent group name is required
                                                      • API String ID: 3677997916-4148607786
                                                      • Opcode ID: b60c37829d9ea3b0f8dd51353dea047c2196d4c71068be0f0c58ced7d000753a
                                                      • Instruction ID: 3ff7b6bf0a91014e0cdb82914d3ac24b39519e99ef6d997070f847f5e25f1e30
                                                      • Opcode Fuzzy Hash: b60c37829d9ea3b0f8dd51353dea047c2196d4c71068be0f0c58ced7d000753a
                                                      • Instruction Fuzzy Hash: 9F11C6B090830ADFDB00DF68C58479EBBF4EB49704F00886AE894E7341E775D9148BA2
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: DirectoryLibraryLoadSystemwsprintf
                                                      • String ID: \
                                                      • API String ID: 2200240437-2967466578
                                                      • Opcode ID: edf936936982a89848ab2bfb9a1c34cba80a5486cfbedbecf1c2913205bce52b
                                                      • Instruction ID: 9f368012c825991ce04982f92701aa648b8799f0085610c4de867fb21c6dde5f
                                                      • Opcode Fuzzy Hash: edf936936982a89848ab2bfb9a1c34cba80a5486cfbedbecf1c2913205bce52b
                                                      • Instruction Fuzzy Hash: 94014BB1508304AFD300DF68D98879EBBF5FB84348F04C83DE08996291DB7895588B1A
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4163042955.0000000000DB1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00DB0000, based on PE: true
                                                      • Associated: 00000000.00000002.4163017212.0000000000DB0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163067709.0000000000DB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163092635.0000000000DB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163118887.0000000000DB7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163144543.0000000000DB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_db0000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: HeapWindow$CallDestroyFreeProcProcess
                                                      • String ID:
                                                      • API String ID: 1278960361-0
                                                      • Opcode ID: 12e251e28d5c930905fe14e91eee4f386113057baf7dbbdadfae235a8dac2fdf
                                                      • Instruction ID: 0c0664c45ff698e8cc9e34c4bedd58668c716ebdbe599d68ca7b6173165a4bdc
                                                      • Opcode Fuzzy Hash: 12e251e28d5c930905fe14e91eee4f386113057baf7dbbdadfae235a8dac2fdf
                                                      • Instruction Fuzzy Hash: B92108B5A04704DFC720EF29E98875ABBF4FB88350F048629E986C7354D334D8449BB2
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: ErrorLast$CreateDirectoryFileSecurity
                                                      • String ID:
                                                      • API String ID: 3449924974-0
                                                      • Opcode ID: 4b4b7c87a1b8ee6e94e6bba5899c313b1bf0de4921ac642b6ace4a115c59440c
                                                      • Instruction ID: a9114a71b9ed1fd184deaf5cb9d0e2738b806a811cb5365c7ce03c7ffc84f281
                                                      • Opcode Fuzzy Hash: 4b4b7c87a1b8ee6e94e6bba5899c313b1bf0de4921ac642b6ace4a115c59440c
                                                      • Instruction Fuzzy Hash: 7C11FAB1D08308AADB009FA9D8487DEFBB4EF54714F10842EE944B7250D77A9549CBAE
                                                      APIs
                                                        • Part of subcall function 00407725: CharNextA.USER32(?,00000000,74DF3160,?,00407F74,?,?,?,00000000,?,004083BF), ref: 0040773A
                                                        • Part of subcall function 00407725: CharNextA.USER32(74DF3160,?,00407F74,?,?,?,00000000,?,004083BF), ref: 00407742
                                                      • SetCurrentDirectoryA.KERNELBASE(00000000,00000000), ref: 00401930
                                                        • Part of subcall function 00407694: CharNextA.USER32 ref: 004076AE
                                                      • GetFileAttributesA.KERNELBASE ref: 004018E0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: CharNext$AttributesCurrentDirectoryFile
                                                      • String ID: \
                                                      • API String ID: 15404496-2967466578
                                                      • Opcode ID: 5c22a10f2eeaa49ecbec61f85fec86801a2d9e51ea18f934f8232086c298fb79
                                                      • Instruction ID: 00cd6c951602bd80d4099365e7cb31704f5a5a5660bfa9d9f1f97e5c295f873e
                                                      • Opcode Fuzzy Hash: 5c22a10f2eeaa49ecbec61f85fec86801a2d9e51ea18f934f8232086c298fb79
                                                      • Instruction Fuzzy Hash: EE2191B18083419AD7103F2A8C4076ABBE8AF41314F15897FE4D5A33E2E63D8581CB2A
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: 0u
                                                      • API String ID: 3850602802-3203441087
                                                      • Opcode ID: 4e71a1974caaa1261595a851c5052f8bebca73b141bb856c4b894835f81d7657
                                                      • Instruction ID: 65c96d0eefb1b38f6cf6dd23baf14e763e2f7a708bd0f60a5118c077a9330c57
                                                      • Opcode Fuzzy Hash: 4e71a1974caaa1261595a851c5052f8bebca73b141bb856c4b894835f81d7657
                                                      • Instruction Fuzzy Hash: 631190B2908301DFC710AF69D88961BBFE8EB40751F15C67EF894A7390E73999048B99
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: CountFileNameTempTick
                                                      • String ID: nsa
                                                      • API String ID: 1716503409-2209301699
                                                      • Opcode ID: 93fc1848b608f135017e582bbd32cd97ec0baf52c4cc3b9489d4c7975639f793
                                                      • Instruction ID: 5a97e475c2bf528ad144de220c914729813741e1c6e15ec140d7c1313bfaff61
                                                      • Opcode Fuzzy Hash: 93fc1848b608f135017e582bbd32cd97ec0baf52c4cc3b9489d4c7975639f793
                                                      • Instruction Fuzzy Hash: A6F04F72E083059BD700AF6AD88869FBFA5EB85310F00843AE95497381DA359515CB96
                                                      APIs
                                                      • GetModuleHandleA.KERNEL32(?,?,004041D7), ref: 0040809E
                                                      • GetProcAddress.KERNEL32 ref: 004080CA
                                                        • Part of subcall function 00407FFE: GetSystemDirectoryA.KERNEL32 ref: 00408019
                                                        • Part of subcall function 00407FFE: wsprintfA.USER32 ref: 00408060
                                                        • Part of subcall function 00407FFE: LoadLibraryExA.KERNELBASE ref: 00408079
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: AddressDirectoryHandleLibraryLoadModuleProcSystemwsprintf
                                                      • String ID: UXTHEME
                                                      • API String ID: 2547128583-2858369361
                                                      • Opcode ID: fa6da1299e01e6f681b8fc28d034e78e45055ec1f99b4499e8faed80d24c1c5f
                                                      • Instruction ID: 491df23e4349f922115187e15a686d99dd7590c197a6103022668aa04458a457
                                                      • Opcode Fuzzy Hash: fa6da1299e01e6f681b8fc28d034e78e45055ec1f99b4499e8faed80d24c1c5f
                                                      • Instruction Fuzzy Hash: A8F08275A047089BD700AF29998446FBBF8EB84750B01C43DF98493320EA35A960879A
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: Global$AllocFree
                                                      • String ID: Call
                                                      • API String ID: 3394109436-1824292864
                                                      • Opcode ID: c97105ca30053a454d05aecfa654e635cbfe171ed3c7ec043818f99b6f5f978a
                                                      • Instruction ID: 871d1b58d1c2a4e5e4038b6f8a94e261c900a6c6fbadd1a87131bd4552b44949
                                                      • Opcode Fuzzy Hash: c97105ca30053a454d05aecfa654e635cbfe171ed3c7ec043818f99b6f5f978a
                                                      • Instruction Fuzzy Hash: F6317EB2A08710AFD710EF15D944A6BB7E8EB84B04F05883EF985A7380D7789941DB5A
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: CloseCreateValue
                                                      • String ID:
                                                      • API String ID: 1818849710-0
                                                      • Opcode ID: 655cd4bdee7b611a47ebb591dad39cdc22d4cc0ab7a637e93ba35ba75de8a483
                                                      • Instruction ID: c70f114857dc8bb25fa6c328139017004dc0d7bac582f0227bc692f201b037f5
                                                      • Opcode Fuzzy Hash: 655cd4bdee7b611a47ebb591dad39cdc22d4cc0ab7a637e93ba35ba75de8a483
                                                      • Instruction Fuzzy Hash: 23316FB09083019FD700EF25C94839EBBF4FB84355F10886EF498A7391D7799A858F5A
                                                      APIs
                                                      Strings
                                                      • C:\Users\user\AppData\Local\Temp\nsiBE5B.tmp\System.dll, xrefs: 004031B3, 00403215
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: FileWrite
                                                      • String ID: C:\Users\user\AppData\Local\Temp\nsiBE5B.tmp\System.dll
                                                      • API String ID: 3934441357-1928934717
                                                      • Opcode ID: a5b481040afeb196096c6cf8418f77f7ebb565596ab9556ed62a218c9e3d3b9a
                                                      • Instruction ID: 9251182b8276100042518cb3302fb10897ac279717b607855393a04265dfa06b
                                                      • Opcode Fuzzy Hash: a5b481040afeb196096c6cf8418f77f7ebb565596ab9556ed62a218c9e3d3b9a
                                                      • Instruction Fuzzy Hash: F50180B19083009FD718AF69D84439EBBF0AB84304F00C87EE08967391D7784584CB9A
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: Open
                                                      • String ID: @h
                                                      • API String ID: 71445658-3436019336
                                                      • Opcode ID: 724425dcc63114b173beb9410b993dbb427e6f1e43d5ca50d2dbe65d7b4fdcb8
                                                      • Instruction ID: 21eb7b73b39be551c045d5804fa28c682b097b1c122b42c0b0b50213ef707915
                                                      • Opcode Fuzzy Hash: 724425dcc63114b173beb9410b993dbb427e6f1e43d5ca50d2dbe65d7b4fdcb8
                                                      • Instruction Fuzzy Hash: 8BF087B0A00306AFCB04EF26C984A4AFBF5BF98304F10C62DE859472A5E730E501CB95
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: Open
                                                      • String ID: @h
                                                      • API String ID: 71445658-3436019336
                                                      • Opcode ID: 04c4111b7faca97cd434c74b43e5d3736dd37eeb9b68cf1a7a63b264a30f222a
                                                      • Instruction ID: 9edcfc96fd8926ded056f6e6ddc148378f3531a355c3ae5333fd229b5fe3d93d
                                                      • Opcode Fuzzy Hash: 04c4111b7faca97cd434c74b43e5d3736dd37eeb9b68cf1a7a63b264a30f222a
                                                      • Instruction Fuzzy Hash: D8F037B0A05306ABCB04EF66C984A4AFBF5BF98344F51C62DE859472A5E730E501CB95
                                                      APIs
                                                      • MessageBoxIndirectA.USER32 ref: 00407689
                                                      Strings
                                                      • Pandora FMS Agent 7.0NG.777.1 Setup, xrefs: 00407647
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: IndirectMessage
                                                      • String ID: Pandora FMS Agent 7.0NG.777.1 Setup
                                                      • API String ID: 1874166685-3452433673
                                                      • Opcode ID: a0b9989dac790c89276446c02662fe56e5146f067b4b785e6006d4b28e70d7c4
                                                      • Instruction ID: a13ab6da1d8a293d91393787c7bc82828f517769e8edf7072ca9ada013704a8a
                                                      • Opcode Fuzzy Hash: a0b9989dac790c89276446c02662fe56e5146f067b4b785e6006d4b28e70d7c4
                                                      • Instruction Fuzzy Hash: 90F017B5A01309AFC740DF28EA4471577E4AB48318F11D43AE845E7360D7789854CB4A
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4163482141.000000006E5C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E5C0000, based on PE: true
                                                      • Associated: 00000000.00000002.4163465602.000000006E5C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163502457.000000006E5C6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163520313.000000006E5C8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163537978.000000006E5C9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163555114.000000006E5CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_6e5c0000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: ProtectVirtual
                                                      • String ID: @
                                                      • API String ID: 544645111-2766056989
                                                      • Opcode ID: 7ea98f346244138fe709102fc37b25e63c8e4eb101189a9a4cd3e1441a87def3
                                                      • Instruction ID: 28cd750346f424f662dbf68a36e014bdd697d14c12b221935bd466f7201e4737
                                                      • Opcode Fuzzy Hash: 7ea98f346244138fe709102fc37b25e63c8e4eb101189a9a4cd3e1441a87def3
                                                      • Instruction Fuzzy Hash: D0F092B0008B40DEEB00DFA5C42D30A7AE0A742F58F41854CE9944ABC5CBB9446ACFA6
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID: (
                                                      • API String ID: 3850602802-3887548279
                                                      • Opcode ID: 3fea1d1dcde79aed48b753e8be5351aaa4ed740cc25652d4c976dd3f3aeffc86
                                                      • Instruction ID: 4431a04590381803e72544c28ab4ca6bc6a442d634567352a3e84a68d91008fe
                                                      • Opcode Fuzzy Hash: 3fea1d1dcde79aed48b753e8be5351aaa4ed740cc25652d4c976dd3f3aeffc86
                                                      • Instruction Fuzzy Hash: D9D017B4404304AFC300EF2CD54960EBBE4AB40308F40C82CE88497241D774D4448F96
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4163482141.000000006E5C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E5C0000, based on PE: true
                                                      • Associated: 00000000.00000002.4163465602.000000006E5C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163502457.000000006E5C6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163520313.000000006E5C8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163537978.000000006E5C9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163555114.000000006E5CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_6e5c0000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: ErrorImageLastLoad
                                                      • String ID:
                                                      • API String ID: 2189606529-0
                                                      • Opcode ID: 2dcc59e37b22470102ce5ea22712f04bbfa7d98cd994f5b2af3464afe560379a
                                                      • Instruction ID: bb1a01ed37a9c7c627bd12ad5be763d6472761d0a4ada896b852aef19c3ba236
                                                      • Opcode Fuzzy Hash: 2dcc59e37b22470102ce5ea22712f04bbfa7d98cd994f5b2af3464afe560379a
                                                      • Instruction Fuzzy Hash: 8651A771504A089FDB11DFE4D5BC79837F8EB41F18F2149ADE900C6644DF389896CB92
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: wsprintf
                                                      • String ID: Pandora FMS Agent 7.0NG.777.1 Setup
                                                      • API String ID: 2111968516-3452433673
                                                      • Opcode ID: db73776f264ac93107dee5e323fdc406abbe58821ea3c0603e3c71232ff97682
                                                      • Instruction ID: 593b97edefadd73ccda5d49503661726c9e38e261618b5471b3a859fbb28941b
                                                      • Opcode Fuzzy Hash: db73776f264ac93107dee5e323fdc406abbe58821ea3c0603e3c71232ff97682
                                                      • Instruction Fuzzy Hash: 9D31B5B19087049BC704EF69D480A5EBBF4EF88714F10853EFA94E7390E778D8058B9A
                                                      APIs
