Edit tour

Windows Analysis Report
WinPcap_4_1_3.exe

Overview

General Information

Sample name:WinPcap_4_1_3.exe
Analysis ID:1355806
MD5:a11a2f0cfe6d0b4c50945989db6360cd
SHA1:e2516fcd1573e70334c8f50bee5241cdfdf48a00
SHA256:fc4623b113a1f603c0d9ad5f83130bd6de1c62b973be9892305132389c8588de
Infos:

Detection

Score:0
Range:0 - 100
Whitelisted:true
Confidence:100%

Compliance

Score:18
Range:0 - 100

Signatures

Install WinpCap (used to filter network traffic)
Contains functionality for read data from the clipboard
Contains functionality to dynamically determine API calls
Contains functionality to shutdown / reboot the system
Creates a process in suspended mode (likely to inject code)
Creates driver files
Creates files inside the driver directory
Creates files inside the system directory
DLL planting / hijacking vulnerabilities found
Detected potential crypto function
Drops PE files
Drops PE files to the windows directory (C:\Windows)
EXE planting / hijacking vulnerabilities found
Found dropped PE file which has not been started or loaded
Modifies existing windows services
PE file contains an invalid checksum
PE file contains executable resources (Code or Archives)
Sample execution stops while process was sleeping (likely an evasion)
Stores files to the Windows start menu directory
Uses 32bit PE files

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • WinPcap_4_1_3.exe (PID: 6596 cmdline: C:\Users\user\Desktop\WinPcap_4_1_3.exe MD5: A11A2F0CFE6D0B4C50945989DB6360CD)
    • net.exe (PID: 7140 cmdline: net start npf MD5: 31890A7DE89936F922D44D677F681A7F)
      • conhost.exe (PID: 7032 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • net1.exe (PID: 1592 cmdline: C:\Windows\system32\net1 start npf MD5: 2EFE6ED4C294AB8A39EB59C80813FEC1)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeDLL: USP10.dllJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeDLL: SHFOLDER.DLLJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeDLL: RichEd20.DLLJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeDLL: msls31.dllJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeEXE: net.exeJump to behavior

Compliance

barindex
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeDLL: USP10.dllJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeDLL: SHFOLDER.DLLJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeDLL: RichEd20.DLLJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeDLL: msls31.dllJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeEXE: net.exeJump to behavior
Source: WinPcap_4_1_3.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeWindow detected: < &BackI &AgreeCancelNullsoft Install System v2.46 Nullsoft Install System v2.46License AgreementPlease review the license terms before installing WinPcap 4.1.3.Press Page Down to see the rest of the agreement.Copyright (c) 1999 - 2005 NetGroup Politecnico di Torino (Italy).Copyright (c) 2005 - 2010 CACE Technologies Davis (California).Copyright (c) 2010 - 2013 Riverbed Technology San Francisco (California).All rights reserved.Redistribution and use in source and binary forms with or without modification are permitted provided that the following conditions are met:1. Redistributions of source code must retain the above copyright notice this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name of the Politecnico di Torino CACE Technologies Riverbed Technology nor the names of their contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES (INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE DATA OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.This product includes software developed by the University of California Lawrence Berkeley Laboratory and its contributors. This product includes software developed by the Kungliga Tekniska Hgskolan and its contributors.This product includes software developed by Yen Yen Lim and North Dakota State University.------------------------------------------Portions Copyright (c) 1990 1991 1992 1993 1994 1995 1996 1997 The Regents of the University of California. All rights reserved.Redistribution and use in source and binary forms with or without modification are permitted provided that the following conditions are met:1. Redistributions of source code must retain the above copyright notice this list of conditions and the following disclaimer.2. Redistributions in binary form must reproduce the above copyright notice this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.3. All advertising materials mentioning features or use of this software must display the following acknowledgement: "This product includes software developed by the Univ
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeFile created: C:\Program Files (x86)\WinPcap\install.logJump to behavior
Source: WinPcap_4_1_3.exeStatic PE information: certificate valid
Source: Binary string: c:\releases\winpcap_4_1_3\winpcap\install\WinPcap Installer Helper\Release\x86\WinPcapInstall.pdb`3\9 source: WinPcapInstall.dll.0.dr
Source: Binary string: c:\releases\winpcap_4_1_3\winpcap\packetNtx\Dll\Project\Release No NetMon\x64\Packet.pdb source: Packet.dll0.0.dr
Source: Binary string: c:\releases\winpcap_4_1_3\winpcap\packetNtx\Dll\Project\Release No NetMon\x64\Packet.pdb! source: Packet.dll0.0.dr
Source: Binary string: c:\releases\winpcap_4_1_3\winpcap\wpcap\libpcap\rpcapd\Release\x86\rpcapd.pdb0 source: rpcapd.exe.0.dr
Source: Binary string: c:\releases\winpcap_4_1_3\winpcap\install\WinPcap Installer Helper\Release\x86\WinPcapInstall.pdb source: WinPcapInstall.dll.0.dr
Source: Binary string: c:\releases\winpcap_4_1_3\winpcap\packetntx\driver\bin\amd64\npf.pdb source: npf.sys.0.dr
Source: Binary string: c:\releases\winpcap_4_1_3\winpcap\wpcap\libpcap\rpcapd\Release\x86\rpcapd.pdb source: rpcapd.exe.0.dr
Source: Binary string: e:\PTHREADS\pthreads\pthreadVC.pdb source: pthreadVC.dll.0.dr
Source: Binary string: c:\releases\winpcap_4_1_3\winpcap\wpcap\PRJ\Release\x86\wpcap.pdb source: wpcap.dll0.0.dr
Source: Binary string: c:\releases\winpcap_4_1_3\winpcap\wpcap\PRJ\Release\x64\wpcap.pdb source: wpcap.dll.0.dr
Source: Binary string: c:\releases\winpcap_4_1_3\winpcap\packetNtx\Dll\Project\Release No NetMon\x86\Packet.pdb source: Packet.dll.0.dr
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeCode function: 0_2_00405D07 FindFirstFileA,FindClose,0_2_00405D07
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeCode function: 0_2_00405331 DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,0_2_00405331
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeCode function: 0_2_0040263E FindFirstFileA,0_2_0040263E
Source: WinPcap_4_1_3.exe, Packet.dll.0.dr, WinPcapInstall.dll.0.dr, Packet.dll0.0.dr, wpcap.dll0.0.dr, npf.sys.0.dr, rpcapd.exe.0.dr, wpcap.dll.0.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: WinPcap_4_1_3.exe, Uninstall.exe.0.drString found in binary or memory: http://nsis.sf.net/NSIS_Error
Source: WinPcap_4_1_3.exe, Uninstall.exe.0.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
Source: WinPcap_4_1_3.exe, Packet.dll.0.dr, WinPcapInstall.dll.0.dr, Packet.dll0.0.dr, wpcap.dll0.0.dr, npf.sys.0.dr, rpcapd.exe.0.dr, wpcap.dll.0.drString found in binary or memory: http://ocsp.thawte.com0
Source: WinPcap_4_1_3.exe, Packet.dll.0.dr, WinPcapInstall.dll.0.dr, Packet.dll0.0.dr, wpcap.dll0.0.dr, npf.sys.0.dr, rpcapd.exe.0.dr, wpcap.dll.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: WinPcap_4_1_3.exe, Packet.dll.0.dr, WinPcapInstall.dll.0.dr, Packet.dll0.0.dr, wpcap.dll0.0.dr, npf.sys.0.dr, rpcapd.exe.0.dr, wpcap.dll.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: WinPcap_4_1_3.exe, Packet.dll.0.dr, WinPcapInstall.dll.0.dr, Packet.dll0.0.dr, wpcap.dll0.0.dr, npf.sys.0.dr, rpcapd.exe.0.dr, wpcap.dll.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: WinPcap_4_1_3.exe, 00000000.00000002.2215020551.0000000000577000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.riverbed.com/
Source: WinPcap_4_1_3.exe, 00000000.00000002.2215020551.0000000000577000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.riverbed.com/URLUpdateInfoVersionMajorVersionMinorDisplayVersion4.1.0.2980DisplayIcon
Source: WinPcap_4_1_3.exe, 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmp, WinPcap_4_1_3.exe, 00000000.00000003.2125181810.0000000002A80000.00000004.00000800.00020000.00000000.sdmp, WinPcap_4_1_3.exe, 00000000.00000003.2084032445.00000000041F0000.00000004.00000800.00020000.00000000.sdmp, WinPcap_4_1_3.exe, 00000000.00000003.2084083328.00000000041F0000.00000004.00000800.00020000.00000000.sdmp, WinPcap_4_1_3.exe, 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.winpcap.org
Source: WinPcap_4_1_3.exe, 00000000.00000002.2215020551.0000000000577000.00000004.00000020.00020000.00000000.sdmp, WinPcap Web Site.url.0.drString found in binary or memory: http://www.winpcap.org/
Source: WinPcap_4_1_3.exe, 00000000.00000002.2215020551.0000000000577000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.winpcap.org/archive
Source: WinPcap_4_1_3.exe, 00000000.00000002.2215020551.0000000000577000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.winpcap.org/install
Source: WinPcap_4_1_3.exe, 00000000.00000002.2215020551.0000000000577000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.winpcap.org10281256103510391045initDialog
Source: WinPcap_4_1_3.exe, 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpString found in binary or memory: http://www.winpcap.orgC:
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeCode function: 0_2_00404EE8 GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_00404EE8

E-Banking Fraud

barindex
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeFile created: C:\Windows\SysWOW64\wpcap.dllJump to behavior