                                                        • Part of subcall function 004015B0: RegOpenKeyExA.KERNELBASE ref: 00401600
                                                      • RegQueryValueExA.KERNELBASE ref: 00403008
                                                      • RegCloseKey.ADVAPI32 ref: 0040307E
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: CloseOpenQueryValue
                                                      • String ID:
                                                      • API String ID: 3677997916-0
                                                      • Opcode ID: 85ab4fcb1b04ab50c0500d86b219c8fa6d9567016e209113fbae202f6b5d9c3a
                                                      • Instruction ID: 5d0aa2dbbc53d88669278889509e7fb439c96b02ffb0fedbb1402b2b7154f18b
                                                      • Opcode Fuzzy Hash: 85ab4fcb1b04ab50c0500d86b219c8fa6d9567016e209113fbae202f6b5d9c3a
                                                      • Instruction Fuzzy Hash: BE217C71909300DFE724DF28C84879ABBF4AB84315F1489BEE489A3380D7799A85CF56
                                                      APIs
                                                        • Part of subcall function 00407AA6: lstrcpynA.KERNEL32(?,?,?,?,?,?,00404249), ref: 00407AC1
                                                        • Part of subcall function 00407725: CharNextA.USER32(?,00000000,74DF3160,?,00407F74,?,?,?,00000000,?,004083BF), ref: 0040773A
                                                        • Part of subcall function 00407725: CharNextA.USER32(74DF3160,?,00407F74,?,?,?,00000000,?,004083BF), ref: 00407742
                                                      • lstrlenA.KERNEL32(?,00000000,?,?,?,00000000,?,004083BF), ref: 00407FAE
                                                      • GetFileAttributesA.KERNELBASE(00000000,?,?,00000000,?,?,?,00000000,?,004083BF), ref: 00407FE7
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                                      • String ID:
                                                      • API String ID: 3248276644-0
                                                      • Opcode ID: 8373e1f232ddb6bf7035178ee982c0deddac14c927df7a2db69a26edf8d4db0f
                                                      • Instruction ID: e0dee199aa33a759337c76bdc749115b0906b62447b55552086bcd5c64e8d670
                                                      • Opcode Fuzzy Hash: 8373e1f232ddb6bf7035178ee982c0deddac14c927df7a2db69a26edf8d4db0f
                                                      • Instruction Fuzzy Hash: 87118FB090C306AEC7107BB96840AAA7EECDE45364F05983FE8C1A3281D77C7841966F
                                                      APIs
                                                      • OleInitialize.OLE32(007F3E48), ref: 00404A18
                                                        • Part of subcall function 004049C7: SendMessageA.USER32 ref: 004049F0
                                                      • OleUninitialize.OLE32(00000000,00000000,?,?,0040630F), ref: 00404A72
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: InitializeMessageSendUninitialize
                                                      • String ID:
                                                      • API String ID: 2896919175-0
                                                      • Opcode ID: d339b3f802cd687aeaa006cbcec2a62dd4f032680ecc39a974beee111cb915e5
                                                      • Instruction ID: 1e3af241344d98a248872f0bd2083e35cf73cdb40cc7b52374e1de70a9c27ef2
                                                      • Opcode Fuzzy Hash: d339b3f802cd687aeaa006cbcec2a62dd4f032680ecc39a974beee111cb915e5
                                                      • Instruction Fuzzy Hash: 180171F1505306AFD740AFA4D844766BBE8EB44310F11947EFE9493291D73994408F5D
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: ShowWindow
                                                      • String ID:
                                                      • API String ID: 1268545403-0
                                                      • Opcode ID: bd2355a4c4afa0af93886b696c643db1bb6602db62a74264e95f2d03f51559e5
                                                      • Instruction ID: 191cf0361faf7115a81ea473c9f044b320c3d38e43f128136233a9863dde8171
                                                      • Opcode Fuzzy Hash: bd2355a4c4afa0af93886b696c643db1bb6602db62a74264e95f2d03f51559e5
                                                      • Instruction Fuzzy Hash: 36F05EB6B08201EFD714DF55AC8056ABBF9FBC4301B15D47BE94593240C6308A01AB59
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: CloseCreateHandleProcess
                                                      • String ID:
                                                      • API String ID: 3712363035-0
                                                      • Opcode ID: d6989bb56516e3a2962a9bd2f4898316265ee85a6e4b2dfdbe44f00bbc7ceed3
                                                      • Instruction ID: 689bfe552f6c86e98e1027bdd9d88049dc19f07609aaa16ba02e971f40684cfe
                                                      • Opcode Fuzzy Hash: d6989bb56516e3a2962a9bd2f4898316265ee85a6e4b2dfdbe44f00bbc7ceed3
                                                      • Instruction Fuzzy Hash: 7B01BDB09083059FE700DF65C95874BBBF4BB88308F00892CE984AB380D7B9D5498F96
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: Window$EnableShow
                                                      • String ID:
                                                      • API String ID: 1136574915-0
                                                      • Opcode ID: c5e1c5af09a17d7162aaa8d321b7f86fef45140455825dc6134dca4c65cc3eb6
                                                      • Instruction ID: 7f628d260daaf21f823d0aec3129a8927898c46e80915c605feb16ab9189c399
                                                      • Opcode Fuzzy Hash: c5e1c5af09a17d7162aaa8d321b7f86fef45140455825dc6134dca4c65cc3eb6
                                                      • Instruction Fuzzy Hash: 18F030F1608200EFD754BF5AEC447AAF7F8EB84316F12843FF589A2591DA7805419A2E
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: InvalidateMessageRectSend
                                                      • String ID:
                                                      • API String ID: 909852535-0
                                                      • Opcode ID: 3687898a21f3f3fe1f817b9c8a46b856033ac9a2ec5078b9b31088a7850533db
                                                      • Instruction ID: 4d59ad536880b3338388803c7daac04e80b68a5d2d2d9c9899754cd343548cd5
                                                      • Opcode Fuzzy Hash: 3687898a21f3f3fe1f817b9c8a46b856033ac9a2ec5078b9b31088a7850533db
                                                      • Instruction Fuzzy Hash: CAF0B7759043049FE710EF69E89839EBBF1FB84315F00D86EE55893250DB358598CF46
                                                      APIs
                                                      • GetFileAttributesA.KERNELBASE ref: 00407875
                                                      • CreateFileA.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00000000,?,00403E07), ref: 004078B4
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: File$AttributesCreate
                                                      • String ID:
                                                      • API String ID: 415043291-0
                                                      • Opcode ID: 095a37bff4decf175eb1bd94082fa7df9a8174ae5e2f969c188c31d5a9e38645
                                                      • Instruction ID: 0fa958c00355423b5825cef4833c134f4f2af1b07d937f04d1427b8d5614869e
                                                      • Opcode Fuzzy Hash: 095a37bff4decf175eb1bd94082fa7df9a8174ae5e2f969c188c31d5a9e38645
                                                      • Instruction Fuzzy Hash: 2FF0B2B05083059BC700EF29D48874EBBF4AB88754F10892CF89987391D775D9848BA2
                                                      APIs
                                                      • GetFileAttributesA.KERNELBASE(?,00000000,00000000), ref: 00407843
                                                      • SetFileAttributesA.KERNELBASE(?,?,00000000,00000000), ref: 00407859
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: AttributesFile
                                                      • String ID:
                                                      • API String ID: 3188754299-0
                                                      • Opcode ID: ee5c1f5fcb19ff260445b9409ea9ad711b6eeeda713977d19237c8fb6ce17a97
                                                      • Instruction ID: 2d87bc076650892dff14bf629d0825291b245e1deb4b29ce28756198e0d386ec
                                                      • Opcode Fuzzy Hash: ee5c1f5fcb19ff260445b9409ea9ad711b6eeeda713977d19237c8fb6ce17a97
                                                      • Instruction Fuzzy Hash: 58E08CB1804709ABC700AF78CCC881EBABCAB24760B504A2CF5A5C33D1D63498408B35
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: CreateDirectoryErrorLast
                                                      • String ID:
                                                      • API String ID: 1375471231-0
                                                      • Opcode ID: 817bc1b9dcae04099eeee7c287e0f8940a7378e0748306417bf06f72b7378fa7
                                                      • Instruction ID: 555b80ff280aab0952195b46ca47e1bd25d37e94dfcacda55879a87a47fbe0d4
                                                      • Opcode Fuzzy Hash: 817bc1b9dcae04099eeee7c287e0f8940a7378e0748306417bf06f72b7378fa7
                                                      • Instruction Fuzzy Hash: A1D05EB0A043056BC700EF78980861BBAF9AB90B44F00C43CB944C3340FA74D8058796
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: FileMove
                                                      • String ID:
                                                      • API String ID: 3562171763-0
                                                      • Opcode ID: 18f417a656d5aee30d76cc2538e182e12095416163dcb9beba6f3a859823740d
                                                      • Instruction ID: 53ae8252f41965b0c1919c1ba66bf311c03744c8a734f28553da68392c6c6446
                                                      • Opcode Fuzzy Hash: 18f417a656d5aee30d76cc2538e182e12095416163dcb9beba6f3a859823740d
                                                      • Instruction Fuzzy Hash: C60192B05086019BD3107F2A8D4466EB6F4EF90724F15863FB5D4B22E1D67848828A6B
                                                      APIs
                                                      • WritePrivateProfileStringA.KERNEL32 ref: 00402D24
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: PrivateProfileStringWrite
                                                      • String ID:
                                                      • API String ID: 390214022-0
                                                      • Opcode ID: dd577b94fb968ef0c328d54a646d973f372bd89200f89a093cceea7d7ba19614
                                                      • Instruction ID: 879747074b4e1b14df2381b92450785b3757b65ac9bf0bb35f3091ebfbfc7782
                                                      • Opcode Fuzzy Hash: dd577b94fb968ef0c328d54a646d973f372bd89200f89a093cceea7d7ba19614
                                                      • Instruction Fuzzy Hash: E2F012714082109ED315BF6A8D4436EBAE46F44385F11853EB588A32E2D7B84481CB5A
                                                      APIs
                                                      • ReadFile.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,00403B47), ref: 00403AA9
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: FileRead
                                                      • String ID:
                                                      • API String ID: 2738559852-0
                                                      • Opcode ID: 864bb8e8a586830efcbe2ee958ea0bf1a0d9a6489681a71610e933f9576fdf23
                                                      • Instruction ID: 1c49c6a52c00be2641cec1acdc1bf2ba04586d911cd88fa55dbd5d8fb6f9238d
                                                      • Opcode Fuzzy Hash: 864bb8e8a586830efcbe2ee958ea0bf1a0d9a6489681a71610e933f9576fdf23
                                                      • Instruction Fuzzy Hash: D2F0AC71904309AFC740EF69D58468EBBF4BB48254F008879E89993341E734D644CF55
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID:
                                                      • API String ID: 3850602802-0
                                                      • Opcode ID: 66d4689fbc8569e1fd45598b70766002729c44451447966a135d6988e736546c
                                                      • Instruction ID: 5a3a7b7be979fc00f35a6542abf12f847681ed3bc5d4400e6a8564fe02df8d3a
                                                      • Opcode Fuzzy Hash: 66d4689fbc8569e1fd45598b70766002729c44451447966a135d6988e736546c
                                                      • Instruction Fuzzy Hash: 33E0E2B0508305AFC700AF68D94961EBFF4AB85314F90982DE989AB391D778D8448F9A
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: MessageSend
                                                      • String ID:
                                                      • API String ID: 3850602802-0
                                                      • Opcode ID: aa5f0078c5c91a5ab00808205fc22a8e80333a2e3e19be405c841ee7ecc70c06
                                                      • Instruction ID: 95ab6499f073aa7dc88c61072bb55c4a539e5532572e3332cdc6406efa5f1179
                                                      • Opcode Fuzzy Hash: aa5f0078c5c91a5ab00808205fc22a8e80333a2e3e19be405c841ee7ecc70c06
                                                      • Instruction Fuzzy Hash: 99D017B1108304AFD300EF28C48971BBBE4AB80344F40C92CE88997290DB78D4449F96
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: ItemText
                                                      • String ID:
                                                      • API String ID: 3367045223-0
                                                      • Opcode ID: 4179ef11889bfc32c970cb4b695ddf26e4d91e89fffc5eb3b513b075a9a18c38
                                                      • Instruction ID: ce57ea90032812a2176e13de1b86ec66f6dd0ae0cf349a3b1574ffa4062be47c
                                                      • Opcode Fuzzy Hash: 4179ef11889bfc32c970cb4b695ddf26e4d91e89fffc5eb3b513b075a9a18c38
                                                      • Instruction Fuzzy Hash: 62D0E8B4908304AFC700FF2CC88990ABBE4AB48218F40C82DE88897350E674E8848F86
                                                      APIs
                                                      • SetFileAttributesA.KERNEL32 ref: 00401855
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: AttributesFile
                                                      • String ID:
                                                      • API String ID: 3188754299-0
                                                      • Opcode ID: f603d45d16697995d78d645df9e97d793ae97943438d0db616a93f364bd97212
                                                      • Instruction ID: aa4265ffbac3d2a2699931aa17bf47b3ae1aa300eb8bdb5092ff34b73920f7e7
                                                      • Opcode Fuzzy Hash: f603d45d16697995d78d645df9e97d793ae97943438d0db616a93f364bd97212
                                                      • Instruction Fuzzy Hash: 13D0A7B000C202DED3005F208C0053BB6F4AF84340F20863DF0C6A31E4D734C8826B2A
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: FilePointer
                                                      • String ID:
                                                      • API String ID: 973152223-0
                                                      • Opcode ID: f502c6a14d72cac2e0b31ba9f8e88146b763efd9c37584d1b9b30b50f253f56b
                                                      • Instruction ID: b3d6143a815d2316660b0046a56e6f3f5b2c112ab8e91570835b50a68ad8d929
                                                      • Opcode Fuzzy Hash: f502c6a14d72cac2e0b31ba9f8e88146b763efd9c37584d1b9b30b50f253f56b
                                                      • Instruction Fuzzy Hash: 0AD06CB4508304AFD300EF68D54970EBBE4AB94348F80C82CE89897251E6B8D4688B9A
                                                      APIs
                                                      • KiUserCallbackDispatcher.NTDLL ref: 00404B49
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: CallbackDispatcherUser
                                                      • String ID:
                                                      • API String ID: 2492992576-0
                                                      • Opcode ID: 65a0447da7a95d6931b711cd232d36d4a58e5925726a574ed6c165ac46d8c0f6
                                                      • Instruction ID: d5e7e5bea0f137f7fa37aa2ac1916e01692c2b4dcd8dd483f3dabad1cf4bdedd
                                                      • Opcode Fuzzy Hash: 65a0447da7a95d6931b711cd232d36d4a58e5925726a574ed6c165ac46d8c0f6
                                                      • Instruction Fuzzy Hash: C7D012B5504304AFC300EF68D94581ABBECBB54244F40442CB985D3300E674E8408BE5
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: FreeGlobal
                                                      • String ID:
                                                      • API String ID: 2979337801-0
                                                      • Opcode ID: f06abad74ecda3f1c635d1236d224e25433d347e540cb9344a3dfd1245929eed
                                                      • Instruction ID: db611f0d9cdbc77af24bca5bd09fd45422bff531a237e336b3002678854f52af
                                                      • Opcode Fuzzy Hash: f06abad74ecda3f1c635d1236d224e25433d347e540cb9344a3dfd1245929eed