Spam, unwanted Advertisements and Ransom Demands

barindex
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeFile created: C:\Windows\SysWOW64\wpcap.dllJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeCode function: 0_2_004030FA EntryPoint,#17,SetErrorMode,OleInitialize,SHGetFileInfoA,GetCommandLineA,GetModuleHandleA,CharNextA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,DeleteFileA,ExitProcess,OleUninitialize,ExitProcess,lstrcatA,lstrcmpiA,CreateDirectoryA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,ExitWindowsEx,ExitProcess,0_2_004030FA
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeFile created: C:\Windows\system32\drivers\npf.sysJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeFile created: C:\Windows\system32\drivers\npf.sysJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeFile created: C:\Windows\SysWOW64\wpcap.dllJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeCode function: 0_2_004061280_2_00406128
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeCode function: 0_2_004046F90_2_004046F9
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeCode function: 0_2_004068FF0_2_004068FF
Source: WinPcap_4_1_3.exeStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
Source: Uninstall.exe.0.drStatic PE information: Resource name: RT_VERSION type: COM executable for DOS
Source: WinPcap_4_1_3.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: Packet.dll0.0.drBinary string: HH:mm:ssdddd, MMMM dd, yyyyMM/dd/yyPMAMDecemberNovemberOctoberSeptemberAugustJulyJuneAprilMarchFebruaryJanuaryDecNovOctSepAugJulJunMayAprMarFebJanSaturdayFridayThursdayWednesdayTuesdayMondaySundaySatFriThuWedTueMonSunGetProcessWindowStationGetUserObjectInformationAGetLastActivePopupGetActiveWindowMessageBoxAUSER32.DLLCONOUT$SunMonTueWedThuFriSatJanFebMarAprMayJunJulAugSepOctNovDecNPF_%SSYSTEM\CurrentControlSet\Services\Tcpip\Parameters\InterfacesSYSTEM\CurrentControlSet\ServicesParametersTcpIpUseZeroBroadcastEnableDHCPDhcpIPAddressDhcpSubnetMaskIPAddressSubnetMask\Device\NPF_1394%s%sSYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002BE10318}ComponentIdLinkageExportSYSTEM\CurrentControlSet\Services\Tcpip\Linkagebinddrivers\NPF.sysIphlpapiGetAdaptersAddressesairpcap.dllAirpcapGetLastErrorAirpcapGetDeviceListAirpcapFreeDeviceListAirpcapOpenAirpcapCloseAirpcapGetLinkTypeAirpcapSetKernelBufferAirpcapSetFilterAirpcapGetMacAddressAirpcapSetMinToCopyAirpcapGetReadEventAirpcapReadAirpcapGetStatsAirpcapWriteWinPcap Packet Driver (NPF)system32\drivers\NPF.sys\VarFileInfo\Translation\StringFileInfo\%04x%04x\FileVersionSYSTEM\CurrentControlSet\Services\%s\\.\%s\\.\Global\%s%wsRSDS=
Source: Packet.dll0.0.drBinary string: \Device\NPF_
Source: npf.sys.0.drBinary string: UBind\Registry\Machine\System\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002BE10318}\Registry\Machine\System\CurrentControlSet\Services\Tcpip\Linkage\DosDevices\\Device\RSDSP#E~
Source: Packet.dll.0.drBinary string: HH:mm:ssdddd, MMMM dd, yyyyMM/dd/yyPMAMDecemberNovemberOctoberSeptemberAugustJulyJuneAprilMarchFebruaryJanuaryDecNovOctSepAugJulJunMayAprMarFebJanSaturdayFridayThursdayWednesdayTuesdayMondaySundaySatFriThuWedTueMonSunGetProcessWindowStationGetUserObjectInformationAGetLastActivePopupGetActiveWindowMessageBoxAUSER32.DLLCONOUT$SunMonTueWedThuFriSatJanFebMarAprMayJunJulAugSepOctNovDecNPF_%SSYSTEM\CurrentControlSet\Services\Tcpip\Parameters\InterfacesSYSTEM\CurrentControlSet\ServicesParametersTcpIpUseZeroBroadcastEnableDHCPDhcpIPAddressDhcpSubnetMaskIPAddressSubnetMask\Device\NPF_1394%s%sSYSTEM\CurrentControlSet\Control\Class\{4D36E972-E325-11CE-BFC1-08002BE10318}ComponentIdLinkageExportSYSTEM\CurrentControlSet\Services\Tcpip\Linkagebinddrivers\NPF.sysIphlpapiGetAdaptersAddressesairpcap.dllAirpcapGetLastErrorAirpcapGetDeviceListAirpcapFreeDeviceListAirpcapOpenAirpcapCloseAirpcapGetLinkTypeAirpcapSetKernelBufferAirpcapSetFilterAirpcapGetMacAddressAirpcapSetMinToCopyAirpcapGetReadEventAirpcapReadAirpcapGetStatsAirpcapWriteWinPcap Packet Driver (NPF)system32\drivers\NPF.sys\VarFileInfo\Translation\StringFileInfo\%04x%04x\FileVersionSYSTEM\CurrentControlSet\Services\%s\\.\%s\\.\Global\%s%wsHx!
Source: classification engineClassification label: clean14.bank.adwa.winEXE@6/20@0/0
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeCode function: 0_2_004041FC GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_004041FC
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeCode function: 0_2_00402020 CoCreateInstance,MultiByteToWideChar,0_2_00402020
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeFile created: C:\Program Files (x86)\WinPcapJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7032:120:WilError_03
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeFile created: C:\Users\user\AppData\Local\Temp\nsn2257.tmpJump to behavior
Source: WinPcap_4_1_3.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeFile read: C:\Users\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeFile read: C:\Users\user\Desktop\WinPcap_4_1_3.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\WinPcap_4_1_3.exe C:\Users\user\Desktop\WinPcap_4_1_3.exe
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeProcess created: C:\Windows\SysWOW64\net.exe net start npf
Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 start npf
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeProcess created: C:\Windows\SysWOW64\net.exe net start npfJump to behavior
Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 start npfJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
Source: Uninstall WinPcap 4.1.3.lnk.0.drLNK file: ..\..\..\..\..\..\Program Files (x86)\WinPcap\uninstall.exe
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeFile written: C:\Users\user\AppData\Local\Temp\nsn2258.tmp\ioSpecial.iniJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeAutomated click: Next >
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeAutomated click: I Agree
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeAutomated click: Install
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeWindow detected: < &BackI &AgreeCancelNullsoft Install System v2.46 Nullsoft Install System v2.46License AgreementPlease review the license terms before installing WinPcap 4.1.3.Press Page Down to see the rest of the agreement.Copyright (c) 1999 - 2005 NetGroup Politecnico di Torino (Italy).Copyright (c) 2005 - 2010 CACE Technologies Davis (California).Copyright (c) 2010 - 2013 Riverbed Technology San Francisco (California).All rights reserved.Redistribution and use in source and binary forms with or without modification are permitted provided that the following conditions are met:1. Redistributions of source code must retain the above copyright notice this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. Neither the name of the Politecnico di Torino CACE Technologies Riverbed Technology nor the names of their contributors may be used to endorse or promote products derived from this software without specific prior written permission. THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT INDIRECT INCIDENTAL SPECIAL EXEMPLARY OR CONSEQUENTIAL DAMAGES (INCLUDING BUT NOT LIMITED TO PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE DATA OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY WHETHER IN CONTRACT STRICT LIABILITY OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.This product includes software developed by the University of California Lawrence Berkeley Laboratory and its contributors. This product includes software developed by the Kungliga Tekniska Hgskolan and its contributors.This product includes software developed by Yen Yen Lim and North Dakota State University.------------------------------------------Portions Copyright (c) 1990 1991 1992 1993 1994 1995 1996 1997 The Regents of the University of California. All rights reserved.Redistribution and use in source and binary forms with or without modification are permitted provided that the following conditions are met:1. Redistributions of source code must retain the above copyright notice this list of conditions and the following disclaimer.2. Redistributions in binary form must reproduce the above copyright notice this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.3. All advertising materials mentioning features or use of this software must display the following acknowledgement: "This product includes software developed by the Univ
Source: WinPcap_4_1_3.exeStatic PE information: certificate valid
Source: Binary string: c:\releases\winpcap_4_1_3\winpcap\install\WinPcap Installer Helper\Release\x86\WinPcapInstall.pdb`3\9 source: WinPcapInstall.dll.0.dr
Source: Binary string: c:\releases\winpcap_4_1_3\winpcap\packetNtx\Dll\Project\Release No NetMon\x64\Packet.pdb source: Packet.dll0.0.dr
Source: Binary string: c:\releases\winpcap_4_1_3\winpcap\packetNtx\Dll\Project\Release No NetMon\x64\Packet.pdb! source: Packet.dll0.0.dr
Source: Binary string: c:\releases\winpcap_4_1_3\winpcap\wpcap\libpcap\rpcapd\Release\x86\rpcapd.pdb0 source: rpcapd.exe.0.dr
Source: Binary string: c:\releases\winpcap_4_1_3\winpcap\install\WinPcap Installer Helper\Release\x86\WinPcapInstall.pdb source: WinPcapInstall.dll.0.dr
Source: Binary string: c:\releases\winpcap_4_1_3\winpcap\packetntx\driver\bin\amd64\npf.pdb source: npf.sys.0.dr
Source: Binary string: c:\releases\winpcap_4_1_3\winpcap\wpcap\libpcap\rpcapd\Release\x86\rpcapd.pdb source: rpcapd.exe.0.dr
Source: Binary string: e:\PTHREADS\pthreads\pthreadVC.pdb source: pthreadVC.dll.0.dr
Source: Binary string: c:\releases\winpcap_4_1_3\winpcap\wpcap\PRJ\Release\x86\wpcap.pdb source: wpcap.dll0.0.dr
Source: Binary string: c:\releases\winpcap_4_1_3\winpcap\wpcap\PRJ\Release\x64\wpcap.pdb source: wpcap.dll.0.dr
Source: Binary string: c:\releases\winpcap_4_1_3\winpcap\packetNtx\Dll\Project\Release No NetMon\x86\Packet.pdb source: Packet.dll.0.dr
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeCode function: 0_2_00405D2E GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00405D2E
Source: Uninstall.exe.0.drStatic PE information: real checksum: 0xedce7 should be: 0x21e7b
Source: System.dll.0.drStatic PE information: real checksum: 0x0 should be: 0xa27d
Source: ExecDos.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x5778
Source: pthreadVC.dll.0.drStatic PE information: real checksum: 0x0 should be: 0x1a30d
Source: UserInfo.dll.0.drStatic PE information: real checksum: 0x0 should be: 0xb9d1
Source: InstallOptions.dll.0.drStatic PE information: real checksum: 0x0 should be: 0xdd4b
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeFile created: C:\Program Files (x86)\WinPcap\WinPcapInstall.dllJump to dropped file
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeFile created: C:\Program Files (x86)\WinPcap\Uninstall.exeJump to dropped file
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeFile created: C:\Program Files (x86)\WinPcap\rpcapd.exeJump to dropped file
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeFile created: C:\Users\user\AppData\Local\Temp\nsn2258.tmp\UserInfo.dllJump to dropped file
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeFile created: C:\Users\user\AppData\Local\Temp\nsn2258.tmp\ExecDos.dllJump to dropped file
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeFile created: C:\Windows\System32\wpcap.dllJump to dropped file
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeFile created: C:\Users\user\AppData\Local\Temp\nsn2258.tmp\InstallOptions.dllJump to dropped file
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeFile created: C:\Windows\System32\Packet.dllJump to dropped file
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeFile created: C:\Windows\SysWOW64\Packet.dllJump to dropped file
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeFile created: C:\Users\user\AppData\Local\Temp\nsn2258.tmp\System.dllJump to dropped file
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeFile created: C:\Windows\SysWOW64\pthreadVC.dllJump to dropped file
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeFile created: C:\Windows\SysWOW64\wpcap.dllJump to dropped file
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeFile created: C:\Windows\System32\drivers\npf.sysJump to dropped file
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeFile created: C:\Windows\System32\wpcap.dllJump to dropped file
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeFile created: C:\Windows\System32\Packet.dllJump to dropped file
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeFile created: C:\Windows\SysWOW64\Packet.dllJump to dropped file
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeFile created: C:\Windows\SysWOW64\pthreadVC.dllJump to dropped file
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeFile created: C:\Windows\SysWOW64\wpcap.dllJump to dropped file
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeFile created: C:\Windows\System32\drivers\npf.sysJump to dropped file
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeFile created: C:\Program Files (x86)\WinPcap\install.logJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeRegistry key value modified: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\NPFJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WinPcapJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WinPcap\WinPcap Web Site.urlJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeFile created: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WinPcap\Uninstall WinPcap 4.1.3.lnkJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeDropped PE file which has not been started: C:\Program Files (x86)\WinPcap\WinPcapInstall.dllJump to dropped file
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeDropped PE file which has not been started: C:\Program Files (x86)\WinPcap\Uninstall.exeJump to dropped file
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeDropped PE file which has not been started: C:\Program Files (x86)\WinPcap\rpcapd.exeJump to dropped file
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeDropped PE file which has not been started: C:\Windows\System32\wpcap.dllJump to dropped file
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeDropped PE file which has not been started: C:\Windows\System32\Packet.dllJump to dropped file
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeDropped PE file which has not been started: C:\Windows\SysWOW64\Packet.dllJump to dropped file
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeDropped PE file which has not been started: C:\Windows\SysWOW64\pthreadVC.dllJump to dropped file
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeDropped PE file which has not been started: C:\Windows\SysWOW64\wpcap.dllJump to dropped file
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeDropped PE file which has not been started: C:\Windows\System32\drivers\npf.sysJump to dropped file
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeCode function: 0_2_00405D07 FindFirstFileA,FindClose,0_2_00405D07
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeCode function: 0_2_00405331 DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,DeleteFileA,FindNextFileA,FindClose,RemoveDirectoryA,0_2_00405331
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeCode function: 0_2_0040263E FindFirstFileA,0_2_0040263E
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeAPI call chain: ExitProcess graph end nodegraph_0-3316
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeCode function: 0_2_00405D2E GetModuleHandleA,LoadLibraryA,GetProcAddress,0_2_00405D2E
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeProcess created: C:\Windows\SysWOW64\net.exe net start npfJump to behavior
Source: C:\Windows\SysWOW64\net.exeProcess created: C:\Windows\SysWOW64\net1.exe C:\Windows\system32\net1 start npfJump to behavior
Source: C:\Users\user\Desktop\WinPcap_4_1_3.exeCode function: 0_2_00405A2E GetVersion,GetSystemDirectoryA,GetWindowsDirectoryA,SHGetSpecialFolderLocation,SHGetPathFromIDListA,CoTaskMemFree,lstrcatA,lstrlenA,0_2_00405A2E
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
Valid Accounts1
Native API
2
Windows Service
2
Windows Service
31
Masquerading
1
Network Sniffing
3
File and Directory Discovery
Remote Services1
Archive Collected Data
Exfiltration Over Other Network Medium1
Encrypted Channel
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without Authorization1
System Shutdown/Reboot
Acquire InfrastructureGather Victim Identity Information
Default AccountsScheduled Task/Job2
DLL Search Order Hijacking
11
Process Injection
11
Process Injection
LSASS Memory1
Network Sniffing
Remote Desktop Protocol1
Clipboard Data
Exfiltration Over BluetoothJunk DataSIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
Domain AccountsAt1
Registry Run Keys / Startup Folder
2
DLL Search Order Hijacking
2
DLL Search Order Hijacking
Security Account Manager3
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyData Encrypted for ImpactDNS ServerEmail Addresses
Local AccountsCronLogin Hook1
Registry Run Keys / Startup Folder
Binary PaddingNTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureTraffic DuplicationProtocol ImpersonationData DestructionVirtual Private ServerEmployee Names
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 process2 2 Behavior Graph ID: 1355806 Sample: WinPcap_4_1_3.exe Startdate: 07/12/2023 Architecture: WINDOWS Score: 0 6 WinPcap_4_1_3.exe 10 45 2->6         started        file3 16 C:\Windows\System32\wpcap.dll, PE32+ 6->16 dropped 18 C:\Windows\System32\drivers\npf.sys, PE32+ 6->18 dropped 20 C:\Windows\System32\Packet.dll, PE32+ 6->20 dropped 22 10 other files (none is malicious) 6->22 dropped 24 Install WinpCap (used to filter network traffic) 6->24 10 net.exe 1 6->10         started        signatures4 process5 process6 12 conhost.exe 10->12         started        14 net1.exe 1 10->14         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
WinPcap_4_1_3.exe0%ReversingLabs
SourceDetectionScannerLabelLink
C:\Program Files (x86)\WinPcap\Uninstall.exe0%ReversingLabs
C:\Program Files (x86)\WinPcap\WinPcapInstall.dll0%ReversingLabs
C:\Program Files (x86)\WinPcap\rpcapd.exe0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsn2258.tmp\ExecDos.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsn2258.tmp\InstallOptions.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsn2258.tmp\System.dll0%ReversingLabs
C:\Users\user\AppData\Local\Temp\nsn2258.tmp\UserInfo.dll0%ReversingLabs
C:\Windows\SysWOW64\Packet.dll0%ReversingLabs
C:\Windows\SysWOW64\pthreadVC.dll0%ReversingLabs
C:\Windows\SysWOW64\wpcap.dll0%ReversingLabs
C:\Windows\System32\Packet.dll0%ReversingLabs
C:\Windows\System32\drivers\npf.sys0%ReversingLabs
C:\Windows\System32\wpcap.dll0%ReversingLabs
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://ocsp.thawte.com00%URL Reputationsafe
http://www.winpcap.org10281256103510391045initDialog0%Avira URL Cloudsafe
http://www.winpcap.orgC:0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
fp2e7a.wpc.phicdn.net
192.229.211.108
truefalse
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://www.riverbed.com/WinPcap_4_1_3.exe, 00000000.00000002.2215020551.0000000000577000.00000004.00000020.00020000.00000000.sdmpfalse
      high
      http://nsis.sf.net/NSIS_ErrorWinPcap_4_1_3.exe, Uninstall.exe.0.drfalse
        high
        http://www.winpcap.org10281256103510391045initDialogWinPcap_4_1_3.exe, 00000000.00000002.2215020551.0000000000577000.00000004.00000020.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://nsis.sf.net/NSIS_ErrorErrorWinPcap_4_1_3.exe, Uninstall.exe.0.drfalse
          high
          http://crl.thawte.com/ThawteTimestampingCA.crl0WinPcap_4_1_3.exe, Packet.dll.0.dr, WinPcapInstall.dll.0.dr, Packet.dll0.0.dr, wpcap.dll0.0.dr, npf.sys.0.dr, rpcapd.exe.0.dr, wpcap.dll.0.drfalse
            high
            http://www.winpcap.orgWinPcap_4_1_3.exe, 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmp, WinPcap_4_1_3.exe, 00000000.00000003.2125181810.0000000002A80000.00000004.00000800.00020000.00000000.sdmp, WinPcap_4_1_3.exe, 00000000.00000003.2084032445.00000000041F0000.00000004.00000800.00020000.00000000.sdmp, WinPcap_4_1_3.exe, 00000000.00000003.2084083328.00000000041F0000.00000004.00000800.00020000.00000000.sdmp, WinPcap_4_1_3.exe, 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpfalse
              high
              http://www.winpcap.orgC:WinPcap_4_1_3.exe, 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://ocsp.thawte.com0WinPcap_4_1_3.exe, Packet.dll.0.dr, WinPcapInstall.dll.0.dr, Packet.dll0.0.dr, wpcap.dll0.0.dr, npf.sys.0.dr, rpcapd.exe.0.dr, wpcap.dll.0.drfalse
              • URL Reputation: safe
              unknown
              http://www.winpcap.org/archiveWinPcap_4_1_3.exe, 00000000.00000002.2215020551.0000000000577000.00000004.00000020.00020000.00000000.sdmpfalse
                high
                http://www.riverbed.com/URLUpdateInfoVersionMajorVersionMinorDisplayVersion4.1.0.2980DisplayIconWinPcap_4_1_3.exe, 00000000.00000002.2215020551.0000000000577000.00000004.00000020.00020000.00000000.sdmpfalse
                  high
                  http://www.winpcap.org/WinPcap_4_1_3.exe, 00000000.00000002.2215020551.0000000000577000.00000004.00000020.00020000.00000000.sdmp, WinPcap Web Site.url.0.drfalse
                    high
                    http://www.winpcap.org/installWinPcap_4_1_3.exe, 00000000.00000002.2215020551.0000000000577000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      No contacted IP infos
                      Joe Sandbox version:38.0.0 Ammolite
                      Analysis ID:1355806
                      Start date and time:2023-12-07 22:02:37 +01:00
                      Joe Sandbox product:CloudBasic
                      Overall analysis duration:0h 2m 52s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                      Number of analysed new started processes analysed:6
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample name:WinPcap_4_1_3.exe
                      Detection:CLEAN
                      Classification:clean14.bank.adwa.winEXE@6/20@0/0
                      EGA Information:
                      • Successful, ratio: 100%
                      HCA Information:
                      • Successful, ratio: 100%
                      • Number of executed functions: 49
                      • Number of non-executed functions: 21
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Stop behavior analysis, all processes terminated
                      • Exclude process from analysis (whitelisted): dllhost.exe, SIHClient.exe
                      • Excluded IPs from analysis (whitelisted): 72.21.81.240
                      • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, wu.ec.azureedge.net, ocsp.edge.digicert.com, bg.apr-52dd2-0503.edgecastdns.net, cs11.wpc.v0cdn.net, hlb.apr-52dd2-0.edgecastdns.net, ctldl.windowsupdate.com, wu-bg-shim.trafficmanager.net, wu.azureedge.net
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      • VT rate limit hit for: WinPcap_4_1_3.exe
                      No simulations
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      fp2e7a.wpc.phicdn.net0996766724211.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                      • 192.229.211.108
                      AN#U00c1LISIS_DEL_CONTRATO-pdf.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                      • 192.229.211.108
                      fordanskningernes_hildebrand.exeGet hashmaliciousAgentTeslaBrowse
                      • 192.229.211.108
                      91am3NlDis.exeGet hashmaliciousSnake KeyloggerBrowse
                      • 192.229.211.108
                      Debt-Payment_paper.jsGet hashmaliciousUnknownBrowse
                      • 192.229.211.108
                      CONTRACT_PREVIEW-pdf.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                      • 192.229.211.108
                      PO_66860012.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                      • 192.229.211.108
                      Zam#U00f3wienie.ZD33166.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                      • 192.229.211.108
                      S#U00d6ZLE#U015eME-pdf.exeGet hashmaliciousAgentTeslaBrowse
                      • 192.229.211.108
                      REVIZUIREA_CONTRACTULUI-pdf.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                      • 192.229.211.108
                      mE361bPBAD.exeGet hashmaliciousXWormBrowse
                      • 192.229.211.108
                      Purchase_Order_#PO30086.exeGet hashmaliciousSnake KeyloggerBrowse
                      • 192.229.211.108
                      https://lovegemini.co.uk/fc.PDFGet hashmaliciousUnknownBrowse
                      • 192.229.211.108
                      DqltlPJzVT.exeGet hashmaliciousGuLoaderBrowse
                      • 192.229.211.108
                      8q1e8AqlDS.exeGet hashmaliciousXmrig, zgRATBrowse
                      • 192.229.211.108
                      Setup.exeGet hashmaliciousRedLineBrowse
                      • 192.229.211.108
                      0R5nIBeVmh.exeGet hashmaliciousPonyBrowse
                      • 192.229.211.108
                      8CF53B54DD1B8FB40221ABE6AA967592BAD78BE7F39EE.exeGet hashmaliciouszgRATBrowse
                      • 192.229.211.108
                      GST_INVOICE.exeGet hashmaliciousViottoKeyloggerBrowse
                      • 192.229.211.108
                      SWIFT_COPY.exeGet hashmaliciousAgentTeslaBrowse
                      • 192.229.211.108
                      No context
                      No context
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      C:\Program Files (x86)\WinPcap\WinPcapInstall.dllywvz5i8kT9.exeGet hashmaliciousUnknownBrowse
                        vcredist_2010.exeGet hashmaliciousUnknownBrowse
                          vcredist_2010(1).exeGet hashmaliciousUnknownBrowse
                            v.exeGet hashmaliciousUnknownBrowse
                              okIQd4f03Z.exeGet hashmaliciousUnknownBrowse
                                https://www.arcai.com/download/netcut.exeGet hashmaliciousUnknownBrowse
                                  C:\Program Files (x86)\WinPcap\Uninstall.exeywvz5i8kT9.exeGet hashmaliciousUnknownBrowse
                                    vcredist_2010.exeGet hashmaliciousUnknownBrowse
                                      vcredist_2010(1).exeGet hashmaliciousUnknownBrowse
                                        v.exeGet hashmaliciousUnknownBrowse
                                          okIQd4f03Z.exeGet hashmaliciousUnknownBrowse
                                            https://www.arcai.com/download/netcut.exeGet hashmaliciousUnknownBrowse
                                              Process:C:\Users\user\Desktop\WinPcap_4_1_3.exe
                                              File Type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                              Category:dropped
                                              Size (bytes):121106
                                              Entropy (8bit):7.561672524856586
                                              Encrypted:false
                                              SSDEEP:3072:NgXdZt9P6D3XJ6ceA6V/EsqmU95VZNFe3J5eA+OC:Ne34wmWemUldiYn3
                                              MD5:C0F94449E113FA3F7EB420C64108B58B
                                              SHA1:2FC0779B5C0D560B4A085E452898B64775C9C3A6
                                              SHA-256:348E87F7ECDB9E2D600370029A95A31DD3172D29454FCD4AFAEE8199285B0EDE
                                              SHA-512:A5D315DE21CA4EAC6C9599530C705A15ED4FCCE2FBD0594AC493ED64E5DBB1215412C8B88898AB36E2574A45BD0335151F503632937640C6B7218DDFFA29A72C
                                              Malicious:false
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              Joe Sandbox View:
                                              • Filename: ywvz5i8kT9.exe, Detection: malicious, Browse
                                              • Filename: vcredist_2010.exe, Detection: malicious, Browse
                                              • Filename: vcredist_2010(1).exe, Detection: malicious, Browse
                                              • Filename: v.exe, Detection: malicious, Browse
                                              • Filename: okIQd4f03Z.exe, Detection: malicious, Browse
                                              • Filename: , Detection: malicious, Browse
                                              Reputation:moderate, very likely benign file
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1..:u..iu..iu..i..iw..iu..i...i..id..i!..i...i...it..iRichu..i........................PE..L......K.................^...........0.......p....@..........................@...............................................t...........C...........................................................................p...............................text...L\.......^.................. ..`.rdata.......p.......b..............@..@.data...X\...........v..............@....ndata...................................rsrc....C.......D...z..............@..@................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\WinPcap_4_1_3.exe
                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):93944
                                              Entropy (8bit):5.944064737500921
                                              Encrypted:false
                                              SSDEEP:1536:s7xjrG5m+619YG7L2xo8JfmL4iMtgLZtAeYjFH:s7s27yaL4kVtAeE9
                                              MD5:E78291558CB803DFD091AD8FB56FEECC
                                              SHA1:4BDE2F87E903FE8D3BD80179C5584CEC7A8CBDC4
                                              SHA-256:D9F4CD9F0E1BC9A138FB4DA6F83C92C3E86EB3DE4F988D5943D75C9B1DC6BB9D
                                              SHA-512:042B96BC2C0E6D8B6E2730426938EB7400FD833BE8A108A4942F559FEDEFABC35FD5DCB7EA1898D377B4382C0A9AF8EEEEBD663A4C852C706E3BD168C1F1F62F
                                              Malicious:false
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              Joe Sandbox View:
                                              • Filename: ywvz5i8kT9.exe, Detection: malicious, Browse
                                              • Filename: vcredist_2010.exe, Detection: malicious, Browse
                                              • Filename: vcredist_2010(1).exe, Detection: malicious, Browse
                                              • Filename: v.exe, Detection: malicious, Browse
                                              • Filename: okIQd4f03Z.exe, Detection: malicious, Browse
                                              • Filename: , Detection: malicious, Browse
                                              Reputation:moderate, very likely benign file
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......;6...W...W...W..X...oW..X..._W..X....W...X..|W...X..xW...W...W..X...|W..X...~W..X...~W..X...~W..Rich.W..........PE..L.....0Q...........!.................*.......................................`.......r..........................................P....0...............P.......@..T.......................................@...............h............................text...4........................... ..`.rdata../'.......0..................@..@.data...H,....... ..................@....rsrc........0....... ..............@..@.reloc.......@... ...0..............@..B........................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\WinPcap_4_1_3.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):422
                                              Entropy (8bit):4.236551634935044
                                              Encrypted:false
                                              SSDEEP:12:j1Ib0V1j3WKcjHgVXnFMqSv9ZEjhZJd5hr1C:jyb0VhaA9FMPv9ZEjhXNc
                                              MD5:D3A2BC3BA963A1C99679AADFE8BD4519
                                              SHA1:51D69987D2AEA4510E3C1484FE1B6168B393A8B6
                                              SHA-256:2F8CB362E387E17AFCD55D982DB30F2BD5DB0AA8242C89BC35EF3EEA32AE4E08
                                              SHA-512:1587C2DFF4231AD25F09EB0CFD49C282DCDA95F8B785C6E0227740F9469B139A9A2F582DBEA73A322F984C52FAE8AD63678D47B2D34B156674F2E3FFB34DF6B2
                                              Malicious:false
                                              Reputation:moderate, very likely benign file
                                              Preview:WinPcap 4.1.0.2980 Installation LOG..-----------------------------------------------------..Debug Information......Operating system detected on registry: 8 - AMD64..True operating system (kernel.dll): 8 - AMD64..npptools.dll present on the system: false..netnm.inf present on the system: false..nmnt.sys present on the system: false....End of log..-----------------------------------------------------..
                                              Process:C:\Users\user\Desktop\WinPcap_4_1_3.exe
                                              File Type:PE32 executable (console) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):118520
                                              Entropy (8bit):6.264101912948104
                                              Encrypted:false
                                              SSDEEP:3072:mL7m5RTfrUna0m2BeIIgJ3155FulLfbt/6:C7m5RTEaseIH515qfA
                                              MD5:83A6C2CAFE236652D1559640594A0EA8
                                              SHA1:C99AA678F387C00C4470FA3CD7B037D26720960D
                                              SHA-256:52360F17C9C70C9CEA3316560B40C4D89FD705ED7E6B6088C99FC54D4CC35EB5
                                              SHA-512:4F6981C4E8D64311087795E9639516409BF80EBCA5C7F25AF1FB436AACCF90F24617ECD3F95B63558981B12BC0E5EEACF120FEA7BE5E5FA05ECF3AFA4F9F799B
                                              Malicious:false
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........z...)...)...).w.)...).w.)...).w.)..)V..)...)}..)...).w.)...)...))..).w.)...).w.)...).w.)...)Rich...)................PE..L...9.0Q.................0...p......%........@....@..................................(.......................................k.......p..8...........................pB...............................f..@............@..,............................text...X-.......0.................. ..`.rdata..v6...@...@...@..............@..@.data............ ..................@....rsrc...8....p......................@..@........................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\WinPcap_4_1_3.exe
                                              File Type:MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
                                              Category:dropped
                                              Size (bytes):798
                                              Entropy (8bit):3.4113726204054617
                                              Encrypted:false
                                              SSDEEP:12:8wl0+0a/ledp8A/a/GcybdpYyhGZ9+r4Q/CNUvH4t2YZ/elFlSJm:85dOAC/SdBhs+DOUFqy
                                              MD5:C565D4B80CE5D1FF9ACF4357DFBFC7CF
                                              SHA1:D82B7E823FED8F5B8507015F64E2D8BE82968F04
                                              SHA-256:4EACC11C8D44203F4A48985B4BA45878082A314D393F9AF025F5F968D8C3C825
                                              SHA-512:0C84749DC6DB5B3A2CC2D3B658CFFB11840CF64D244CA92911681C58C281D3C080057759F06F40BFA21CADF927798A3A1A701CD08592659DDA0A3A7C6C32336C
                                              Malicious:false
                                              Preview:L..................F........................................................g....P.O. .:i.....+00.../C:\...................z.1...........Program Files (x86).X............................................P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.)...".V.1...........WinPcap.@............................................W.i.n.P.c.a.p.....h.2...........uninstall.exe.L............................................u.n.i.n.s.t.a.l.l...e.x.e.......;.....\.....\.....\.....\.....\.....\.P.r.o.g.r.a.m. .F.i.l.e.s. .(.x.8.6.).\.W.i.n.P.c.a.p.\.u.n.i.n.s.t.a.l.l...e.x.e...C.:.\.W.i.n.d.o.w.s.\.s.y.s.t.e.m.3.2.........*................@Z|...K.J.....................1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.2.2.4.6.1.2.2.6.5.8.-.3.6.9.3.4.0.5.1.1.7.-.2.4.7.6.7.5.6.6.3.4.-.1.0.0.3.................
                                              Process:C:\Users\user\Desktop\WinPcap_4_1_3.exe
                                              File Type:MS Windows 95 Internet shortcut text (URL=<http://www.winpcap.org/>), ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):49
                                              Entropy (8bit):4.461050149972742
                                              Encrypted:false
                                              SSDEEP:3:HRAbABGQYm/0S4/Wov:HRYFVm/r4/Wy
                                              MD5:4045C586E0A52F8D15E34642A688FA3B
                                              SHA1:B5D50D25D5802B59C6DE5499E251913DFFAB58FE
                                              SHA-256:66DB8411780D0E4B9C09475241E1A8578A3A26A438A0E016722DB5D174055F43
                                              SHA-512:E5581162D69D4EC997DDF1342CC6A0532CEDFCB81F5E257EA0231AC68B43A52D7BBE7C8C20F1943F5C83C815BE9A5F47F2FECCEEC1BB8B8C5DE48C41144C8437
                                              Malicious:false
                                              Preview:[InternetShortcut]..URL=http://www.winpcap.org/..