                                                      • Instruction Fuzzy Hash: ED215E759082049FD740AF35C94899AFBF4EF45314F4184BFE888E7241EA348A85CF56
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: Sleep
                                                      • String ID:
                                                      • API String ID: 3472027048-0
                                                      • Opcode ID: 010e457f777b0ba3de50f07910f119e564ed8aada70e8426dbe02e110ff309ea
                                                      • Instruction ID: 5d3e66056d311facd1f43b60f2da74df669075f311b99e9e3489bd3f95b44579
                                                      • Opcode Fuzzy Hash: 010e457f777b0ba3de50f07910f119e564ed8aada70e8426dbe02e110ff309ea
                                                      • Instruction Fuzzy Hash: F3E0C2727082008FE344AF6AAC002AAF3EAEFD0315F22843BEA45D2050D6388A01951A
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: CloseHandle
                                                      • String ID:
                                                      • API String ID: 2962429428-0
                                                      • Opcode ID: c3f3ffad0066bc9af8d9fed563eafafd78feeb676d5469556e3341a8ffa81967
                                                      • Instruction ID: f778a753f5e19012d3217eb13628dc2c5327f2f1d8f53c9d8af6707b497de67d
                                                      • Opcode Fuzzy Hash: c3f3ffad0066bc9af8d9fed563eafafd78feeb676d5469556e3341a8ffa81967
                                                      • Instruction Fuzzy Hash: 39C012B184D7519FC3056F306859465BF706E11205B06187EF4C1A6193DB3845149617
                                                      APIs
                                                        • Part of subcall function 6E5C1A84: GlobalAlloc.KERNEL32(?,?,?,?,?,6E5C1AE2,?,?,?,6E5C1D9D,?,?,?,6E5C14CB), ref: 6E5C1A9A
                                                        • Part of subcall function 6E5C1AC3: lstrcpyA.KERNEL32(?,?,?,6E5C1D9D,?,?,?,6E5C14CB), ref: 6E5C1AEE
                                                        • Part of subcall function 6E5C1AC3: GlobalFree.KERNEL32(00000000), ref: 6E5C1B02
                                                      • GlobalAlloc.KERNEL32 ref: 6E5C23A0
                                                      • GlobalFree.KERNEL32(00000000), ref: 6E5C24FB
                                                      • GlobalFree.KERNEL32(00000000), ref: 6E5C2504
                                                      • GlobalFree.KERNEL32(00000000), ref: 6E5C250D
                                                      • GetModuleHandleA.KERNEL32(00000000), ref: 6E5C25C3
                                                      • LoadLibraryA.KERNEL32(00000001), ref: 6E5C25D7
                                                      • GetProcAddress.KERNEL32(00000001), ref: 6E5C2601
                                                      • lstrcatA.KERNEL32 ref: 6E5C261E
                                                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 6E5C2633
                                                      • lstrcpyA.KERNEL32(00000000,00000000), ref: 6E5C2744
                                                      • GlobalFree.KERNEL32(00000000), ref: 6E5C2903
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4163482141.000000006E5C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E5C0000, based on PE: true
                                                      • Associated: 00000000.00000002.4163465602.000000006E5C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163502457.000000006E5C6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163520313.000000006E5C8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163537978.000000006E5C9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163555114.000000006E5CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_6e5c0000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: Global$Free$AddressAllocProclstrcpy$HandleLibraryLoadModulelstrcat
                                                      • String ID: <`\n
                                                      • API String ID: 960787091-1869221154
                                                      • Opcode ID: eef741c8f73e08eb6d6344694e957d45622ef18745d9d2f68eec55b253c02fc2
                                                      • Instruction ID: 444cd68df2272b8b9f21c71279f2a338c6f62e08c64f56e3461046c59e487aa2
                                                      • Opcode Fuzzy Hash: eef741c8f73e08eb6d6344694e957d45622ef18745d9d2f68eec55b253c02fc2
                                                      • Instruction Fuzzy Hash: B2227C78804A15CFDB50CFE9C4A43ADBBF5BB45B04F05E92DD894AB244D7B48886CF92
                                                      APIs
                                                      • SetUnhandledExceptionFilter.KERNEL32 ref: 6E5C3AFF
                                                      • UnhandledExceptionFilter.KERNEL32 ref: 6E5C3B0F
                                                      • GetCurrentProcess.KERNEL32 ref: 6E5C3B18
                                                      • TerminateProcess.KERNEL32 ref: 6E5C3B29
                                                      • abort.MSVCRT ref: 6E5C3B32
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4163482141.000000006E5C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E5C0000, based on PE: true
                                                      • Associated: 00000000.00000002.4163465602.000000006E5C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163502457.000000006E5C6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163520313.000000006E5C8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163537978.000000006E5C9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163555114.000000006E5CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_6e5c0000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterProcessUnhandled$CurrentTerminateabort
                                                      • String ID:
                                                      • API String ID: 520269711-0
                                                      • Opcode ID: db2ea6cfbae88e9818d838afebed1a7832ee56c383ff42062c61979a5364e221
                                                      • Instruction ID: 6a1809723f4558abe9ef9a64cd20787c6f35a85e59dddf5b25c8fdab4bfe742e
                                                      • Opcode Fuzzy Hash: db2ea6cfbae88e9818d838afebed1a7832ee56c383ff42062c61979a5364e221
                                                      • Instruction Fuzzy Hash: E91107B4804B05CFCB00EFB9C56D659BBF0BB49B04F42896DE98897341EB349954CF92
                                                      APIs
                                                      • GetSystemTimeAsFileTime.KERNEL32 ref: 6E5C3A39
                                                      • GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,6E5C1439), ref: 6E5C3A4A
                                                      • GetCurrentThreadId.KERNEL32 ref: 6E5C3A52
                                                      • GetTickCount.KERNEL32 ref: 6E5C3A5A
                                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,6E5C1439), ref: 6E5C3A69
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4163482141.000000006E5C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E5C0000, based on PE: true
                                                      • Associated: 00000000.00000002.4163465602.000000006E5C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163502457.000000006E5C6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163520313.000000006E5C8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163537978.000000006E5C9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163555114.000000006E5CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_6e5c0000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                                      • String ID:
                                                      • API String ID: 1445889803-0
                                                      • Opcode ID: 523464c3f403b970596e7afae4a968b8852f716a9b4d3081fbfb478f5e11a281
                                                      • Instruction ID: 94cce05d9da4e41bd13cea3a0bbf6888bbe8ae1f8f33c598f371b459f89195d9
                                                      • Opcode Fuzzy Hash: 523464c3f403b970596e7afae4a968b8852f716a9b4d3081fbfb478f5e11a281
                                                      • Instruction Fuzzy Hash: 7A115EB6904B058FCB00EFF9D89C55BBBE4FB89A64F42082DE448C7200DE3198588B92
                                                      APIs
                                                      • SetUnhandledExceptionFilter.KERNEL32 ref: 6E5C3AFF
                                                      • UnhandledExceptionFilter.KERNEL32 ref: 6E5C3B0F
                                                      • GetCurrentProcess.KERNEL32 ref: 6E5C3B18
                                                      • TerminateProcess.KERNEL32 ref: 6E5C3B29
                                                      • abort.MSVCRT ref: 6E5C3B32
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4163482141.000000006E5C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E5C0000, based on PE: true
                                                      • Associated: 00000000.00000002.4163465602.000000006E5C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163502457.000000006E5C6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163520313.000000006E5C8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163537978.000000006E5C9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163555114.000000006E5CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_6e5c0000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterProcessUnhandled$CurrentTerminateabort
                                                      • String ID:
                                                      • API String ID: 520269711-0
                                                      • Opcode ID: a8db63faaaf068254577a2f70e5be241c3f8f07d48a3b6772ee04ddc51fe8807
                                                      • Instruction ID: 4535de574edaa20f96e90ce34de3def5107d5e71f17ff0f0a9d2c4cd59df8b3d
                                                      • Opcode Fuzzy Hash: a8db63faaaf068254577a2f70e5be241c3f8f07d48a3b6772ee04ddc51fe8807
                                                      • Instruction Fuzzy Hash: 811135B4800A05CFCB00EFB9C52D2997BF0BB0AB04F0285ADE94897241EB34A944CF92
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: FileFindFirst
                                                      • String ID:
                                                      • API String ID: 1974802433-0
                                                      • Opcode ID: a383e3318ce8df95e431e481b1b6ef230ff90cdfaef740520a84b3d16d448493
                                                      • Instruction ID: 7bbb0544dbbebf1df20c253cd27ee875bfc9e3f20a8d285f2b93f6bdd00ca06b
                                                      • Opcode Fuzzy Hash: a383e3318ce8df95e431e481b1b6ef230ff90cdfaef740520a84b3d16d448493
                                                      • Instruction Fuzzy Hash: 380171B1908600EED310DF69C844AAEFBF8EF84315F10C86FE489A3280D7384A418F67
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 30b1a7986aa0b74e1a34f4ed43e36a838e808f1387f411dda699a044b285acb4
                                                      • Instruction ID: df6b0dc4cca14d6d4c01dc5fc37562bc820621efc621070ec281f652a941da47
                                                      • Opcode Fuzzy Hash: 30b1a7986aa0b74e1a34f4ed43e36a838e808f1387f411dda699a044b285acb4
                                                      • Instruction Fuzzy Hash: 9112F3B4C04219CFCB18CF95C58469EBBF0FF48304F2485AAD855AB38AD7789A46CF95
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4163482141.000000006E5C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E5C0000, based on PE: true
                                                      • Associated: 00000000.00000002.4163465602.000000006E5C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163502457.000000006E5C6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163520313.000000006E5C8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163537978.000000006E5C9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163555114.000000006E5CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_6e5c0000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID:
                                                      • String ID:
                                                      • API String ID:
                                                      • Opcode ID: 43e378a65eeb9ef31b54acbc4f00068264d3b9adccad63ebbccdedfa2f358023
                                                      • Instruction ID: 1235d19ad6f32c7b8dc3a2fba1398f0c5c1c30d49b08674fa8564d820740e5ca
                                                      • Opcode Fuzzy Hash: 43e378a65eeb9ef31b54acbc4f00068264d3b9adccad63ebbccdedfa2f358023
                                                      • Instruction Fuzzy Hash: 7F31C33170930A4BD758CDEE94B4A6BB6E397CAB50F55C53DA50AC3384ED709C87C682
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4163482141.000000006E5C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E5C0000, based on PE: true
                                                      • Associated: 00000000.00000002.4163465602.000000006E5C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163502457.000000006E5C6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163520313.000000006E5C8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163537978.000000006E5C9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163555114.000000006E5CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_6e5c0000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: FreeGlobal$lstrcpy
                                                      • String ID: '
                                                      • API String ID: 176019282-1997036262
                                                      • Opcode ID: ad54ee81cc521a66bd61810715a2b953a2fa856b7b7522c7797097b33876b5b5
                                                      • Instruction ID: afbc35224d4cacc622fcd2e502aac90eaee27c05f711bbe49ba15e31bbee25f0
                                                      • Opcode Fuzzy Hash: ad54ee81cc521a66bd61810715a2b953a2fa856b7b7522c7797097b33876b5b5
                                                      • Instruction Fuzzy Hash: B4D118B4904B05DFCB00DFA9C4A86AABBF4FF89B44F11896DE4989B340D7349945CF92
                                                      APIs
                                                      Strings
                                                      • Pandora FMS Agent 7.0NG.777.1 Setup, xrefs: 004011B2
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: CreateIndirectRect$BeginBrushClientColorDeleteFillFontModeObjectPaintProcTextWindow
                                                      • String ID: Pandora FMS Agent 7.0NG.777.1 Setup
                                                      • API String ID: 2207649800-3452433673
                                                      • Opcode ID: 61b91f46278564504fcc6e8d7c54ede98f6323e260d14d83c86c78e6abc51892
                                                      • Instruction ID: 6812554381b726746be0810cd68d0cbcff0de309ce517ffca120cf1bd0aec520
                                                      • Opcode Fuzzy Hash: 61b91f46278564504fcc6e8d7c54ede98f6323e260d14d83c86c78e6abc51892
                                                      • Instruction Fuzzy Hash: 1061F2B09047089FCB14DFA9C9885AEFBF8FB88710F11892EE499D7251E734A844DF55
                                                      APIs
                                                        • Part of subcall function 00DB238D: lstrcpynA.KERNEL32 ref: 00DB23CA
                                                        • Part of subcall function 00DB238D: GlobalFree.KERNEL32 ref: 00DB23DF
                                                      • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00DB11E3
                                                      • GetFileAttributesA.KERNEL32 ref: 00DB11F4
                                                      • lstrcpyA.KERNEL32 ref: 00DB1213
                                                      • lstrcpyA.KERNEL32 ref: 00DB1241
                                                      • CharNextA.USER32 ref: 00DB1262
                                                      • GetCurrentDirectoryA.KERNEL32 ref: 00DB127E
                                                      • GetSaveFileNameA.COMDLG32 ref: 00DB128D
                                                      • GetOpenFileNameA.COMDLG32 ref: 00DB1295
                                                      • CommDlgExtendedError.COMDLG32 ref: 00DB12AE
                                                      • GetSaveFileNameA.COMDLG32 ref: 00DB12C9
                                                      • GetOpenFileNameA.COMDLG32 ref: 00DB12D1
                                                      • SetCurrentDirectoryA.KERNEL32(00000000), ref: 00DB12F5
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4163042955.0000000000DB1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00DB0000, based on PE: true
                                                      • Associated: 00000000.00000002.4163017212.0000000000DB0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163067709.0000000000DB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163092635.0000000000DB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163118887.0000000000DB7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163144543.0000000000DB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_db0000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: File$Name$CurrentDirectoryOpenSavelstrcpy$AttributesCharCommErrorExtendedFreeGlobalNextlstrcmpilstrcpyn
                                                      • String ID: All Files|*.*$X$save
                                                      • API String ID: 3853173656-3147001704
                                                      • Opcode ID: 38224dc21374caa7790eb13572ac3aad33d27a1d6e8ee1bf5fb34c981da3a175
                                                      • Instruction ID: bea4f6ba749743dceadf7dbcda1b0845c36c17e05073cebddba14fa99952352a
                                                      • Opcode Fuzzy Hash: 38224dc21374caa7790eb13572ac3aad33d27a1d6e8ee1bf5fb34c981da3a175
                                                      • Instruction Fuzzy Hash: 714135B4408304EFE700AFA9E8596AABBF9BF85305F45451CE58ADB351C77488058B72
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4163482141.000000006E5C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E5C0000, based on PE: true
                                                      • Associated: 00000000.00000002.4163465602.000000006E5C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163502457.000000006E5C6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163520313.000000006E5C8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163537978.000000006E5C9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163555114.000000006E5CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_6e5c0000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: Virtual$ProtectQueryabortfwritevfprintf
                                                      • String ID: @$f\n$f\n$f\n$f\n$f\n$f\n$f\n
                                                      • API String ID: 1503958624-3675119293
                                                      • Opcode ID: 0ff0a107993387651b644fdb640d87b8800044d6efd1d646b6ec6f7529abac93
                                                      • Instruction ID: f896503a3ed3bbbe0caa9f1cc561a92e8f9142bf07f6f24f6f5d2878360406a5
                                                      • Opcode Fuzzy Hash: 0ff0a107993387651b644fdb640d87b8800044d6efd1d646b6ec6f7529abac93
                                                      • Instruction Fuzzy Hash: 1A4118B1904B018FD700DFA8C9A865AFBF4BF85F58F02895DE99887240E734E845CB83
                                                      APIs
                                                      Strings
                                                      • NSIS: nsControl pointer property, xrefs: 00DB1A1D
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4163042955.0000000000DB1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00DB0000, based on PE: true
                                                      • Associated: 00000000.00000002.4163017212.0000000000DB0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163067709.0000000000DB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163092635.0000000000DB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163118887.0000000000DB7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163144543.0000000000DB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_db0000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: Text$Draw$Window$ColorFocusItemLongMessagePropRectRemoveSend
                                                      • String ID: NSIS: nsControl pointer property
                                                      • API String ID: 2331901045-1714965683
                                                      • Opcode ID: 4d401eda96edb2dde235838fa2f3606de8a7e253aba3b70049e104c8111e119b
                                                      • Instruction ID: aecbdb7afeb45bb2d9c8a72f506213d89a2c6a1258f8bd0c7fb5c80fc34130a7
                                                      • Opcode Fuzzy Hash: 4d401eda96edb2dde235838fa2f3606de8a7e253aba3b70049e104c8111e119b
                                                      • Instruction Fuzzy Hash: A9A16DB4905300DFCB249F28C8A8BAABBF4EB45300F44896DE98AC7255D734D885CF75
                                                      APIs
                                                        • Part of subcall function 00408089: GetModuleHandleA.KERNEL32(?,?,004041D7), ref: 0040809E
                                                        • Part of subcall function 00408089: GetProcAddress.KERNEL32 ref: 004080CA
                                                      • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,?,00408612), ref: 00408173
                                                      • GetShortPathNameA.KERNEL32 ref: 0040818D
                                                        • Part of subcall function 004077A4: lstrlenA.KERNEL32 ref: 004077BC
                                                        • Part of subcall function 004077A4: lstrcmpiA.KERNEL32 ref: 004077E4
                                                      • GetShortPathNameA.KERNEL32 ref: 004081B8
                                                      • wsprintfA.USER32 ref: 004081EF
                                                      • GetFileSize.KERNEL32 ref: 0040824A
                                                      • GlobalAlloc.KERNEL32 ref: 00408266
                                                      • ReadFile.KERNEL32(?,?), ref: 00408292
                                                      • SetFilePointer.KERNEL32 ref: 00408358
                                                        • Part of subcall function 00407868: GetFileAttributesA.KERNELBASE ref: 00407875
                                                        • Part of subcall function 00407868: CreateFileA.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00000000,?,00403E07), ref: 004078B4
                                                      • WriteFile.KERNEL32 ref: 0040837B
                                                      • GlobalFree.KERNEL32 ref: 00408387
                                                      • CloseHandle.KERNEL32(?,?), ref: 00408391
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: File$Handle$CloseGlobalNamePathShort$AddressAllocAttributesCreateFreeModulePointerProcReadSizeWritelstrcmpilstrlenwsprintf
                                                      • String ID:
                                                      • API String ID: 1472977481-0
                                                      • Opcode ID: d5d04cc9d5ea6ec76904520980c899f315adf1fa77415180068aea4c81665863
                                                      • Instruction ID: 308bbf7f557dd640f05079230b4c5f8ffdc3149362ed8bc35b0ed9b5a77fee7d
                                                      • Opcode Fuzzy Hash: d5d04cc9d5ea6ec76904520980c899f315adf1fa77415180068aea4c81665863
                                                      • Instruction Fuzzy Hash: E67109B0908705AFD700AF65D98866FBBF4FF84744F01C82EE8C4A7251DB799445CB9A
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: CapsCreateDeviceFontIndirectwsprintf
                                                      • String ID: H$MS Shell Dlg$Z
                                                      • API String ID: 1586071882-4218872114
                                                      • Opcode ID: 881112ba72558d67ed13d821e07257514b29198231bf02e61c5de64094c5b7b1
                                                      • Instruction ID: 43d35e70bc8dbdfe8576c93b0f3c387e258589e5c84843adacc66f172cbbc799
                                                      • Opcode Fuzzy Hash: 881112ba72558d67ed13d821e07257514b29198231bf02e61c5de64094c5b7b1
                                                      • Instruction Fuzzy Hash: CF216AB28093009FD300BF68DD446AABBF8FB89304F05C97EE488E3251C7B84544CB6A
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                                      • String ID:
                                                      • API String ID: 2320649405-0
                                                      • Opcode ID: e96614c8964ac1cd6b477263a2bf992c25e24962f13eaf36a0c103584b46f05f
                                                      • Instruction ID: 04b3c23794f61a317552016f1abe4b29bcde86f2adf8ab189f55abfa7b5de22e
                                                      • Opcode Fuzzy Hash: e96614c8964ac1cd6b477263a2bf992c25e24962f13eaf36a0c103584b46f05f
                                                      • Instruction Fuzzy Hash: 213112B0505705ABCB009FA8D988A6ABFE8EF48710F04886EFD94DB391D735D940CB69
                                                      APIs
                                                      • GlobalFree.KERNEL32(00000000), ref: 6E5C307A
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4163482141.000000006E5C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E5C0000, based on PE: true
                                                      • Associated: 00000000.00000002.4163465602.000000006E5C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163502457.000000006E5C6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163520313.000000006E5C8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163537978.000000006E5C9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163555114.000000006E5CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_6e5c0000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: FreeGlobal
                                                      • String ID:
                                                      • API String ID: 2979337801-0
                                                      • Opcode ID: 53fdc29596b879b3902f8d8fe8991ec1a41c46c075b2655e2f9a951f3f4bba21
                                                      • Instruction ID: b9b6eae5df56bd2c2719c4b755f0ab810b6e2ab0808b4241b0dfde64b3dda651
                                                      • Opcode Fuzzy Hash: 53fdc29596b879b3902f8d8fe8991ec1a41c46c075b2655e2f9a951f3f4bba21
                                                      • Instruction Fuzzy Hash: 09A15B75904609DFCB00DFE9C4986A9BBF4FF89B54F0588ADE498AB340D7349941CF92
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4163482141.000000006E5C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E5C0000, based on PE: true
                                                      • Associated: 00000000.00000002.4163465602.000000006E5C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163502457.000000006E5C6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163520313.000000006E5C8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163537978.000000006E5C9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163555114.000000006E5CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_6e5c0000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: Sleep_amsg_exit
                                                      • String ID:
                                                      • API String ID: 1015461914-0
                                                      • Opcode ID: 0bc2beddaba1dbe452c189a6e73d211ecc316ba6bd34073bf9b013e9c2d35ee3
                                                      • Instruction ID: 5ee8268678132be912cbdae54052a6dbdbc3bcaedc088163fdb98ea5bbef9f9b
                                                      • Opcode Fuzzy Hash: 0bc2beddaba1dbe452c189a6e73d211ecc316ba6bd34073bf9b013e9c2d35ee3
                                                      • Instruction Fuzzy Hash: 6E417370614A418FEB409FF9C6B875A76F0FB81F84F02892DD9449B684DB79C949CB83
                                                      APIs
                                                        • Part of subcall function 00DB238D: lstrcpynA.KERNEL32 ref: 00DB23CA
                                                        • Part of subcall function 00DB238D: GlobalFree.KERNEL32 ref: 00DB23DF
                                                      • SHBrowseForFolderA.SHELL32 ref: 00DB10F7
                                                      • SHGetPathFromIDListA.SHELL32(?), ref: 00DB110F
                                                      • CoTaskMemFree.OLE32 ref: 00DB1130
                                                        • Part of subcall function 00DB23EF: GlobalAlloc.KERNEL32 ref: 00DB2412
                                                        • Part of subcall function 00DB23EF: lstrcpynA.KERNEL32 ref: 00DB2432
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4163042955.0000000000DB1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00DB0000, based on PE: true
                                                      • Associated: 00000000.00000002.4163017212.0000000000DB0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163067709.0000000000DB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163092635.0000000000DB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163118887.0000000000DB7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163144543.0000000000DB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_db0000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: FreeGloballstrcpyn$AllocBrowseFolderFromListPathTask
                                                      • String ID: E$error
                                                      • API String ID: 3273179968-2359134700
                                                      • Opcode ID: 0f0b42b845c932e7269f1056546f2c1219da27bb3617bc8ffe95e4abaae379b8
                                                      • Instruction ID: a46f8796878a3f875bbcb703fd6541cc37d374ff0bc9922798ed8fed8e543e2f
                                                      • Opcode Fuzzy Hash: 0f0b42b845c932e7269f1056546f2c1219da27bb3617bc8ffe95e4abaae379b8
                                                      • Instruction Fuzzy Hash: EF2139B4804718DFDB10AF69DC846EABBF8EF84350F00459EE94997300D7768A948FB1
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: Message$Send$ClientScreen
                                                      • String ID: f
                                                      • API String ID: 41195575-1993550816
                                                      • Opcode ID: e247cb14e7cbc10d249b4c088be4279f67b96e3107739047fa0c8582e93359d1
                                                      • Instruction ID: 4cf5f096f0e2f78d401906831ade355419e8194ea2adda6136bc25bff010bef3
                                                      • Opcode Fuzzy Hash: e247cb14e7cbc10d249b4c088be4279f67b96e3107739047fa0c8582e93359d1
                                                      • Instruction Fuzzy Hash: 442106B0804318EFDB00AFA9D88829EFFF4EF84715F00C91EE99997281D77984448F96
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: TextTimerWindowwsprintf
                                                      • String ID: d
                                                      • API String ID: 2438957755-2564639436
                                                      • Opcode ID: dd67e884ec8ec0caaa6a545a3b78761555da69fea8bcb67246b7d7cfdc1be238
                                                      • Instruction ID: b56613fd29131e2b1d50a06e70e6d50693f59c0b8f9709b00288229121e5cf6f
                                                      • Opcode Fuzzy Hash: dd67e884ec8ec0caaa6a545a3b78761555da69fea8bcb67246b7d7cfdc1be238
                                                      • Instruction Fuzzy Hash: F11148B1808304AFD700AF28D98869EBFF4FB44745F10C92EF58997290DB789944CB8A
                                                      APIs
                                                      • DestroyWindow.USER32 ref: 004039F9
                                                      • GetTickCount.KERNEL32 ref: 00403A24
                                                      • CreateDialogParamA.USER32 ref: 00403A5A
                                                      • ShowWindow.USER32(?,?,?,?,?,?,?,?,?,?,00403F64), ref: 00403A73
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: Window$CountCreateDestroyDialogParamShowTick
                                                      • String ID: o
                                                      • API String ID: 2102729457-252678980
                                                      • Opcode ID: c87e7bb689c90c73cca680aa2d2e093ebec6ee8f34a2ff9494079182611b8dc5
                                                      • Instruction ID: 1290f7298517dfc8fb71d2f53176280423ee3bc91481700663a47affe96060cf
                                                      • Opcode Fuzzy Hash: c87e7bb689c90c73cca680aa2d2e093ebec6ee8f34a2ff9494079182611b8dc5
                                                      • Instruction Fuzzy Hash: D601E9B0208301AFD710AF65D88C71ABEE8BB40346F01893DE48597290DB788585CF6A
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4163482141.000000006E5C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E5C0000, based on PE: true
                                                      • Associated: 00000000.00000002.4163465602.000000006E5C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163502457.000000006E5C6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163520313.000000006E5C8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163537978.000000006E5C9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163555114.000000006E5CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_6e5c0000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: FreeGlobal
                                                      • String ID: +`\n$error
                                                      • API String ID: 2979337801-3600206984
                                                      • Opcode ID: 39f0c94a17ed2a50b575994097e7cd68fe42b62ebe20008ce07c3b6782aa35ae
                                                      • Instruction ID: 2d261a05050bfb8a2bfcc564829959e2f90395ade2ddcb3b6afedb854b45d144
                                                      • Opcode Fuzzy Hash: 39f0c94a17ed2a50b575994097e7cd68fe42b62ebe20008ce07c3b6782aa35ae
                                                      • Instruction Fuzzy Hash: 2E210CB4508B05DFCB00AFF4D5A86A9BFF8FF05B58F11886DEA8887240D7749554CB92
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                                      • String ID:
                                                      • API String ID: 1849352358-0
                                                      • Opcode ID: 6b9e9b6faa1a00af3eae5babc4ac847923e0ea189fd3ef769c8cb007565c5f91
                                                      • Instruction ID: abf57335424ea27cfc3bd9a21e606f2b92d378061a2b335e2ae11d471bcb5056
                                                      • Opcode Fuzzy Hash: 6b9e9b6faa1a00af3eae5babc4ac847923e0ea189fd3ef769c8cb007565c5f91
                                                      • Instruction Fuzzy Hash: 2A1104B19083009FD740EF69D94839EFBF4FB88705F01886EF58897250EB788A848F46
                                                      APIs
                                                      • IsWindowVisible.USER32 ref: 00406D06
                                                      • CallWindowProcA.USER32 ref: 00406DA8
                                                        • Part of subcall function 004049C7: SendMessageA.USER32 ref: 004049F0
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: Window$CallMessageProcSendVisible
                                                      • String ID: $Pandora FMS Agent 7.0NG.777.1 Setup
                                                      • API String ID: 3748168415-87424590
                                                      • Opcode ID: dce0b9ccfbcc526376bbf972b1384a38493b26d43d79b090b71e6b401c74d695
                                                      • Instruction ID: 376c30814a19dbf3e8d1ceb79ef38d2e8bd4654c647e55e4954393d94a294f82
                                                      • Opcode Fuzzy Hash: dce0b9ccfbcc526376bbf972b1384a38493b26d43d79b090b71e6b401c74d695
                                                      • Instruction Fuzzy Hash: A2212CB0508305AFD710AF15D98496FBBF8EF84715F01943FF885A7281C7B859508B5A
                                                      APIs
                                                      • lstrlenA.KERNEL32(?,?,?,?,?,?,?,00DB143A), ref: 00DB1315
                                                      • CharPrevA.USER32(?,?,?,?,?,?,?,?,00DB143A), ref: 00DB1325
                                                      • MapDialogRect.USER32(00000000), ref: 00DB1396
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4163042955.0000000000DB1000.00000020.00000001.01000000.00000006.sdmp, Offset: 00DB0000, based on PE: true
                                                      • Associated: 00000000.00000002.4163017212.0000000000DB0000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163067709.0000000000DB3000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163092635.0000000000DB6000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163118887.0000000000DB7000.00000004.00000001.01000000.00000006.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163144543.0000000000DB9000.00000002.00000001.01000000.00000006.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_db0000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: CharDialogPrevRectlstrlen
                                                      • String ID: d
                                                      • API String ID: 3411278111-2564639436
                                                      • Opcode ID: 11e2e8fad07774ae8c4db5fd71b33977c5f30d0c5e813b81b9e696ce9ed136ad
                                                      • Instruction ID: f00ffd0d2c006d08c5935461dfbf29305bad0f19c484e7164cae96673c1ac4fc
                                                      • Opcode Fuzzy Hash: 11e2e8fad07774ae8c4db5fd71b33977c5f30d0c5e813b81b9e696ce9ed136ad
                                                      • Instruction Fuzzy Hash: 52214875A08729DFCB10DF64D8846EEBBF8AB48700F40852AE986D7300E770D944CBE1
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4163482141.000000006E5C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E5C0000, based on PE: true
                                                      • Associated: 00000000.00000002.4163465602.000000006E5C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163502457.000000006E5C6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163520313.000000006E5C8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163537978.000000006E5C9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163555114.000000006E5CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_6e5c0000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: AddressHandleModuleProc
                                                      • String ID: _Jv_RegisterClasses$libgcj-16.dll
                                                      • API String ID: 1646373207-328863460
                                                      • Opcode ID: fb8a6bb6d88f095a24dfa36c465cd94e140ddd7333cb5af2f2c05a077dbe6e2d
                                                      • Instruction ID: e76af4fe049a6557068719adc2a05e69a8bbc5231633e53917f7bf8d37eafce4
                                                      • Opcode Fuzzy Hash: fb8a6bb6d88f095a24dfa36c465cd94e140ddd7333cb5af2f2c05a077dbe6e2d
                                                      • Instruction Fuzzy Hash: 26E0C970614A018BE740BFF986BE32A7BF4AB82E45F42846CC985E7244EE70D449C793
                                                      APIs
                                                        • Part of subcall function 6E5C1AC3: lstrcpyA.KERNEL32(?,?,?,6E5C1D9D,?,?,?,6E5C14CB), ref: 6E5C1AEE
                                                        • Part of subcall function 6E5C1AC3: GlobalFree.KERNEL32(00000000), ref: 6E5C1B02
                                                      • GlobalFree.KERNEL32 ref: 6E5C1F46
                                                      • GlobalFree.KERNEL32 ref: 6E5C220B
                                                      • GlobalFree.KERNEL32(00000000), ref: 6E5C2211
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4163482141.000000006E5C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E5C0000, based on PE: true
                                                      • Associated: 00000000.00000002.4163465602.000000006E5C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163502457.000000006E5C6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163520313.000000006E5C8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163537978.000000006E5C9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163555114.000000006E5CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_6e5c0000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: FreeGlobal$lstrcpy
                                                      • String ID: >
                                                      • API String ID: 176019282-325317158
                                                      • Opcode ID: 87254c482326426157807a6a45a12002f7431ac612f560a64d9f314d138807a1
                                                      • Instruction ID: 74043427e9f5d45ba1e77a9927b6befe71a1225257ffaea2cb0d2483085817e5
                                                      • Opcode Fuzzy Hash: 87254c482326426157807a6a45a12002f7431ac612f560a64d9f314d138807a1
                                                      • Instruction Fuzzy Hash: 14916F39E04B68CFDB20CAE9C86079AB7F6BB85B50F05949ED68CA7201D7345D818F53
                                                      APIs
                                                      • CharNextA.USER32(?,?,?,?,?,?,00000000,?,?,?,004040DE), ref: 00407B8F
                                                      • CharNextA.USER32(?,?,?,?,?,00000000,?,?,?,004040DE), ref: 00407BAE
                                                      • CharNextA.USER32(?,?,?,00000000,?,?,?,004040DE), ref: 00407BBA
                                                      • CharPrevA.USER32(?,?,00000000,?,?,?,004040DE), ref: 00407BD5
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4162233942.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000000.00000002.4162209415.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162259880.000000000040A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162282586.000000000040B000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000412000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000435000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.000000000043F000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162312977.0000000000451000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.000000000045B000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      • Associated: 00000000.00000002.4162428637.0000000000483000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_400000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: Char$Next$Prev
                                                      • String ID:
                                                      • API String ID: 589700163-0
                                                      • Opcode ID: 7cf81dcc3d96b46d5d0325c684f48696c58df3b32a57e50987832e823e076a25
                                                      • Instruction ID: a017ce9f29574a2fbdca88c11cbcba89ae79f0d64e1ae8b2359e16dfb5afbbe4
                                                      • Opcode Fuzzy Hash: 7cf81dcc3d96b46d5d0325c684f48696c58df3b32a57e50987832e823e076a25
                                                      • Instruction Fuzzy Hash: 28219471C0C3409EDB216F288C8066AFFF59F95724F4984BFE4C45B282D778A881876B
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4163482141.000000006E5C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E5C0000, based on PE: true
                                                      • Associated: 00000000.00000002.4163465602.000000006E5C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163502457.000000006E5C6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163520313.000000006E5C8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163537978.000000006E5C9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163555114.000000006E5CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_6e5c0000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: __dllonexit_lock_onexit_unlock
                                                      • String ID:
                                                      • API String ID: 209411981-0
                                                      • Opcode ID: 5548a53bd232445f15e51c804d3f6c3bb19bc928ea4ee957be7dcd3a3286b85c
                                                      • Instruction ID: 8052c45d4bec48a81b89e232f6dc3365d481f40536303d19ffa35a018f8c3734
                                                      • Opcode Fuzzy Hash: 5548a53bd232445f15e51c804d3f6c3bb19bc928ea4ee957be7dcd3a3286b85c
                                                      • Instruction Fuzzy Hash: 161106B4919B048FCB40EFB4C49849EBBE4AF95A44F011C2EE9C4C7340EB38D9958B83
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4163482141.000000006E5C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E5C0000, based on PE: true
                                                      • Associated: 00000000.00000002.4163465602.000000006E5C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163502457.000000006E5C6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163520313.000000006E5C8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163537978.000000006E5C9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163555114.000000006E5CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_6e5c0000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: Virtual$ProtectQuery
                                                      • String ID: @
                                                      • API String ID: 1027372294-2766056989
                                                      • Opcode ID: dbfd7b8cc633845426074aec9857913a31f4ca2e37780ab35b0169c5443941e6
                                                      • Instruction ID: 5db2839361e50f659f152f4919c7d1c439fde235d51cc27fc195e7da8dfd9d85
                                                      • Opcode Fuzzy Hash: dbfd7b8cc633845426074aec9857913a31f4ca2e37780ab35b0169c5443941e6
                                                      • Instruction Fuzzy Hash: 7E316F72504B068FD710DFB8C9A865AFBF4BB85F54F46899CD95887240E730E841CB93
                                                      APIs
                                                        • Part of subcall function 6E5C1AC3: lstrcpyA.KERNEL32(?,?,?,6E5C1D9D,?,?,?,6E5C14CB), ref: 6E5C1AEE
                                                        • Part of subcall function 6E5C1AC3: GlobalFree.KERNEL32(00000000), ref: 6E5C1B02
                                                      • GlobalAlloc.KERNEL32 ref: 6E5C166C
                                                      • GlobalFree.KERNEL32 ref: 6E5C16D1
                                                      • GlobalFree.KERNEL32 ref: 6E5C172B
                                                      • GlobalFree.KERNEL32 ref: 6E5C173C
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4163482141.000000006E5C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E5C0000, based on PE: true
                                                      • Associated: 00000000.00000002.4163465602.000000006E5C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163502457.000000006E5C6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163520313.000000006E5C8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163537978.000000006E5C9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163555114.000000006E5CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_6e5c0000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: Global$Free$Alloclstrcpy
                                                      • String ID:
                                                      • API String ID: 852173138-0
                                                      • Opcode ID: 8189f534069a341e8d4021b56f36a8e15f0c1da63cb738f11c2f49cdbabcd202
                                                      • Instruction ID: f55bd1ca918b85953870e3711d1c7b100d7b06f828ea03030092589967f430b5
                                                      • Opcode Fuzzy Hash: 8189f534069a341e8d4021b56f36a8e15f0c1da63cb738f11c2f49cdbabcd202
                                                      • Instruction Fuzzy Hash: 35415EB4904A058FCB00DFE8C5A85AAFBF5FB8AF04F05C95ED58497241D7349486CF52
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4163482141.000000006E5C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E5C0000, based on PE: true
                                                      • Associated: 00000000.00000002.4163465602.000000006E5C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163502457.000000006E5C6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163520313.000000006E5C8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163537978.000000006E5C9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163555114.000000006E5CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_6e5c0000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$EnterLeavefree
                                                      • String ID:
                                                      • API String ID: 4020351045-0
                                                      • Opcode ID: 99395ee615209239c0a01609c9f3e439448ab6f6d5cdff7e1617f3f6409888ae
                                                      • Instruction ID: 018f2c71292d4037724393d6a36352418f7f6a0f31becb9448b19d8d65bc3760
                                                      • Opcode Fuzzy Hash: 99395ee615209239c0a01609c9f3e439448ab6f6d5cdff7e1617f3f6409888ae
                                                      • Instruction Fuzzy Hash: 69015EB56046018FD700EFF8D8A9919B7F1BB55B00F55496DED8987605EB309852CB83
                                                      APIs
                                                      • EnterCriticalSection.KERNEL32(?,?,?,?,?,?,6E5C42F5,?,?,?,?,?,6E5C3B78), ref: 6E5C409E
                                                      • TlsGetValue.KERNEL32(?,?,?,?,?,?,?,6E5C42F5,?,?,?,?,?,6E5C3B78), ref: 6E5C40C5
                                                      • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,6E5C42F5,?,?,?,?,?,6E5C3B78), ref: 6E5C40CC
                                                      • LeaveCriticalSection.KERNEL32(?,?,?,?,?,?,?,6E5C42F5,?,?,?,?,?,6E5C3B78), ref: 6E5C40EC
                                                      Memory Dump Source
                                                      • Source File: 00000000.00000002.4163482141.000000006E5C1000.00000020.00000001.01000000.00000007.sdmp, Offset: 6E5C0000, based on PE: true
                                                      • Associated: 00000000.00000002.4163465602.000000006E5C0000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163502457.000000006E5C6000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163520313.000000006E5C8000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163537978.000000006E5C9000.00000004.00000001.01000000.00000007.sdmpDownload File
                                                      • Associated: 00000000.00000002.4163555114.000000006E5CC000.00000002.00000001.01000000.00000007.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_0_2_6e5c0000_PandoraFMS_One_Agent_Windows-lts.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$EnterErrorLastLeaveValue
                                                      • String ID:
                                                      • API String ID: 682475483-0
                                                      • Opcode ID: c991cc6bda3599e5e96b592b4e590799303f7b4f24d2023f940fd92eea0ff549
                                                      • Instruction ID: 08b022bf466d8c6dd9c33391619ed65589c351eb0f546eeb5fc01cbbffb2ad6d
                                                      • Opcode Fuzzy Hash: c991cc6bda3599e5e96b592b4e590799303f7b4f24d2023f940fd92eea0ff549
                                                      • Instruction Fuzzy Hash: 0BF044B5500B158BDB00BFF9D5AD91A7BF4EA45E54B06056CDD485B208DA30E81ACBA3