                                              Process:C:\Users\user\Desktop\WinPcap_4_1_3.exe
                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):5632
                                              Entropy (8bit):4.881160720969831
                                              Encrypted:false
                                              SSDEEP:48:6jOBtU/BXN8kUByyy/Aklkcrkyg7Vg5RibGoTCTo0gqVeeaeQqzM5rv774YRljmB:y/DMy4ncrkyg7tbpQFLUEYRxe
                                              MD5:A7CD6206240484C8436C66AFB12BDFBF
                                              SHA1:0BB3E24A7EB0A9E5A8EAE06B1C6E7551A7EC9919
                                              SHA-256:69AC56D2FDF3C71B766D3CC49B33B36F1287CC2503310811017467DFCB455926
                                              SHA-512:B9EE7803301E50A8EC20AB3F87EB9E509EA24D11A69E90005F30C1666ACC4ED0A208BD56E372E2E5C6A6D901D45F04A12427303D74761983593D10B344C79904
                                              Malicious:false
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......Y.......................B..........Rich...........PE..L.....F...........!................F........ ...............................P.......................................#..c...x ..<............................@....................................................... ..x............................text...L........................... ..`.rdata..c.... ......................@..@.data........0......................@....reloc.......@......................@..B................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\WinPcap_4_1_3.exe
                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):14848
                                              Entropy (8bit):5.550299117674118
                                              Encrypted:false
                                              SSDEEP:192:86d+dHXLHQOPiY53uiUdigyU+WsPdc/A1A+2jwK72dwF7dBEnbok:86UdHXcIiY535zBt2jw+BEnbo
                                              MD5:325B008AEC81E5AAA57096F05D4212B5
                                              SHA1:27A2D89747A20305B6518438EFF5B9F57F7DF5C3
                                              SHA-256:C9CD5C9609E70005926AE5171726A4142FFBCCCC771D307EFCD195DAFC1E6B4B
                                              SHA-512:18362B3AEE529A27E85CC087627ECF6E2D21196D725F499C4A185CB3A380999F43FF1833A8EBEC3F5BA1D3A113EF83185770E663854121F2D8B885790115AFDF
                                              Malicious:false
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......L.p..q.,.q.,.q.,.q.,@q.,.~C,.q.,\R.,.q.,\R/,.q.,.w.,.q.,.Q.,.q.,Rich.q.,........................PE..L......K...........!.........<.......).......0.......................................................................8..p...81.......p..........................@....................................................0..8............................text...@........................... ..`.rdata.......0....... ..............@..@.data... (...@.......*..............@....rsrc........p.......2..............@..@.reloc...............4..............@..B........................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\WinPcap_4_1_3.exe
                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):11264
                                              Entropy (8bit):5.568877095847681
                                              Encrypted:false
                                              SSDEEP:192:7DKnJZCv6VmbJQC+tFiUdK7ckD4gRXKQx+LQ2CSF:7ViJrtFRdbmXK8+PCw
                                              MD5:C17103AE9072A06DA581DEC998343FC1
                                              SHA1:B72148C6BDFAADA8B8C3F950E610EE7CF1DA1F8D
                                              SHA-256:DC58D8AD81CACB0C1ED72E33BFF8F23EA40B5252B5BB55D393A0903E6819AE2F
                                              SHA-512:D32A71AAEF18E993F28096D536E41C4D016850721B31171513CE28BBD805A54FD290B7C3E9D935F72E676A1ACFB4F0DCC89D95040A0DD29F2B6975855C18986F
                                              Malicious:false
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......)...m.m.m...k.m.~....j....l.9..i....l.Richm.........................PE..L......K...........!................0).......0...............................`......................................p2......t0..P............................P.......................................................0..X............................text...1........................... ..`.rdata.......0......."..............@..@.data...d....@.......&..............@....reloc.......P.......(..............@..B................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\WinPcap_4_1_3.exe
                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):4096
                                              Entropy (8bit):3.331979080664426
                                              Encrypted:false
                                              SSDEEP:48:iViF7LLM4wXqQH1wRrOpArXMVyjlZSXRN:ky7EcQHu4tVy4R
                                              MD5:7579ADE7AE1747A31960A228CE02E666
                                              SHA1:8EC8571A296737E819DCF86353A43FCF8EC63351
                                              SHA-256:564C80DEC62D76C53497C40094DB360FF8A36E0DC1BDA8383D0F9583138997F5
                                              SHA-512:A88BC56E938374C333B0E33CB72951635B5D5A98B9CB2D6785073CBCAD23BF4C0F9F69D3B7E87B46C76EB03CED9BB786844CE87656A9E3DF4CA24ACF43D7A05B
                                              Malicious:false
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.....................4..............Rich..................PE..L......K...........!......................... ...............................P...................................... "......L ..<............................@..d.................................................... ..L............................text............................... ..`.rdata....... ......................@..@.data...X....0......................@....reloc.......@......................@..B........................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\WinPcap_4_1_3.exe
                                              File Type:Generic INItialization configuration [Field 1]
                                              Category:dropped
                                              Size (bytes):371
                                              Entropy (8bit):5.315051894879581
                                              Encrypted:false
                                              SSDEEP:6:aY+ZPr3QMtNuJO4q2k3KfuRoeRm8FXpzXbRAFFIgnfvu75HBkyYm1KKoa4M:ZYrltNukF2kafF8zmFigfvuNHEYKKoG
                                              MD5:605F189293ADEDA4633D0EC4AE944E42
                                              SHA1:12D400189CEEDC3CF18A28201565A7BC969407DB
                                              SHA-256:3C58147DFC168A2F7FED5E80118DDC166E45C3798305BC28B52F6B4334E17F1D
                                              SHA-512:D1AB35A72BD119376E3379D6041E91C94ECC00BAA5E22F69A635623A1787CE021F912269E372ACB2E151B5F757966406E88883E74FFE1DD86C3DCB2BB56904D6
                                              Malicious:false
                                              Preview:; Ini file generated by the HM NIS Edit IO designer...[Settings]..NumFields=1..RTL=0..State=0....[Field 1]..Type=Checkbox..Text=Automatically start the WinPcap driver at boot time..Left=8..Right=198..Top=36..Bottom=46..State=1....;[Field 2]..;Type=Text..;Flags=NOTABSTOP|MULTILINE|READONLY..;State=Text\r\nPirla..;Left=8..;Right=279..;Top=70..;Bottom=136....HWND=197624..
                                              Process:C:\Users\user\Desktop\WinPcap_4_1_3.exe
                                              File Type:Generic INItialization configuration [Field 1]
                                              Category:dropped
                                              Size (bytes):557
                                              Entropy (8bit):5.366711398993734
                                              Encrypted:false
                                              SSDEEP:12:lOuf9VTsAgQRvAVaa7hO4gNhBYyafB4gND2IrEjl8s3NHy:1TdRvAVaahO1RYB1ZlrEj1ty
                                              MD5:2401F9421C7124F695A0B2904FFFDFD6
                                              SHA1:3CBCB5EA241AB00998370A478E2645493DD2CD0D
                                              SHA-256:FAD1A1CBC5ED891E75B59535FC8920E875BA298C260577CDE0243BF68533AB54
                                              SHA-512:7217DBA08E458B6BD6DE56147D7C39EAD10C882ADB96F115EA73804EB1D7A904ADB051D361ED0B1D64AE6C6E65C5F417BFF554A369EBF9DAEB20C2949A6971EA
                                              Malicious:false
                                              Preview:[Settings]..Rect=1044..NumFields=3..RTL=0..NextButtonText=&Finish..CancelEnabled=..State=0..[Field 1]..Type=bitmap..Left=0..Right=109..Top=0..Bottom=193..Flags=RESIZETOFIT..Text=C:\Users\user\AppData\Local\Temp\nsn2258.tmp\modern-wizard.bmp..HWND=132094..[Field 2]..Type=label..Left=120..Right=315..Top=10..Text=Completing the WinPcap 4.1.3 Setup Wizard..Bottom=38..HWND=66560..[Field 3]..Type=label..Left=120..Right=315..Top=45..Bottom=185..Text=WinPcap 4.1.3 has been installed on your computer.\r\n\r\nClick Finish to close this wizard...HWND=66562..
                                              Process:C:\Users\user\Desktop\WinPcap_4_1_3.exe
                                              File Type:PC bitmap, Windows 3.x format, 175 x 58 x 24, image size 30624, resolution 2834 x 2834 px/m, cbSize 30678, bits offset 54
                                              Category:dropped
                                              Size (bytes):30678
                                              Entropy (8bit):4.017046289283279
                                              Encrypted:false
                                              SSDEEP:192:UdCd/28k2hZrlQ+jP3/PGs/ZkTnSQpuWE:UD8jLlQ+jP3///ZUSJ5
                                              MD5:D8F59A707B2A5000C7903595EDDC3D48
                                              SHA1:E86239FE1DC3CFDBEC6006817160EB5F1FC92BCA
                                              SHA-256:C0E284FDE834FE8A6F90504DBA7ABFF25B1E7DD4611483341203FD3EFC5DE8A6
                                              SHA-512:91E28A685733620832D3851D7F3EEE36495F2728610BD6C66F305CDDA039F75AB8499D0E51E64AFA018C221A728889503DB2FC7C84CF9599A61B68951686B048
                                              Malicious:false
                                              Preview:BM.w......6...(.......:............w....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\WinPcap_4_1_3.exe
                                              File Type:PC bitmap, Windows 3.x format, 164 x 314 x 4, image size 26376, resolution 2834 x 2834 px/m, cbSize 26494, bits offset 118
                                              Category:dropped
                                              Size (bytes):26494
                                              Entropy (8bit):1.9568109962493656
                                              Encrypted:false
                                              SSDEEP:24:Qwika6aSaaDaVYoG6abuJsnZs5GhI11BayNXPcDrSsUWcSphsWwlEWqCl6aHAX2x:Qoi47a5G8SddzKFIcsOz3Xz
                                              MD5:CBE40FD2B1EC96DAEDC65DA172D90022
                                              SHA1:366C216220AA4329DFF6C485FD0E9B0F4F0A7944
                                              SHA-256:3AD2DC318056D0A2024AF1804EA741146CFC18CC404649A44610CBF8B2056CF2
                                              SHA-512:62990CB16E37B6B4EFF6AB03571C3A82DCAA21A1D393C3CB01D81F62287777FB0B4B27F8852B5FA71BC975FEAB5BAA486D33F2C58660210E115DE7E2BD34EA63
                                              Malicious:false
                                              Preview:BM~g......v...(.......:............g..................................................................................DDD@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DDDDDDDDDD@@@@DDDDDDDDD@@@@@@..DDD....DDDDDD........................................DDDDDDDDDD....DDDDDDDDD........DD@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DDDDDDDDD@@@@DDDDDDDDDD@@@@@@D..DD....DDDDDDD......................................DDDDDDDDDD....DDDDDDDDDD......D..D@@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DDDDDDDDDD@@@@DDDDDDDDDD@@@@@DDD..D.....DDDDDD......................................DDDDDDDDD.....DDDDDDDDD......DDD..@@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DDDDDDDDDD@@@@DDDDDDDDDD@@@@@@DDDD.......DDDDDD.....................................DDDDDDDDDD....DDDDDDDDDD.....DDDDD..@@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@DDDDDDDDDD@@@@DDDDDDDDD@@@@@@DDDDDD.......DDDDDD....................................DDDDDDDDD....DDDDDDDDDD......DDDDDD..@@@@DDDDDD@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
                                              Process:C:\Users\user\Desktop\WinPcap_4_1_3.exe
                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):98040
                                              Entropy (8bit):6.127745728436191
                                              Encrypted:false
                                              SSDEEP:1536:zg6Z54QkC2wpk2c+ZCDHKklh74RTfIEtaYQ0:M6Z54ARcIxk4LIEtaYj
                                              MD5:86316BE34481C1ED5B792169312673FD
                                              SHA1:6CCDE3A8C76879E49B34E4ABB3B8DFAF7A9D77B5
                                              SHA-256:49656C178B17198470AD6906E9EE0865F16F01C1DBBF11C613B55A07246A7918
                                              SHA-512:3A6E77C39942B89F3F149E9527AB8A9EB39F55AC18A9DB3A3922DFB294BEB0760D10CA12BE0E3A3854FF7DABBE2DF18C52E3696874623A2A9C5DC74B29A860BC
                                              Malicious:false
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........H...H...H...oe.Z...oe.j...oe.+......C...H...2...oe..L...oe..I...oe.I...oe..I...RichH...........PE..L...<.0Q...........!.........p......`Q..........................................................................................x....P..T............`.......`..d...................................X...@............................................text...:........................... ..`.rdata...+.......0..................@..@.data....,... ....... ..............@....rsrc...T....P.......0..............@..@.reloc..d....`... ...@..............@..B................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\WinPcap_4_1_3.exe
                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):53299
                                              Entropy (8bit):3.9943496203596918
                                              Encrypted:false
                                              SSDEEP:384:hSvfC8Vv0Vy7ojuq7GQcdWTc4zU+GFronD/yD5rBEe0kiH32Jp9AhOW:wt+TGQcdWYdMG59EeJiH3YzW
                                              MD5:F04A90F917BA10AE2DCBE859870F4DEA
                                              SHA1:6668EBE373CE58C33017697C477557653427E626
                                              SHA-256:99C61ABF41C3AEC38CAB3ED6270ADBCA9A247BBF5F9AA9D29ECB0659A5527F48
                                              SHA-512:AEC29301B9CE311B27F1590B0E0C4121ACDC183A30B570E087D77B7035684F02A6DFBDEE950C37F3023B32E2EA5A075A5FBE6D18A2804DA9490D4959733BB516
                                              Malicious:false
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......EGi..&...&...&..c9...&...&..7&...9...&...9...&..Rich.&..........................PE..L.....g?...........!.....p...P.......d..............................................................................0...^.......P...............................T...................................................................................text...3f.......p.................. ..`.rdata........... ..................@..@.data...............................@....idata..4...........................@....reloc..J...........................@..B........................................................................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\WinPcap_4_1_3.exe
                                              File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                              Category:dropped
                                              Size (bytes):282360
                                              Entropy (8bit):6.604477037348888
                                              Encrypted:false
                                              SSDEEP:6144:E4yIm5rC9WNWwKcNBSCiLvK8+jKgZBwIbg2:jyIm59WwpqCuEKIwv2
                                              MD5:4633B298D57014627831CCAC89A2C50B
                                              SHA1:E5F449766722C5C25FA02B065D22A854B6A32A5B
                                              SHA-256:B967E4DCE952F9232592E4C1753516081438702A53424005642700522055DBC9
                                              SHA-512:29590FA5F72E6A36F2B72FC2A2CCA35EE41554E13C9995198E740608975621142395D4B2E057DB4314EDF95520FD32AAE8DB066444D8D8DB0FD06C391111C6D3
                                              Malicious:false
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......%I+&a(Eua(Eua(Eu..;uc(EuF.8uv(EuF.+uC(EuF.(u.(EuF.>uc(Eua(Du.(Eu.'.ud(EuF.4ut(EuF.?u`(EuF.9u`(EuF.=u`(EuRicha(Eu........................PE..L.....0Q...........!................z...............................................8_.............................. ...........P....................0..........8&..p...................................@...............,............................text....z.......................... ..`.rdata..=7.......@..................@..@.data...!........ ..................@....rsrc...............................@..@.reloc..p........0..................@..B................................................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\WinPcap_4_1_3.exe
                                              File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                              Category:dropped
                                              Size (bytes):107768
                                              Entropy (8bit):6.207807273671645
                                              Encrypted:false
                                              SSDEEP:3072:xpMSqNrAF/ln2800b4U7kByZo6Fsl1LOb:xpMSq0/AN0EG4yZ/
                                              MD5:899A5BF1669610CDB78D322AC8D9358B
                                              SHA1:80A2E420B99FFE294A523C6C6D87ED09DFC8D82B
                                              SHA-256:AB3CCE674F5216895FD26A073771F82B05D4C8B214A89F0F288A59774A06B14B
                                              SHA-512:41F2459793AC04E433D8471780E770417AFAC499DC3C5413877D4A4499656C9669C069D24E638D0AAF43AF178A763ACB656FFD34D710EB5E3C94682DB1559056
                                              Malicious:false
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........................5.......5.......5.....n..............5.......5.......5.......5......Rich....................PE..d.....0Q.........." .........t...... l..............................................r................................................\.......P..x.......T.......\....................$............................................... ...............................text...>........................... ..`.rdata...@... ...B..................@..@.data...(7...p.......T..............@....pdata..\............j..............@..@.rsrc...T............|..............@..@.reloc..............................@..B................................................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\WinPcap_4_1_3.exe
                                              File Type:PE32+ executable (native) x86-64, for MS Windows
                                              Category:dropped
                                              Size (bytes):36600
                                              Entropy (8bit):6.293365115285525
                                              Encrypted:false
                                              SSDEEP:768:VVRRdUlDRJuOfUhk8ZX2ZeRY4soGLeTZ8wwfKRw:VVRsZREOfUhNK96TZ8wwi6
                                              MD5:DE7FCC77F4A503AF4CA6A47D49B3713D
                                              SHA1:8206E2D8374F5E7BF626E47D56D2431EDC939652
                                              SHA-256:4BFAA99393F635CD05D91A64DE73EDB5639412C129E049F0FE34F88517A10FC6
                                              SHA-512:FDACE7EE2593FFE5724DB32F4BE62BB13AA1EC89E1E01C713D8C1E9891A5A0975D127450024C3388A987A35E546568ECDBCC60C185DC8F8B08CCEF67A084B20D
                                              Malicious:false
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$............}i.}i.}i.}h..}i...}i...}i...}i...}i...}i...}i.Rich.}i.................PE..d.....0Q.........."......V..........................................................9q......................................................d...P....................p...............a...............................................`...............................text....M.......N.................. ..h.rdata.......`.......R..............@..H.data...4....p.......X..............@....pdata...............^..............@..HINIT.................`.............. ....rsrc................h..............@..B.reloc..<............n..............@..B........................................................................................................................................................................................................................................
                                              Process:C:\Users\user\Desktop\WinPcap_4_1_3.exe
                                              File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                              Category:dropped
                                              Size (bytes):370424
                                              Entropy (8bit):6.481542014421452
                                              Encrypted:false
                                              SSDEEP:6144:pH+VjFreKE0V/NGvaX86tWBXZkbTe/CtjgZBwIV8g/wNmJ4eXk:pH+VBeT0V/NBX8k2YTe/QIwIs8k
                                              MD5:A672F1CF00FA5AC3F4F59577F77D8C86
                                              SHA1:B68E64401D91C75CAFA810086A35CD0838C61A4B
                                              SHA-256:35AAB6CAAAF1720A4D888AE0DE9E2A8E19604F3EA0E4DD882C3EEAE4F39AF117
                                              SHA-512:A566E7571437BE765279C915DD6E13F72203EFF0DC3838A154FC137ED828E05644D650FD8432D1FB4C1E1D84EE00EF9BDE90225C68C3CA8A5DA349065E7EBFD6
                                              Malicious:false
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........5...[...[...[.e.%...[...&...[...5...[...6..[... ...[...Z.d.[.U ...[...*...[...!...[...'...[...#...[.Rich..[.........................PE..d.....0Q.........." ................p........................................P......................................................P4.......'..P....0...........'...........@..X.......................................................X............................text............................... ..`.rdata..mm.......n..................@..@.data........@...&...,..............@....pdata...'.......(...R..............@..@.rsrc........0.......z..............@..@.reloc.......@......................@..B........................................................................................................................................................................................................................................
                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
                                              Entropy (8bit):7.980473659413747
                                              TrID:
                                              • Win32 Executable (generic) a (10002005/4) 92.16%
                                              • NSIS - Nullsoft Scriptable Install System (846627/2) 7.80%
                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                              • DOS Executable Generic (2002/1) 0.02%
                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                              File name:WinPcap_4_1_3.exe
                                              File size:915'128 bytes
                                              MD5:a11a2f0cfe6d0b4c50945989db6360cd
                                              SHA1:e2516fcd1573e70334c8f50bee5241cdfdf48a00
                                              SHA256:fc4623b113a1f603c0d9ad5f83130bd6de1c62b973be9892305132389c8588de
                                              SHA512:2652d84eb91ca7957b4fb3ff77313e5dae978960492669242df4f246296f1bedaa48c0d33ffb286b2859a1b86ef5460060b551edca597b4ec60ee08676877c70
                                              SSDEEP:24576:UBOldyR6ORWsaM2QROxa6jsqUENfJjNK/CG6niqiL:2KzqWsayROxa6QDENuaG+ifL
                                              TLSH:7F15231507A47D77FF274270906FEA60AFFEC2294390362733A464EA2D53AD62B1417B
                                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......1..:u..iu..iu..i...iw..iu..i...i...id..i!..i...i...it..iRichu..i........................PE..L......K.................^.........
                                              Icon Hash:0771ccf8d84d2907
                                              Entrypoint:0x4030fa
                                              Entrypoint Section:.text
                                              Digitally signed:true
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                              DLL Characteristics:TERMINAL_SERVER_AWARE
                                              Time Stamp:0x4B1AE3CC [Sat Dec 5 22:50:52 2009 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:4
                                              OS Version Minor:0
                                              File Version Major:4
                                              File Version Minor:0
                                              Subsystem Version Major:4
                                              Subsystem Version Minor:0
                                              Import Hash:7fa974366048f9c551ef45714595665e
                                              Signature Valid:true
                                              Signature Issuer:CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
                                              Signature Validation Error:The operation completed successfully
                                              Error Number:0
                                              Not Before, Not After
                                              • 26/09/2012 02:00:00 28/10/2015 00:59:59
                                              Subject Chain
                                              • CN="Riverbed Technology, Inc.", OU=Product Marketing, OU=Digital ID Class 3 - Microsoft Software Validation v2, O="Riverbed Technology, Inc.", L=San Francisco, S=California, C=US
                                              Version:3
                                              Thumbprint MD5:B60719FF3ED25BCF2F558D12BE84DEE5
                                              Thumbprint SHA-1:C7584F696C2A2DA123C8B9F189D0227102A46FAB
                                              Thumbprint SHA-256:A6EAC3AB012CCD0E6BE59A42EED458739BCCB5727B1B95A1E6A577A248D87B58
                                              Serial:1402AEEF0D31BE743E73F6A7A960C4F4
                                              Instruction
                                              sub esp, 00000180h
                                              push ebx
                                              push ebp
                                              push esi
                                              xor ebx, ebx
                                              push edi
                                              mov dword ptr [esp+18h], ebx
                                              mov dword ptr [esp+10h], 00409160h
                                              xor esi, esi
                                              mov byte ptr [esp+14h], 00000020h
                                              call dword ptr [00407030h]
                                              push 00008001h
                                              call dword ptr [004070B0h]
                                              push ebx
                                              call dword ptr [0040727Ch]
                                              push 00000008h
                                              mov dword ptr [0042EC18h], eax
                                              call 00007FA524C39DC6h
                                              mov dword ptr [0042EB64h], eax
                                              push ebx
                                              lea eax, dword ptr [esp+34h]
                                              push 00000160h
                                              push eax
                                              push ebx
                                              push 00428F98h
                                              call dword ptr [00407158h]
                                              push 00409154h
                                              push 0042E360h
                                              call 00007FA524C39A79h
                                              call dword ptr [004070ACh]
                                              mov edi, 00434000h
                                              push eax
                                              push edi
                                              call 00007FA524C39A67h
                                              push ebx
                                              call dword ptr [0040710Ch]
                                              cmp byte ptr [00434000h], 00000022h
                                              mov dword ptr [0042EB60h], eax
                                              mov eax, edi
                                              jne 00007FA524C371DCh
                                              mov byte ptr [esp+14h], 00000022h
                                              mov eax, 00434001h
                                              push dword ptr [esp+14h]
                                              push eax
                                              call 00007FA524C3955Ah
                                              push eax
                                              call dword ptr [0040721Ch]
                                              mov dword ptr [esp+1Ch], eax
                                              jmp 00007FA524C37235h
                                              cmp cl, 00000020h
                                              jne 00007FA524C371D8h
                                              inc eax
                                              cmp byte ptr [eax], 00000020h
                                              je 00007FA524C371CCh
                                              cmp byte ptr [eax], 00000022h
                                              mov byte ptr [eax+eax+00h], 00000000h
                                              Programming Language:
                                              • [EXP] VC++ 6.0 SP5 build 8804
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0x74b00xb4.rdata
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x3f0000x43a8.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0xdd7c00x1ef8
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x70000x28c.rdata
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x10000x5c4c0x5e00False0.6697140957446809data6.440105549497952IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .rdata0x70000x129c0x1400False0.43359375data5.046835307909969IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .data0x90000x25c580x400False0.5849609375data4.801003752715384IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .ndata0x2f0000x100000x0False0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .rsrc0x3f0000x43a80x4400False0.6177045036764706data5.846431450907402IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              RT_ICON0x3f3580x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4224EnglishUnited States0.7213883677298312
                                              RT_ICON0x404000xea8Device independent bitmap graphic, 48 x 96 x 8, image size 2688, 256 important colorsEnglishUnited States0.6751066098081023
                                              RT_ICON0x412a80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 1152, 256 important colorsEnglishUnited States0.7851985559566786
                                              RT_ICON0x41b500x568Device independent bitmap graphic, 16 x 32 x 8, image size 320, 256 important colorsEnglishUnited States0.6560693641618497
                                              RT_ICON0x420b80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.8031914893617021
                                              RT_ICON0x425200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640EnglishUnited States0.3118279569892473
                                              RT_ICON0x428080x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.36824324324324326
                                              RT_DIALOG0x429300xb4dataEnglishUnited States0.6111111111111112
                                              RT_DIALOG0x429e80x200dataEnglishUnited States0.3984375
                                              RT_DIALOG0x42be80xf8dataEnglishUnited States0.6290322580645161
                                              RT_DIALOG0x42ce00xa0dataEnglishUnited States0.60625
                                              RT_DIALOG0x42d800xeedataEnglishUnited States0.6260504201680672
                                              RT_GROUP_ICON0x42e700x68dataEnglishUnited States0.6634615384615384
                                              RT_VERSION0x42ed80x2b8COM executable for DOSEnglishUnited States0.492816091954023
                                              RT_MANIFEST0x431900x215XML 1.0 document, ASCII text, with very long lines (533), with no line terminatorsEnglishUnited States0.575984990619137
                                              DLLImport
                                              KERNEL32.dllCompareFileTime, SearchPathA, GetShortPathNameA, GetFullPathNameA, MoveFileA, SetCurrentDirectoryA, GetFileAttributesA, GetLastError, CreateDirectoryA, SetFileAttributesA, Sleep, GetTickCount, GetFileSize, GetModuleFileNameA, GetCurrentProcess, CopyFileA, ExitProcess, GetWindowsDirectoryA, SetFileTime, GetCommandLineA, SetErrorMode, LoadLibraryA, lstrcpynA, GetDiskFreeSpaceA, GlobalUnlock, GlobalLock, CreateThread, CreateProcessA, RemoveDirectoryA, CreateFileA, GetTempFileNameA, lstrlenA, lstrcatA, GetSystemDirectoryA, GetVersion, CloseHandle, lstrcmpiA, lstrcmpA, ExpandEnvironmentStringsA, GlobalFree, GlobalAlloc, WaitForSingleObject, GetExitCodeProcess, GetModuleHandleA, LoadLibraryExA, GetProcAddress, FreeLibrary, MultiByteToWideChar, WritePrivateProfileStringA, GetPrivateProfileStringA, WriteFile, ReadFile, MulDiv, SetFilePointer, FindClose, FindNextFileA, FindFirstFileA, DeleteFileA, GetTempPathA
                                              USER32.dllEndDialog, ScreenToClient, GetWindowRect, EnableMenuItem, GetSystemMenu, SetClassLongA, IsWindowEnabled, SetWindowPos, GetSysColor, GetWindowLongA, SetCursor, LoadCursorA, CheckDlgButton, GetMessagePos, LoadBitmapA, CallWindowProcA, IsWindowVisible, CloseClipboard, SetClipboardData, EmptyClipboard, RegisterClassA, TrackPopupMenu, AppendMenuA, CreatePopupMenu, GetSystemMetrics, SetDlgItemTextA, GetDlgItemTextA, MessageBoxIndirectA, CharPrevA, DispatchMessageA, PeekMessageA, DestroyWindow, CreateDialogParamA, SetTimer, SetWindowTextA, PostQuitMessage, SetForegroundWindow, wsprintfA, SendMessageTimeoutA, FindWindowExA, SystemParametersInfoA, CreateWindowExA, GetClassInfoA, DialogBoxParamA, CharNextA, OpenClipboard, ExitWindowsEx, IsWindow, GetDlgItem, SetWindowLongA, LoadImageA, GetDC, EnableWindow, InvalidateRect, SendMessageA, DefWindowProcA, BeginPaint, GetClientRect, FillRect, DrawTextA, EndPaint, ShowWindow
                                              GDI32.dllSetBkColor, GetDeviceCaps, DeleteObject, CreateBrushIndirect, CreateFontIndirectA, SetBkMode, SetTextColor, SelectObject
                                              SHELL32.dllSHGetPathFromIDListA, SHBrowseForFolderA, SHGetFileInfoA, ShellExecuteA, SHFileOperationA, SHGetSpecialFolderLocation
                                              ADVAPI32.dllRegQueryValueExA, RegSetValueExA, RegEnumKeyA, RegEnumValueA, RegOpenKeyExA, RegDeleteKeyA, RegDeleteValueA, RegCloseKey, RegCreateKeyExA
                                              COMCTL32.dllImageList_AddMasked, ImageList_Destroy, ImageList_Create
                                              ole32.dllCoTaskMemFree, OleInitialize, OleUninitialize, CoCreateInstance
                                              VERSION.dllGetFileVersionInfoSizeA, GetFileVersionInfoA, VerQueryValueA
                                              Language of compilation systemCountry where language is spokenMap
                                              EnglishUnited States
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Dec 7, 2023 22:03:43.962311983 CET1.1.1.1192.168.2.60x7122No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                                              Dec 7, 2023 22:03:43.962311983 CET1.1.1.1192.168.2.60x7122No error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false

                                              Click to jump to process

                                              Click to jump to process

                                              • File
                                              • Registry

                                              Click to dive into process behavior distribution

                                              Target ID:0
                                              Start time:22:03:23
                                              Start date:07/12/2023
                                              Path:C:\Users\user\Desktop\WinPcap_4_1_3.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Users\user\Desktop\WinPcap_4_1_3.exe
                                              Imagebase:0x400000
                                              File size:915'128 bytes
                                              MD5 hash:A11A2F0CFE6D0B4C50945989DB6360CD
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:moderate
                                              Has exited:true
                                              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                                              There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                                              Target ID:2
                                              Start time:22:03:34
                                              Start date:07/12/2023
                                              Path:C:\Windows\SysWOW64\net.exe
                                              Wow64 process (32bit):true
                                              Commandline:net start npf
                                              Imagebase:0x600000
                                              File size:47'104 bytes
                                              MD5 hash:31890A7DE89936F922D44D677F681A7F
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:moderate
                                              Has exited:true

                                              Target ID:3
                                              Start time:22:03:34
                                              Start date:07/12/2023
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff66e660000
                                              File size:862'208 bytes
                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:4
                                              Start time:22:03:34
                                              Start date:07/12/2023
                                              Path:C:\Windows\SysWOW64\net1.exe
                                              Wow64 process (32bit):true
                                              Commandline:C:\Windows\system32\net1 start npf
                                              Imagebase:0xe60000
                                              File size:139'776 bytes
                                              MD5 hash:2EFE6ED4C294AB8A39EB59C80813FEC1
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Reputation:moderate
                                              Has exited:true