                                                      Execution Graph

                                                      Execution Coverage:51.6%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:0%
                                                      Total number of Nodes:6
                                                      Total number of Limit Nodes:1

                                                      Callgraph

                                                      • Executed
                                                      • Not Executed
                                                      • Opacity -> Relevance
                                                      • Disassembly available
                                                      callgraph 0 Function_00401500 1 Function_00654A30 0->1

                                                      Control-flow Graph

                                                      APIs
                                                      • GetSystemTimeAsFileTime.KERNEL32 ref: 00654A75
                                                      • GetCurrentProcessId.KERNEL32 ref: 00654A80
                                                      • GetCurrentThreadId.KERNEL32 ref: 00654A89
                                                      • GetTickCount.KERNEL32 ref: 00654A91
                                                      • QueryPerformanceCounter.KERNEL32 ref: 00654A9E
                                                      Memory Dump Source
                                                      • Source File: 00000008.00000002.1898434459.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 00000008.00000002.1898404146.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000008.00000002.1898656578.0000000000722000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000008.00000002.1898684553.0000000000732000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000008.00000002.1898706731.0000000000736000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000008.00000002.1898706731.000000000079D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000008.00000002.1898809562.000000000082B000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000008.00000002.1898809562.0000000000837000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000008.00000002.1898855521.0000000000839000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000008.00000002.1898855521.000000000083D000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 00000008.00000002.1898898517.000000000083E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_8_2_400000_PandoraAgent.jbxd
                                                      Similarity
                                                      • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                                      • String ID:
                                                      • API String ID: 1445889803-0
                                                      • Opcode ID: a229c177b31d8b5e617a06d5b7807bd764e8c50821ad7ccf31540a0d0d88c111
                                                      • Instruction ID: 6d2f32427776540ec56a7ee9d9ae1a9b7b41f0b35b6308f6b2ee3d61313dba6b
                                                      • Opcode Fuzzy Hash: a229c177b31d8b5e617a06d5b7807bd764e8c50821ad7ccf31540a0d0d88c111
                                                      • Instruction Fuzzy Hash: 6B11BC6661EB0042FB204B20FC043596361BB88BF9F4856609E8C02BA8DE3CCA88C310

                                                      Execution Graph

                                                      Execution Coverage:15.3%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:0%
                                                      Total number of Nodes:286
                                                      Total number of Limit Nodes:24
                                                      execution_graph 1487 4021c0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess abort 1488 4022c0 1489 4022d0 calloc 1488->1489 1490 4022c9 1488->1490 1491 40232b 1489->1491 1492 4022ee EnterCriticalSection LeaveCriticalSection 1489->1492 1492->1491 1587 402500 strlen 1588 402525 1587->1588 1590 40251a 1587->1590 1589 40256a strncmp 1589->1590 1591 402582 1589->1591 1590->1588 1590->1589 1592 401500 1593 401850 4 API calls 1592->1593 1594 401512 1593->1594 1595 401680 1596 40168b 1595->1596 1597 401690 1596->1597 1600 4023e0 1596->1600 1599 4016b8 1601 402434 1600->1601 1602 4023ec 1600->1602 1605 402450 InitializeCriticalSection 1601->1605 1606 40243d 1601->1606 1603 402405 1602->1603 1604 4023ee 1602->1604 1608 40240e 1603->1608 1609 402250 4 API calls 1603->1609 1607 4023fc 1604->1607 1611 402250 4 API calls 1604->1611 1605->1606 1606->1599 1607->1599 1608->1607 1610 402418 DeleteCriticalSection 1608->1610 1609->1608 1610->1607 1611->1607 1612 401a80 1613 401a96 1612->1613 1614 401a9d fprintf 1612->1614 1613->1614 1493 4018c7 1494 4018d0 1493->1494 1495 401900 signal 1494->1495 1496 4018d7 1494->1496 1497 4019f0 signal 1495->1497 1504 4018e9 1495->1504 1498 4018e2 1496->1498 1499 40197f signal 1496->1499 1497->1504 1501 401940 signal 1498->1501 1498->1504 1500 4019b0 signal 1499->1500 1499->1504 1502 4019d0 signal 1500->1502 1500->1504 1503 401959 signal 1501->1503 1501->1504 1502->1504 1503->1504 1505 4010c8 1506 401048 1505->1506 1507 4010a0 __set_app_type 1506->1507 1508 401056 __set_app_type 1506->1508 1509 401062 1507->1509 1508->1509 1510 401093 1509->1510 1513 401a70 1509->1513 1514 4028c0 __setusermatherr 1513->1514 1515 4019c9 1516 4019d0 signal 1515->1516 1517 40192a 1516->1517 1352 401cd9 1355 401c30 1352->1355 1353 401c14 VirtualQuery 1354 401d77 1353->1354 1353->1355 1370 401ae0 fwrite vfprintf abort 1354->1370 1355->1353 1356 401c3e memcpy 1355->1356 1358 401c60 VirtualProtect memcpy 1355->1358 1359 401c56 1355->1359 1360 401cb0 VirtualProtect 1355->1360 1356->1359 1358->1355 1358->1359 1360->1355 1361 401d99 1362 401d8f 1362->1361 1364 401e9d 1362->1364 1366 401e2b 1362->1366 1364->1361 1365 401edc 1364->1365 1399 401b40 1364->1399 1365->1361 1367 401f12 VirtualQuery 1365->1367 1366->1361 1368 401ae0 23 API calls 1366->1368 1369 401f38 VirtualProtect 1367->1369 1368->1361 1369->1365 1372 401b40 1370->1372 1371 401d40 1371->1362 1372->1371 1377 401d67 1372->1377 1381 401c0d 1372->1381 1382 401bbe VirtualQuery 1372->1382 1373 401c14 VirtualQuery 1374 401d77 1373->1374 1373->1381 1376 401ae0 10 API calls 1374->1376 1375 401c3e memcpy 1379 401c56 1375->1379 1391 401d8f 1376->1391 1380 401ae0 10 API calls 1377->1380 1378 401c60 VirtualProtect memcpy 1378->1379 1378->1381 1379->1362 1380->1374 1381->1373 1381->1375 1381->1378 1381->1379 1383 401cb0 VirtualProtect 1381->1383 1384 401d47 1382->1384 1385 401bfb 1382->1385 1383->1362 1383->1381 1384->1377 1386 401ae0 10 API calls 1384->1386 1385->1381 1387 401cf0 VirtualProtect 1385->1387 1386->1377 1387->1381 1388 401d2a GetLastError 1387->1388 1388->1371 1389 401ae0 10 API calls 1388->1389 1389->1371 1390 401d99 1390->1362 1391->1390 1393 401e9d 1391->1393 1395 401e2b 1391->1395 1392 401b40 10 API calls 1392->1393 1393->1390 1393->1392 1394 401edc 1393->1394 1394->1390 1396 401f12 VirtualQuery 1394->1396 1395->1390 1397 401ae0 10 API calls 1395->1397 1398 401f38 VirtualProtect 1396->1398 1397->1390 1398->1394 1400 401d40 1399->1400 1406 401b5f 1399->1406 1400->1364 1401 401c14 VirtualQuery 1402 401d77 1401->1402 1403 401c0d 1401->1403 1405 401ae0 13 API calls 1402->1405 1403->1401 1404 401c3e memcpy 1403->1404 1408 401c60 VirtualProtect memcpy 1403->1408 1409 401c56 1403->1409 1412 401cb0 VirtualProtect 1403->1412 1404->1409 1420 401d8f 1405->1420 1406->1403 1407 401d67 1406->1407 1411 401bbe VirtualQuery 1406->1411 1410 401ae0 13 API calls 1407->1410 1408->1403 1408->1409 1409->1364 1410->1402 1413 401d47 1411->1413 1414 401bfb 1411->1414 1412->1364 1412->1403 1413->1407 1415 401ae0 13 API calls 1413->1415 1414->1403 1416 401cf0 VirtualProtect 1414->1416 1415->1407 1416->1403 1417 401d2a GetLastError 1416->1417 1417->1400 1418 401ae0 13 API calls 1417->1418 1418->1400 1419 401d99 1419->1364 1420->1419 1422 401e9d 1420->1422 1424 401e2b 1420->1424 1421 401b40 13 API calls 1421->1422 1422->1419 1422->1421 1423 401edc 1422->1423 1423->1419 1425 401f12 VirtualQuery 1423->1425 1424->1419 1426 401ae0 13 API calls 1424->1426 1427 401f38 VirtualProtect 1425->1427 1426->1419 1427->1423 1518 402359 1519 402360 EnterCriticalSection 1518->1519 1520 402391 LeaveCriticalSection 1519->1520 1523 40237a 1519->1523 1522 4023a1 1520->1522 1521 402380 free LeaveCriticalSection 1521->1522 1523->1520 1523->1521 1615 401099 1616 4010a0 __set_app_type 1615->1616 1617 401062 1616->1617 1618 401093 1617->1618 1619 401a70 __setusermatherr 1617->1619 1620 40110c 1619->1620 1621 40209c 1622 4020a0 1621->1622 1623 401850 4 API calls 1622->1623 1624 4020cb 1623->1624 1625 40169c 1626 4016a0 1625->1626 1627 4023e0 6 API calls 1626->1627 1628 4016b8 1627->1628 1525 4014e0 1526 402110 5 API calls 1525->1526 1527 4014f2 1526->1527 1629 401da0 1630 401db8 1629->1630 1632 401e9d 1630->1632 1634 401e2b 1630->1634 1635 401e8e 1630->1635 1631 401b40 23 API calls 1631->1632 1632->1631 1633 401edc 1632->1633 1632->1635 1633->1635 1636 401f12 VirtualQuery 1633->1636 1634->1635 1637 401ae0 23 API calls 1634->1637 1638 401f38 VirtualProtect 1636->1638 1637->1635 1638->1633 1528 402469 1529 402470 1528->1529 1534 402250 EnterCriticalSection 1529->1534 1531 40240e 1532 402418 DeleteCriticalSection 1531->1532 1533 4023fc 1531->1533 1532->1533 1535 4022a5 LeaveCriticalSection 1534->1535 1537 40227d 1534->1537 1535->1531 1536 402280 TlsGetValue GetLastError 1536->1537 1537->1535 1537->1536 1538 401ee9 1539 401ef0 1538->1539 1540 401e90 1539->1540 1541 401f12 VirtualQuery 1539->1541 1542 401f38 VirtualProtect 1541->1542 1542->1539 1639 4023a9 1640 4023b0 free LeaveCriticalSection 1639->1640 1642 4023a1 1640->1642 1546 401870 1547 401885 1546->1547 1560 4018b8 1546->1560 1548 401940 signal 1547->1548 1553 401974 1547->1553 1554 40189b signal 1547->1554 1552 401959 signal 1548->1552 1558 4018e9 1548->1558 1549 401900 signal 1551 4019f0 signal 1549->1551 1549->1558 1550 4018d7 1555 4018e2 1550->1555 1556 40197f signal 1550->1556 1551->1558 1552->1558 1553->1556 1553->1558 1559 4019d0 signal 1554->1559 1554->1560 1555->1548 1555->1558 1557 4019b0 signal 1556->1557 1556->1558 1557->1558 1557->1559 1559->1558 1560->1549 1560->1550 1560->1558 1643 401130 __getmainargs 1644 402337 1645 402360 EnterCriticalSection 1644->1645 1646 402351 1644->1646 1647 402391 LeaveCriticalSection 1645->1647 1648 40237a 1645->1648 1646->1645 1649 4023a1 1647->1649 1648->1647 1650 402380 free LeaveCriticalSection 1648->1650 1650->1649 1428 4012f9 1434 401180 1428->1434 1429 401333 malloc 1429->1434 1430 401364 strlen malloc memcpy 1430->1430 1430->1434 1431 4014ab exit 1472 402110 1431->1472 1434->1429 1434->1430 1434->1431 1436 4013f5 1434->1436 1439 401470 GetStartupInfoA 1434->1439 1440 401481 _initterm 1434->1440 1441 401424 _amsg_exit 1434->1441 1442 40120a Sleep 1434->1442 1443 40143e _initterm 1434->1443 1446 401d90 1434->1446 1457 4020f0 1434->1457 1462 401530 1434->1462 1437 401409 1436->1437 1438 4013ff _cexit 1436->1438 1438->1437 1439->1440 1440->1434 1441->1434 1441->1443 1442->1434 1443->1434 1445 40128b SetUnhandledExceptionFilter 1445->1434 1447 401d99 1446->1447 1449 401da0 1446->1449 1447->1445 1448 401e8e 1448->1445 1449->1448 1451 401e9d 1449->1451 1453 401e2b 1449->1453 1450 401b40 23 API calls 1450->1451 1451->1448 1451->1450 1452 401edc 1451->1452 1452->1448 1454 401f12 VirtualQuery 1452->1454 1453->1448 1455 401ae0 23 API calls 1453->1455 1456 401f38 VirtualProtect 1454->1456 1455->1448 1456->1452 1458 4020f9 1457->1458 1459 4020a0 1457->1459 1458->1434 1476 401850 1459->1476 1463 4020f0 4 API calls 1462->1463 1464 40153e 1463->1464 1465 401577 fopen 1464->1465 1466 401549 puts puts puts 1464->1466 1468 40159a printf 1465->1468 1469 4015bc fseek ftell 1465->1469 1467 401673 1466->1467 1467->1434 1468->1467 1470 401622 fseek fwrite fclose 1469->1470 1471 4015ef printf fclose 1469->1471 1470->1467 1471->1467 1473 402142 GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 1472->1473 1474 402133 1472->1474 1475 402198 1473->1475 1474->1434 1475->1434 1479 401790 1476->1479 1478 40185f 1478->1434 1480 4017a1 1479->1480 1481 401830 _onexit 1480->1481 1482 4017ae _lock 1480->1482 1481->1478 1483 4017c7 1482->1483 1484 4017d8 __dllonexit 1483->1484 1485 401806 1484->1485 1486 401817 _unlock 1485->1486 1486->1478 1561 401179 1567 401180 1561->1567 1562 401470 GetStartupInfoA 1563 401481 _initterm 1562->1563 1563->1567 1564 401424 _amsg_exit 1566 40143e _initterm 1564->1566 1564->1567 1565 40120a Sleep 1565->1567 1566->1567 1567->1562 1567->1563 1567->1564 1567->1565 1567->1566 1568 4014ab exit 1567->1568 1570 401d90 25 API calls 1567->1570 1572 401333 malloc 1567->1572 1573 401364 strlen malloc memcpy 1567->1573 1574 4020f0 4 API calls 1567->1574 1575 401530 16 API calls 1567->1575 1576 4013f5 1567->1576 1569 402110 5 API calls 1568->1569 1569->1567 1571 40128b SetUnhandledExceptionFilter 1570->1571 1571->1567 1572->1567 1573->1567 1573->1573 1574->1567 1575->1567 1577 401409 1576->1577 1578 4013ff _cexit 1576->1578 1578->1577 1579 4018fc 1580 401900 signal 1579->1580 1581 4019f0 signal 1580->1581 1582 4018e9 1580->1582 1581->1582 1656 4021bc 1657 4021c0 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess abort 1656->1657 1658 40103f 1659 4010a0 __set_app_type 1658->1659 1660 401056 __set_app_type 1658->1660 1661 401062 1659->1661 1660->1661 1662 401093 1661->1662 1663 401a70 __setusermatherr 1661->1663 1664 40110c 1663->1664

                                                      Callgraph

                                                      • Executed
                                                      • Not Executed
                                                      • Opacity -> Relevance
                                                      • Disassembly available
                                                      callgraph 0 Function_004021C0 1 Function_00401B40 1->1 12 Function_004027D0 1->12 20 Function_00401AE0 1->20 35 Function_004025F0 1->35 70 Function_004026A0 1->70 71 Function_004025A0 1->71 2 Function_004024C0 3 Function_004022C0 4 Function_00401842 5 Function_00401746 6 Function_004018C7 22 Function_00402060 6->22 7 Function_004010C8 33 Function_00401A70 7->33 49 Function_00401780 7->49 51 Function_00401A10 7->51 8 Function_004019C9 9 Function_0040B14F 10 Function_00401850 54 Function_00401790 10->54 11 Function_00402250 13 Function_004026D0 13->2 44 Function_00402480 13->44 14 Function_0040BC52 15 Function_0040BE54 16 Function_0040A0D7 17 Function_00402359 18 Function_00401CD9 18->1 18->12 18->20 18->35 19 Function_004129DD 20->1 20->12 20->20 20->35 20->70 20->71 21 Function_00401760 23 Function_004023E0 23->11 24 Function_004014E0 52 Function_00402110 24->52 25 Function_00402469 25->11 26 Function_004020E9 27 Function_00401EE9 28 Function_004019E9 29 Function_00401A6C 30 Function_0040C1EF 31 Function_00401770 32 Function_00401870 32->22 34 Function_00402070 35->44 36 Function_004020F0 36->10 37 Function_00401775 38 Function_0040E475 39 Function_00401179 39->12 39->22 39->36 50 Function_00401D90 39->50 39->52 66 Function_00402820 39->66 75 Function_00401530 39->75 40 Function_004012F9 40->12 40->22 40->36 40->50 40->52 40->66 40->75 41 Function_004018FC 42 Function_004020FC 42->10 43 Function_00402500 43->44 45 Function_00401500 45->10 46 Function_00401680 46->23 47 Function_00402900 48 Function_00401A80 50->1 50->12 50->20 50->35 53 Function_00402810 54->31 54->49 55 Function_0040CC90 56 Function_00401711 57 Function_00402697 58 Function_0040CC97 59 Function_00402819 60 Function_00401099 60->33 60->49 60->51 61 Function_0040261C 61->44 62 Function_0040259C 63 Function_0040209C 63->10 64 Function_0040169C 64->23 65 Function_00401A20 67 Function_00401520 68 Function_00412121 69 Function_00401DA0 69->1 69->12 69->20 69->35 70->44 71->2 71->44 72 Function_004024A0 73 Function_004023A9 74 Function_004129AB 75->36 76 Function_00401130 77 Function_00402730 77->2 77->44 78 Function_004024B2 79 Function_00402337 80 Function_00401939 80->22 81 Function_00402639 81->44 82 Function_004025B9 82->2 82->44 83 Function_0040CC3A 84 Function_004021BC 85 Function_0040103F 85->33 85->49 85->51

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 81 401179 82 401180-4011e9 call 4027d0 81->82 85 401470-401479 GetStartupInfoA 82->85 86 4011ef-401200 82->86 88 401481-40149a _initterm 85->88 87 401216-401222 86->87 89 401202-401204 87->89 90 401224-40122e 87->90 98 4014a4 88->98 93 401411-40141e 89->93 94 40120a-401213 Sleep 89->94 91 401424-401438 _amsg_exit 90->91 92 401234-40123b 90->92 96 401259-40125b 91->96 97 40143e-40145e _initterm 91->97 92->88 95 401241-401253 92->95 93->91 93->92 94->87 95->96 95->97 99 401261-401268 96->99 100 401464-40146a 96->100 97->99 97->100 103 4014ab-4014d5 exit call 402110 98->103 101 401286-4012c4 call 401d90 SetUnhandledExceptionFilter call 402820 call 402060 99->101 102 40126a-401283 99->102 100->99 113 401314-40131c 101->113 114 4012c6-4012c8 101->114 102->101 103->82 115 401333-40135a malloc 113->115 116 40131e-40132e 113->116 117 4012e1-4012e7 114->117 115->98 120 401360-401362 115->120 116->115 118 4012d0-4012d2 117->118 119 4012e9-4012f4 117->119 121 4012d4-4012d7 118->121 122 40130f 118->122 123 4012de 119->123 124 401364-401399 strlen malloc memcpy 120->124 125 401304-40130d 121->125 126 4012d9 121->126 122->113 123->117 124->124 127 40139b-4013ef call 4020f0 call 401530 124->127 125->122 128 401300-401302 125->128 126->123 127->103 133 4013f5-4013fd 127->133 128->122 128->125 134 401409-401410 133->134 135 4013ff-401404 _cexit 133->135 135->134
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1913431590.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000F.00000002.1913371067.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1913450533.0000000000402000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1914262879.0000000000404000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1914375125.0000000000407000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1914431363.000000000040A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_400000_ShortElev.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterInfoSleepStartupUnhandled
                                                      • String ID:
                                                      • API String ID: 2839300629-0
                                                      • Opcode ID: 99cc06deda5b5394276622cd1691a00f6eb4851a20b4a29d9602f214fe30ab98
                                                      • Instruction ID: c15df658a3cc893094c1fb6861b894ff7586e5007a9f56061a4e12fa1a874bd6
                                                      • Opcode Fuzzy Hash: 99cc06deda5b5394276622cd1691a00f6eb4851a20b4a29d9602f214fe30ab98
                                                      • Instruction Fuzzy Hash: 6F818CB1A042008FD710EF69DA8475ABBE0FB44304F06853ED985BB3B1D779A855CF9A

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 0 401ae0-401b59 fwrite vfprintf abort 2 401d40-401d42 0->2 3 401b5f-401b69 0->3 4 401b70-401b74 3->4 5 401b84-401b8c 4->5 6 401b76-401b7e 4->6 5->4 8 401b8e-401b9a call 4025a0 5->8 6->5 7 401ce0-401cea 6->7 9 401c14-401c2a VirtualQuery 7->9 17 401ba0-401bf5 call 4026a0 VirtualQuery 8->17 18 401d67-401d72 call 401ae0 8->18 12 401c30-401c37 9->12 13 401d77-401d97 call 401ae0 9->13 14 401c39-401c3c 12->14 15 401c3e-401c51 memcpy 12->15 28 401da0-401def call 4025f0 call 4027d0 13->28 29 401d99 13->29 14->15 19 401c60-401ca9 VirtualProtect memcpy 14->19 20 401c56-401c5d 15->20 30 401d47-401d5e 17->30 31 401bfb-401c02 17->31 18->13 19->20 24 401cab-401cae 19->24 24->20 27 401cb0-401cd7 VirtualProtect 24->27 27->7 42 401e90-401e97 28->42 43 401df5-401df8 28->43 30->18 33 401d62 call 401ae0 30->33 34 401c04-401c07 31->34 35 401c0d 31->35 33->18 34->35 37 401cf0-401d24 VirtualProtect 34->37 35->9 37->35 39 401d2a-401d37 GetLastError 37->39 39->2 41 401d3b call 401ae0 39->41 41->2 44 401f63 43->44 45 401dfe-401e25 43->45 47 401f68-401f6c 44->47 45->47 52 401e2b 45->52 49 401f72-401f77 47->49 50 401e9d-401ea3 47->50 53 401e30-401e45 49->53 54 401f7d 49->54 50->42 51 401ea5-401eac 50->51 55 401eb0-401eda call 401b40 51->55 52->53 53->42 58 401e47-401e8e call 401ae0 53->58 54->50 62 401edc-401ee5 55->62 58->42 64 401ee7 62->64 65 401efb-401f10 62->65 64->42 66 401ef0-401ef9 65->66 67 401f12-401f61 VirtualQuery VirtualProtect 65->67 66->42 66->65 67->66
                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1913431590.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000F.00000002.1913371067.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1913450533.0000000000402000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1914262879.0000000000404000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1914375125.0000000000407000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1914431363.000000000040A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_400000_ShortElev.jbxd
                                                      Similarity
                                                      • API ID: QueryVirtual$abortfwritememcpyvfprintf
                                                      • String ID: $E@$0E@$0E@$0E@$0E@$0E@$@
                                                      • API String ID: 3828011698-1165053847
                                                      • Opcode ID: b69e903d09c204b8c876a37b1ffb6f923a4892cc2b1158d5b22b8654e6bc15b6
                                                      • Instruction ID: 6181d22603ce2d12ae831f80ea0475ddf7c6fff155df32b4345b9f5259be3375
                                                      • Opcode Fuzzy Hash: b69e903d09c204b8c876a37b1ffb6f923a4892cc2b1158d5b22b8654e6bc15b6
                                                      • Instruction Fuzzy Hash: 07711EB49083059FD700EF69D68455ABBE0FF88344F01892EF989A73A1D778E944CF4A

                                                      Control-flow Graph

                                                      APIs
                                                      Strings
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1913431590.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000F.00000002.1913371067.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1913450533.0000000000402000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1914262879.0000000000404000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1914375125.0000000000407000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1914431363.000000000040A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_400000_ShortElev.jbxd
                                                      Similarity
                                                      • API ID: puts$fopenprintf
                                                      • String ID: "$d@@
                                                      • API String ID: 2713031070-2601049721
                                                      • Opcode ID: a8d501f061a4ca7ffe6a083a5da3a2b9d59d447b3f0aa522e0ec829a37c1c441
                                                      • Instruction ID: b307bc13793dc2d4bb6869ad18d3f337f783364bb2641a6e7dd08223ad808d7d
                                                      • Opcode Fuzzy Hash: a8d501f061a4ca7ffe6a083a5da3a2b9d59d447b3f0aa522e0ec829a37c1c441
                                                      • Instruction Fuzzy Hash: F031C4B59083019FD700EF29C54971EBBE0EF84348F00C92EE585AB391D7B9D4889B9A

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 136 4012f9 137 401300-401302 136->137 138 401304-40130d 137->138 139 40130f 137->139 138->137 138->139 140 401314-40131c 139->140 141 401333-40135a malloc 140->141 142 40131e-40132e 140->142 143 401360-401362 141->143 144 4014a4 141->144 142->141 145 401364-401399 strlen malloc memcpy 143->145 147 4014ab-4014d5 call 4027d0 exit call 402110 144->147 145->145 146 40139b-4013dd call 4020f0 call 401530 145->146 154 4013e2-4013ef 146->154 160 401470-401479 GetStartupInfoA 147->160 161 4011ef-401200 147->161 154->147 156 4013f5-4013fd 154->156 158 401409-401410 156->158 159 4013ff-401404 _cexit 156->159 159->158 163 401481-40149a _initterm 160->163 162 401216-401222 161->162 164 401202-401204 162->164 165 401224-40122e 162->165 163->144 168 401411-40141e 164->168 169 40120a-401213 Sleep 164->169 166 401424-401438 _amsg_exit 165->166 167 401234-40123b 165->167 171 401259-40125b 166->171 172 40143e-40145e _initterm 166->172 167->163 170 401241-401253 167->170 168->166 168->167 169->162 170->171 170->172 173 401261-401268 171->173 174 401464-40146a 171->174 172->173 172->174 175 401286 call 401d90 173->175 176 40126a-401283 173->176 174->173 179 40128b-4012c4 SetUnhandledExceptionFilter call 402820 call 402060 175->179 176->175 179->140 184 4012c6-4012c8 179->184 185 4012e1-4012e7 184->185 186 4012d0-4012d2 185->186 187 4012e9-4012f4 185->187 186->139 188 4012d4-4012d7 186->188 189 4012de 187->189 188->138 190 4012d9 188->190 189->185 190->189
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1913431590.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000F.00000002.1913371067.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1913450533.0000000000402000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1914262879.0000000000404000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1914375125.0000000000407000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1914431363.000000000040A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_400000_ShortElev.jbxd
                                                      Similarity
                                                      • API ID: malloc$ExceptionFilterUnhandled_amsg_exit_cexit_inittermmemcpystrlen
                                                      • String ID:
                                                      • API String ID: 2574462208-0
                                                      • Opcode ID: c9b06d42529bcedfef8fee72870fd89262aca3d1dfebd48efde91bed2a28f986
                                                      • Instruction ID: d4b69ffb3596250692abb332bb1b8398c5fa04885f4e607fe9df41cc56b7db4c
                                                      • Opcode Fuzzy Hash: c9b06d42529bcedfef8fee72870fd89262aca3d1dfebd48efde91bed2a28f986
                                                      • Instruction Fuzzy Hash: 3F314AB5A003048FDB20DF69DA8065ABBF5FB84304F16853ED949BB3A1D379A811CF59