                                              Execution Graph

                                              Execution Coverage

                                              Dynamic/Packed Code Coverage

                                              Signature Coverage

                                              Execution Coverage:33.4%
                                              Dynamic/Decrypted Code Coverage:0%
                                              Signature Coverage:22.9%
                                              Total number of Nodes:1220
                                              Total number of Limit Nodes:48
                                              Show Legend
                                              Hide Nodes/Edges
                                              execution_graph 2618 401cc1 GetDlgItem GetClientRect 2623 4029f6 2618->2623 2621 40288b 2622 401d0f DeleteObject 2622->2621 2624 402a02 2623->2624 2629 405a2e 2624->2629 2627 401cf1 LoadImageA SendMessageA 2627->2621 2627->2622 2644 405a3b 2629->2644 2630 405c55 2631 402a23 2630->2631 2663 405a0c lstrcpynA 2630->2663 2631->2627 2647 405c6e 2631->2647 2633 405ad3 GetVersion 2633->2644 2634 405c2c lstrlenA 2634->2644 2637 405a2e 10 API calls 2637->2634 2639 405b4b GetSystemDirectoryA 2639->2644 2640 405b5e GetWindowsDirectoryA 2640->2644 2641 405c6e 5 API calls 2641->2644 2642 405a2e 10 API calls 2642->2644 2643 405bd5 lstrcatA 2643->2644 2644->2630 2644->2633 2644->2634 2644->2637 2644->2639 2644->2640 2644->2641 2644->2642 2644->2643 2645 405b92 SHGetSpecialFolderLocation 2644->2645 2656 4058f3 RegOpenKeyExW 2644->2656 2661 40596a wsprintfA 2644->2661 2662 405a0c lstrcpynA 2644->2662 2645->2644 2646 405baa SHGetPathFromIDListA CoTaskMemFree 2645->2646 2646->2644 2653 405c7a 2647->2653 2648 405ce6 CharPrevA 2651 405ce2 2648->2651 2649 405cd7 CharNextA 2649->2651 2649->2653 2651->2648 2652 405d01 2651->2652 2652->2627 2653->2649 2653->2651 2654 405cc5 CharNextA 2653->2654 2655 405cd2 CharNextA 2653->2655 2664 40552a 2653->2664 2654->2653 2655->2649 2657 405964 2656->2657 2658 405926 RegQueryValueExW 2656->2658 2657->2644 2659 405947 RegCloseKey 2658->2659 2659->2657 2661->2644 2662->2644 2663->2631 2665 405530 2664->2665 2666 405543 2665->2666 2667 405536 CharNextA 2665->2667 2666->2653 2667->2665 3537 401dc1 3538 4029f6 18 API calls 3537->3538 3539 401dc7 3538->3539 3540 4029f6 18 API calls 3539->3540 3541 401dd0 3540->3541 3542 4029f6 18 API calls 3541->3542 3543 401dd9 3542->3543 3544 4029f6 18 API calls 3543->3544 3545 401de2 3544->3545 3546 401423 25 API calls 3545->3546 3547 401de9 ShellExecuteA 3546->3547 3548 401e16 3547->3548 2723 401ec5 2724 4029f6 18 API calls 2723->2724 2725 401ecc GetFileVersionInfoSizeA 2724->2725 2726 401eef GlobalAlloc 2725->2726 2733 401f45 2725->2733 2727 401f03 GetFileVersionInfoA 2726->2727 2726->2733 2728 401f14 VerQueryValueA 2727->2728 2727->2733 2729 401f2d 2728->2729 2728->2733 2734 40596a wsprintfA 2729->2734 2731 401f39 2735 40596a wsprintfA 2731->2735 2734->2731 2735->2733 3549 401645 3550 4029f6 18 API calls 3549->3550 3551 40164c 3550->3551 3552 4029f6 18 API calls 3551->3552 3553 401655 3552->3553 3554 4029f6 18 API calls 3553->3554 3555 40165e MoveFileA 3554->3555 3556 401671 3555->3556 3557 40166a 3555->3557 3558 405d07 2 API calls 3556->3558 3561 402169 3556->3561 3559 401423 25 API calls 3557->3559 3560 401680 3558->3560 3559->3561 3560->3561 3562 40575a 38 API calls 3560->3562 3562->3557 3563 4014ca 3564 404daa 25 API calls 3563->3564 3565 4014d1 3564->3565 3566 4025cc 3567 4025d3 3566->3567 3573 402838 3566->3573 3568 4029d9 18 API calls 3567->3568 3569 4025de 3568->3569 3570 4025e5 SetFilePointer 3569->3570 3571 4025f5 3570->3571 3570->3573 3574 40596a wsprintfA 3571->3574 3574->3573 2936 401f51 2937 401f63 2936->2937 2938 402012 2936->2938 2939 4029f6 18 API calls 2937->2939 2941 401423 25 API calls 2938->2941 2940 401f6a 2939->2940 2942 4029f6 18 API calls 2940->2942 2946 402169 2941->2946 2943 401f73 2942->2943 2944 401f88 LoadLibraryExA 2943->2944 2945 401f7b GetModuleHandleA 2943->2945 2944->2938 2947 401f98 GetProcAddress 2944->2947 2945->2944 2945->2947 2948 401fe5 2947->2948 2949 401fa8 2947->2949 2950 404daa 25 API calls 2948->2950 2952 401fb8 2949->2952 2954 401423 2949->2954 2950->2952 2952->2946 2953 402006 FreeLibrary 2952->2953 2953->2946 2955 404daa 25 API calls 2954->2955 2956 401431 2955->2956 2956->2952 3575 403ed2 lstrcpynA lstrlenA 3576 4014d6 3577 4029d9 18 API calls 3576->3577 3578 4014dc Sleep 3577->3578 3580 40288b 3578->3580 3586 4018d8 3587 40190f 3586->3587 3588 4029f6 18 API calls 3587->3588 3589 401914 3588->3589 3590 405331 68 API calls 3589->3590 3591 40191d 3590->3591 3592 4018db 3593 4029f6 18 API calls 3592->3593 3594 4018e2 3593->3594 3595 4052cd MessageBoxIndirectA 3594->3595 3596 4018eb 3595->3596 3597 401ae5 3598 4029f6 18 API calls 3597->3598 3599 401aec 3598->3599 3600 4029d9 18 API calls 3599->3600 3601 401af5 wsprintfA 3600->3601 3602 40288b 3601->3602 3026 402866 SendMessageA 3027 402880 InvalidateRect 3026->3027 3028 40288b 3026->3028 3027->3028 3603 4019e6 3604 4029f6 18 API calls 3603->3604 3605 4019ef ExpandEnvironmentStringsA 3604->3605 3606 401a03 3605->3606 3608 401a16 3605->3608 3607 401a08 lstrcmpA 3606->3607 3606->3608 3607->3608 3029 402267 3030 4029f6 18 API calls 3029->3030 3031 402275 3030->3031 3032 4029f6 18 API calls 3031->3032 3033 40227e 3032->3033 3034 4029f6 18 API calls 3033->3034 3035 402288 GetPrivateProfileStringA 3034->3035 3050 404ee8 3051 405094 3050->3051 3052 404f09 GetDlgItem GetDlgItem GetDlgItem 3050->3052 3053 4050c5 3051->3053 3054 40509d GetDlgItem CreateThread FindCloseChangeNotification 3051->3054 3096 403df3 SendMessageA 3052->3096 3056 4050f0 3053->3056 3058 405112 3053->3058 3059 4050dc ShowWindow ShowWindow 3053->3059 3054->3053 3102 404e7c OleInitialize 3054->3102 3060 40514e 3056->3060 3063 405101 3056->3063 3064 405127 ShowWindow 3056->3064 3057 404f7a 3061 404f81 GetClientRect GetSystemMetrics SendMessageA SendMessageA 3057->3061 3065 403e25 8 API calls 3058->3065 3098 403df3 SendMessageA 3059->3098 3060->3058 3068 405159 SendMessageA 3060->3068 3066 404ff0 3061->3066 3067 404fd4 SendMessageA SendMessageA 3061->3067 3099 403d97 3063->3099 3071 405147 3064->3071 3072 405139 3064->3072 3070 405120 3065->3070 3074 405003 3066->3074 3075 404ff5 SendMessageA 3066->3075 3067->3066 3068->3070 3076 405172 CreatePopupMenu 3068->3076 3073 403d97 SendMessageA 3071->3073 3077 404daa 25 API calls 3072->3077 3073->3060 3079 403dbe 19 API calls 3074->3079 3075->3074 3078 405a2e 18 API calls 3076->3078 3077->3071 3080 405182 AppendMenuA 3078->3080 3081 405013 3079->3081 3082 405195 GetWindowRect 3080->3082 3083 4051a8 3080->3083 3084 405050 GetDlgItem SendMessageA 3081->3084 3085 40501c ShowWindow 3081->3085 3086 4051b1 TrackPopupMenu 3082->3086 3083->3086 3084->3070 3089 405077 SendMessageA SendMessageA 3084->3089 3087 405032 ShowWindow 3085->3087 3088 40503f 3085->3088 3086->3070 3090 4051cf 3086->3090 3087->3088 3097 403df3 SendMessageA 3088->3097 3089->3070 3091 4051eb SendMessageA 3090->3091 3091->3091 3093 405208 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 3091->3093 3094 40522a SendMessageA 3093->3094 3094->3094 3095 40524b GlobalUnlock SetClipboardData CloseClipboard 3094->3095 3095->3070 3096->3057 3097->3084 3098->3056 3100 403da4 SendMessageA 3099->3100 3101 403d9e 3099->3101 3100->3058 3101->3100 3109 403e0a 3102->3109 3104 404e9f 3108 404ec6 3104->3108 3112 401389 3104->3112 3105 403e0a SendMessageA 3106 404ed8 OleUninitialize 3105->3106 3108->3105 3110 403e22 3109->3110 3111 403e13 SendMessageA 3109->3111 3110->3104 3111->3110 3114 401390 3112->3114 3113 4013fe 3113->3104 3114->3113 3115 4013cb MulDiv SendMessageA 3114->3115 3115->3114 3116 4038eb 3117 403903 3116->3117 3118 403a3e 3116->3118 3117->3118 3119 40390f 3117->3119 3120 403a8f 3118->3120 3121 403a4f GetDlgItem GetDlgItem 3118->3121 3122 40391a SetWindowPos 3119->3122 3123 40392d 3119->3123 3125 403ae9 3120->3125 3133 401389 2 API calls 3120->3133 3124 403dbe 19 API calls 3121->3124 3122->3123 3127 403932 ShowWindow 3123->3127 3128 40394a 3123->3128 3129 403a79 SetClassLongA 3124->3129 3126 403e0a SendMessageA 3125->3126 3176 403a39 3125->3176 3174 403afb 3126->3174 3127->3128 3130 403952 DestroyWindow 3128->3130 3131 40396c 3128->3131 3132 40140b 2 API calls 3129->3132 3137 403d47 3130->3137 3134 403971 SetWindowLongA 3131->3134 3135 403982 3131->3135 3132->3120 3136 403ac1 3133->3136 3134->3176 3140 4039f9 3135->3140 3141 40398e GetDlgItem 3135->3141 3136->3125 3142 403ac5 SendMessageA 3136->3142 3144 403d78 ShowWindow 3137->3144 3137->3176 3138 40140b 2 API calls 3138->3174 3139 403d49 DestroyWindow KiUserCallbackDispatcher 3139->3137 3143 403e25 8 API calls 3140->3143 3145 4039a1 SendMessageA IsWindowEnabled 3141->3145 3146 4039be 3141->3146 3142->3176 3143->3176 3144->3176 3145->3146 3145->3176 3148 4039cb 3146->3148 3149 403a12 SendMessageA 3146->3149 3150 4039de 3146->3150 3157 4039c3 3146->3157 3147 405a2e 18 API calls 3147->3174 3148->3149 3148->3157 3149->3140 3152 4039e6 3150->3152 3153 4039fb 3150->3153 3151 403d97 SendMessageA 3151->3140 3187 40140b 3152->3187 3155 40140b 2 API calls 3153->3155 3155->3157 3156 403dbe 19 API calls 3156->3174 3157->3140 3157->3151 3158 403dbe 19 API calls 3159 403b76 GetDlgItem 3158->3159 3160 403b93 ShowWindow KiUserCallbackDispatcher 3159->3160 3161 403b8b 3159->3161 3184 403de0 KiUserCallbackDispatcher 3160->3184 3161->3160 3163 403bbd KiUserCallbackDispatcher 3166 403bd1 3163->3166 3164 403bd6 GetSystemMenu EnableMenuItem SendMessageA 3165 403c06 SendMessageA 3164->3165 3164->3166 3165->3166 3166->3164 3185 403df3 SendMessageA 3166->3185 3186 405a0c lstrcpynA 3166->3186 3169 403c34 lstrlenA 3170 405a2e 18 API calls 3169->3170 3171 403c45 SetWindowTextA 3170->3171 3172 401389 2 API calls 3171->3172 3172->3174 3173 403c89 DestroyWindow 3173->3137 3175 403ca3 CreateDialogParamA 3173->3175 3174->3138 3174->3139 3174->3147 3174->3156 3174->3158 3174->3173 3174->3176 3175->3137 3177 403cd6 3175->3177 3178 403dbe 19 API calls 3177->3178 3179 403ce1 GetDlgItem GetWindowRect ScreenToClient SetWindowPos 3178->3179 3180 401389 2 API calls 3179->3180 3181 403d27 3180->3181 3181->3176 3182 403d2f ShowWindow 3181->3182 3183 403e0a SendMessageA 3182->3183 3183->3137 3184->3163 3185->3166 3186->3169 3188 401389 2 API calls 3187->3188 3189 401420 3188->3189 3189->3157 3609 401c6d 3610 4029d9 18 API calls 3609->3610 3611 401c73 IsWindow 3610->3611 3612 4019d6 3611->3612 3613 4014f0 SetForegroundWindow 3614 40288b 3613->3614 3615 402172 3616 4029f6 18 API calls 3615->3616 3617 402178 3616->3617 3618 4029f6 18 API calls 3617->3618 3619 402181 3618->3619 3620 4029f6 18 API calls 3619->3620 3621 40218a 3620->3621 3622 405d07 2 API calls 3621->3622 3623 402193 3622->3623 3624 4021a4 lstrlenA lstrlenA 3623->3624 3628 402197 3623->3628 3626 404daa 25 API calls 3624->3626 3625 404daa 25 API calls 3629 40219f 3625->3629 3627 4021e0 SHFileOperationA 3626->3627 3627->3628 3627->3629 3628->3625 3628->3629 3630 4021f4 3631 4021fb 3630->3631 3634 40220e 3630->3634 3632 405a2e 18 API calls 3631->3632 3633 402208 3632->3633 3635 4052cd MessageBoxIndirectA 3633->3635 3635->3634 3636 4046f9 GetDlgItem GetDlgItem 3637 40474d 7 API calls 3636->3637 3649 40496a 3636->3649 3638 4047f3 DeleteObject 3637->3638 3639 4047e6 SendMessageA 3637->3639 3640 4047fe 3638->3640 3639->3638 3642 404835 3640->3642 3643 405a2e 18 API calls 3640->3643 3641 404a54 3645 404b03 3641->3645 3651 40495d 3641->3651 3656 404aad SendMessageA 3641->3656 3644 403dbe 19 API calls 3642->3644 3646 404817 SendMessageA SendMessageA 3643->3646 3650 404849 3644->3650 3647 404b18 3645->3647 3648 404b0c SendMessageA 3645->3648 3646->3640 3658 404b31 3647->3658 3659 404b2a ImageList_Destroy 3647->3659 3666 404b41 3647->3666 3648->3647 3649->3641 3670 4049de 3649->3670 3689 404679 SendMessageA 3649->3689 3655 403dbe 19 API calls 3650->3655 3652 403e25 8 API calls 3651->3652 3657 404cf3 3652->3657 3653 404a46 SendMessageA 3653->3641 3671 404857 3655->3671 3656->3651 3661 404ac2 SendMessageA 3656->3661 3662 404b3a GlobalFree 3658->3662 3658->3666 3659->3658 3660 404ca7 3660->3651 3667 404cb9 ShowWindow GetDlgItem ShowWindow 3660->3667 3664 404ad5 3661->3664 3662->3666 3663 40492b GetWindowLongA SetWindowLongA 3665 404944 3663->3665 3673 404ae6 SendMessageA 3664->3673 3668 404962 3665->3668 3669 40494a ShowWindow 3665->3669 3666->3660 3672 40140b 2 API calls 3666->3672 3683 404b73 3666->3683 3667->3651 3688 403df3 SendMessageA 3668->3688 3687 403df3 SendMessageA 3669->3687 3670->3641 3670->3653 3671->3663 3674 404925 3671->3674 3677 4048a6 SendMessageA 3671->3677 3678 4048e2 SendMessageA 3671->3678 3679 4048f3 SendMessageA 3671->3679 3672->3683 3673->3645 3674->3663 3674->3665 3677->3671 3678->3671 3679->3671 3680 404c7d InvalidateRect 3680->3660 3681 404c93 3680->3681 3694 404597 3681->3694 3682 404ba1 SendMessageA 3684 404bb7 3682->3684 3683->3682 3683->3684 3684->3680 3686 404c2b SendMessageA SendMessageA 3684->3686 3686->3684 3687->3651 3688->3649 3690 4046d8 SendMessageA 3689->3690 3691 40469c GetMessagePos ScreenToClient SendMessageA 3689->3691 3693 4046d0 3690->3693 3692 4046d5 3691->3692 3691->3693 3692->3690 3693->3670 3695 4045b1 3694->3695 3696 405a2e 18 API calls 3695->3696 3697 4045e6 3696->3697 3698 405a2e 18 API calls 3697->3698 3699 4045f1 3698->3699 3700 405a2e 18 API calls 3699->3700 3701 404622 lstrlenA wsprintfA SetDlgItemTextA 3700->3701 3701->3660 3284 4030fa #17 SetErrorMode OleInitialize 3285 405d2e 3 API calls 3284->3285 3286 40313d SHGetFileInfoA 3285->3286 3354 405a0c lstrcpynA 3286->3354 3288 403168 GetCommandLineA 3355 405a0c lstrcpynA 3288->3355 3290 40317a GetModuleHandleA 3291 403191 3290->3291 3292 40552a CharNextA 3291->3292 3293 4031a5 CharNextA 3292->3293 3298 4031b2 3293->3298 3294 40321b 3295 40322e GetTempPathA 3294->3295 3356 4030c6 3295->3356 3297 403244 3299 403268 DeleteFileA 3297->3299 3300 403248 GetWindowsDirectoryA lstrcatA 3297->3300 3298->3294 3301 40552a CharNextA 3298->3301 3305 40321d 3298->3305 3364 402c22 GetTickCount GetModuleFileNameA 3299->3364 3302 4030c6 11 API calls 3300->3302 3301->3298 3304 403264 3302->3304 3304->3299 3308 4032e6 ExitProcess OleUninitialize 3304->3308 3446 405a0c lstrcpynA 3305->3446 3306 403279 3306->3308 3309 4032d2 3306->3309 3315 40552a CharNextA 3306->3315 3310 4033e0 3308->3310 3311 4032fb 3308->3311 3392 403555 3309->3392 3313 403463 ExitProcess 3310->3313 3317 405d2e 3 API calls 3310->3317 3312 4052cd MessageBoxIndirectA 3311->3312 3316 403309 ExitProcess 3312->3316 3320 403290 3315->3320 3321 4033ef 3317->3321 3318 4032e2 3318->3308 3323 403311 lstrcatA lstrcmpiA 3320->3323 3324 4032ad 3320->3324 3322 405d2e 3 API calls 3321->3322 3325 4033f8 3322->3325 3323->3308 3326 40332d CreateDirectoryA SetCurrentDirectoryA 3323->3326 3327 4055e0 18 API calls 3324->3327 3328 405d2e 3 API calls 3325->3328 3330 403344 3326->3330 3331 40334f 3326->3331 3332 4032b8 3327->3332 3329 403401 3328->3329 3333 40344f ExitWindowsEx 3329->3333 3338 40340f GetCurrentProcess 3329->3338 3449 405a0c lstrcpynA 3330->3449 3450 405a0c lstrcpynA 3331->3450 3332->3308 3447 405a0c lstrcpynA 3332->3447 3333->3313 3337 40345c 3333->3337 3340 40140b 2 API calls 3337->3340 3343 40341f 3338->3343 3339 4032c7 3448 405a0c lstrcpynA 3339->3448 3340->3313 3342 405a2e 18 API calls 3344 40337f DeleteFileA 3342->3344 3343->3333 3345 40338c CopyFileA 3344->3345 3351 40335d 3344->3351 3345->3351 3346 4033d4 3347 40575a 38 API calls 3346->3347 3349 4033db 3347->3349 3348 40575a 38 API calls 3348->3351 3349->3308 3350 405a2e 18 API calls 3350->3351 3351->3342 3351->3346 3351->3348 3351->3350 3352 40526c 2 API calls 3351->3352 3353 4033c0 CloseHandle 3351->3353 3352->3351 3353->3351 3354->3288 3355->3290 3357 405c6e 5 API calls 3356->3357 3358 4030d2 3357->3358 3359 4030dc 3358->3359 3360 4054ff 3 API calls 3358->3360 3359->3297 3361 4030e4 CreateDirectoryA 3360->3361 3362 405712 2 API calls 3361->3362 3363 4030f8 3362->3363 3363->3297 3451 4056e3 GetFileAttributesA CreateFileA 3364->3451 3366 402c62 3387 402c72 3366->3387 3452 405a0c lstrcpynA 3366->3452 3368 402c88 3369 405546 2 API calls 3368->3369 3370 402c8e 3369->3370 3453 405a0c lstrcpynA 3370->3453 3372 402c99 GetFileSize 3373 402d95 3372->3373 3385 402cb0 3372->3385 3454 402bbe 3373->3454 3375 402d9e 3377 402dce GlobalAlloc 3375->3377 3375->3387 3465 4030af SetFilePointer 3375->3465 3376 40307d ReadFile 3376->3385 3466 4030af SetFilePointer 3377->3466 3379 402e01 3383 402bbe 6 API calls 3379->3383 3381 402db7 3384 40307d ReadFile 3381->3384 3382 402de9 3386 402e5b 33 API calls 3382->3386 3383->3387 3388 402dc2 3384->3388 3385->3373 3385->3376 3385->3379 3385->3387 3389 402bbe 6 API calls 3385->3389 3390 402df5 3386->3390 3387->3306 3388->3377 3388->3387 3389->3385 3390->3387 3390->3390 3391 402e32 SetFilePointer 3390->3391 3391->3387 3393 405d2e 3 API calls 3392->3393 3394 403569 3393->3394 3395 403581 3394->3395 3396 40356f 3394->3396 3397 4058f3 3 API calls 3395->3397 3476 40596a wsprintfA 3396->3476 3398 4035a2 3397->3398 3400 4035c0 lstrcatA 3398->3400 3402 4058f3 3 API calls 3398->3402 3401 40357f 3400->3401 3467 40381e 3401->3467 3402->3400 3405 4055e0 18 API calls 3406 4035f2 3405->3406 3407 40367b 3406->3407 3409 4058f3 3 API calls 3406->3409 3408 4055e0 18 API calls 3407->3408 3410 403681 3408->3410 3411 40361e 3409->3411 3412 403691 LoadImageA 3410->3412 3413 405a2e 18 API calls 3410->3413 3411->3407 3416 40363a lstrlenA 3411->3416 3420 40552a CharNextA 3411->3420 3414 403745 3412->3414 3415 4036bc RegisterClassA 3412->3415 3413->3412 3419 40140b 2 API calls 3414->3419 3417 40374f 3415->3417 3418 4036f8 SystemParametersInfoA CreateWindowExA 3415->3418 3421 403648 lstrcmpiA 3416->3421 3422 40366e 3416->3422 3417->3318 3418->3414 3423 40374b 3419->3423 3425 403638 3420->3425 3421->3422 3426 403658 GetFileAttributesA 3421->3426 3424 4054ff 3 API calls 3422->3424 3423->3417 3427 40381e 19 API calls 3423->3427 3428 403674 3424->3428 3425->3416 3429 403664 3426->3429 3430 40375c 3427->3430 3477 405a0c lstrcpynA 3428->3477 3429->3422 3432 405546 2 API calls 3429->3432 3433 403768 ShowWindow LoadLibraryA 3430->3433 3434 4037eb 3430->3434 3432->3422 3435 403787 LoadLibraryA 3433->3435 3436 40378e GetClassInfoA 3433->3436 3437 404e7c 5 API calls 3434->3437 3435->3436 3438 4037a2 GetClassInfoA RegisterClassA 3436->3438 3439 4037b8 DialogBoxParamA 3436->3439 3440 4037f1 3437->3440 3438->3439 3441 40140b 2 API calls 3439->3441 3442 40380d 3440->3442 3444 4037f5 3440->3444 3441->3417 3443 40140b 2 API calls 3442->3443 3443->3417 3444->3417 3445 40140b 2 API calls 3444->3445 3445->3417 3446->3295 3447->3339 3448->3309 3449->3331 3450->3351 3451->3366 3452->3368 3453->3372 3455 402bc7 3454->3455 3456 402bdf 3454->3456 3457 402bd0 DestroyWindow 3455->3457 3458 402bd7 3455->3458 3459 402be7 3456->3459 3460 402bef GetTickCount 3456->3460 3457->3458 3458->3375 3461 405d67 2 API calls 3459->3461 3462 402c20 3460->3462 3463 402bfd CreateDialogParamA ShowWindow 3460->3463 3464 402bed 3461->3464 3462->3375 3463->3462 3464->3375 3465->3381 3466->3382 3468 403832 3467->3468 3478 40596a wsprintfA 3468->3478 3470 4038a3 3471 405a2e 18 API calls 3470->3471 3472 4038af SetWindowTextA 3471->3472 3473 4035d0 3472->3473 3474 4038cb 3472->3474 3473->3405 3474->3473 3475 405a2e 18 API calls 3474->3475 3475->3474 3476->3401 3477->3407 3478->3470 3702 404cfa 3703 404d08 3702->3703 3704 404d1f 3702->3704 3705 404d0e 3703->3705 3720 404d88 3703->3720 3706 404d2d IsWindowVisible 3704->3706 3712 404d44 3704->3712 3707 403e0a SendMessageA 3705->3707 3709 404d3a 3706->3709 3706->3720 3710 404d18 3707->3710 3708 404d8e CallWindowProcA 3708->3710 3711 404679 5 API calls 3709->3711 3711->3712 3712->3708 3721 405a0c lstrcpynA 3712->3721 3714 404d73 3722 40596a wsprintfA 3714->3722 3716 404d7a 3717 40140b 2 API calls 3716->3717 3718 404d81 3717->3718 3723 405a0c lstrcpynA 3718->3723 3720->3708 3721->3714 3722->3716 3723->3720 3724 4016fa 3725 4029f6 18 API calls 3724->3725 3726 401701 SearchPathA 3725->3726 3727 40171c 3726->3727 3479 40347b 3480 403493 3479->3480 3481 403485 CloseHandle 3479->3481 3486 4034c0 3480->3486 3481->3480 3484 405331 68 API calls 3485 4034a4 3484->3485 3487 4034ce 3486->3487 3488 4034d3 FreeLibrary GlobalFree 3487->3488 3489 403498 3487->3489 3488->3488 3488->3489 3489->3484 3728 4025fb 3729 402602 3728->3729 3730 40288b 3728->3730 3731 402608 FindClose 3729->3731 3731->3730 3490 40267c 3491 4029f6 18 API calls 3490->3491 3493 40268a 3491->3493 3492 4026a0 3495 4056c4 2 API calls 3492->3495 3493->3492 3494 4029f6 18 API calls 3493->3494 3494->3492 3496 4026a6 3495->3496 3516 4056e3 GetFileAttributesA CreateFileA 3496->3516 3498 4026b3 3499 40275c 3498->3499 3500 4026bf GlobalAlloc 3498->3500 3503 402764 DeleteFileA 3499->3503 3504 402777 3499->3504 3501 402753 CloseHandle 3500->3501 3502 4026d8 3500->3502 3501->3499 3517 4030af SetFilePointer 3502->3517 3503->3504 3506 4026de 3507 40307d ReadFile 3506->3507 3508 4026e7 GlobalAlloc 3507->3508 3509 4026f7 3508->3509 3510 40272b WriteFile GlobalFree 3508->3510 3511 402e5b 33 API calls 3509->3511 3512 402e5b 33 API calls 3510->3512 3515 402704 3511->3515 3513 402750 3512->3513 3513->3501 3514 402722 GlobalFree 3514->3510 3515->3514 3516->3498 3517->3506 3732 4041fc 3733 40423a 3732->3733 3734 40422d 3732->3734 3736 404243 GetDlgItem 3733->3736 3741 4042a6 3733->3741 3793 4052b1 GetDlgItemTextA 3734->3793 3738 404257 3736->3738 3737 404234 3740 405c6e 5 API calls 3737->3740 3743 40426b SetWindowTextA 3738->3743 3749 405593 4 API calls 3738->3749 3739 40438a 3744 404516 3739->3744 3795 4052b1 GetDlgItemTextA 3739->3795 3740->3733 3741->3739 3741->3744 3745 405a2e 18 API calls 3741->3745 3747 403dbe 19 API calls 3743->3747 3748 403e25 8 API calls 3744->3748 3750 40431c SHBrowseForFolderA 3745->3750 3746 4043b6 3751 4055e0 18 API calls 3746->3751 3752 404289 3747->3752 3753 40452a 3748->3753 3754 404261 3749->3754 3750->3739 3755 404334 CoTaskMemFree 3750->3755 3756 4043bc 3751->3756 3757 403dbe 19 API calls 3752->3757 3754->3743 3760 4054ff 3 API calls 3754->3760 3758 4054ff 3 API calls 3755->3758 3796 405a0c lstrcpynA 3756->3796 3759 404297 3757->3759 3761 404341 3758->3761 3794 403df3 SendMessageA 3759->3794 3760->3743 3764 404378 SetDlgItemTextA 3761->3764 3769 405a2e 18 API calls 3761->3769 3764->3739 3765 40429f 3767 405d2e 3 API calls 3765->3767 3766 4043d3 3768 405d2e 3 API calls 3766->3768 3767->3741 3776 4043db 3768->3776 3770 404360 lstrcmpiA 3769->3770 3770->3764 3773 404371 lstrcatA 3770->3773 3771 404415 3797 405a0c lstrcpynA 3771->3797 3773->3764 3774 40441e 3775 405593 4 API calls 3774->3775 3777 404424 GetDiskFreeSpaceA 3775->3777 3776->3771 3779 405546 2 API calls 3776->3779 3781 404468 3776->3781 3780 404446 MulDiv 3777->3780 3777->3781 3779->3776 3780->3781 3782 4044c5 3781->3782 3783 404597 21 API calls 3781->3783 3784 4044e8 3782->3784 3786 40140b 2 API calls 3782->3786 3785 4044b7 3783->3785 3798 403de0 KiUserCallbackDispatcher 3784->3798 3788 4044c7 SetDlgItemTextA 3785->3788 3789 4044bc 3785->3789 3786->3784 3788->3782 3791 404597 21 API calls 3789->3791 3790 404504 3790->3744 3792 404191 SendMessageA 3790->3792 3791->3782 3792->3744 3793->3737 3794->3765 3795->3746 3796->3766 3797->3774 3798->3790 3799 4014fe 3800 401506 3799->3800 3802 401519 3799->3802 3801 4029d9 18 API calls 3800->3801 3801->3802 3803 401000 3804 401037 BeginPaint GetClientRect 3803->3804 3805 40100c DefWindowProcA 3803->3805 3807 4010f3 3804->3807 3808 401179 3805->3808 3809 401073 CreateBrushIndirect FillRect DeleteObject 3807->3809 3810 4010fc 3807->3810 3809->3807 3811 401102 CreateFontIndirectA 3810->3811 3812 401167 EndPaint 3810->3812 3811->3812 3813 401112 6 API calls 3811->3813 3812->3808 3813->3812 2668 402303 2669 402309 2668->2669 2670 4029f6 18 API calls 2669->2670 2671 40231b 2670->2671 2672 4029f6 18 API calls 2671->2672 2673 402325 RegCreateKeyExW 2672->2673 2674 40288b 2673->2674 2675 40234f 2673->2675 2676 402367 2675->2676 2677 4029f6 18 API calls 2675->2677 2678 402373 2676->2678 2685 4029d9 2676->2685 2680 402360 lstrlenA 2677->2680 2679 40238e RegSetValueExW 2678->2679 2688 402e5b 2678->2688 2683 4023a4 RegCloseKey 2679->2683 2680->2676 2683->2674 2686 405a2e 18 API calls 2685->2686 2687 4029ed 2686->2687 2687->2678 2689 402e71 2688->2689 2690 402e9f 2689->2690 2722 4030af SetFilePointer 2689->2722 2709 40307d ReadFile 2690->2709 2694 402ffc 2694->2679 2695 403011 2697 403015 2695->2697 2698 40302d 2695->2698 2696 402ebc GetTickCount 2696->2694 2701 402f0b 2696->2701 2700 40307d ReadFile 2697->2700 2698->2694 2702 40307d ReadFile 2698->2702 2703 403048 WriteFile 2698->2703 2699 40307d ReadFile 2699->2701 2700->2694 2701->2694 2701->2699 2705 402f61 GetTickCount 2701->2705 2706 402f86 MulDiv wsprintfA 2701->2706 2708 402fc4 WriteFile 2701->2708 2702->2698 2703->2694 2704 40305d 2703->2704 2704->2694 2704->2698 2705->2701 2711 404daa 2706->2711 2708->2694 2708->2701 2710 402eaa 2709->2710 2710->2694 2710->2695 2710->2696 2712 404dc5 2711->2712 2721 404e68 2711->2721 2713 404de2 lstrlenA 2712->2713 2714 405a2e 18 API calls 2712->2714 2715 404df0 lstrlenA 2713->2715 2716 404e0b 2713->2716 2714->2713 2717 404e02 lstrcatA 2715->2717 2715->2721 2718 404e11 SetWindowTextA 2716->2718 2719 404e1e 2716->2719 2717->2716 2718->2719 2720 404e24 SendMessageA SendMessageA SendMessageA 2719->2720 2719->2721 2720->2721 2721->2701 2722->2690 3814 402803 3815 4029d9 18 API calls 3814->3815 3816 402809 3815->3816 3817 40283a 3816->3817 3818 40265c 3816->3818 3820 402817 3816->3820 3817->3818 3819 405a2e 18 API calls 3817->3819 3819->3818 3820->3818 3822 40596a wsprintfA 3820->3822 3822->3818 2736 403f06 2737 403f1c 2736->2737 2740 404029 2736->2740 2765 403dbe 2737->2765 2738 404098 2739 40416c 2738->2739 2742 4040a2 GetDlgItem 2738->2742 2774 403e25 2739->2774 2740->2738 2740->2739 2746 40406d GetDlgItem SendMessageA 2740->2746 2744 4040b8 2742->2744 2745 40412a 2742->2745 2743 403f72 2748 403dbe 19 API calls 2743->2748 2744->2745 2749 4040de 6 API calls 2744->2749 2745->2739 2750 40413c 2745->2750 2770 403de0 KiUserCallbackDispatcher 2746->2770 2753 403f7f CheckDlgButton 2748->2753 2749->2745 2754 404142 SendMessageA 2750->2754 2755 404153 2750->2755 2752 404167 2768 403de0 KiUserCallbackDispatcher 2753->2768 2754->2755 2755->2752 2758 404159 SendMessageA 2755->2758 2756 404093 2771 404191 2756->2771 2758->2752 2760 403f9d GetDlgItem 2769 403df3 SendMessageA 2760->2769 2762 403fb3 SendMessageA 2763 403fd1 GetSysColor 2762->2763 2764 403fda SendMessageA SendMessageA lstrlenA SendMessageA SendMessageA 2762->2764 2763->2764 2764->2752 2766 405a2e 18 API calls 2765->2766 2767 403dc9 SetDlgItemTextA 2766->2767 2767->2743 2768->2760 2769->2762 2770->2756 2772 4041a4 SendMessageA 2771->2772 2773 40419f 2771->2773 2772->2738 2773->2772 2775 403e3d GetWindowLongA 2774->2775 2785 403ec6 2774->2785 2776 403e4e 2775->2776 2775->2785 2777 403e60 2776->2777 2778 403e5d GetSysColor 2776->2778 2779 403e70 SetBkMode 2777->2779 2780 403e66 SetTextColor 2777->2780 2778->2777 2781 403e88 GetSysColor 2779->2781 2782 403e8e 2779->2782 2780->2779 2781->2782 2783 403e95 SetBkColor 2782->2783 2784 403e9f 2782->2784 2783->2784 2784->2785 2786 403eb2 DeleteObject 2784->2786 2787 403eb9 CreateBrushIndirect 2784->2787 2785->2752 2786->2787 2787->2785 2788 401b06 2789 401b57 2788->2789 2792 401b13 2788->2792 2790 401b80 GlobalAlloc 2789->2790 2793 401b5b 2789->2793 2795 405a2e 18 API calls 2790->2795 2791 4021fb 2796 405a2e 18 API calls 2791->2796 2792->2791 2797 401b2a 2792->2797 2794 401b9b 2793->2794 2809 405a0c lstrcpynA 2793->2809 2795->2794 2799 402208 2796->2799 2807 405a0c lstrcpynA 2797->2807 2810 4052cd 2799->2810 2801 401b6d GlobalFree 2801->2794 2803 401b39 2808 405a0c lstrcpynA 2803->2808 2805 401b48 2814 405a0c lstrcpynA 2805->2814 2807->2803 2808->2805 2809->2801 2811 4052e2 2810->2811 2812 4052f6 MessageBoxIndirectA 2811->2812 2813 40532e 2811->2813 2812->2813 2813->2794 2814->2794 3823 402506 3824 4029d9 18 API calls 3823->3824 3827 402510 3824->3827 3825 402586 3826 402544 ReadFile 3826->3825 3826->3827 3827->3825 3827->3826 3828 402588 3827->3828 3830 402598 3827->3830 3832 40596a wsprintfA 3828->3832 3830->3825 3831 4025ae SetFilePointer 3830->3831 3831->3825 3832->3825 3833 401c8a 3834 4029d9 18 API calls 3833->3834 3835 401c91 3834->3835 3836 4029d9 18 API calls 3835->3836 3837 401c99 GetDlgItem 3836->3837 3838 4024b8 3837->3838 2815 40190d 2816 40190f 2815->2816 2817 4029f6 18 API calls 2816->2817 2818 401914 2817->2818 2821 405331 2818->2821 2862 4055e0 2821->2862 2824 405365 2827 40549a 2824->2827 2876 405a0c lstrcpynA 2824->2876 2825 40534e DeleteFileA 2826 40191d 2825->2826 2827->2826 2881 405d07 FindFirstFileA 2827->2881 2829 40538f 2830 4053a0 2829->2830 2831 405393 lstrcatA 2829->2831 2887 405546 lstrlenA 2830->2887 2833 4053a6 2831->2833 2835 4053b4 lstrcatA 2833->2835 2837 4053bf lstrlenA FindFirstFileA 2833->2837 2835->2837 2837->2827 2852 4053e3 2837->2852 2839 40552a CharNextA 2839->2852 2841 4056c4 2 API calls 2842 4054cf RemoveDirectoryA 2841->2842 2843 4054f1 2842->2843 2844 4054da 2842->2844 2845 404daa 25 API calls 2843->2845 2844->2826 2848 4054e0 2844->2848 2845->2826 2846 405479 FindNextFileA 2849 405491 FindClose 2846->2849 2846->2852 2850 404daa 25 API calls 2848->2850 2849->2827 2851 4054e8 2850->2851 2853 40575a 38 API calls 2851->2853 2852->2839 2852->2846 2855 405331 59 API calls 2852->2855 2858 404daa 25 API calls 2852->2858 2861 405457 2852->2861 2877 405a0c lstrcpynA 2852->2877 2878 4056c4 GetFileAttributesA 2852->2878 2856 4054ef 2853->2856 2855->2852 2856->2826 2858->2846 2859 404daa 25 API calls 2859->2861 2861->2846 2861->2859 2891 40575a 2861->2891 2917 405a0c lstrcpynA 2862->2917 2864 4055f1 2918 405593 CharNextA CharNextA 2864->2918 2867 405345 2867->2824 2867->2825 2868 405c6e 5 API calls 2874 405607 2868->2874 2869 405632 lstrlenA 2870 40563d 2869->2870 2869->2874 2872 4054ff 3 API calls 2870->2872 2871 405d07 2 API calls 2871->2874 2873 405642 GetFileAttributesA 2872->2873 2873->2867 2874->2867 2874->2869 2874->2871 2875 405546 2 API calls 2874->2875 2875->2869 2876->2829 2877->2852 2879 405446 DeleteFileA 2878->2879 2880 4056d3 SetFileAttributesA 2878->2880 2879->2852 2880->2879 2882 4054bf 2881->2882 2883 405d1d FindClose 2881->2883 2882->2826 2884 4054ff lstrlenA CharPrevA 2882->2884 2883->2882 2885 4054c9 2884->2885 2886 405519 lstrcatA 2884->2886 2885->2841 2886->2885 2888 405553 2887->2888 2889 405564 2888->2889 2890 405558 CharPrevA 2888->2890 2889->2833 2890->2888 2890->2889 2924 405d2e GetModuleHandleA 2891->2924 2894 4057c2 GetShortPathNameA 2896 4057d7 2894->2896 2897 4058b7 2894->2897 2896->2897 2899 4057df wsprintfA 2896->2899 2897->2861 2898 4057a6 CloseHandle GetShortPathNameA 2898->2897 2900 4057ba 2898->2900 2901 405a2e 18 API calls 2899->2901 2900->2894 2900->2897 2902 405807 2901->2902 2929 4056e3 GetFileAttributesA CreateFileA 2902->2929 2904 405814 2904->2897 2905 405823 GetFileSize GlobalAlloc 2904->2905 2906 4058b0 CloseHandle 2905->2906 2907 405841 ReadFile 2905->2907 2906->2897 2907->2906 2908 405855 2907->2908 2908->2906 2930 405658 lstrlenA 2908->2930 2911 4058c4 2914 405658 4 API calls 2911->2914 2912 40586a 2935 405a0c lstrcpynA 2912->2935 2915 405878 2914->2915 2916 40588b SetFilePointer WriteFile GlobalFree 2915->2916 2916->2906 2917->2864 2919 4055ad 2918->2919 2923 4055b9 2918->2923 2920 4055b4 CharNextA 2919->2920 2919->2923 2921 4055d6 2920->2921 2921->2867 2921->2868 2922 40552a CharNextA 2922->2923 2923->2921 2923->2922 2925 405d55 GetProcAddress 2924->2925 2926 405d4a LoadLibraryA 2924->2926 2927 405765 2925->2927 2926->2925 2926->2927 2927->2894 2927->2897 2928 4056e3 GetFileAttributesA CreateFileA 2927->2928 2928->2898 2929->2904 2931 40568e lstrlenA 2930->2931 2932 405698 2931->2932 2933 40566c lstrcmpiA 2931->2933 2932->2911 2932->2912 2933->2932 2934 405685 CharNextA 2933->2934 2934->2931 2935->2915 3839 403513 3840 40351e 3839->3840 3841 403522 3840->3841 3842 403525 GlobalAlloc 3840->3842 3842->3841 2957 401d95 2958 4029d9 18 API calls 2957->2958 2959 401d9b 2958->2959 2960 4029d9 18 API calls 2959->2960 2961 401da4 2960->2961 2962 401db6 EnableWindow 2961->2962 2963 401dab ShowWindow 2961->2963 2964 40288b 2962->2964 2963->2964 3843 402615 3844 402618 3843->3844 3848 402630 3843->3848 3845 402625 FindNextFileA 3844->3845 3846 40266f 3845->3846 3845->3848 3849 405a0c lstrcpynA 3846->3849 3849->3848 3850 401595 3851 4029f6 18 API calls 3850->3851 3852 40159c SetFileAttributesA 3851->3852 3853 4015ae 3852->3853 3854 401e95 3855 4029f6 18 API calls 3854->3855 3856 401e9c 3855->3856 3857 405d07 2 API calls 3856->3857 3858 401ea2 3857->3858 3860 401eb4 3858->3860 3861 40596a wsprintfA 3858->3861 3861->3860 3862 401696 3863 4029f6 18 API calls 3862->3863 3864 40169c GetFullPathNameA 3863->3864 3867 4016b3 3864->3867 3871 4016d4 3864->3871 3865 4016e8 GetShortPathNameA 3866 40288b 3865->3866 3868 405d07 2 API calls 3867->3868 3867->3871 3869 4016c4 3868->3869 3869->3871 3872 405a0c lstrcpynA 3869->3872 3871->3865 3871->3866 3872->3871 2965 401e1b 2966 4029f6 18 API calls 2965->2966 2967 401e21 2966->2967 2968 404daa 25 API calls 2967->2968 2969 401e2b 2968->2969 2980 40526c CreateProcessA 2969->2980 2971 401e87 FindCloseChangeNotification 2973 40265c 2971->2973 2972 401e50 WaitForSingleObject 2974 401e31 2972->2974 2975 401e5e GetExitCodeProcess 2972->2975 2974->2971 2974->2972 2974->2973 2983 405d67 2974->2983 2977 401e70 2975->2977 2979 401e79 2975->2979 2987 40596a wsprintfA 2977->2987 2979->2971 2981 4052a7 2980->2981 2982 40529b CloseHandle 2980->2982 2981->2974 2982->2981 2984 405d84 PeekMessageA 2983->2984 2985 405d94 2984->2985 2986 405d7a DispatchMessageA 2984->2986 2985->2972 2986->2984 2987->2979 3873 401d1b GetDC GetDeviceCaps 3874 4029d9 18 API calls 3873->3874 3875 401d37 MulDiv 3874->3875 3876 4029d9 18 API calls 3875->3876 3877 401d4c 3876->3877 3878 405a2e 18 API calls 3877->3878 3879 401d85 CreateFontIndirectA 3878->3879 3880 4024b8 3879->3880 3881 40249c 3882 4029f6 18 API calls 3881->3882 3883 4024a3 3882->3883 3886 4056e3 GetFileAttributesA CreateFileA 3883->3886 3885 4024af 3886->3885 2988 402020 2989 4029f6 18 API calls 2988->2989 2990 402027 2989->2990 2991 4029f6 18 API calls 2990->2991 2992 402031 2991->2992 2993 4029f6 18 API calls 2992->2993 2994 40203a 2993->2994 2995 4029f6 18 API calls 2994->2995 2996 402044 2995->2996 2997 4029f6 18 API calls 2996->2997 2999 40204e 2997->2999 2998 402062 CoCreateInstance 3003 402081 2998->3003 3004 402137 2998->3004 2999->2998 3000 4029f6 18 API calls 2999->3000 3000->2998 3001 401423 25 API calls 3002 402169 3001->3002 3003->3004 3005 402116 MultiByteToWideChar 3003->3005 3004->3001 3004->3002 3005->3004 3006 401721 3007 4029f6 18 API calls 3006->3007 3008 401728 3007->3008 3012 405712 3008->3012 3010 40172f 3011 405712 2 API calls 3010->3011 3011->3010 3013 40571d GetTickCount GetTempFileNameA 3012->3013 3014 405749 3013->3014 3015 40574d 3013->3015 3014->3013 3014->3015 3015->3010 3887 401922 3888 4029f6 18 API calls 3887->3888 3889 401929 lstrlenA 3888->3889 3890 4024b8 3889->3890 3016 402223 3017 402231 3016->3017 3018 40222b 3016->3018 3020 4029f6 18 API calls 3017->3020 3022 402241 3017->3022 3019 4029f6 18 API calls 3018->3019 3019->3017 3020->3022 3021 40224f 3024 4029f6 18 API calls 3021->3024 3022->3021 3023 4029f6 18 API calls 3022->3023 3023->3021 3025 402258 WritePrivateProfileStringA 3024->3025 3891 401ca5 3892 4029d9 18 API calls 3891->3892 3893 401cb5 SetWindowLongA 3892->3893 3894 40288b 3893->3894 3895 401a26 3896 4029d9 18 API calls 3895->3896 3897 401a2c 3896->3897 3898 4029d9 18 API calls 3897->3898 3899 4019d6 3898->3899 3036 402427 3046 402b00 3036->3046 3038 402431 3039 4029d9 18 API calls 3038->3039 3040 40243a 3039->3040 3041 402451 RegEnumKeyA 3040->3041 3042 40245d RegEnumValueA 3040->3042 3044 40265c 3040->3044 3043 402476 RegCloseKey 3041->3043 3042->3043 3042->3044 3043->3044 3047 4029f6 18 API calls 3046->3047 3048 402b19 3047->3048 3049 402b27 RegOpenKeyExW 3048->3049 3049->3038 3900 4022a7 3901 4022d7 3900->3901 3902 4022ac 3900->3902 3904 4029f6 18 API calls 3901->3904 3903 402b00 19 API calls 3902->3903 3905 4022b3 3903->3905 3907 4022de 3904->3907 3906 4029f6 18 API calls 3905->3906 3910 4022f4 3905->3910 3908 4022c4 RegDeleteValueA RegCloseKey 3906->3908 3911 402a36 RegOpenKeyExA 3907->3911 3908->3910 3914 402a61 3911->3914 3920 402aad 3911->3920 3912 402a87 RegEnumKeyA 3913 402a99 RegCloseKey 3912->3913 3912->3914 3916 405d2e 3 API calls 3913->3916 3914->3912 3914->3913 3915 402abe RegCloseKey 3914->3915 3917 402a36 3 API calls 3914->3917 3915->3920 3918 402aa9 3916->3918 3917->3914 3919 402ad9 RegDeleteKeyA 3918->3919 3918->3920 3919->3920 3920->3910 3190 401bad 3191 4029d9 18 API calls 3190->3191 3192 401bb4 3191->3192 3193 4029d9 18 API calls 3192->3193 3194 401bbe 3193->3194 3195 4029f6 18 API calls 3194->3195 3196 401bce 3194->3196 3195->3196 3197 4029f6 18 API calls 3196->3197 3201 401bde 3196->3201 3197->3201 3198 401be9 3202 4029d9 18 API calls 3198->3202 3199 401c2d 3200 4029f6 18 API calls 3199->3200 3204 401c32 3200->3204 3201->3198 3201->3199 3203 401bee 3202->3203 3205 4029d9 18 API calls 3203->3205 3206 4029f6 18 API calls 3204->3206 3207 401bf7 3205->3207 3208 401c3b FindWindowExA 3206->3208 3209 401c1d SendMessageA 3207->3209 3210 401bff SendMessageTimeoutA 3207->3210 3211 401c59 3208->3211 3209->3211 3210->3211 3212 4023af 3213 402b00 19 API calls 3212->3213 3214 4023b9 3213->3214 3215 4029f6 18 API calls 3214->3215 3216 4023c2 3215->3216 3217 4023cc RegQueryValueExW 3216->3217 3219 40265c 3216->3219 3218 4023ec 3217->3218 3222 4023f2 RegCloseKey 3217->3222 3218->3222 3223 40596a wsprintfA 3218->3223 3222->3219 3223->3222 3921 404531 3922 404541 3921->3922 3923 40455d 3921->3923 3932 4052b1 GetDlgItemTextA 3922->3932 3925 404590 3923->3925 3926 404563 SHGetPathFromIDListA 3923->3926 3928 40457a SendMessageA 3926->3928 3929 404573 3926->3929 3927 40454e SendMessageA 3927->3923 3928->3925 3931 40140b 2 API calls 3929->3931 3931->3928 3932->3927 3224 4015b3 3225 4029f6 18 API calls 3224->3225 3226 4015ba 3225->3226 3227 405593 4 API calls 3226->3227 3238 4015c2 3227->3238 3228 40160a 3230 40162d 3228->3230 3231 40160f 3228->3231 3229 40552a CharNextA 3232 4015d0 CreateDirectoryA 3229->3232 3236 401423 25 API calls 3230->3236 3233 401423 25 API calls 3231->3233 3234 4015e5 GetLastError 3232->3234 3232->3238 3235 401616 3233->3235 3237 4015f2 GetFileAttributesA 3234->3237 3234->3238 3242 405a0c lstrcpynA 3235->3242 3240 402169 3236->3240 3237->3238 3238->3228 3238->3229 3241 401621 SetCurrentDirectoryA 3241->3240 3242->3241 3243 401734 3244 4029f6 18 API calls 3243->3244 3245 40173b 3244->3245 3246 401761 3245->3246 3247 401759 3245->3247 3283 405a0c lstrcpynA 3246->3283 3282 405a0c lstrcpynA 3247->3282 3250 40175f 3254 405c6e 5 API calls 3250->3254 3251 40176c 3252 4054ff 3 API calls 3251->3252 3253 401772 lstrcatA 3252->3253 3253->3250 3260 40177e 3254->3260 3255 405d07 2 API calls 3255->3260 3256 4056c4 2 API calls 3256->3260 3258 401795 CompareFileTime 3258->3260 3259 401859 3261 404daa 25 API calls 3259->3261 3260->3255 3260->3256 3260->3258 3260->3259 3263 405a0c lstrcpynA 3260->3263 3269 405a2e 18 API calls 3260->3269 3277 4052cd MessageBoxIndirectA 3260->3277 3280 401830 3260->3280 3281 4056e3 GetFileAttributesA CreateFileA 3260->3281 3264 401863 3261->3264 3262 404daa 25 API calls 3268 401845 3262->3268 3263->3260 3265 402e5b 33 API calls 3264->3265 3266 401876 3265->3266 3267 40188a SetFileTime 3266->3267 3270 40189c FindCloseChangeNotification 3266->3270 3267->3270 3269->3260 3270->3268 3271 4018ad 3270->3271 3272 4018b2 3271->3272 3273 4018c5 3271->3273 3275 405a2e 18 API calls 3272->3275 3274 405a2e 18 API calls 3273->3274 3276 4018cd 3274->3276 3278 4018ba lstrcatA 3275->3278 3279 4052cd MessageBoxIndirectA 3276->3279 3277->3260 3278->3276 3279->3268 3280->3262 3280->3268 3281->3260 3282->3250 3283->3251 3933 401634 3934 4029f6 18 API calls 3933->3934 3935 40163a 3934->3935 3936 405d07 2 API calls 3935->3936 3937 401640 3936->3937 3938 401934 3939 4029d9 18 API calls 3938->3939 3940 40193b 3939->3940 3941 4029d9 18 API calls 3940->3941 3942 401945 3941->3942 3943 4029f6 18 API calls 3942->3943 3944 40194e 3943->3944 3945 401961 lstrlenA 3944->3945 3946 40199c 3944->3946 3947 40196b 3945->3947 3947->3946 3951 405a0c lstrcpynA 3947->3951 3949 401985 3949->3946 3950 401992 lstrlenA 3949->3950 3950->3946 3951->3949 3952 4041b5 3953 4041c5 3952->3953 3954 4041eb 3952->3954 3955 403dbe 19 API calls 3953->3955 3956 403e25 8 API calls 3954->3956 3957 4041d2 SetDlgItemTextA 3955->3957 3958 4041f7 3956->3958 3957->3954 3959 4019b5 3960 4029f6 18 API calls 3959->3960 3961 4019bc 3960->3961 3962 4029f6 18 API calls 3961->3962 3963 4019c5 3962->3963 3964 4019cc lstrcmpiA 3963->3964 3965 4019de lstrcmpA 3963->3965 3966 4019d2 3964->3966 3965->3966 3967 4014b7 3968 4014bd 3967->3968 3969 401389 2 API calls 3968->3969 3970 4014c5 3969->3970 3971 402b3b 3972 402b63 3971->3972 3973 402b4a SetTimer 3971->3973 3974 402bb8 3972->3974 3975 402b7d MulDiv wsprintfA SetWindowTextA SetDlgItemTextA 3972->3975 3973->3972 3975->3974 3518 40263e 3519 4029f6 18 API calls 3518->3519 3520 402645 FindFirstFileA 3519->3520 3521 402668 3520->3521 3524 402658 3520->3524 3522 40266f 3521->3522 3526 40596a wsprintfA 3521->3526 3527 405a0c lstrcpynA 3522->3527 3526->3522 3527->3524 3528 4024be 3529 4024c3 3528->3529 3530 4024d4 3528->3530 3531 4029d9 18 API calls 3529->3531 3532 4029f6 18 API calls 3530->3532 3534 4024ca 3531->3534 3533 4024db lstrlenA 3532->3533 3533->3534 3535 4024fa WriteFile 3534->3535 3536 40265c 3534->3536 3535->3536