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 191 401ee9 192 401ef0-401ef9 191->192 193 401e90-401e97 192->193 194 401efb-401f10 192->194 194->192 195 401f12-401f61 VirtualQuery VirtualProtect 194->195 195->192
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1913431590.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000F.00000002.1913371067.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1913450533.0000000000402000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1914262879.0000000000404000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1914375125.0000000000407000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1914431363.000000000040A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_400000_ShortElev.jbxd
                                                      Similarity
                                                      • API ID: Virtual$ProtectQuery
                                                      • String ID:
                                                      • API String ID: 1027372294-0
                                                      • Opcode ID: 23a96097263dae46e098c6e48332b17175af7e7fd769d52e0bd5a42bd1668501
                                                      • Instruction ID: 3591d5fdb85a6e1e196882128eae80fbbbb2c932e026e69d4f7c2f88bf2d9e64
                                                      • Opcode Fuzzy Hash: 23a96097263dae46e098c6e48332b17175af7e7fd769d52e0bd5a42bd1668501
                                                      • Instruction Fuzzy Hash: 9E01D674908301DFDB10EF68DA8869EBBF2BF44300F158429E945A7361D734E855DF46

                                                      Control-flow Graph

                                                      APIs
                                                      • SetUnhandledExceptionFilter.KERNEL32 ref: 0040220F
                                                      • UnhandledExceptionFilter.KERNEL32 ref: 0040221F
                                                      • GetCurrentProcess.KERNEL32 ref: 00402228
                                                      • TerminateProcess.KERNEL32 ref: 00402239
                                                      • abort.MSVCRT ref: 00402242
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1913450533.0000000000402000.00000080.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000F.00000002.1913371067.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1913431590.0000000000401000.00000020.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1914262879.0000000000404000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1914375125.0000000000407000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1914431363.000000000040A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_400000_ShortElev.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterProcessUnhandled$CurrentTerminateabort
                                                      • String ID:
                                                      • API String ID: 520269711-0
                                                      • Opcode ID: e2f8fd7fa2d42eb3a8e5b247162d56bc6a8181ca5aa0ed0c781dc752fce05052
                                                      • Instruction ID: 165403e1dcaf70f97a7d4c49adf17f634e1223ea88bb695fc664b9e463cd37e2
                                                      • Opcode Fuzzy Hash: e2f8fd7fa2d42eb3a8e5b247162d56bc6a8181ca5aa0ed0c781dc752fce05052
                                                      • Instruction Fuzzy Hash: 450192B4805204DFC700EFA9EB492497BF0BB09305F018539ED8AAB365E774A5598F9A

                                                      Control-flow Graph

                                                      APIs
                                                      • SetUnhandledExceptionFilter.KERNEL32 ref: 0040220F
                                                      • UnhandledExceptionFilter.KERNEL32 ref: 0040221F
                                                      • GetCurrentProcess.KERNEL32 ref: 00402228
                                                      • TerminateProcess.KERNEL32 ref: 00402239
                                                      • abort.MSVCRT ref: 00402242
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1913450533.0000000000402000.00000080.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000F.00000002.1913371067.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1913431590.0000000000401000.00000020.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1914262879.0000000000404000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1914375125.0000000000407000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1914431363.000000000040A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_400000_ShortElev.jbxd
                                                      Similarity
                                                      • API ID: ExceptionFilterProcessUnhandled$CurrentTerminateabort
                                                      • String ID:
                                                      • API String ID: 520269711-0
                                                      • Opcode ID: 04dd601da9111b5c479d65fcb981df0056497f434b1dd15647caec8f0cb2ddd3
                                                      • Instruction ID: b3ccbfaf9c7a333ee7244beb5fafaa86e70c704d0c6fe5de34a70052f219efa6
                                                      • Opcode Fuzzy Hash: 04dd601da9111b5c479d65fcb981df0056497f434b1dd15647caec8f0cb2ddd3
                                                      • Instruction Fuzzy Hash: F001A4B4805204DFC700EFA9EB492487FF0BB09305F018539ED8AAB365E774A5598F9A

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 197 401870-401883 198 4018d0-4018d5 197->198 199 401885-40188a 197->199 202 401900-401917 signal 198->202 203 4018d7-4018dc 198->203 200 401940-401957 signal 199->200 201 401890-401895 199->201 205 40191d-40191f 200->205 206 401959-401972 signal call 402060 200->206 207 401974-401979 201->207 208 40189b-4018b2 signal 201->208 204 4019f0-401a04 signal 202->204 202->205 209 4018e2-4018e7 203->209 210 40197f-401996 signal 203->210 213 40192a 204->213 214 401921 205->214 215 4018e9-4018f0 205->215 206->213 207->210 207->215 217 4019d0-4019e4 signal 208->217 218 4018b8-4018ba 208->218 209->200 209->215 211 4019b0-4019c4 signal 210->211 212 401998-40199a 210->212 211->213 211->217 212->215 220 4019a0-4019a9 212->220 219 40192f-401933 213->219 214->213 215->219 223 4018f2-4018f8 215->223 217->213 218->215 222 4018bc-4018c5 218->222 220->213 222->198 222->213
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1913431590.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000F.00000002.1913371067.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1913450533.0000000000402000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1914262879.0000000000404000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1914375125.0000000000407000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1914431363.000000000040A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_400000_ShortElev.jbxd
                                                      Similarity
                                                      • API ID: signal
                                                      • String ID:
                                                      • API String ID: 1946981877-0
                                                      • Opcode ID: cc5e0f6f3a19240111b8d9756e2819022e344453821d3244ecaef8342e094c22
                                                      • Instruction ID: ef6f55998a86da59a904ba65539066fa55ff3d2951436b8cc2def4a2c2d336d1
                                                      • Opcode Fuzzy Hash: cc5e0f6f3a19240111b8d9756e2819022e344453821d3244ecaef8342e094c22
                                                      • Instruction Fuzzy Hash: E5314DB1504301CAE710BF65C29436E76E8AB45358F15892FE1C8A73E1C7BDC984DB1B

                                                      Control-flow Graph

                                                      APIs
                                                      • GetSystemTimeAsFileTime.KERNEL32 ref: 00402149
                                                      • GetCurrentProcessId.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004014F2), ref: 0040215A
                                                      • GetCurrentThreadId.KERNEL32 ref: 00402162
                                                      • GetTickCount.KERNEL32 ref: 0040216A
                                                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,004014F2), ref: 00402179
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1913450533.0000000000402000.00000080.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000F.00000002.1913371067.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1913431590.0000000000401000.00000020.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1914262879.0000000000404000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1914375125.0000000000407000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1914431363.000000000040A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_400000_ShortElev.jbxd
                                                      Similarity
                                                      • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                                      • String ID:
                                                      • API String ID: 1445889803-0
                                                      • Opcode ID: 456ab34481953780d482b3704d0cc115c67e335bd347a39907ea1c0fe4ad7b57
                                                      • Instruction ID: a34ecbd558ef4af1ba273e244e8b7f41493d51da4d3b68ece57e2ea5233ef8d1
                                                      • Opcode Fuzzy Hash: 456ab34481953780d482b3704d0cc115c67e335bd347a39907ea1c0fe4ad7b57
                                                      • Instruction Fuzzy Hash: 1D117375D093008FC310DF79EA8855BBBE4FB8C255F05083AE684DB350DA3599598BD7

                                                      Control-flow Graph

                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1913431590.0000000000401000.00000020.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000F.00000002.1913371067.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1913450533.0000000000402000.00000080.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1914262879.0000000000404000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1914375125.0000000000407000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1914431363.000000000040A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_400000_ShortElev.jbxd
                                                      Similarity
                                                      • API ID: __dllonexit_lock_onexit_unlock
                                                      • String ID:
                                                      • API String ID: 209411981-0
                                                      • Opcode ID: 4b72cae09ac0519ac9bef8fe7a193a8243c8ed8e8ea69326f3d3de4b2cebaf89
                                                      • Instruction ID: d4ff4da94d25b7f665149e1a51568b9879a9b2cae011600a9f4df0321a1fa380
                                                      • Opcode Fuzzy Hash: 4b72cae09ac0519ac9bef8fe7a193a8243c8ed8e8ea69326f3d3de4b2cebaf89
                                                      • Instruction Fuzzy Hash: CD1180B991A3018FC700EF79D58551EBBE0AB49344F41493EF8C4A73A2E63894948B8A

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 282 402337-40234f 283 402360-402378 EnterCriticalSection 282->283 284 402351-402357 282->284 285 402391-40239e LeaveCriticalSection 283->285 286 40237a-40237e 283->286 284->283 289 4023a1-4023a7 285->289 287 402380-4023db 286->287 288 40238a-40238f 286->288 294 4023b6-4023ce free LeaveCriticalSection 287->294 288->285 291 402382-402386 288->291 292 4023b0-4023b3 291->292 293 402388 291->293 292->294 293->288 294->289
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1913450533.0000000000402000.00000080.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000F.00000002.1913371067.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1913431590.0000000000401000.00000020.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1914262879.0000000000404000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1914375125.0000000000407000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1914431363.000000000040A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_400000_ShortElev.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$EnterLeavefree
                                                      • String ID:
                                                      • API String ID: 4020351045-0
                                                      • Opcode ID: 8ee836b976f67aeea1b8b27855f0d8eaaae248bbd9ae32ed0cd8c7042e8c57fd
                                                      • Instruction ID: b1e28576f2fa02e77e2260c3c406feebba2d56c4249656223933477f267f2ddd
                                                      • Opcode Fuzzy Hash: 8ee836b976f67aeea1b8b27855f0d8eaaae248bbd9ae32ed0cd8c7042e8c57fd
                                                      • Instruction Fuzzy Hash: A0016571A041118FD704AF78DA8851AB7E1BB80300F15857ADD86BB3D2E77CA851CBDE

                                                      Control-flow Graph

                                                      • Executed
                                                      • Not Executed
                                                      control_flow_graph 295 402250-40227b EnterCriticalSection 296 4022a5-4022bc LeaveCriticalSection 295->296 297 40227d 295->297 298 402280-402290 TlsGetValue GetLastError 297->298 299 402292-402294 298->299 300 40229e-4022a3 298->300 299->300 301 402296-402299 299->301 300->296 300->298 301->300
                                                      APIs
                                                      Memory Dump Source
                                                      • Source File: 0000000F.00000002.1913450533.0000000000402000.00000080.00000001.01000000.0000000C.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000000F.00000002.1913371067.0000000000400000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1913431590.0000000000401000.00000020.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1914262879.0000000000404000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1914375125.0000000000407000.00000004.00000001.01000000.0000000C.sdmpDownload File
                                                      • Associated: 0000000F.00000002.1914431363.000000000040A000.00000002.00000001.01000000.0000000C.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_15_2_400000_ShortElev.jbxd
                                                      Similarity
                                                      • API ID: CriticalSection$EnterErrorLastLeaveValue
                                                      • String ID:
                                                      • API String ID: 682475483-0
                                                      • Opcode ID: 779c3b759be3563ad33a6946f233231bdf77dececdbb531bcb012fd1311d0d8a
                                                      • Instruction ID: bad66241d4b588debb01c28b8d7b76bd65fc326059fd977c8fbe74e1655a1b79
                                                      • Opcode Fuzzy Hash: 779c3b759be3563ad33a6946f233231bdf77dececdbb531bcb012fd1311d0d8a
                                                      • Instruction Fuzzy Hash: B3F0A4B19042108FDB10BFB8EA8891B7BA4AA44750B06047DDD856B385D734B819CBAB

                                                      Execution Graph

                                                      Execution Coverage:51.6%
                                                      Dynamic/Decrypted Code Coverage:0%
                                                      Signature Coverage:0%
                                                      Total number of Nodes:6
                                                      Total number of Limit Nodes:1

                                                      Callgraph

                                                      • Executed
                                                      • Not Executed
                                                      • Opacity -> Relevance
                                                      • Disassembly available
                                                      callgraph 0 Function_00401500 1 Function_00654A30 0->1

                                                      Control-flow Graph

                                                      APIs
                                                      • GetSystemTimeAsFileTime.KERNEL32 ref: 00654A75
                                                      • GetCurrentProcessId.KERNEL32 ref: 00654A80
                                                      • GetCurrentThreadId.KERNEL32 ref: 00654A89
                                                      • GetTickCount.KERNEL32 ref: 00654A91
                                                      • QueryPerformanceCounter.KERNEL32 ref: 00654A9E
                                                      Memory Dump Source
                                                      • Source File: 0000001B.00000002.4162179057.0000000000401000.00000020.00000001.01000000.0000000B.sdmp, Offset: 00400000, based on PE: true
                                                      • Associated: 0000001B.00000002.4162153250.0000000000400000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 0000001B.00000002.4162545419.0000000000722000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 0000001B.00000002.4162576475.0000000000732000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 0000001B.00000002.4162596872.0000000000736000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 0000001B.00000002.4162596872.000000000079D000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 0000001B.00000002.4162743806.000000000082B000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 0000001B.00000002.4162743806.0000000000837000.00000004.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 0000001B.00000002.4162794485.0000000000839000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 0000001B.00000002.4162794485.000000000083D000.00000008.00000001.01000000.0000000B.sdmpDownload File
                                                      • Associated: 0000001B.00000002.4162850266.000000000083E000.00000002.00000001.01000000.0000000B.sdmpDownload File
                                                      Joe Sandbox IDA Plugin
                                                      • Snapshot File: hcaresult_27_2_400000_PandoraAgent.jbxd
                                                      Similarity
                                                      • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                                                      • String ID:
                                                      • API String ID: 1445889803-0
                                                      • Opcode ID: a229c177b31d8b5e617a06d5b7807bd764e8c50821ad7ccf31540a0d0d88c111
                                                      • Instruction ID: 6d2f32427776540ec56a7ee9d9ae1a9b7b41f0b35b6308f6b2ee3d61313dba6b
                                                      • Opcode Fuzzy Hash: a229c177b31d8b5e617a06d5b7807bd764e8c50821ad7ccf31540a0d0d88c111
                                                      • Instruction Fuzzy Hash: 6B11BC6661EB0042FB204B20FC043596361BB88BF9F4856609E8C02BA8DE3CCA88C310