                                              Executed Functions

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 0 4030fa-40318f #17 SetErrorMode OleInitialize call 405d2e SHGetFileInfoA call 405a0c GetCommandLineA call 405a0c GetModuleHandleA 7 403191-403196 0->7 8 40319b-4031b0 call 40552a CharNextA 0->8 7->8 11 403215-403219 8->11 12 4031b2-4031b5 11->12 13 40321b 11->13 15 4031b7-4031bb 12->15 16 4031bd-4031c5 12->16 14 40322e-403246 GetTempPathA call 4030c6 13->14 25 403268-40327f DeleteFileA call 402c22 14->25 26 403248-403266 GetWindowsDirectoryA lstrcatA call 4030c6 14->26 15->15 15->16 17 4031c7-4031c8 16->17 18 4031cd-4031d0 16->18 17->18 20 4031d2-4031d6 18->20 21 403205-403212 call 40552a 18->21 23 4031e6-4031ec 20->23 24 4031d8-4031e1 20->24 21->11 38 403214 21->38 30 4031fc-403203 23->30 31 4031ee-4031f7 23->31 24->23 28 4031e3 24->28 40 4032e6-4032f5 ExitProcess OleUninitialize 25->40 41 403281-403287 25->41 26->25 26->40 28->23 30->21 36 40321d-403229 call 405a0c 30->36 31->30 35 4031f9 31->35 35->30 36->14 38->11 44 4033e0-4033e6 40->44 45 4032fb-40330b call 4052cd ExitProcess 40->45 42 4032d6-4032dd call 403555 41->42 43 403289-403292 call 40552a 41->43 53 4032e2 42->53 58 40329d-40329f 43->58 47 403463-40346b 44->47 48 4033e8-403405 call 405d2e * 3 44->48 54 403471-403475 ExitProcess 47->54 55 40346d 47->55 73 403407-403409 48->73 74 40344f-40345a ExitWindowsEx 48->74 53->40 55->54 59 4032a1-4032ab 58->59 60 403294-40329a 58->60 63 403311-40332b lstrcatA lstrcmpiA 59->63 64 4032ad-4032ba call 4055e0 59->64 60->59 62 40329c 60->62 62->58 63->40 66 40332d-403342 CreateDirectoryA SetCurrentDirectoryA 63->66 64->40 76 4032bc-4032d2 call 405a0c * 2 64->76 70 403344-40334a call 405a0c 66->70 71 40334f-403369 call 405a0c 66->71 70->71 84 40336e-40338a call 405a2e DeleteFileA 71->84 73->74 78 40340b-40340d 73->78 74->47 81 40345c-40345e call 40140b 74->81 76->42 78->74 82 40340f-403421 GetCurrentProcess 78->82 81->47 82->74 91 403423-403445 82->91 92 4033cb-4033d2 84->92 93 40338c-40339c CopyFileA 84->93 91->74 92->84 94 4033d4-4033db call 40575a 92->94 93->92 95 40339e-4033be call 40575a call 405a2e call 40526c 93->95 94->40 95->92 105 4033c0-4033c7 CloseHandle 95->105 105->92
                                              APIs
                                              • #17.COMCTL32 ref: 00403119
                                              • SetErrorMode.KERNELBASE(00008001), ref: 00403124
                                              • OleInitialize.OLE32(00000000), ref: 0040312B
                                                • Part of subcall function 00405D2E: GetModuleHandleA.KERNEL32(?,?,00000000,0040313D,00000008), ref: 00405D40
                                                • Part of subcall function 00405D2E: LoadLibraryA.KERNELBASE(?,?,00000000,0040313D,00000008), ref: 00405D4B
                                                • Part of subcall function 00405D2E: GetProcAddress.KERNEL32(00000000,?), ref: 00405D5C
                                              • SHGetFileInfoA.SHELL32(00428F98,00000000,?,00000160,00000000,00000008), ref: 00403153
                                                • Part of subcall function 00405A0C: lstrcpynA.KERNEL32(?,?,00000400,00403168,WinPcap 4.1.3 Setup,NSIS Error), ref: 00405A19
                                              • GetCommandLineA.KERNEL32(WinPcap 4.1.3 Setup,NSIS Error), ref: 00403168
                                              • GetModuleHandleA.KERNEL32(00000000,"C:\Users\user\Desktop\WinPcap_4_1_3.exe",00000000), ref: 0040317B
                                              • CharNextA.USER32(00000000,"C:\Users\user\Desktop\WinPcap_4_1_3.exe",00000020), ref: 004031A6
                                              • GetTempPathA.KERNEL32(00000400,C:\Users\user\AppData\Local\Temp\,00000000,00000020), ref: 00403239
                                              • GetWindowsDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,000003FB), ref: 0040324E
                                              • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,\Temp), ref: 0040325A
                                              • DeleteFileA.KERNELBASE(1033), ref: 0040326D
                                              • ExitProcess.KERNEL32(00000000), ref: 004032E6
                                              • OleUninitialize.OLE32(00000000), ref: 004032EB
                                              • ExitProcess.KERNEL32 ref: 0040330B
                                              • lstrcatA.KERNEL32(C:\Users\user\AppData\Local\Temp\,~nsu.tmp,"C:\Users\user\Desktop\WinPcap_4_1_3.exe",00000000,00000000), ref: 00403317
                                              • lstrcmpiA.KERNEL32(C:\Users\user\AppData\Local\Temp\,C:\Users\user\Desktop), ref: 00403323
                                              • CreateDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\,00000000), ref: 0040332F
                                              • SetCurrentDirectoryA.KERNEL32(C:\Users\user\AppData\Local\Temp\), ref: 00403336
                                              • DeleteFileA.KERNEL32(00428B98,00428B98,?,0042F000,?), ref: 00403380
                                              • CopyFileA.KERNEL32(C:\Users\user\Desktop\WinPcap_4_1_3.exe,00428B98,00000001), ref: 00403394
                                              • CloseHandle.KERNEL32(00000000,00428B98,00428B98,?,00428B98,00000000), ref: 004033C1
                                              • GetCurrentProcess.KERNEL32(00000028,?,00000005,00000004,00000003), ref: 00403416
                                              • ExitWindowsEx.USER32(00000002,00000000), ref: 00403452
                                              • ExitProcess.KERNEL32 ref: 00403475
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: ExitFileProcess$DirectoryHandle$CurrentDeleteModuleWindowslstrcat$AddressCharCloseCommandCopyCreateErrorInfoInitializeLibraryLineLoadModeNextPathProcTempUninitializelstrcmpilstrcpyn
                                              • String ID: /D=$ _?=$"$"C:\Users\user\Desktop\WinPcap_4_1_3.exe"$1033$C:\Program Files (x86)\WinPcap$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\WinPcap_4_1_3.exe$C:\Windows\system32$Error launching installer$NCRC$NSIS Error$SeShutdownPrivilege$WinPcap 4.1.3 Setup$\Temp$~nsu.tmp
                                              • API String ID: 553446912-1339417090
                                              • Opcode ID: 45d42ed5c4d876ad97725e9f6e03eadd888ac50b64b28f7db70aa7e7231c680b
                                              • Instruction ID: 1e9e478c3a9e7f3573a82b9cae4fcf3dc9ecc54075f91e84b1854e8c20532e3f
                                              • Opcode Fuzzy Hash: 45d42ed5c4d876ad97725e9f6e03eadd888ac50b64b28f7db70aa7e7231c680b
                                              • Instruction Fuzzy Hash: 4191D130A08344AFE7216F61AD4AB6B7E9CEB0530AF04057FF541B61D2C77C99058B6E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 106 404ee8-404f03 107 405094-40509b 106->107 108 404f09-404fd2 GetDlgItem * 3 call 403df3 call 40464c GetClientRect GetSystemMetrics SendMessageA * 2 106->108 109 4050c5-4050d2 107->109 110 40509d-4050bf GetDlgItem CreateThread FindCloseChangeNotification 107->110 126 404ff0-404ff3 108->126 127 404fd4-404fee SendMessageA * 2 108->127 112 4050f0-4050f7 109->112 113 4050d4-4050da 109->113 110->109 118 4050f9-4050ff 112->118 119 40514e-405152 112->119 116 405112-40511b call 403e25 113->116 117 4050dc-4050eb ShowWindow * 2 call 403df3 113->117 130 405120-405124 116->130 117->112 123 405101-40510d call 403d97 118->123 124 405127-405137 ShowWindow 118->124 119->116 121 405154-405157 119->121 121->116 128 405159-40516c SendMessageA 121->128 123->116 131 405147-405149 call 403d97 124->131 132 405139-405142 call 404daa 124->132 134 405003-40501a call 403dbe 126->134 135 404ff5-405001 SendMessageA 126->135 127->126 136 405172-405193 CreatePopupMenu call 405a2e AppendMenuA 128->136 137 405265-405267 128->137 131->119 132->131 145 405050-405071 GetDlgItem SendMessageA 134->145 146 40501c-405030 ShowWindow 134->146 135->134 143 405195-4051a6 GetWindowRect 136->143 144 4051a8-4051ae 136->144 137->130 147 4051b1-4051c9 TrackPopupMenu 143->147 144->147 145->137 150 405077-40508f SendMessageA * 2 145->150 148 405032-40503d ShowWindow 146->148 149 40503f 146->149 147->137 151 4051cf-4051e6 147->151 152 405045-40504b call 403df3 148->152 149->152 150->137 153 4051eb-405206 SendMessageA 151->153 152->145 153->153 155 405208-405228 OpenClipboard EmptyClipboard GlobalAlloc GlobalLock 153->155 156 40522a-405249 SendMessageA 155->156 156->156 157 40524b-40525f GlobalUnlock SetClipboardData CloseClipboard 156->157 157->137
                                              APIs
                                              • GetDlgItem.USER32(?,00000403), ref: 00404F47
                                              • GetDlgItem.USER32(?,000003EE), ref: 00404F56
                                              • GetClientRect.USER32(?,?), ref: 00404F93
                                              • GetSystemMetrics.USER32(00000015), ref: 00404F9B
                                              • SendMessageA.USER32(?,0000101B,00000000,00000002), ref: 00404FBC
                                              • SendMessageA.USER32(?,00001036,00004000,00004000), ref: 00404FCD
                                              • SendMessageA.USER32(?,00001001,00000000,00000110), ref: 00404FE0
                                              • SendMessageA.USER32(?,00001026,00000000,00000110), ref: 00404FEE
                                              • SendMessageA.USER32(?,00001024,00000000,?), ref: 00405001
                                              • ShowWindow.USER32(00000000,?,0000001B,000000FF), ref: 00405023
                                              • ShowWindow.USER32(?,00000008), ref: 00405037
                                              • GetDlgItem.USER32(?,000003EC), ref: 00405058
                                              • SendMessageA.USER32(00000000,00000401,00000000,75300000), ref: 00405068
                                              • SendMessageA.USER32(00000000,00000409,00000000,?), ref: 00405081
                                              • SendMessageA.USER32(00000000,00002001,00000000,00000110), ref: 0040508D
                                              • GetDlgItem.USER32(?,000003F8), ref: 00404F65
                                                • Part of subcall function 00403DF3: SendMessageA.USER32(00000028,?,00000001,00403C24), ref: 00403E01
                                              • GetDlgItem.USER32(?,000003EC), ref: 004050AA
                                              • CreateThread.KERNELBASE(00000000,00000000,Function_00004E7C,00000000), ref: 004050B8
                                              • FindCloseChangeNotification.KERNELBASE(00000000), ref: 004050BF
                                              • ShowWindow.USER32(00000000), ref: 004050E3
                                              • ShowWindow.USER32(000303EC,00000008), ref: 004050E8
                                              • ShowWindow.USER32(00000008), ref: 0040512F
                                              • SendMessageA.USER32(000303EC,00001004,00000000,00000000), ref: 00405161
                                              • CreatePopupMenu.USER32 ref: 00405172
                                              • AppendMenuA.USER32(00000000,00000000,00000001,00000000), ref: 00405187
                                              • GetWindowRect.USER32(000303EC,?), ref: 0040519A
                                              • TrackPopupMenu.USER32(00000000,00000180,?,?,00000000,?,00000000), ref: 004051BE
                                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 004051F9
                                              • OpenClipboard.USER32(00000000), ref: 00405209
                                              • EmptyClipboard.USER32 ref: 0040520F
                                              • GlobalAlloc.KERNEL32(00000042,?,?,?,00000000,?,00000000), ref: 00405218
                                              • GlobalLock.KERNEL32(00000000,?,?,00000000,?,00000000), ref: 00405222
                                              • SendMessageA.USER32(?,0000102D,00000000,?), ref: 00405236
                                              • GlobalUnlock.KERNEL32(00000000,?,?,00000000,?,00000000), ref: 0040524E
                                              • SetClipboardData.USER32(00000001,00000000), ref: 00405259
                                              • CloseClipboard.USER32 ref: 0040525F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: MessageSend$Window$ItemShow$Clipboard$GlobalMenu$CloseCreatePopupRect$AllocAppendChangeClientDataEmptyFindLockMetricsNotificationOpenSystemThreadTrackUnlock
                                              • String ID: {
                                              • API String ID: 4154960007-366298937
                                              • Opcode ID: fe7e969d2c22f19af4888f7a47512703474a450c12f54b0918034fcaa462cfcc
                                              • Instruction ID: ecf959edf644124ae9a18d4fa2a520563b4821934e06b5e1f2851b0e4fc8d151
                                              • Opcode Fuzzy Hash: fe7e969d2c22f19af4888f7a47512703474a450c12f54b0918034fcaa462cfcc
                                              • Instruction Fuzzy Hash: FBA14870900208BFEB219FA1DD89AAE7F79FB08355F40407AFA05AA2A0C7755E41DF59
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 439 405a2e-405a39 440 405a3b-405a4a 439->440 441 405a4c-405a69 439->441 440->441 442 405c4b-405c4f 441->442 443 405a6f-405a76 441->443 444 405c55-405c5f 442->444 445 405a7b-405a85 442->445 443->442 447 405c61-405c65 call 405a0c 444->447 448 405c6a-405c6b 444->448 445->444 446 405a8b-405a92 445->446 450 405a98-405acd 446->450 451 405c3e 446->451 447->448 452 405ad3-405ade GetVersion 450->452 453 405be8-405beb 450->453 454 405c40-405c46 451->454 455 405c48-405c4a 451->455 456 405ae0-405ae4 452->456 457 405af8 452->457 458 405c1b-405c1e 453->458 459 405bed-405bf0 453->459 454->442 455->442 456->457 463 405ae6-405aea 456->463 460 405aff-405b06 457->460 461 405c20-405c27 call 405a2e 458->461 462 405c2c-405c3c lstrlenA 458->462 464 405c00-405c0c call 405a0c 459->464 465 405bf2-405bfe call 40596a 459->465 467 405b08-405b0a 460->467 468 405b0b-405b0d 460->468 461->462 462->442 463->457 471 405aec-405af0 463->471 475 405c11-405c17 464->475 465->475 467->468 473 405b46-405b49 468->473 474 405b0f-405b2a call 4058f3 468->474 471->457 476 405af2-405af6 471->476 479 405b59-405b5c 473->479 480 405b4b-405b57 GetSystemDirectoryA 473->480 481 405b2f-405b32 474->481 475->462 478 405c19 475->478 476->460 482 405be0-405be6 call 405c6e 478->482 484 405bc6-405bc8 479->484 485 405b5e-405b6c GetWindowsDirectoryA 479->485 483 405bca-405bcd 480->483 486 405b38-405b41 call 405a2e 481->486 487 405bcf-405bd3 481->487 482->462 483->482 483->487 484->483 488 405b6e-405b78 484->488 485->484 486->483 487->482 491 405bd5-405bdb lstrcatA 487->491 493 405b92-405ba8 SHGetSpecialFolderLocation 488->493 494 405b7a-405b7d 488->494 491->482 496 405bc3 493->496 497 405baa-405bc1 SHGetPathFromIDListA CoTaskMemFree 493->497 494->493 495 405b7f-405b86 494->495 499 405b8e-405b90 495->499 496->484 497->483 497->496 499->483 499->493
                                              APIs
                                              • GetVersion.KERNEL32(00000000,Remove folder: C:\Users\user\AppData\Local\Temp\nsn2258.tmp\,00000000,00404DE2,Remove folder: C:\Users\user\AppData\Local\Temp\nsn2258.tmp\,00000000), ref: 00405AD6
                                              • GetSystemDirectoryA.KERNEL32(Remove folder: ,00000400), ref: 00405B51
                                              • GetWindowsDirectoryA.KERNEL32(Remove folder: ,00000400), ref: 00405B64
                                              • SHGetSpecialFolderLocation.SHELL32(?,0041A693), ref: 00405BA0
                                              • SHGetPathFromIDListA.SHELL32(0041A693,Remove folder: ), ref: 00405BAE
                                              • CoTaskMemFree.OLE32(0041A693), ref: 00405BB9
                                              • lstrcatA.KERNEL32(Remove folder: ,\Microsoft\Internet Explorer\Quick Launch), ref: 00405BDB
                                              • lstrlenA.KERNEL32(Remove folder: ,00000000,Remove folder: C:\Users\user\AppData\Local\Temp\nsn2258.tmp\,00000000,00404DE2,Remove folder: C:\Users\user\AppData\Local\Temp\nsn2258.tmp\,00000000), ref: 00405C2D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: Directory$FolderFreeFromListLocationPathSpecialSystemTaskVersionWindowslstrcatlstrlen
                                              • String ID: Remove folder: $Remove folder: C:\Users\user\AppData\Local\Temp\nsn2258.tmp\$Software\Microsoft\Windows\CurrentVersion$\Microsoft\Internet Explorer\Quick Launch
                                              • API String ID: 900638850-2636999381
                                              • Opcode ID: 846b22e61c070398cd05a92e3a510f78d4c6db27c62cd07b9d697c387b804f0c
                                              • Instruction ID: e3937826694aa96a66c9679703be47664347117baa65301e61951ea2719d1281
                                              • Opcode Fuzzy Hash: 846b22e61c070398cd05a92e3a510f78d4c6db27c62cd07b9d697c387b804f0c
                                              • Instruction Fuzzy Hash: DB51F331A04B05AAEF219B689C84BBF3BB4DB15314F54423BE912B62D0D27C6D42DF4E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 500 405331-40534c call 4055e0 503 405365-40536f 500->503 504 40534e-405360 DeleteFileA 500->504 506 405371-405373 503->506 507 405383-405391 call 405a0c 503->507 505 4054f9-4054fc 504->505 508 4054a4-4054aa 506->508 509 405379-40537d 506->509 515 4053a0-4053a1 call 405546 507->515 516 405393-40539e lstrcatA 507->516 508->505 511 4054ac-4054af 508->511 509->507 509->508 513 4054b1-4054b7 511->513 514 4054b9-4054c1 call 405d07 511->514 513->505 514->505 524 4054c3-4054d8 call 4054ff call 4056c4 RemoveDirectoryA 514->524 518 4053a6-4053a9 515->518 516->518 520 4053b4-4053ba lstrcatA 518->520 521 4053ab-4053b2 518->521 523 4053bf-4053dd lstrlenA FindFirstFileA 520->523 521->520 521->523 525 4053e3-4053fa call 40552a 523->525 526 40549a-40549e 523->526 539 4054f1-4054f4 call 404daa 524->539 540 4054da-4054de 524->540 533 405405-405408 525->533 534 4053fc-405400 525->534 526->508 528 4054a0 526->528 528->508 537 40540a-40540f 533->537 538 40541b-405429 call 405a0c 533->538 534->533 536 405402 534->536 536->533 542 405411-405413 537->542 543 405479-40548b FindNextFileA 537->543 551 405440-40544f call 4056c4 DeleteFileA 538->551 552 40542b-405433 538->552 539->505 540->513 545 4054e0-4054ef call 404daa call 40575a 540->545 542->538 548 405415-405419 542->548 543->525 546 405491-405494 FindClose 543->546 545->505 546->526 548->538 548->543 560 405471-405474 call 404daa 551->560 561 405451-405455 551->561 552->543 553 405435-40543e call 405331 552->553 553->543 560->543 562 405457-405467 call 404daa call 40575a 561->562 563 405469-40546f 561->563 562->543 563->543
                                              APIs
                                              • DeleteFileA.KERNELBASE(?,?,"C:\Users\user\Desktop\WinPcap_4_1_3.exe",00000000), ref: 0040534F
                                              • lstrcatA.KERNEL32(0042AFE8,\*.*,0042AFE8,?,00000000,?,"C:\Users\user\Desktop\WinPcap_4_1_3.exe",00000000), ref: 00405399
                                              • lstrcatA.KERNEL32(?,00409010,?,0042AFE8,?,00000000,?,"C:\Users\user\Desktop\WinPcap_4_1_3.exe",00000000), ref: 004053BA
                                              • lstrlenA.KERNEL32(?,?,00409010,?,0042AFE8,?,00000000,?,"C:\Users\user\Desktop\WinPcap_4_1_3.exe",00000000), ref: 004053C0
                                              • FindFirstFileA.KERNELBASE(0042AFE8,?,?,?,00409010,?,0042AFE8,?,00000000,?,"C:\Users\user\Desktop\WinPcap_4_1_3.exe",00000000), ref: 004053D1
                                              • FindNextFileA.KERNELBASE(?,00000010,000000F2,?), ref: 00405483
                                              • FindClose.KERNEL32(?), ref: 00405494
                                              Strings
                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00405331
                                              • "C:\Users\user\Desktop\WinPcap_4_1_3.exe", xrefs: 0040533B
                                              • \*.*, xrefs: 00405393
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: FileFind$lstrcat$CloseDeleteFirstNextlstrlen
                                              • String ID: "C:\Users\user\Desktop\WinPcap_4_1_3.exe"$C:\Users\user\AppData\Local\Temp\$\*.*
                                              • API String ID: 2035342205-3467379206
                                              • Opcode ID: fb5f0b97fd6045d75f3de5e206462d23269cef9c6319140f549f9214963cb2b4
                                              • Instruction ID: 46a167c19d0f92bb62e791f7a1b0a3e0954e7dde2177130d433e16ae92940f3d
                                              • Opcode Fuzzy Hash: fb5f0b97fd6045d75f3de5e206462d23269cef9c6319140f549f9214963cb2b4
                                              • Instruction Fuzzy Hash: 84510130904A5476DB21AB218C85BFF3A68DF4231AF14813BF941752D2C77C49C2DE5E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • CoCreateInstance.OLE32(00407490,?,00000001,00407480,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 00402073
                                              • MultiByteToWideChar.KERNEL32(?,?,?,000000FF,C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WinPcap\Uninstall WinPcap 4.1.3.lnk,00000400,?,00000001,00407480,?,00000000,00000045,000000CD,00000002,000000DF,000000F0), ref: 0040212D
                                              Strings
                                              • C:\Windows\system32, xrefs: 004020AB
                                              • C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WinPcap\Uninstall WinPcap 4.1.3.lnk, xrefs: 00402116, 00402120, 0040213C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: ByteCharCreateInstanceMultiWide
                                              • String ID: C:\ProgramData\Microsoft\Windows\Start Menu\Programs\WinPcap\Uninstall WinPcap 4.1.3.lnk$C:\Windows\system32
                                              • API String ID: 123533781-3193942914
                                              • Opcode ID: 68441b76e02daf5c94a04c817994d866479800aff39ed8a12ba88c5297dbe799
                                              • Instruction ID: ee874f8c2dec57c4877f78095a0f9dac743c80c93ea62094aeb2a8065092a27c
                                              • Opcode Fuzzy Hash: 68441b76e02daf5c94a04c817994d866479800aff39ed8a12ba88c5297dbe799
                                              • Instruction Fuzzy Hash: 07417D75A00205BFCB40DFA4CD88E9E7BBABF48354B204269FA15FB2D1CA799D41CB54
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • FindFirstFileA.KERNELBASE(?,0042C030,C:\,00405623,C:\,C:\,00000000,C:\,C:\,?,?,00000000,00405345,?,"C:\Users\user\Desktop\WinPcap_4_1_3.exe",00000000), ref: 00405D12
                                              • FindClose.KERNEL32(00000000), ref: 00405D1E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: Find$CloseFileFirst
                                              • String ID: C:\
                                              • API String ID: 2295610775-3404278061
                                              • Opcode ID: 0ba34ad688579e7913e3aeb04dcfdbb9c24dd4cd636fec125d72bd6057fbbed4
                                              • Instruction ID: 6bc8dc8487d68019062fb65c0caa7a5850599756ae9c65598668cc32d68c0862
                                              • Opcode Fuzzy Hash: 0ba34ad688579e7913e3aeb04dcfdbb9c24dd4cd636fec125d72bd6057fbbed4
                                              • Instruction Fuzzy Hash: C5D0123195D5309BD31017797C0C85B7A58DF293317108A33F025F22E0D3749C519AED
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetModuleHandleA.KERNEL32(?,?,00000000,0040313D,00000008), ref: 00405D40
                                              • LoadLibraryA.KERNELBASE(?,?,00000000,0040313D,00000008), ref: 00405D4B
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 00405D5C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: AddressHandleLibraryLoadModuleProc
                                              • String ID:
                                              • API String ID: 310444273-0
                                              • Opcode ID: 7acfb344228b968400b962badda7c36266698eee5c55508006b44164a923ef80
                                              • Instruction ID: 58781945b1ebe0d6425232f008294b0fb1b641fb0524d4e5e5734917004db801
                                              • Opcode Fuzzy Hash: 7acfb344228b968400b962badda7c36266698eee5c55508006b44164a923ef80
                                              • Instruction Fuzzy Hash: 8CE08C36A04510BBD3215B30AE08A6B73ACEEC9B41304897EF615F6251D734AC11DBBA
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • FindFirstFileA.KERNELBASE(00000000,?,00000002), ref: 0040264D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: FileFindFirst
                                              • String ID:
                                              • API String ID: 1974802433-0
                                              • Opcode ID: 5ec8cfe3ecd6d47a33181b223f4745e968f2e88ce0dfbd25e8ae3887cda06d2f
                                              • Instruction ID: c4edc1118dc91e0c9440d01bfde8b8f2caf312925950fbc99ec99334c7621aa2
                                              • Opcode Fuzzy Hash: 5ec8cfe3ecd6d47a33181b223f4745e968f2e88ce0dfbd25e8ae3887cda06d2f
                                              • Instruction Fuzzy Hash: E3F0E572648101DFD700EBB49D49AEEB768DF51328FA007BBF502F20C1C2B84945DB2A
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 158 4038eb-4038fd 159 403903-403909 158->159 160 403a3e-403a4d 158->160 159->160 161 40390f-403918 159->161 162 403a9c-403ab1 160->162 163 403a4f-403a97 GetDlgItem * 2 call 403dbe SetClassLongA call 40140b 160->163 164 40391a-403927 SetWindowPos 161->164 165 40392d-403930 161->165 167 403af1-403af6 call 403e0a 162->167 168 403ab3-403ab6 162->168 163->162 164->165 170 403932-403944 ShowWindow 165->170 171 40394a-403950 165->171 176 403afb-403b16 167->176 173 403ab8-403ac3 call 401389 168->173 174 403ae9-403aeb 168->174 170->171 177 403952-403967 DestroyWindow 171->177 178 40396c-40396f 171->178 173->174 195 403ac5-403ae4 SendMessageA 173->195 174->167 175 403d8b 174->175 183 403d8d-403d94 175->183 181 403b18-403b1a call 40140b 176->181 182 403b1f-403b25 176->182 184 403d68-403d6e 177->184 186 403971-40397d SetWindowLongA 178->186 187 403982-403988 178->187 181->182 191 403d49-403d62 DestroyWindow KiUserCallbackDispatcher 182->191 192 403b2b-403b36 182->192 184->175 189 403d70-403d76 184->189 186->183 193 403a2b-403a39 call 403e25 187->193 194 40398e-40399f GetDlgItem 187->194 189->175 197 403d78-403d81 ShowWindow 189->197 191->184 192->191 198 403b3c-403b89 call 405a2e call 403dbe * 3 GetDlgItem 192->198 193->183 199 4039a1-4039b8 SendMessageA IsWindowEnabled 194->199 200 4039be-4039c1 194->200 195->183 197->175 228 403b93-403bcf ShowWindow KiUserCallbackDispatcher call 403de0 KiUserCallbackDispatcher 198->228 229 403b8b-403b90 198->229 199->175 199->200 203 4039c3-4039c4 200->203 204 4039c6-4039c9 200->204 208 4039f4-4039f9 call 403d97 203->208 205 4039d7-4039dc 204->205 206 4039cb-4039d1 204->206 209 403a12-403a25 SendMessageA 205->209 211 4039de-4039e4 205->211 206->209 210 4039d3-4039d5 206->210 208->193 209->193 210->208 214 4039e6-4039ec call 40140b 211->214 215 4039fb-403a04 call 40140b 211->215 224 4039f2 214->224 215->193 225 403a06-403a10 215->225 224->208 225->224 232 403bd1-403bd2 228->232 233 403bd4 228->233 229->228 234 403bd6-403c04 GetSystemMenu EnableMenuItem SendMessageA 232->234 233->234 235 403c06-403c17 SendMessageA 234->235 236 403c19 234->236 237 403c1f-403c58 call 403df3 call 405a0c lstrlenA call 405a2e SetWindowTextA call 401389 235->237 236->237 237->176 246 403c5e-403c60 237->246 246->176 247 403c66-403c6a 246->247 248 403c89-403c9d DestroyWindow 247->248 249 403c6c-403c72 247->249 248->184 251 403ca3-403cd0 CreateDialogParamA 248->251 249->175 250 403c78-403c7e 249->250 250->176 252 403c84 250->252 251->184 253 403cd6-403d2d call 403dbe GetDlgItem GetWindowRect ScreenToClient SetWindowPos call 401389 251->253 252->175 253->175 258 403d2f-403d42 ShowWindow call 403e0a 253->258 260 403d47 258->260 260->184
                                              APIs
                                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000013), ref: 00403927
                                              • ShowWindow.USER32(?), ref: 00403944
                                              • DestroyWindow.USER32 ref: 00403958
                                              • SetWindowLongA.USER32(?,00000000,00000000), ref: 00403974
                                              • GetDlgItem.USER32(?,?), ref: 00403995
                                              • SendMessageA.USER32(00000000,000000F3,00000000,00000000), ref: 004039A9
                                              • IsWindowEnabled.USER32(00000000), ref: 004039B0
                                              • GetDlgItem.USER32(?,00000001), ref: 00403A5E
                                              • GetDlgItem.USER32(?,00000002), ref: 00403A68
                                              • SetClassLongA.USER32(?,000000F2,?), ref: 00403A82
                                              • SendMessageA.USER32(0000040F,00000000,00000001,?), ref: 00403AD3
                                              • GetDlgItem.USER32(?,00000003), ref: 00403B79
                                              • ShowWindow.USER32(00000000,?), ref: 00403B9A
                                              • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403BAC
                                              • KiUserCallbackDispatcher.NTDLL(?,?), ref: 00403BC7
                                              • GetSystemMenu.USER32(?,00000000,0000F060,00000001), ref: 00403BDD
                                              • EnableMenuItem.USER32(00000000), ref: 00403BE4
                                              • SendMessageA.USER32(?,000000F4,00000000,00000001), ref: 00403BFC
                                              • SendMessageA.USER32(?,00000401,00000002,00000000), ref: 00403C0F
                                              • lstrlenA.KERNEL32(00429FE0,?,00429FE0,WinPcap 4.1.3 Setup), ref: 00403C38
                                              • SetWindowTextA.USER32(?,00429FE0), ref: 00403C47
                                              • ShowWindow.USER32(?,0000000A), ref: 00403D7B
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: Window$Item$MessageSend$Show$CallbackDispatcherLongMenuUser$ClassDestroyEnableEnabledSystemTextlstrlen
                                              • String ID: WinPcap 4.1.3 Setup
                                              • API String ID: 1252290697-1798332198
                                              • Opcode ID: 048f0401d2d78e99a36359b8774e307136c9c010a2c2033ba7648e13957d1e12
                                              • Instruction ID: 552f9e5d3371f53337095c5be2d86efa37a563823f2766eb5c4291c6ef6876bd
                                              • Opcode Fuzzy Hash: 048f0401d2d78e99a36359b8774e307136c9c010a2c2033ba7648e13957d1e12
                                              • Instruction Fuzzy Hash: B8C1B171604204AFD721AF62ED85E2B7F6CEB44706F40053EF941B51E1C779A942DB2E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 261 403555-40356d call 405d2e 264 403581-4035a8 call 4058f3 261->264 265 40356f-40357f call 40596a 261->265 270 4035c0-4035c6 lstrcatA 264->270 271 4035aa-4035bb call 4058f3 264->271 274 4035cb-4035f4 call 40381e call 4055e0 265->274 270->274 271->270 279 4035fa-4035ff 274->279 280 40367b-403683 call 4055e0 274->280 279->280 281 403601-403619 call 4058f3 279->281 286 403691-4036b6 LoadImageA 280->286 287 403685-40368c call 405a2e 280->287 285 40361e-403625 281->285 285->280 288 403627-403629 285->288 290 403745-40374d call 40140b 286->290 291 4036bc-4036f2 RegisterClassA 286->291 287->286 292 40363a-403646 lstrlenA 288->292 293 40362b-403638 call 40552a 288->293 305 403757-403762 call 40381e 290->305 306 40374f-403752 290->306 294 403814 291->294 295 4036f8-403740 SystemParametersInfoA CreateWindowExA 291->295 299 403648-403656 lstrcmpiA 292->299 300 40366e-403676 call 4054ff call 405a0c 292->300 293->292 297 403816-40381d 294->297 295->290 299->300 304 403658-403662 GetFileAttributesA 299->304 300->280 309 403664-403666 304->309 310 403668-403669 call 405546 304->310 314 403768-403785 ShowWindow LoadLibraryA 305->314 315 4037eb-4037ec call 404e7c 305->315 306->297 309->300 309->310 310->300 316 403787-40378c LoadLibraryA 314->316 317 40378e-4037a0 GetClassInfoA 314->317 321 4037f1-4037f3 315->321 316->317 319 4037a2-4037b2 GetClassInfoA RegisterClassA 317->319 320 4037b8-4037db DialogBoxParamA call 40140b 317->320 319->320 326 4037e0-4037e9 call 4034a5 320->326 323 4037f5-4037fb 321->323 324 40380d-40380f call 40140b 321->324 323->306 327 403801-403808 call 40140b 323->327 324->294 326->297 327->306
                                              APIs
                                                • Part of subcall function 00405D2E: GetModuleHandleA.KERNEL32(?,?,00000000,0040313D,00000008), ref: 00405D40
                                                • Part of subcall function 00405D2E: LoadLibraryA.KERNELBASE(?,?,00000000,0040313D,00000008), ref: 00405D4B
                                                • Part of subcall function 00405D2E: GetProcAddress.KERNEL32(00000000,?), ref: 00405D5C
                                              • lstrcatA.KERNEL32(1033,00429FE0,80000001,Control Panel\Desktop\ResourceLocale,00000000,00429FE0,00000000,00000006,"C:\Users\user\Desktop\WinPcap_4_1_3.exe",00000000,C:\Users\user\AppData\Local\Temp\,00000000), ref: 004035C6
                                              • lstrlenA.KERNEL32(Remove folder: ,?,?,?,Remove folder: ,00000000,C:\Program Files (x86)\WinPcap,1033,00429FE0,80000001,Control Panel\Desktop\ResourceLocale,00000000,00429FE0,00000000,00000006,"C:\Users\user\Desktop\WinPcap_4_1_3.exe"), ref: 0040363B
                                              • lstrcmpiA.KERNEL32(?,.exe), ref: 0040364E
                                              • GetFileAttributesA.KERNEL32(Remove folder: ), ref: 00403659
                                              • LoadImageA.USER32(00000067,00000001,00000000,00000000,00008040,C:\Program Files (x86)\WinPcap), ref: 004036A2
                                                • Part of subcall function 0040596A: wsprintfA.USER32 ref: 00405977
                                              • RegisterClassA.USER32 ref: 004036E9
                                              • SystemParametersInfoA.USER32(00000030,00000000,_Nb,00000000), ref: 00403701
                                              • CreateWindowExA.USER32(00000080,?,00000000,80000000,?,?,?,?,00000000,00000000,00000000), ref: 0040373A
                                              • ShowWindow.USER32(00000005,00000000), ref: 00403770
                                              • LoadLibraryA.KERNELBASE(RichEd20), ref: 00403781
                                              • LoadLibraryA.KERNEL32(RichEd32), ref: 0040378C
                                              • GetClassInfoA.USER32(00000000,RichEdit20A,0042E300), ref: 0040379C
                                              • GetClassInfoA.USER32(00000000,RichEdit,0042E300), ref: 004037A9
                                              • RegisterClassA.USER32(0042E300), ref: 004037B2
                                              • DialogBoxParamA.USER32(?,00000000,004038EB,00000000), ref: 004037D1
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: ClassLoad$InfoLibrary$RegisterWindow$AddressAttributesCreateDialogFileHandleImageModuleParamParametersProcShowSystemlstrcatlstrcmpilstrlenwsprintf
                                              • String ID: "C:\Users\user\Desktop\WinPcap_4_1_3.exe"$.DEFAULT\Control Panel\International$.exe$1033$C:\Program Files (x86)\WinPcap$C:\Users\user\AppData\Local\Temp\$Control Panel\Desktop\ResourceLocale$Remove folder: $RichEd20$RichEd32$RichEdit$RichEdit20A$_Nb
                                              • API String ID: 914957316-2332580808
                                              • Opcode ID: 79fd6d7680e4434318c5d431373bafe135b671b9c271f7b1c614c7309aac5398
                                              • Instruction ID: af9374935d7a54fd1dce6881c110e57d7cc589bc1fe1380e1b33b637fa7f222c
                                              • Opcode Fuzzy Hash: 79fd6d7680e4434318c5d431373bafe135b671b9c271f7b1c614c7309aac5398
                                              • Instruction Fuzzy Hash: E161C571604204BAD220AF669D85F273EACE744759F40447FF941B22E1D779AD028B3E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 332 403f06-403f16 333 404029-40403c 332->333 334 403f1c-403f24 332->334 335 404098-40409c 333->335 336 40403e-404047 333->336 337 403f26-403f35 334->337 338 403f37-403fcf call 403dbe * 2 CheckDlgButton call 403de0 GetDlgItem call 403df3 SendMessageA 334->338 342 4040a2-4040b6 GetDlgItem 335->342 343 40416c-404173 335->343 339 40417b 336->339 340 40404d-404055 336->340 337->338 370 403fd1-403fd4 GetSysColor 338->370 371 403fda-404024 SendMessageA * 2 lstrlenA SendMessageA * 2 338->371 346 40417e-404185 call 403e25 339->346 340->339 344 40405b-404067 340->344 348 4040b8-4040bf 342->348 349 40412a-404131 342->349 343->339 345 404175 343->345 344->339 351 40406d-404093 GetDlgItem SendMessageA call 403de0 call 404191 344->351 345->339 358 40418a-40418e 346->358 348->349 354 4040c1-4040dc 348->354 349->346 350 404133-40413a 349->350 350->346 356 40413c-404140 350->356 351->335 354->349 355 4040de-404127 SendMessageA LoadCursorA SetCursor ShellExecuteA LoadCursorA SetCursor 354->355 355->349 360 404142-404151 SendMessageA 356->360 361 404153-404157 356->361 360->361 364 404167-40416a 361->364 365 404159-404165 SendMessageA 361->365 364->358 365->364 370->371 371->358
                                              APIs
                                              • CheckDlgButton.USER32(00000000,-0000040A,00000001), ref: 00403F91
                                              • GetDlgItem.USER32(00000000,000003E8), ref: 00403FA5
                                              • SendMessageA.USER32(00000000,0000045B,00000001,00000000), ref: 00403FC3
                                              • GetSysColor.USER32(?), ref: 00403FD4
                                              • SendMessageA.USER32(00000000,00000443,00000000,?), ref: 00403FE3
                                              • SendMessageA.USER32(00000000,00000445,00000000,04010000), ref: 00403FF2
                                              • lstrlenA.KERNEL32(?), ref: 00403FFC
                                              • SendMessageA.USER32(00000000,00000435,00000000,00000000), ref: 0040400A
                                              • SendMessageA.USER32(00000000,00000449,?,00000110), ref: 00404019
                                              • GetDlgItem.USER32(?,0000040A), ref: 0040407C
                                              • SendMessageA.USER32(00000000), ref: 0040407F
                                              • GetDlgItem.USER32(?,000003E8), ref: 004040AA
                                              • SendMessageA.USER32(00000000,0000044B,00000000,00000201), ref: 004040EA
                                              • LoadCursorA.USER32(00000000,00007F02), ref: 004040F9
                                              • SetCursor.USER32(00000000), ref: 00404102
                                              • ShellExecuteA.SHELL32(0000070B,open,0042DB00,00000000,00000000,00000001), ref: 00404115
                                              • LoadCursorA.USER32(00000000,00007F00), ref: 00404122
                                              • SetCursor.USER32(00000000), ref: 00404125
                                              • SendMessageA.USER32(00000111,00000001,00000000), ref: 00404151
                                              • SendMessageA.USER32(00000010,00000000,00000000), ref: 00404165
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: MessageSend$Cursor$Item$Load$ButtonCheckColorExecuteShelllstrlen
                                              • String ID: N$Remove folder: $open
                                              • API String ID: 3615053054-3278287247
                                              • Opcode ID: ca9ac3b64147b6f3934cc3f9d65700a8f1bf1296ace46b7c3bfa8303cb2a33ee
                                              • Instruction ID: 0605a8af88f24b8a239437e517aaa265f180be2417519ff34b25117700073a86
                                              • Opcode Fuzzy Hash: ca9ac3b64147b6f3934cc3f9d65700a8f1bf1296ace46b7c3bfa8303cb2a33ee
                                              • Instruction Fuzzy Hash: D161C1B1A40209BBEB109F60DD45F6A3B69FF54715F108036FB01BA2D1C7B8A991CF98
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 372 402c22-402c70 GetTickCount GetModuleFileNameA call 4056e3 375 402c72-402c77 372->375 376 402c7c-402caa call 405a0c call 405546 call 405a0c GetFileSize 372->376 377 402e54-402e58 375->377 384 402cb0 376->384 385 402d97-402da5 call 402bbe 376->385 386 402cb5-402ccc 384->386 391 402da7-402daa 385->391 392 402dfa-402dff 385->392 388 402cd0-402cd2 call 40307d 386->388 389 402cce 386->389 396 402cd7-402cd9 388->396 389->388 394 402dac-402dbd call 4030af call 40307d 391->394 395 402dce-402df8 GlobalAlloc call 4030af call 402e5b 391->395 392->377 412 402dc2-402dc4 394->412 395->392 423 402e0b-402e1c 395->423 398 402e01-402e09 call 402bbe 396->398 399 402cdf-402ce6 396->399 398->392 402 402d62-402d66 399->402 403 402ce8-402cfc call 4056a4 399->403 407 402d70-402d76 402->407 408 402d68-402d6f call 402bbe 402->408 403->407 421 402cfe-402d05 403->421 414 402d85-402d8f 407->414 415 402d78-402d82 call 405d9a 407->415 408->407 412->392 418 402dc6-402dcc 412->418 414->386 422 402d95 414->422 415->414 418->392 418->395 421->407 427 402d07-402d0e 421->427 422->385 424 402e24-402e29 423->424 425 402e1e 423->425 428 402e2a-402e30 424->428 425->424 427->407 429 402d10-402d17 427->429 428->428 430 402e32-402e4d SetFilePointer call 4056a4 428->430 429->407 431 402d19-402d20 429->431 434 402e52 430->434 431->407 433 402d22-402d42 431->433 433->392 435 402d48-402d4c 433->435 434->377 436 402d54-402d5c 435->436 437 402d4e-402d52 435->437 436->407 438 402d5e-402d60 436->438 437->422 437->436 438->407
                                              APIs
                                              • GetTickCount.KERNEL32 ref: 00402C33
                                              • GetModuleFileNameA.KERNEL32(00000000,C:\Users\user\Desktop\WinPcap_4_1_3.exe,00000400), ref: 00402C4F
                                                • Part of subcall function 004056E3: GetFileAttributesA.KERNELBASE(00000003,00402C62,C:\Users\user\Desktop\WinPcap_4_1_3.exe,80000000,00000003), ref: 004056E7
                                                • Part of subcall function 004056E3: CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405709
                                              • GetFileSize.KERNEL32(00000000,00000000,00436000,00000000,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\WinPcap_4_1_3.exe,C:\Users\user\Desktop\WinPcap_4_1_3.exe,80000000,00000003), ref: 00402C9B
                                              Strings
                                              • C:\Users\user\Desktop, xrefs: 00402C7D, 00402C82, 00402C88
                                              • Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error, xrefs: 00402DFA
                                              • Error launching installer, xrefs: 00402C72
                                              • Null, xrefs: 00402D19
                                              • soft, xrefs: 00402D10
                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 00402C22
                                              • "C:\Users\user\Desktop\WinPcap_4_1_3.exe", xrefs: 00402C2C
                                              • C:\Users\user\Desktop\WinPcap_4_1_3.exe, xrefs: 00402C39, 00402C48, 00402C5C, 00402C7C
                                              • Inst, xrefs: 00402D07
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: File$AttributesCountCreateModuleNameSizeTick
                                              • String ID: "C:\Users\user\Desktop\WinPcap_4_1_3.exe"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\Desktop$C:\Users\user\Desktop\WinPcap_4_1_3.exe$Error launching installer$Inst$Installer integrity check has failed. Common causes includeincomplete download and damaged media. Contact theinstaller's author to obtain a new copy.More information at:http://nsis.sf.net/NSIS_Error$Null$soft
                                              • API String ID: 4283519449-3925247633
                                              • Opcode ID: 19a1f9410bf62bb7c26d91ab593fbbc98d7f1b49a46bf68e22654edc0ba003eb
                                              • Instruction ID: 5cdc40c0d59b83eec34e45f83230a383a342561faf5f4e8ee161a7b3089b1b43
                                              • Opcode Fuzzy Hash: 19a1f9410bf62bb7c26d91ab593fbbc98d7f1b49a46bf68e22654edc0ba003eb
                                              • Instruction Fuzzy Hash: 40512371A00214ABDB20DF61DE89B9E7BA8EF04329F10413BF905B62D1D7BC9D418B9D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 569 401734-401757 call 4029f6 call 40556c 574 401761-401773 call 405a0c call 4054ff lstrcatA 569->574 575 401759-40175f call 405a0c 569->575 580 401778-40177e call 405c6e 574->580 575->580 585 401783-401787 580->585 586 401789-401793 call 405d07 585->586 587 4017ba-4017bd 585->587 594 4017a5-4017b7 586->594 595 401795-4017a3 CompareFileTime 586->595 589 4017c5-4017e1 call 4056e3 587->589 590 4017bf-4017c0 call 4056c4 587->590 597 4017e3-4017e6 589->597 598 401859-401882 call 404daa call 402e5b 589->598 590->589 594->587 595->594 599 4017e8-40182a call 405a0c * 2 call 405a2e call 405a0c call 4052cd 597->599 600 40183b-401845 call 404daa 597->600 612 401884-401888 598->612 613 40188a-401896 SetFileTime 598->613 599->585 633 401830-401831 599->633 610 40184e-401854 600->610 614 402894 610->614 612->613 616 40189c-4018a7 FindCloseChangeNotification 612->616 613->616 617 402896-40289a 614->617 619 40288b-40288e 616->619 620 4018ad-4018b0 616->620 619->614 622 4018b2-4018c3 call 405a2e lstrcatA 620->622 623 4018c5-4018c8 call 405a2e 620->623 627 4018cd-402213 call 4052cd 622->627 623->627 627->617 636 40265c-402663 627->636 633->610 635 401833-401834 633->635 635->600 636->619
                                              APIs
                                              • lstrcatA.KERNEL32(00000000,00000000,show,C:\Windows\system32,00000000,00000000,00000031), ref: 00401773
                                              • CompareFileTime.KERNEL32(-00000014,?,show,show,00000000,00000000,show,C:\Windows\system32,00000000,00000000,00000031), ref: 0040179D
                                                • Part of subcall function 00405A0C: lstrcpynA.KERNEL32(?,?,00000400,00403168,WinPcap 4.1.3 Setup,NSIS Error), ref: 00405A19
                                                • Part of subcall function 00404DAA: lstrlenA.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsn2258.tmp\,00000000,0041A693,762323A0,?,?,?,?,?,?,?,?,?,00402FB6,00000000,?), ref: 00404DE3
                                                • Part of subcall function 00404DAA: lstrlenA.KERNEL32(00402FB6,Remove folder: C:\Users\user\AppData\Local\Temp\nsn2258.tmp\,00000000,0041A693,762323A0,?,?,?,?,?,?,?,?,?,00402FB6,00000000), ref: 00404DF3
                                                • Part of subcall function 00404DAA: lstrcatA.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsn2258.tmp\,00402FB6,00402FB6,Remove folder: C:\Users\user\AppData\Local\Temp\nsn2258.tmp\,00000000,0041A693,762323A0), ref: 00404E06
                                                • Part of subcall function 00404DAA: SetWindowTextA.USER32(Remove folder: C:\Users\user\AppData\Local\Temp\nsn2258.tmp\,Remove folder: C:\Users\user\AppData\Local\Temp\nsn2258.tmp\), ref: 00404E18
                                                • Part of subcall function 00404DAA: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404E3E
                                                • Part of subcall function 00404DAA: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404E58
                                                • Part of subcall function 00404DAA: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404E66
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: MessageSend$lstrcatlstrlen$CompareFileTextTimeWindowlstrcpyn
                                              • String ID: C:\Users\user\AppData\Local\Temp\nsn2258.tmp$C:\Users\user\AppData\Local\Temp\nsn2258.tmp\InstallOptions.dll$C:\Windows\system32$show
                                              • API String ID: 1941528284-2442984
                                              • Opcode ID: 5764c5881e74c298e0271c9ee47bdc948f6cebb267fb6ceaf7a45804cd027a39
                                              • Instruction ID: 2412d90e5cc6ef50ac46e2462e63b4f26081636668b1d4f665875a47291bc265
                                              • Opcode Fuzzy Hash: 5764c5881e74c298e0271c9ee47bdc948f6cebb267fb6ceaf7a45804cd027a39
                                              • Instruction Fuzzy Hash: 4341D831A10515BACF10BBB5DD86DAF3A69EF41328B24433BF511F11E2D67C4A418E6D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 637 404daa-404dbf 638 404e75-404e79 637->638 639 404dc5-404dd7 637->639 640 404de2-404dee lstrlenA 639->640 641 404dd9-404ddd call 405a2e 639->641 643 404df0-404e00 lstrlenA 640->643 644 404e0b-404e0f 640->644 641->640 643->638 645 404e02-404e06 lstrcatA 643->645 646 404e11-404e18 SetWindowTextA 644->646 647 404e1e-404e22 644->647 645->644 646->647 648 404e24-404e66 SendMessageA * 3 647->648 649 404e68-404e6a 647->649 648->649 649->638 650 404e6c-404e6f 649->650 650->638
                                              APIs
                                              • lstrlenA.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsn2258.tmp\,00000000,0041A693,762323A0,?,?,?,?,?,?,?,?,?,00402FB6,00000000,?), ref: 00404DE3
                                              • lstrlenA.KERNEL32(00402FB6,Remove folder: C:\Users\user\AppData\Local\Temp\nsn2258.tmp\,00000000,0041A693,762323A0,?,?,?,?,?,?,?,?,?,00402FB6,00000000), ref: 00404DF3
                                              • lstrcatA.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsn2258.tmp\,00402FB6,00402FB6,Remove folder: C:\Users\user\AppData\Local\Temp\nsn2258.tmp\,00000000,0041A693,762323A0), ref: 00404E06
                                              • SetWindowTextA.USER32(Remove folder: C:\Users\user\AppData\Local\Temp\nsn2258.tmp\,Remove folder: C:\Users\user\AppData\Local\Temp\nsn2258.tmp\), ref: 00404E18
                                              • SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404E3E
                                              • SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404E58
                                              • SendMessageA.USER32(?,00001013,?,00000000), ref: 00404E66
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: MessageSend$lstrlen$TextWindowlstrcat
                                              • String ID: Remove folder: C:\Users\user\AppData\Local\Temp\nsn2258.tmp\
                                              • API String ID: 2531174081-3040502673
                                              • Opcode ID: 4c40d471567b76e324dd5d5172a32d65f1e9fb516d406fa49f56aca93204cf98
                                              • Instruction ID: 64f14355eea1465708e63b557f2fc924fecf56a011f776fb8de10cf69f9f2b8c
                                              • Opcode Fuzzy Hash: 4c40d471567b76e324dd5d5172a32d65f1e9fb516d406fa49f56aca93204cf98
                                              • Instruction Fuzzy Hash: F7216071A00118BBDB119FA9DD85ADEBFA9FF44354F14807AF904B6290C7398E418F98
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 651 402e5b-402e6f 652 402e71 651->652 653 402e78-402e81 651->653 652->653 654 402e83 653->654 655 402e8a-402e8f 653->655 654->655 656 402e91-402e9a call 4030af 655->656 657 402e9f-402eac call 40307d 655->657 656->657 661 402eb2-402eb6 657->661 662 403028 657->662 664 403011-403013 661->664 665 402ebc-402f05 GetTickCount 661->665 663 40302a-40302b 662->663 666 403076-40307a 663->666 667 403015-403018 664->667 668 403068-40306c 664->668 669 403073 665->669 670 402f0b-402f13 665->670 673 40301a 667->673 674 40301d-403026 call 40307d 667->674 671 40302d-403033 668->671 672 40306e 668->672 669->666 675 402f15 670->675 676 402f18-402f26 call 40307d 670->676 678 403035 671->678 679 403038-403046 call 40307d 671->679 672->669 673->674 674->662 686 403070 674->686 675->676 676->662 684 402f2c-402f35 676->684 678->679 679->662 688 403048-40305b WriteFile 679->688 687 402f3b-402f5b call 405e08 684->687 686->669 694 402f61-402f74 GetTickCount 687->694 695 403009-40300b 687->695 690 40300d-40300f 688->690 691 40305d-403060 688->691 690->663 691->690 693 403062-403065 691->693 693->668 696 402f76-402f7e 694->696 697 402fb9-402fbd 694->697 695->663 698 402f80-402f84 696->698 699 402f86-402fb1 MulDiv wsprintfA call 404daa 696->699 700 402ffe-403001 697->700 701 402fbf-402fc2 697->701 698->697 698->699 708 402fb6 699->708 700->670 702 403007 700->702 704 402fe4-402fef 701->704 705 402fc4-402fd8 WriteFile 701->705 702->669 707 402ff2-402ff6 704->707 705->690 706 402fda-402fdd 705->706 706->690 709 402fdf-402fe2 706->709 707->687 710 402ffc 707->710 708->697 709->707 710->669
                                              APIs
                                              • GetTickCount.KERNEL32 ref: 00402EC2
                                              • GetTickCount.KERNEL32 ref: 00402F69
                                              • MulDiv.KERNEL32(7FFFFFFF,00000064,00000020), ref: 00402F92
                                              • wsprintfA.USER32 ref: 00402FA2
                                              • WriteFile.KERNELBASE(00000000,00000000,0041A693,7FFFFFFF,00000000), ref: 00402FD0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: CountTick$FileWritewsprintf
                                              • String ID: ... %d%%
                                              • API String ID: 4209647438-2449383134
                                              • Opcode ID: 7289b7ae2f0745a7acfa0f8d9375c81fb7e26caa9b1403e8e39dbbcf3e0a4daa
                                              • Instruction ID: 0d39cdfb2b20f01ea0ef459ff81ac6f09524c508dd7874cbed1e127a204ff5ac
                                              • Opcode Fuzzy Hash: 7289b7ae2f0745a7acfa0f8d9375c81fb7e26caa9b1403e8e39dbbcf3e0a4daa
                                              • Instruction Fuzzy Hash: 3D618D7190121AEBDF10CF65DA44A9E7BB8EF04366F10413BF800B72D4D7789A51DBAA
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              APIs
                                              • GlobalAlloc.KERNEL32(00000040,0000BE00,00000000,40000000,00000002,00000000,00000000,?,?,000000F0), ref: 004026D0
                                              • GlobalAlloc.KERNEL32(00000040,?,00000000,?,?,?,?,000000F0), ref: 004026EC
                                              • GlobalFree.KERNEL32(?), ref: 00402725
                                              • WriteFile.KERNELBASE(FFFFFD66,00000000,?,FFFFFD66,?,?,?,?,000000F0), ref: 00402737
                                              • GlobalFree.KERNELBASE(00000000), ref: 0040273E
                                              • CloseHandle.KERNEL32(FFFFFD66,?,?,000000F0), ref: 00402756
                                              • DeleteFileA.KERNEL32(?,00000000,40000000,00000002,00000000,00000000,?,?,000000F0), ref: 0040276A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: Global$AllocFileFree$CloseDeleteHandleWrite
                                              • String ID:
                                              • API String ID: 3294113728-0
                                              • Opcode ID: ad9dba0a6d7d7ff00a0aa23633edca48885571ce4b116709350681886f746bde
                                              • Instruction ID: 62f2159171fbc9033078dd1539b67ba065abfcd1800d5973976be9d0b9eda31e
                                              • Opcode Fuzzy Hash: ad9dba0a6d7d7ff00a0aa23633edca48885571ce4b116709350681886f746bde
                                              • Instruction Fuzzy Hash: DE319F71C00128BBDF216FA5CD89EAE7E78EF04364F10422AF524772E0C7795D419BA9
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 744 401f51-401f5d 745 401f63-401f79 call 4029f6 * 2 744->745 746 402019-40201b 744->746 756 401f88-401f96 LoadLibraryExA 745->756 757 401f7b-401f86 GetModuleHandleA 745->757 748 402164-402169 call 401423 746->748 753 40288b-40289a 748->753 759 401f98-401fa6 GetProcAddress 756->759 760 402012-402014 756->760 757->756 757->759 761 401fe5-401fea call 404daa 759->761 762 401fa8-401fae 759->762 760->748 766 401fef-401ff2 761->766 764 401fb0-401fbc call 401423 762->764 765 401fc7-401fdb 762->765 764->766 775 401fbe-401fc5 764->775 768 401fe0-401fe3 765->768 766->753 769 401ff8-402000 call 4034f5 766->769 768->766 769->753 774 402006-40200d FreeLibrary 769->774 774->753 775->766
                                              APIs
                                              • GetModuleHandleA.KERNELBASE(00000000,00000001,000000F0), ref: 00401F7C
                                                • Part of subcall function 00404DAA: lstrlenA.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsn2258.tmp\,00000000,0041A693,762323A0,?,?,?,?,?,?,?,?,?,00402FB6,00000000,?), ref: 00404DE3
                                                • Part of subcall function 00404DAA: lstrlenA.KERNEL32(00402FB6,Remove folder: C:\Users\user\AppData\Local\Temp\nsn2258.tmp\,00000000,0041A693,762323A0,?,?,?,?,?,?,?,?,?,00402FB6,00000000), ref: 00404DF3
                                                • Part of subcall function 00404DAA: lstrcatA.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsn2258.tmp\,00402FB6,00402FB6,Remove folder: C:\Users\user\AppData\Local\Temp\nsn2258.tmp\,00000000,0041A693,762323A0), ref: 00404E06
                                                • Part of subcall function 00404DAA: SetWindowTextA.USER32(Remove folder: C:\Users\user\AppData\Local\Temp\nsn2258.tmp\,Remove folder: C:\Users\user\AppData\Local\Temp\nsn2258.tmp\), ref: 00404E18
                                                • Part of subcall function 00404DAA: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404E3E
                                                • Part of subcall function 00404DAA: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404E58
                                                • Part of subcall function 00404DAA: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404E66
                                              • LoadLibraryExA.KERNELBASE(00000000,?,00000008,00000001,000000F0), ref: 00401F8C
                                              • GetProcAddress.KERNEL32(00000000,?), ref: 00401F9C
                                              • FreeLibrary.KERNELBASE(00000000,00000000,000000F7,?,?,00000008,00000001,000000F0), ref: 00402007
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: MessageSend$Librarylstrlen$AddressFreeHandleLoadModuleProcTextWindowlstrcat
                                              • String ID: B
                                              • API String ID: 2987980305-3806887055
                                              • Opcode ID: 7801585ffc0b9ac36e2f6c86c8f002994cbbb77bfdbfe2fb33793952b630982a
                                              • Instruction ID: bf94c0598684f4a2e8798aed6ecd64900ad0f6fcd097f114c8a1beddd358b100
                                              • Opcode Fuzzy Hash: 7801585ffc0b9ac36e2f6c86c8f002994cbbb77bfdbfe2fb33793952b630982a
                                              • Instruction Fuzzy Hash: 5121EE72D04216EBCF107FA5CE49A6E75B06F45358F20433BF511B62E1C77C4941A65E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 776 402303-402349 call 402aeb call 4029f6 * 2 RegCreateKeyExW 783 40288b-40289a 776->783 784 40234f-402357 776->784 786 402367-40236a 784->786 787 402359-402366 call 4029f6 lstrlenA 784->787 790 40237a-40237d 786->790 791 40236c-402379 call 4029d9 786->791 787->786 792 40238e-4023a2 RegSetValueExW 790->792 793 40237f-402389 call 402e5b 790->793 791->790 798 4023a4 792->798 799 4023a7-402483 RegCloseKey 792->799 793->792 798->799 799->783
                                              APIs
                                              • RegCreateKeyExW.KERNELBASE(00000000,00000000,?,?,?,00000000,?,?,?,00000011,00000002), ref: 00402341
                                              • lstrlenA.KERNEL32(C:\Users\user\AppData\Local\Temp\nsn2258.tmp,00000023,?,?,?,00000000,?,?,?,00000011,00000002), ref: 00402361
                                              • RegSetValueExW.KERNELBASE(?,?,?,?,C:\Users\user\AppData\Local\Temp\nsn2258.tmp,00000000,?,?,?,00000000,?,?,?,00000011,00000002), ref: 0040239A
                                              • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsn2258.tmp,00000000,?,?,?,00000000,?,?,?,00000011,00000002), ref: 0040247D
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: CloseCreateValuelstrlen
                                              • String ID: C:\Users\user\AppData\Local\Temp\nsn2258.tmp
                                              • API String ID: 1356686001-4094799008
                                              • Opcode ID: 6d3b865e91797ef867c492b09b4a0ea448f3873fd28b0c564879606631dd48fe
                                              • Instruction ID: 74c2b7e5efa1a9b7d251dd878628ee018497e02546d33d1ea7114f4406d6c15c
                                              • Opcode Fuzzy Hash: 6d3b865e91797ef867c492b09b4a0ea448f3873fd28b0c564879606631dd48fe
                                              • Instruction Fuzzy Hash: 721160B1E00209BFEB10AFA5DE89EAF767CFB40398F10453AF901B71D0D6B85D019669
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Control-flow Graph

                                              • Executed
                                              • Not Executed
                                              control_flow_graph 801 4015b3-4015c6 call 4029f6 call 405593 806 4015c8-4015e3 call 40552a CreateDirectoryA 801->806 807 40160a-40160d 801->807 814 401600-401608 806->814 815 4015e5-4015f0 GetLastError 806->815 809 40162d-402169 call 401423 807->809 810 40160f-401628 call 401423 call 405a0c SetCurrentDirectoryA 807->810 822 40288b-40289a 809->822 810->822 814->806 814->807 819 4015f2-4015fb GetFileAttributesA 815->819 820 4015fd 815->820 819->814 819->820 820->814
                                              APIs
                                                • Part of subcall function 00405593: CharNextA.USER32(ES@,?,C:\,00000000,004055F7,C:\,C:\,?,?,00000000,00405345,?,"C:\Users\user\Desktop\WinPcap_4_1_3.exe",00000000), ref: 004055A1
                                                • Part of subcall function 00405593: CharNextA.USER32(00000000), ref: 004055A6
                                                • Part of subcall function 00405593: CharNextA.USER32(00000000), ref: 004055B5
                                              • CreateDirectoryA.KERNELBASE(00000000,?,00000000,0000005C,00000000,000000F0), ref: 004015DB
                                              • GetLastError.KERNEL32(?,00000000,0000005C,00000000,000000F0), ref: 004015E5
                                              • GetFileAttributesA.KERNELBASE(00000000,?,00000000,0000005C,00000000,000000F0), ref: 004015F3
                                              • SetCurrentDirectoryA.KERNELBASE(00000000,C:\Windows\system32,00000000,00000000,000000F0), ref: 00401622
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: CharNext$Directory$AttributesCreateCurrentErrorFileLast
                                              • String ID: C:\Windows\system32
                                              • API String ID: 3751793516-2896066436
                                              • Opcode ID: e9d59eda693b922a5fdb80184fc3babb31ba0cd8e1a3062a527ae998bf2baf8a
                                              • Instruction ID: bf1eb0eabc3c1df6ff2fb323ed3efcd7168262dea338722757ad05095e7f5395
                                              • Opcode Fuzzy Hash: e9d59eda693b922a5fdb80184fc3babb31ba0cd8e1a3062a527ae998bf2baf8a
                                              • Instruction Fuzzy Hash: AB012631908180AFDB217F756D449BF6BB0EA56365728073FF492B22E2C23C4D42962E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetTickCount.KERNEL32 ref: 00405725
                                              • GetTempFileNameA.KERNELBASE(?,0061736E,00000000,?), ref: 0040573F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: CountFileNameTempTick
                                              • String ID: "C:\Users\user\Desktop\WinPcap_4_1_3.exe"$C:\Users\user\AppData\Local\Temp\$nsa
                                              • API String ID: 1716503409-1752785561
                                              • Opcode ID: fc5e126f8815d4696b9f295c06fae67d9d4e63728d0dbdda5093f58b42bfadad
                                              • Instruction ID: 857343acb9398127b83b67a88284cb3acf20d602f6beb627bdaaa73bf87bc8f8
                                              • Opcode Fuzzy Hash: fc5e126f8815d4696b9f295c06fae67d9d4e63728d0dbdda5093f58b42bfadad
                                              • Instruction Fuzzy Hash: 19F0A736348204BAE7105E55DC04B9B7F99DFD1750F14C027F9449B1C0D6F099589BA9
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetDlgItem.USER32(?), ref: 00401CC5
                                              • GetClientRect.USER32(00000000,?), ref: 00401CD2
                                              • LoadImageA.USER32(?,00000000,?,?,?,?), ref: 00401CF3
                                              • SendMessageA.USER32(00000000,00000172,?,00000000), ref: 00401D01
                                              • DeleteObject.GDI32(00000000), ref: 00401D10
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: ClientDeleteImageItemLoadMessageObjectRectSend
                                              • String ID:
                                              • API String ID: 1849352358-0
                                              • Opcode ID: bcf2014c00065f5201b430a5429a32b7385cfa622623bd2341514d29d8348619
                                              • Instruction ID: f89edaf4e673e5a696cf4c500be88082f9c29b5fdabb6c66a10e118bddb835aa
                                              • Opcode Fuzzy Hash: bcf2014c00065f5201b430a5429a32b7385cfa622623bd2341514d29d8348619
                                              • Instruction Fuzzy Hash: 71F01DB2E04105BFD700EBA4EE89DAFB7BDEB44345B104576F602F6190C678AD018B69
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • SendMessageTimeoutA.USER32(00000000,00000000,?,?,?,00000002,?), ref: 00401C0D
                                              • SendMessageA.USER32(00000000,00000000,?,?), ref: 00401C25
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: MessageSend$Timeout
                                              • String ID: !
                                              • API String ID: 1777923405-2657877971
                                              • Opcode ID: 5e77a80833e19dc55b8a20fadec5ab0659a97bc6c71de6bcb2193ca436d8299f
                                              • Instruction ID: e870f9960eb541ab862ab70d99fa676f0883abea00e9f1964bf1c40a5587cb5b
                                              • Opcode Fuzzy Hash: 5e77a80833e19dc55b8a20fadec5ab0659a97bc6c71de6bcb2193ca436d8299f
                                              • Instruction Fuzzy Hash: 3B21C4B1A44209BFEF01AFB4CE4AAAE7B75EF40344F14053EF602B60D1D6B84980E718
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetFileVersionInfoSizeA.VERSION(00000000,?,000000EE), ref: 00401ED4
                                              • GlobalAlloc.KERNEL32(00000040,00000000,00000000,?,000000EE), ref: 00401EF2
                                              • GetFileVersionInfoA.VERSION(?,?,?,00000000), ref: 00401F0B
                                              • VerQueryValueA.VERSION(?,00409010,?,?,?,?,?,00000000), ref: 00401F24
                                                • Part of subcall function 0040596A: wsprintfA.USER32 ref: 00405977
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: FileInfoVersion$AllocGlobalQuerySizeValuewsprintf
                                              • String ID:
                                              • API String ID: 1404258612-0
                                              • Opcode ID: 099a0aa409c47306a0e5e8436e4e2e7c61bc24b53b401cebe12c2d8cce08dfb0
                                              • Instruction ID: ac83c8b0d38e5b491d5bd27050ffdb4091974a4b49ad9b19d675067d3fb65d11
                                              • Opcode Fuzzy Hash: 099a0aa409c47306a0e5e8436e4e2e7c61bc24b53b401cebe12c2d8cce08dfb0
                                              • Instruction Fuzzy Hash: 201148B2900108BFDB01EFA5D981DAEBBB9EF04344B24807AF505F61E1D7389A54DB28
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                                • Part of subcall function 00405A0C: lstrcpynA.KERNEL32(?,?,00000400,00403168,WinPcap 4.1.3 Setup,NSIS Error), ref: 00405A19
                                                • Part of subcall function 00405593: CharNextA.USER32(ES@,?,C:\,00000000,004055F7,C:\,C:\,?,?,00000000,00405345,?,"C:\Users\user\Desktop\WinPcap_4_1_3.exe",00000000), ref: 004055A1
                                                • Part of subcall function 00405593: CharNextA.USER32(00000000), ref: 004055A6
                                                • Part of subcall function 00405593: CharNextA.USER32(00000000), ref: 004055B5
                                              • lstrlenA.KERNEL32(C:\,00000000,C:\,C:\,?,?,00000000,00405345,?,"C:\Users\user\Desktop\WinPcap_4_1_3.exe",00000000), ref: 00405633
                                              • GetFileAttributesA.KERNELBASE(C:\,C:\,C:\,C:\,C:\,C:\,00000000,C:\,C:\,?,?,00000000,00405345,?,"C:\Users\user\Desktop\WinPcap_4_1_3.exe",00000000), ref: 00405643
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: CharNext$AttributesFilelstrcpynlstrlen
                                              • String ID: C:\
                                              • API String ID: 3248276644-3404278061
                                              • Opcode ID: da87c44caba5ef5b47b3dfc23c9f89bee904d632c2bc274008544d1b26360f61
                                              • Instruction ID: cbb7be82a93a6dd192d11d13e0df5a6c8cbb76871d8c278764bccb9a445afede
                                              • Opcode Fuzzy Hash: da87c44caba5ef5b47b3dfc23c9f89bee904d632c2bc274008544d1b26360f61
                                              • Instruction Fuzzy Hash: B5F02825205D6132D622363A1C49BAF1A56CD833247980D3BF854B12C6DB3D8943EE6E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • lstrlenA.KERNEL32(00000000,00000011), ref: 004024DC
                                              • WriteFile.KERNELBASE(00000000,?,C:\Users\user\AppData\Local\Temp\nsn2258.tmp\InstallOptions.dll,00000000,?,?,00000000,00000011), ref: 004024FB
                                              Strings
                                              • C:\Users\user\AppData\Local\Temp\nsn2258.tmp\InstallOptions.dll, xrefs: 004024CA, 004024EF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: FileWritelstrlen
                                              • String ID: C:\Users\user\AppData\Local\Temp\nsn2258.tmp\InstallOptions.dll
                                              • API String ID: 427699356-4035620651
                                              • Opcode ID: f8afe27f35a0341f5f43dc116950efcf8e5d728f532d9ae0525ec423e2171d68
                                              • Instruction ID: 266b505f4b4a70e0031bd9b61304a7f29979de1156be46298b6644775383f0d6
                                              • Opcode Fuzzy Hash: f8afe27f35a0341f5f43dc116950efcf8e5d728f532d9ae0525ec423e2171d68
                                              • Instruction Fuzzy Hash: 70F0B4B2B04201AFDB00EBA19E49AAF36589B40348F14443BB142F50C2D6BC4941AB6D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                                • Part of subcall function 00405C6E: CharNextA.USER32(?,*?|<>/":,00000000,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\WinPcap_4_1_3.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030D2,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 00405CC6
                                                • Part of subcall function 00405C6E: CharNextA.USER32(?,?,?,00000000), ref: 00405CD3
                                                • Part of subcall function 00405C6E: CharNextA.USER32(?,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\WinPcap_4_1_3.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030D2,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 00405CD8
                                                • Part of subcall function 00405C6E: CharPrevA.USER32(?,?,"C:\Users\user\Desktop\WinPcap_4_1_3.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030D2,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 00405CE8
                                              • CreateDirectoryA.KERNELBASE(C:\Users\user\AppData\Local\Temp\,00000000,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 004030E7
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: Char$Next$CreateDirectoryPrev
                                              • String ID: 1033$C:\Users\user\AppData\Local\Temp\
                                              • API String ID: 4115351271-3512041753
                                              • Opcode ID: 9fc94c8ce289ceace51d82d7694160c71b26e7ee5232ad3accb455f1d4d4e313
                                              • Instruction ID: 7f1b43601f0a10077d0081c2ba5ec5825ac71a1bded9547d22d949ebda8a6a9f
                                              • Opcode Fuzzy Hash: 9fc94c8ce289ceace51d82d7694160c71b26e7ee5232ad3accb455f1d4d4e313
                                              • Instruction Fuzzy Hash: B6D0922150AD3031D651322A3E06BCF154D8F4636AF65807BF944B608A4A6C2A825AEE
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • FreeLibrary.KERNELBASE(?,"C:\Users\user\Desktop\WinPcap_4_1_3.exe",00000000,00000000,00403498,004032EB,00000000), ref: 004034DA
                                              • GlobalFree.KERNEL32(00000000), ref: 004034E1
                                              Strings
                                              • "C:\Users\user\Desktop\WinPcap_4_1_3.exe", xrefs: 004034D2
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: Free$GlobalLibrary
                                              • String ID: "C:\Users\user\Desktop\WinPcap_4_1_3.exe"
                                              • API String ID: 1100898210-4289606307
                                              • Opcode ID: 46acf84ebda6383aa3704241e203cd439e3c816428f1e63aa7a51627b246d5e2
                                              • Instruction ID: a7ab284cabc648ba81e11ba063b903b3b671d5f7e61a69f5101281db245b6d62
                                              • Opcode Fuzzy Hash: 46acf84ebda6383aa3704241e203cd439e3c816428f1e63aa7a51627b246d5e2
                                              • Instruction Fuzzy Hash: E1E08C329110209BD6221F05AE0575A7B6D6B44B32F02802AE9407B2A087746C424BDD
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GlobalFree.KERNEL32(00000000), ref: 00401B75
                                              • GlobalAlloc.KERNELBASE(00000040,00000404), ref: 00401B87
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: Global$AllocFree
                                              • String ID: show
                                              • API String ID: 3394109436-839833857
                                              • Opcode ID: 0f8e336cfa202ebd74b4841c9e5fcfc62dd7a51da43063299facde2bddfebbd9
                                              • Instruction ID: 02e27a443d0c975bd2d35078e55c9ecbb47b75263e9a7029776e4410220f8425
                                              • Opcode Fuzzy Hash: 0f8e336cfa202ebd74b4841c9e5fcfc62dd7a51da43063299facde2bddfebbd9
                                              • Instruction Fuzzy Hash: C821C3B67002029BC710EB94DEC595F73A8EB84368724463BF502F32D0DB78AC019B5E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                                • Part of subcall function 00404DAA: lstrlenA.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsn2258.tmp\,00000000,0041A693,762323A0,?,?,?,?,?,?,?,?,?,00402FB6,00000000,?), ref: 00404DE3
                                                • Part of subcall function 00404DAA: lstrlenA.KERNEL32(00402FB6,Remove folder: C:\Users\user\AppData\Local\Temp\nsn2258.tmp\,00000000,0041A693,762323A0,?,?,?,?,?,?,?,?,?,00402FB6,00000000), ref: 00404DF3
                                                • Part of subcall function 00404DAA: lstrcatA.KERNEL32(Remove folder: C:\Users\user\AppData\Local\Temp\nsn2258.tmp\,00402FB6,00402FB6,Remove folder: C:\Users\user\AppData\Local\Temp\nsn2258.tmp\,00000000,0041A693,762323A0), ref: 00404E06
                                                • Part of subcall function 00404DAA: SetWindowTextA.USER32(Remove folder: C:\Users\user\AppData\Local\Temp\nsn2258.tmp\,Remove folder: C:\Users\user\AppData\Local\Temp\nsn2258.tmp\), ref: 00404E18
                                                • Part of subcall function 00404DAA: SendMessageA.USER32(?,00001004,00000000,00000000), ref: 00404E3E
                                                • Part of subcall function 00404DAA: SendMessageA.USER32(?,00001007,00000000,00000001), ref: 00404E58
                                                • Part of subcall function 00404DAA: SendMessageA.USER32(?,00001013,?,00000000), ref: 00404E66
                                                • Part of subcall function 0040526C: CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,0042BFE8,Error launching installer), ref: 00405291
                                                • Part of subcall function 0040526C: CloseHandle.KERNEL32(?), ref: 0040529E
                                              • WaitForSingleObject.KERNEL32(?,00000064,00000000,000000EB,00000000), ref: 00401E55
                                              • GetExitCodeProcess.KERNEL32(?,?), ref: 00401E65
                                              • FindCloseChangeNotification.KERNELBASE(?,00000000,000000EB,00000000), ref: 00401E8A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: MessageSend$CloseProcesslstrlen$ChangeCodeCreateExitFindHandleNotificationObjectSingleTextWaitWindowlstrcat
                                              • String ID:
                                              • API String ID: 3954718778-0
                                              • Opcode ID: b6bdf3c3515d2c7f51cf4a410362fa12cdd9e75705dd24ab69e6c7319206e84f
                                              • Instruction ID: b33c81b7bc3b485aca967e7674fca75add98f6be2a8732829935c4442cdc9329
                                              • Opcode Fuzzy Hash: b6bdf3c3515d2c7f51cf4a410362fa12cdd9e75705dd24ab69e6c7319206e84f
                                              • Instruction Fuzzy Hash: 99018071904214EBDF11AFA1CD859AE7A75EF00348F24403BF906B61E1C3794A82DB9A
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • RegOpenKeyExW.KERNELBASE(80000002,00405B2F,00000000,00000002,?,00000002,00150879,?,00405B2F,80000002,Software\Microsoft\Windows\CurrentVersion,00150879,Remove folder: ,0057F411), ref: 0040591C
                                              • RegQueryValueExW.KERNELBASE(00150879,?,00000000,00405B2F,00150879,00405B2F), ref: 0040593D
                                              • RegCloseKey.KERNELBASE(?), ref: 0040595E
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: CloseOpenQueryValue
                                              • String ID:
                                              • API String ID: 3677997916-0
                                              • Opcode ID: 20ca1dc64cf80f35bde4a5a459f169022cfe0f17446037da1f5ac97088a586f8
                                              • Instruction ID: 7f29002dde4dac3a19eb3905e2141cfc53fc6fe5580d4c3066aa5286193c6294
                                              • Opcode Fuzzy Hash: 20ca1dc64cf80f35bde4a5a459f169022cfe0f17446037da1f5ac97088a586f8
                                              • Instruction Fuzzy Hash: 16015AB104020AEFDF128F64EC44AEB3FACEF153A4F004436F954E6220D235D968DBA5
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                                • Part of subcall function 00402B00: RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402B28
                                              • RegEnumKeyA.ADVAPI32(00000000,00000000,?,000003FF), ref: 00402455
                                              • RegEnumValueA.ADVAPI32(00000000,00000000,?,?,?,?,?,?,00000003), ref: 00402468
                                              • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsn2258.tmp,00000000,?,?,?,00000000,?,?,?,00000011,00000002), ref: 0040247D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: Enum$CloseOpenValue
                                              • String ID:
                                              • API String ID: 167947723-0
                                              • Opcode ID: 81cedb2092e123af607385370f466b43b8b28ee3647f35b55f5e77a27fcb63b4
                                              • Instruction ID: ba27a5b4615b94bf9550a78118f2e7023eed3f1787cd0549807e620a17edd571
                                              • Opcode Fuzzy Hash: 81cedb2092e123af607385370f466b43b8b28ee3647f35b55f5e77a27fcb63b4
                                              • Instruction Fuzzy Hash: 26F0D671A04201EFE715AF659D88EBF7A6CDF40388F10443FF406B61C0D2B85D42967A
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetPrivateProfileStringA.KERNEL32(00000000,?,!N~,?,000003FF,00000000), ref: 00402297
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: PrivateProfileString
                                              • String ID: !N~
                                              • API String ID: 1096422788-529124213
                                              • Opcode ID: 83959307df37686c86d75e4de7286cd2fa4b3ebc5ce89ae33a3a58613c6f73fc
                                              • Instruction ID: 21cd7503a9a85725414fd2f210def48a3ed87e9b9f52c0cacc02f36f79452d1c
                                              • Opcode Fuzzy Hash: 83959307df37686c86d75e4de7286cd2fa4b3ebc5ce89ae33a3a58613c6f73fc
                                              • Instruction Fuzzy Hash: E4E04F71900208BBDB50AFA1CD49DAE3AA8BF043C4F100129FA10AB1C1DBB89541AB55
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • SendMessageA.USER32(00000408,?,00000000,004039F9), ref: 00403DB5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID: x
                                              • API String ID: 3850602802-2363233923
                                              • Opcode ID: 2297d9a5740f239e563778608566daf4408a5e1d57364abcd084643e47e82489
                                              • Instruction ID: ab0c8c299765955ccbfa59721f842daf732f2f91f0a416ba9cb054cc648477c1
                                              • Opcode Fuzzy Hash: 2297d9a5740f239e563778608566daf4408a5e1d57364abcd084643e47e82489
                                              • Instruction Fuzzy Hash: 4FC01271A84201EADA209B02DE00B06BA71EBA4702F508039F385200B186706822DB0D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                                • Part of subcall function 00402B00: RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402B28
                                              • RegQueryValueExW.KERNELBASE(00000000,00000000,?,000003FF,?,?,?,?,00000033), ref: 004023DF
                                              • RegCloseKey.KERNELBASE(?,?,?,C:\Users\user\AppData\Local\Temp\nsn2258.tmp,00000000,?,?,?,00000000,?,?,?,00000011,00000002), ref: 0040247D
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: CloseOpenQueryValue
                                              • String ID:
                                              • API String ID: 3677997916-0
                                              • Opcode ID: 3f9771260286cfbf3c38fa9d26fb08416a5fc84d851e3df57d723fbd924de948
                                              • Instruction ID: b014844320ad767dada11dd3629d5dc4f3fca22d365999f113298c01dbc1c66c
                                              • Opcode Fuzzy Hash: 3f9771260286cfbf3c38fa9d26fb08416a5fc84d851e3df57d723fbd924de948
                                              • Instruction Fuzzy Hash: B011C471904205EFDB15DF64CA889AE7BB4EF14348F20807FE442B72C1D2B88A45EB5A
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • MulDiv.KERNEL32(00007530,00000000,00000000), ref: 004013E4
                                              • SendMessageA.USER32(?,00000402,00000000), ref: 004013F4
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID:
                                              • API String ID: 3850602802-0
                                              • Opcode ID: cf7b3020d7635a73a7f034f7f9c2b240c5e2222d46fcf66a2415134205071e91
                                              • Instruction ID: 8223ec958efd2c964e321ebce6dca8e406ed2778dd364e0d2667d4e2a9ef0db3
                                              • Opcode Fuzzy Hash: cf7b3020d7635a73a7f034f7f9c2b240c5e2222d46fcf66a2415134205071e91
                                              • Instruction Fuzzy Hash: FE01F4317242109BE7299B799D04B6A36D8E710325F14453FF955F72F1D678DC028B4D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • OleInitialize.OLE32(00000000), ref: 00404E8C
                                                • Part of subcall function 00403E0A: SendMessageA.USER32(000303FC,00000000,00000000,00000000), ref: 00403E1C
                                              • OleUninitialize.OLE32(00000404,00000000), ref: 00404ED8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: InitializeMessageSendUninitialize
                                              • String ID:
                                              • API String ID: 2896919175-0
                                              • Opcode ID: 40dbed6342c342f19cf155c60ec5393d5941e5f8c4ce0c4d617a2ddd15e81d86
                                              • Instruction ID: 553340d25051964c1d9f2091c6121c40533f6be98ef284e5afc8434be7077bea
                                              • Opcode Fuzzy Hash: 40dbed6342c342f19cf155c60ec5393d5941e5f8c4ce0c4d617a2ddd15e81d86
                                              • Instruction Fuzzy Hash: 33F096B3A0820086E71197A6DD01B567BA4BBD4312F55403AFF45622E1D775584286DD
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • SendMessageA.USER32(?,0000000B,?), ref: 00402875
                                              • InvalidateRect.USER32(?), ref: 00402885
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: InvalidateMessageRectSend
                                              • String ID:
                                              • API String ID: 909852535-0
                                              • Opcode ID: a5f93ca787052cb85bb993d16fb5bfc88cd44bd4415a14ef171f869fd08a24a6
                                              • Instruction ID: 5d37e61976acf5bdbec0b869d18ae9d7eae5027ec9d1abcfdb12a567b3c3e37f
                                              • Opcode Fuzzy Hash: a5f93ca787052cb85bb993d16fb5bfc88cd44bd4415a14ef171f869fd08a24a6
                                              • Instruction Fuzzy Hash: 7AE08CB2B40104AFEB10DB94EE85DAE7BBAEB40349B14007AF602F0060D2341D10CA28
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • ShowWindow.USER32(00000000,00000000,00000001), ref: 00401DAB
                                              • EnableWindow.USER32(00000000,00000000), ref: 00401DB6
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: Window$EnableShow
                                              • String ID:
                                              • API String ID: 1136574915-0
                                              • Opcode ID: bec9b1a9a5822b1f3694e8d3d7e5bfeccac05f90ba014232035f8450c8442d81
                                              • Instruction ID: 9da135c70202b86661629657fe57a258e31507742a425f579c1fc233a54c13c2
                                              • Opcode Fuzzy Hash: bec9b1a9a5822b1f3694e8d3d7e5bfeccac05f90ba014232035f8450c8442d81
                                              • Instruction Fuzzy Hash: 62E0CD72B08110DBD710F7B45D8995D3664DB40369B10453BF503F50C1D2789C4196EE
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetFileAttributesA.KERNELBASE(00000003,00402C62,C:\Users\user\Desktop\WinPcap_4_1_3.exe,80000000,00000003), ref: 004056E7
                                              • CreateFileA.KERNELBASE(?,?,00000001,00000000,?,00000001,00000000), ref: 00405709
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: File$AttributesCreate
                                              • String ID:
                                              • API String ID: 415043291-0
                                              • Opcode ID: f96d5d8e90d761c4e0dddf78ec48930a46771e4615b27f2c581d09f506512028
                                              • Instruction ID: 518821d5ca0a74227a37217cadb520a33af9faec79942caa6648154b48e23ab6
                                              • Opcode Fuzzy Hash: f96d5d8e90d761c4e0dddf78ec48930a46771e4615b27f2c581d09f506512028
                                              • Instruction Fuzzy Hash: DDD09E71658301AFEF098F20DE1AF2E7AA2EB84B01F10962CB646940E0D6715C15DB16
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • CloseHandle.KERNEL32(FFFFFFFF,004032EB,00000000), ref: 00403486
                                              Strings
                                              • C:\Users\user\AppData\Local\Temp\nsn2258.tmp\, xrefs: 0040349A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: CloseHandle
                                              • String ID: C:\Users\user\AppData\Local\Temp\nsn2258.tmp\
                                              • API String ID: 2962429428-1727873046
                                              • Opcode ID: 31f78a86cd46fd7a0018bd77bfa4d4c204eb943dc09def5fdfba012cb08fa724
                                              • Instruction ID: dd629d7ffa80b2531d7668e5a1a305395e4adc4893f6b58610a8e469f8d50dee
                                              • Opcode Fuzzy Hash: 31f78a86cd46fd7a0018bd77bfa4d4c204eb943dc09def5fdfba012cb08fa724
                                              • Instruction Fuzzy Hash: F8C01230504600E6D2246F759E0A6093A18574173AB904336B179B50F1C77C5901453E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetFileAttributesA.KERNELBASE(?,004054CF,?,?,?), ref: 004056C8
                                              • SetFileAttributesA.KERNELBASE(?,00000000), ref: 004056DA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: AttributesFile
                                              • String ID:
                                              • API String ID: 3188754299-0
                                              • Opcode ID: 499c41a265c8c72c251eb99c81a2d8ea197c0ca55525d81af5d9f53b6a62e1c9
                                              • Instruction ID: 8174f72b6c2f00669cb3d5f93c0fb6c6646d93779de37800628d5af5c47e1667
                                              • Opcode Fuzzy Hash: 499c41a265c8c72c251eb99c81a2d8ea197c0ca55525d81af5d9f53b6a62e1c9
                                              • Instruction Fuzzy Hash: C7C002B1808501AAD6015B24DF0D81E7A66EB50361B508F25F569A00F0C7355866DA1A
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • WritePrivateProfileStringA.KERNEL32(00000000,00000000,?,00000000), ref: 0040225C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: PrivateProfileStringWrite
                                              • String ID:
                                              • API String ID: 390214022-0
                                              • Opcode ID: b6116c209c80720ea8c5b66b32d343bdc214f8bf2523826a10554ae8e2aaa3ef
                                              • Instruction ID: 7f0f3d0bfb11d3a69440f7e30d7772d63b8707f304f836d716d69bda9ce5b450
                                              • Opcode Fuzzy Hash: b6116c209c80720ea8c5b66b32d343bdc214f8bf2523826a10554ae8e2aaa3ef
                                              • Instruction Fuzzy Hash: 31E04871F002656BDBA07AF14F8D97F115C7B84344F14027EBA15762C6E9BC4D416169
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • ReadFile.KERNELBASE(00000000,00000000,00000000,00000000,000000FF,?,00402EAA,000000FF,00000004,00000000,00000000,00000000), ref: 00403094
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: FileRead
                                              • String ID:
                                              • API String ID: 2738559852-0
                                              • Opcode ID: 728267699a9b44ddad9e6e694247195ab13049bac6004c2e56fc09e99b3f0f19
                                              • Instruction ID: 43e3c0ed55451ca58d66c179b0d5cd373ba627774d09ad719adf1b780fd88a5d
                                              • Opcode Fuzzy Hash: 728267699a9b44ddad9e6e694247195ab13049bac6004c2e56fc09e99b3f0f19
                                              • Instruction Fuzzy Hash: F0E08631101119BBCF105E61AC00A9B3F9CEB05362F00C032FA04E5190D538DA14DBA5
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • RegOpenKeyExW.KERNELBASE(00000000,?,00000000,00000022,00000000,?,?), ref: 00402B28
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: Open
                                              • String ID:
                                              • API String ID: 71445658-0
                                              • Opcode ID: 332b4b28ccf70e09bb7c329d8b92fdd51d6a369451d7e4fe1d23c46d78dfb372
                                              • Instruction ID: 26822e9457f7499eaf47d686268157363fcd7c772d88ad4a089d565b944a1739
                                              • Opcode Fuzzy Hash: 332b4b28ccf70e09bb7c329d8b92fdd51d6a369451d7e4fe1d23c46d78dfb372
                                              • Instruction Fuzzy Hash: 4DE08CB6240108BFDB50EFA5ED4BFD677ECBB04340F008921B618EB091CA75E5809B68
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • SetDlgItemTextA.USER32(?,?,00000000), ref: 00403DD8
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: ItemText
                                              • String ID:
                                              • API String ID: 3367045223-0
                                              • Opcode ID: 127803520696b4f43e8fc6f5d9bd0ca07d8143994230ac30ebc5eaf9d6967234
                                              • Instruction ID: 1da1af2c7098a7a5c47cb9e65cfb44b89bee0289569f32b065f15b06c39939a7
                                              • Opcode Fuzzy Hash: 127803520696b4f43e8fc6f5d9bd0ca07d8143994230ac30ebc5eaf9d6967234
                                              • Instruction Fuzzy Hash: 79C04C79248604BFD641A759DC42F1FB79DEF94315F00C52EB19CE11D1C63984209E26
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • SendMessageA.USER32(000303FC,00000000,00000000,00000000), ref: 00403E1C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID:
                                              • API String ID: 3850602802-0
                                              • Opcode ID: c5061dae57279ed18d5e0219b0993123e9bb10419d0af8d34ddcf4ee1c6729a0
                                              • Instruction ID: 4a69275ab6afdcc9dd23c2635c3fa87663c4bda3d9f509ac91b66b343a6ea2c2
                                              • Opcode Fuzzy Hash: c5061dae57279ed18d5e0219b0993123e9bb10419d0af8d34ddcf4ee1c6729a0
                                              • Instruction Fuzzy Hash: 0FC04C717443016AEA20DB51DE45F0777589754B01F548465B604A50D0C674E410D65D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • SendMessageA.USER32(00000028,?,00000001,00403C24), ref: 00403E01
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: MessageSend
                                              • String ID:
                                              • API String ID: 3850602802-0
                                              • Opcode ID: acb417c3046c5230bf261fb3a85c5b045a6b8022903fbd0a553d80ffe77ce434
                                              • Instruction ID: d5eec3387bf9f2af87c3deac1be3c081a68759b5cbc5052c90a1cd046c0f3978
                                              • Opcode Fuzzy Hash: acb417c3046c5230bf261fb3a85c5b045a6b8022903fbd0a553d80ffe77ce434
                                              • Instruction Fuzzy Hash: BCB01275BC4201FBEE219B01DE09F457E62E764701F008074B305240F0C6B210A1DF0D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • SetFilePointer.KERNELBASE(00000000,00000000,00000000,00402DE9,0000BDE4), ref: 004030BD
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: FilePointer
                                              • String ID:
                                              • API String ID: 973152223-0
                                              • Opcode ID: 2028dafccfaa88a297be93e7ba1f52e009ec02dcd94d5fd44c1761bf2bffe23e
                                              • Instruction ID: eafd0aff1283cdec3023edec91852d87283cefa69c9b21bce59c6677f93a42a7
                                              • Opcode Fuzzy Hash: 2028dafccfaa88a297be93e7ba1f52e009ec02dcd94d5fd44c1761bf2bffe23e
                                              • Instruction Fuzzy Hash: 14B01271644200BFDB214F00DF06F057B21A790701F108030B344380F082712420EB1E
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • KiUserCallbackDispatcher.NTDLL(?,00403BBD), ref: 00403DEA
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: CallbackDispatcherUser
                                              • String ID:
                                              • API String ID: 2492992576-0
                                              • Opcode ID: e3f2ba33d58efc8432ae633466a552196efcc3252a2fe2007ece747084bac9c6
                                              • Instruction ID: 5393fb3fd4ec66336373a3cea7bd514d8462fd9d014250aae94180e38f4c2131
                                              • Opcode Fuzzy Hash: e3f2ba33d58efc8432ae633466a552196efcc3252a2fe2007ece747084bac9c6
                                              • Instruction Fuzzy Hash: AFA002755051009BCA515B50DF048457A61A754701B458475F1459017487315861EB6A
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Non-executed Functions

                                              APIs
                                              • GetDlgItem.USER32(?,000003F9), ref: 00404710
                                              • GetDlgItem.USER32(?,00000408), ref: 0040471D
                                              • GlobalAlloc.KERNEL32(00000040,00000001), ref: 00404769
                                              • LoadBitmapA.USER32(0000006E), ref: 0040477C
                                              • SetWindowLongA.USER32(?,000000FC,00404CFA), ref: 00404796
                                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000006,00000000), ref: 004047AA
                                              • ImageList_AddMasked.COMCTL32(00000000,?,00FF00FF), ref: 004047BE
                                              • SendMessageA.USER32(?,00001109,00000002), ref: 004047D3
                                              • SendMessageA.USER32(?,0000111C,00000000,00000000), ref: 004047DF
                                              • SendMessageA.USER32(?,0000111B,00000010,00000000), ref: 004047F1
                                              • DeleteObject.GDI32(?), ref: 004047F6
                                              • SendMessageA.USER32(?,00000143,00000000,00000000), ref: 00404821
                                              • SendMessageA.USER32(?,00000151,00000000,00000000), ref: 0040482D
                                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 004048C2
                                              • SendMessageA.USER32(?,0000110A,00000003,00000000), ref: 004048ED
                                              • SendMessageA.USER32(?,00001100,00000000,?), ref: 00404901
                                              • GetWindowLongA.USER32(?,000000F0), ref: 00404930
                                              • SetWindowLongA.USER32(?,000000F0,00000000), ref: 0040493E
                                              • ShowWindow.USER32(?,00000005), ref: 0040494F
                                              • SendMessageA.USER32(?,00000419,00000000,?), ref: 00404A52
                                              • SendMessageA.USER32(?,00000147,00000000,00000000), ref: 00404AB7
                                              • SendMessageA.USER32(?,00000150,00000000,00000000), ref: 00404ACC
                                              • SendMessageA.USER32(?,00000420,00000000,00000020), ref: 00404AF0
                                              • SendMessageA.USER32(?,00000200,00000000,00000000), ref: 00404B16
                                              • ImageList_Destroy.COMCTL32(00000000), ref: 00404B2B
                                              • GlobalFree.KERNEL32(00000000), ref: 00404B3B
                                              • SendMessageA.USER32(?,0000014E,00000000,00000000), ref: 00404BAB
                                              • SendMessageA.USER32(?,00001102,00000410,?), ref: 00404C54
                                              • SendMessageA.USER32(?,0000110D,00000000,00000008), ref: 00404C63
                                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00404C83
                                              • ShowWindow.USER32(?,00000000), ref: 00404CD1
                                              • GetDlgItem.USER32(?,000003FE), ref: 00404CDC
                                              • ShowWindow.USER32(00000000), ref: 00404CE3
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: MessageSend$Window$ImageItemList_LongShow$Global$AllocBitmapCreateDeleteDestroyFreeInvalidateLoadMaskedObjectRect
                                              • String ID: $M$N
                                              • API String ID: 1638840714-813528018
                                              • Opcode ID: 59eb1809f78b2e22b71ab630a4b4117a288a05a336703e358dd51402bec2e6c3
                                              • Instruction ID: 30a51c26aaa2b30bd696497e7e47c5adc9155ce2862f65cc436e234c57937e2f
                                              • Opcode Fuzzy Hash: 59eb1809f78b2e22b71ab630a4b4117a288a05a336703e358dd51402bec2e6c3
                                              • Instruction Fuzzy Hash: D402AFB0A00208AFDB20DF55DD45AAE7BB5FB84314F10817AF611BA2E1D7799E42CF58
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetDlgItem.USER32(?,000003FB), ref: 00404248
                                              • SetWindowTextA.USER32(?,?), ref: 00404275
                                              • SHBrowseForFolderA.SHELL32(?,004293B0,?), ref: 0040432A
                                              • CoTaskMemFree.OLE32(00000000), ref: 00404335
                                              • lstrcmpiA.KERNEL32(Remove folder: ,00429FE0), ref: 00404367
                                              • lstrcatA.KERNEL32(?,Remove folder: ), ref: 00404373
                                              • SetDlgItemTextA.USER32(?,000003FB,?), ref: 00404383
                                                • Part of subcall function 004052B1: GetDlgItemTextA.USER32(?,?,00000400,004043B6), ref: 004052C4
                                                • Part of subcall function 00405C6E: CharNextA.USER32(?,*?|<>/":,00000000,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\WinPcap_4_1_3.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030D2,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 00405CC6
                                                • Part of subcall function 00405C6E: CharNextA.USER32(?,?,?,00000000), ref: 00405CD3
                                                • Part of subcall function 00405C6E: CharNextA.USER32(?,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\WinPcap_4_1_3.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030D2,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 00405CD8
                                                • Part of subcall function 00405C6E: CharPrevA.USER32(?,?,"C:\Users\user\Desktop\WinPcap_4_1_3.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030D2,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 00405CE8
                                              • GetDiskFreeSpaceA.KERNEL32(00428FA8,?,?,0000040F,?,00428FA8,00428FA8,?,00000000,00428FA8,?,?,000003FB,?), ref: 0040443C
                                              • MulDiv.KERNEL32(?,0000040F,00000400), ref: 00404457
                                              • SetDlgItemTextA.USER32(00000000,00000400,00428F98), ref: 004044D0
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: CharItemText$Next$Free$BrowseDiskFolderPrevSpaceTaskWindowlstrcatlstrcmpi
                                              • String ID: A$C:\Program Files (x86)\WinPcap$Remove folder:
                                              • API String ID: 2246997448-1218624837
                                              • Opcode ID: ff348560b6faec50659af313b3d2a2111afe001c507a4e4cf48385b70e4cb693
                                              • Instruction ID: 52dfe11e264a0fce323933678d720eed1997f61c196974170264a293bd140da1
                                              • Opcode Fuzzy Hash: ff348560b6faec50659af313b3d2a2111afe001c507a4e4cf48385b70e4cb693
                                              • Instruction Fuzzy Hash: 19915FB1A00219ABDF11AFA1CC85AAF7BB8EF84315F10407BFA00B6291D77C99418F59
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: c2605cf98d0f5e4d904242d25cd3a4b56aad5cd8bbaf3b06cd26a7c18d89d64d
                                              • Instruction ID: 671146196c1174ec618cbc22bbed2adbdbe1d7b4d249fb8fe9215707769dedfe
                                              • Opcode Fuzzy Hash: c2605cf98d0f5e4d904242d25cd3a4b56aad5cd8bbaf3b06cd26a7c18d89d64d
                                              • Instruction Fuzzy Hash: 3FE16971901B09DFDB24CF58C880BAABBF5EB44305F15852EE897A72D1D378AA51CF44
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID:
                                              • String ID:
                                              • API String ID:
                                              • Opcode ID: b751e5aff08849ce342a749075ab7f0bf0a9efd73ac853bc595c300a3c4f69bb
                                              • Instruction ID: ce73a9d55fc041a401e528a6b0bed7c2fc314d3430b7e91baefc2d4226deaab1
                                              • Opcode Fuzzy Hash: b751e5aff08849ce342a749075ab7f0bf0a9efd73ac853bc595c300a3c4f69bb
                                              • Instruction Fuzzy Hash: 51C13A71A002698BDF14CF68C4905EEB7B2FF99314F26827AD856B7380D7346952CF94
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • DefWindowProcA.USER32(?,00000046,?,?), ref: 0040102C
                                              • BeginPaint.USER32(?,?), ref: 00401047
                                              • GetClientRect.USER32(?,?), ref: 0040105B
                                              • CreateBrushIndirect.GDI32(00000000), ref: 004010CF
                                              • FillRect.USER32(00000000,?,00000000), ref: 004010E4
                                              • DeleteObject.GDI32(?), ref: 004010ED
                                              • CreateFontIndirectA.GDI32(?), ref: 00401105
                                              • SetBkMode.GDI32(00000000,00000001), ref: 00401126
                                              • SetTextColor.GDI32(00000000,?), ref: 00401130
                                              • SelectObject.GDI32(00000000,?), ref: 00401140
                                              • DrawTextA.USER32(00000000,WinPcap 4.1.3 Setup,000000FF,00000010,00000820), ref: 00401156
                                              • SelectObject.GDI32(00000000,00000000), ref: 00401160
                                              • DeleteObject.GDI32(?), ref: 00401165
                                              • EndPaint.USER32(?,?), ref: 0040116E
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: Object$CreateDeleteIndirectPaintRectSelectText$BeginBrushClientColorDrawFillFontModeProcWindow
                                              • String ID: F$WinPcap 4.1.3 Setup
                                              • API String ID: 941294808-2800853159
                                              • Opcode ID: 3029600e7a8438bcc5a7b1f7b0fc9c629607e2b31f65c15310fafe19c7710355
                                              • Instruction ID: 226a36137513f208ef2a020474f107b038e547e09bed9ebbc09fe29577f91b00
                                              • Opcode Fuzzy Hash: 3029600e7a8438bcc5a7b1f7b0fc9c629607e2b31f65c15310fafe19c7710355
                                              • Instruction Fuzzy Hash: C0419B71804249AFCF058FA5CD459BFBFB9FF44314F00812AF952AA1A0C738AA51DFA5
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                                • Part of subcall function 00405D2E: GetModuleHandleA.KERNEL32(?,?,00000000,0040313D,00000008), ref: 00405D40
                                                • Part of subcall function 00405D2E: LoadLibraryA.KERNELBASE(?,?,00000000,0040313D,00000008), ref: 00405D4B
                                                • Part of subcall function 00405D2E: GetProcAddress.KERNEL32(00000000,?), ref: 00405D5C
                                              • CloseHandle.KERNEL32(00000000,?,00000000,00000001,00000001,?,00000000,?,?,004054EF,?,00000000,000000F1,?), ref: 004057A7
                                              • GetShortPathNameA.KERNEL32(?,0042C170,00000400), ref: 004057B0
                                              • GetShortPathNameA.KERNEL32(00000000,0042BBE8,00000400), ref: 004057CD
                                              • wsprintfA.USER32 ref: 004057EB
                                              • GetFileSize.KERNEL32(00000000,00000000,0042BBE8,C0000000,00000004,0042BBE8,?,?,?,00000000,000000F1,?), ref: 00405826
                                              • GlobalAlloc.KERNEL32(00000040,0000000A,?,?,00000000,000000F1,?), ref: 00405835
                                              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,00000000,000000F1,?), ref: 0040584B
                                              • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000,?,0042B7E8,00000000,-0000000A,00409330,00000000,[Rename],?,?,00000000,000000F1,?), ref: 00405891
                                              • WriteFile.KERNEL32(00000000,00000000,?,?,00000000,?,?,00000000,000000F1,?), ref: 004058A3
                                              • GlobalFree.KERNEL32(00000000), ref: 004058AA
                                              • CloseHandle.KERNEL32(00000000,?,?,00000000,000000F1,?), ref: 004058B1
                                                • Part of subcall function 00405658: lstrlenA.KERNEL32(00000000,?,00000000,00000000,00405866,00000000,[Rename],?,?,00000000,000000F1,?), ref: 0040565F
                                                • Part of subcall function 00405658: lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,00405866,00000000,[Rename],?,?,00000000,000000F1,?), ref: 0040568F
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: File$Handle$CloseGlobalNamePathShortlstrlen$AddressAllocFreeLibraryLoadModulePointerProcReadSizeWritewsprintf
                                              • String ID: %s=%s$[Rename]
                                              • API String ID: 3772915668-1727408572
                                              • Opcode ID: dff5e8461f90d0a7b08308301f80b1547d188907f97dbbe474557014f1802e0f
                                              • Instruction ID: 426fb2abaf3c2c6495405564ff4e517f65c757b77f6bed08917e1be6c8ffeb7f
                                              • Opcode Fuzzy Hash: dff5e8461f90d0a7b08308301f80b1547d188907f97dbbe474557014f1802e0f
                                              • Instruction Fuzzy Hash: 6341FF32606B15ABE3206B619C49F6B3A5CDF80705F004436FD05F62C2E678E8118EBD
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • CharNextA.USER32(?,*?|<>/":,00000000,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\WinPcap_4_1_3.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030D2,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 00405CC6
                                              • CharNextA.USER32(?,?,?,00000000), ref: 00405CD3
                                              • CharNextA.USER32(?,C:\Users\user\AppData\Local\Temp\,"C:\Users\user\Desktop\WinPcap_4_1_3.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030D2,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 00405CD8
                                              • CharPrevA.USER32(?,?,"C:\Users\user\Desktop\WinPcap_4_1_3.exe",C:\Users\user\AppData\Local\Temp\,00000000,004030D2,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 00405CE8
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: Char$Next$Prev
                                              • String ID: "C:\Users\user\Desktop\WinPcap_4_1_3.exe"$*?|<>/":$C:\Users\user\AppData\Local\Temp\
                                              • API String ID: 589700163-3227874267
                                              • Opcode ID: 5aa71b13a4eda0142438c40892e2bf660e792717ed83394db4a483eb7dc85cb7
                                              • Instruction ID: 3b67653c5ee308ebbdbeafcda2e7905df7fa5ba98b11233f7c0ae47683edab57
                                              • Opcode Fuzzy Hash: 5aa71b13a4eda0142438c40892e2bf660e792717ed83394db4a483eb7dc85cb7
                                              • Instruction Fuzzy Hash: 0811905180CB912EFB3206245D44BB7BF89CB567A0F58447BE9C5B22C2CA7C5C429A6D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetWindowLongA.USER32(?,000000EB), ref: 00403E42
                                              • GetSysColor.USER32(00000000), ref: 00403E5E
                                              • SetTextColor.GDI32(?,00000000), ref: 00403E6A
                                              • SetBkMode.GDI32(?,?), ref: 00403E76
                                              • GetSysColor.USER32(?), ref: 00403E89
                                              • SetBkColor.GDI32(?,?), ref: 00403E99
                                              • DeleteObject.GDI32(?), ref: 00403EB3
                                              • CreateBrushIndirect.GDI32(?), ref: 00403EBD
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: Color$BrushCreateDeleteIndirectLongModeObjectTextWindow
                                              • String ID:
                                              • API String ID: 2320649405-0
                                              • Opcode ID: 54c4c26d0880f537c7164b4e2121e342b47f232b14c6c2566c024284623f766e
                                              • Instruction ID: df06335cf3b4afc37a3544ae2d30c5d34a8579c70edf0d6bae8496df32602c64
                                              • Opcode Fuzzy Hash: 54c4c26d0880f537c7164b4e2121e342b47f232b14c6c2566c024284623f766e
                                              • Instruction Fuzzy Hash: DC219671904709ABCB219F78DD08B4B7FF8AF00715F048A29F855E22E0D338E904CB95
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • SendMessageA.USER32(?,0000110A,00000009,00000000), ref: 00404694
                                              • GetMessagePos.USER32 ref: 0040469C
                                              • ScreenToClient.USER32(?,?), ref: 004046B6
                                              • SendMessageA.USER32(?,00001111,00000000,?), ref: 004046C8
                                              • SendMessageA.USER32(?,0000110C,00000000,?), ref: 004046EE
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: Message$Send$ClientScreen
                                              • String ID: f
                                              • API String ID: 41195575-1993550816
                                              • Opcode ID: 2a5698d5089c35727aab5c3c5da7bcfb0b51a0b1d2cb1bbeaafe9db8233e3477
                                              • Instruction ID: b5388fb2048f9adb4f66bcd81e9da03b2d8faafec29f08353259a6dacb87349b
                                              • Opcode Fuzzy Hash: 2a5698d5089c35727aab5c3c5da7bcfb0b51a0b1d2cb1bbeaafe9db8233e3477
                                              • Instruction Fuzzy Hash: 0E014071D00219BADB00DB94DC45BEEBBB8AB59711F10016ABA11B61C0D7B865418BA5
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • SetTimer.USER32(?,00000001,000000FA,00000000), ref: 00402B56
                                              • MulDiv.KERNEL32(000DD7BA,00000064,000DF6B8), ref: 00402B81
                                              • wsprintfA.USER32 ref: 00402B91
                                              • SetWindowTextA.USER32(?,?), ref: 00402BA1
                                              • SetDlgItemTextA.USER32(?,00000406,?), ref: 00402BB3
                                              Strings
                                              • verifying installer: %d%%, xrefs: 00402B8B
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: Text$ItemTimerWindowwsprintf
                                              • String ID: verifying installer: %d%%
                                              • API String ID: 1451636040-82062127
                                              • Opcode ID: fb9d5c419c19e2bdb6c378f6819b1ebc1dc21d5e7d0f0b4f2b85ce684f360012
                                              • Instruction ID: 3d98ddf4d84b742d5460afe4edfb6d9be597fa80bf04213b3bc288f28cb5f5da
                                              • Opcode Fuzzy Hash: fb9d5c419c19e2bdb6c378f6819b1ebc1dc21d5e7d0f0b4f2b85ce684f360012
                                              • Instruction Fuzzy Hash: 82014470A40209ABDB209F60DD09FAE3779BB04345F008039FA06A92D1D7B8AA558F99
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • GetDC.USER32(?), ref: 00401D22
                                              • GetDeviceCaps.GDI32(00000000), ref: 00401D29
                                              • MulDiv.KERNEL32(00000000,00000002,00000000), ref: 00401D38
                                              • CreateFontIndirectA.GDI32(0040AF84), ref: 00401D8A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: CapsCreateDeviceFontIndirect
                                              • String ID: MS Shell Dlg
                                              • API String ID: 3272661963-76309092
                                              • Opcode ID: cde7f90e9653f28e0253788fad6bfaf6f4cce6a54e225caafa13451a0e0ea16a
                                              • Instruction ID: 580b179190550232f88f4ba5e52f5296c98f8c4b0afe68c870f47754878f2485
                                              • Opcode Fuzzy Hash: cde7f90e9653f28e0253788fad6bfaf6f4cce6a54e225caafa13451a0e0ea16a
                                              • Instruction Fuzzy Hash: 68F044F1A45342AEE702A7B0AE4B7993B649725309F100436F545BA1E2C5BC00149B7F
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • RegOpenKeyExA.ADVAPI32(?,?,00000000,00000000,?), ref: 00402A57
                                              • RegEnumKeyA.ADVAPI32(?,00000000,?,00000105), ref: 00402A93
                                              • RegCloseKey.ADVAPI32(?), ref: 00402A9C
                                              • RegCloseKey.ADVAPI32(?), ref: 00402AC1
                                              • RegDeleteKeyA.ADVAPI32(?,?), ref: 00402ADF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: Close$DeleteEnumOpen
                                              • String ID:
                                              • API String ID: 1912718029-0
                                              • Opcode ID: b26b43b9b7666f40e9fdb218fe96b22a79156d573bb7d5cc257a1d138f5a7564
                                              • Instruction ID: 324dab2b24170647655e9dcbeda369d8ff673eed47d89bab0de13a8960c84090
                                              • Opcode Fuzzy Hash: b26b43b9b7666f40e9fdb218fe96b22a79156d573bb7d5cc257a1d138f5a7564
                                              • Instruction Fuzzy Hash: 4F115675A00008FFEF31AF91DE49DAB7B6DEB40384B104436FA05B10A0DBB59E51AE69
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • CharNextA.USER32(ES@,?,C:\,00000000,004055F7,C:\,C:\,?,?,00000000,00405345,?,"C:\Users\user\Desktop\WinPcap_4_1_3.exe",00000000), ref: 004055A1
                                              • CharNextA.USER32(00000000), ref: 004055A6
                                              • CharNextA.USER32(00000000), ref: 004055B5
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: CharNext
                                              • String ID: C:\$ES@
                                              • API String ID: 3213498283-247893726
                                              • Opcode ID: 68c7f773aafbecf3834176a21eebbfbca0b4bda0270daf5a8c718fc322178301
                                              • Instruction ID: f60ec20427defc95a9886ae099bd540e39d30c8fbbaad3333d1940da6ed1a81e
                                              • Opcode Fuzzy Hash: 68c7f773aafbecf3834176a21eebbfbca0b4bda0270daf5a8c718fc322178301
                                              • Instruction Fuzzy Hash: F8F0A7A2D44B25B6E73222A84C44B6B6BADDB55711F244437E200B61D597B84C828FBA
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • lstrlenA.KERNEL32(00429FE0,00429FE0,?,%u.%u%s%s,00000005,00000000,00000000,?,000000DC,00000000,004044B7,000000DF,0000040F,00000400,00000000), ref: 00404625
                                              • wsprintfA.USER32 ref: 0040462D
                                              • SetDlgItemTextA.USER32(?,00429FE0), ref: 00404640
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: ItemTextlstrlenwsprintf
                                              • String ID: %u.%u%s%s
                                              • API String ID: 3540041739-3551169577
                                              • Opcode ID: 74831606c9b093612702591a57e7d7575a57c61aed7505950e70be9150aef9cb
                                              • Instruction ID: a73c68329ee831a229c644748369bffc84c82a565a353c3d841dc2820e0c3950
                                              • Opcode Fuzzy Hash: 74831606c9b093612702591a57e7d7575a57c61aed7505950e70be9150aef9cb
                                              • Instruction Fuzzy Hash: 9911D0737001243BDB10A66D9C46EEF329ADBC6334F14023BFA25F61D1E9388C5286E8
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • SetWindowTextA.USER32(00000000,WinPcap 4.1.3 Setup), ref: 004038B6
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: TextWindow
                                              • String ID: 1033$C:\Users\user\AppData\Local\Temp\$WinPcap 4.1.3 Setup
                                              • API String ID: 530164218-3097238002
                                              • Opcode ID: 1025670415ed7299d3a4535275ffdf3c061a3cffc7b258d7069b92854ad026b7
                                              • Instruction ID: f58d08b88b77c55e92e539ad5181c9965f6bbcffbd0d008a8b371c472e4a47a6
                                              • Opcode Fuzzy Hash: 1025670415ed7299d3a4535275ffdf3c061a3cffc7b258d7069b92854ad026b7
                                              • Instruction Fuzzy Hash: 9311D176B001009BC734EF56DC809737BADEB8471636881BFEC02A7390D639A8038A98
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000000,00000000,00000000,00000000,0042BFE8,Error launching installer), ref: 00405291
                                              • CloseHandle.KERNEL32(?), ref: 0040529E
                                              Strings
                                              • Error launching installer, xrefs: 0040527F
                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 0040526C
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: CloseCreateHandleProcess
                                              • String ID: C:\Users\user\AppData\Local\Temp\$Error launching installer
                                              • API String ID: 3712363035-4043152584
                                              • Opcode ID: dc33ac1254d82063a7b9e43172f0f507123e59eb9c5a5fd92b1179a08dc1bdb0
                                              • Instruction ID: 9c205d3d1494e9e4afb0e3639077779a104ecf70f113e6d393e41fe649cd8d97
                                              • Opcode Fuzzy Hash: dc33ac1254d82063a7b9e43172f0f507123e59eb9c5a5fd92b1179a08dc1bdb0
                                              • Instruction Fuzzy Hash: FBE0ECB4A04209ABEB00EF64ED09D7B7BBCEB00304B408522A911E2290D778E410CEB9
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • lstrlenA.KERNEL32(?,C:\Users\user\AppData\Local\Temp\,004030E4,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 00405505
                                              • CharPrevA.USER32(?,00000000,?,C:\Users\user\AppData\Local\Temp\,004030E4,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,C:\Users\user\AppData\Local\Temp\,00000000,00403244), ref: 0040550E
                                              • lstrcatA.KERNEL32(?,00409010), ref: 0040551F
                                              Strings
                                              • C:\Users\user\AppData\Local\Temp\, xrefs: 004054FF
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: CharPrevlstrcatlstrlen
                                              • String ID: C:\Users\user\AppData\Local\Temp\
                                              • API String ID: 2659869361-3936084776
                                              • Opcode ID: f17b2ccdaa8efd10834e0f4341d4d5b977b2bb6e8559feba5c8cad9ccc1df0ef
                                              • Instruction ID: dfec000a3f5bf2671270dd29e8f8c50a5f72ee918dd093ba8f25731816a648b4
                                              • Opcode Fuzzy Hash: f17b2ccdaa8efd10834e0f4341d4d5b977b2bb6e8559feba5c8cad9ccc1df0ef
                                              • Instruction Fuzzy Hash: FCD0A972705A307ED2022A19AC06F8F2A88CF17301B044822F100B62D2C23C9E418FFE
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • DestroyWindow.USER32(00000000,00000000,00402D9E,00000001), ref: 00402BD1
                                              • GetTickCount.KERNEL32 ref: 00402BEF
                                              • CreateDialogParamA.USER32(0000006F,00000000,00402B3B,00000000), ref: 00402C0C
                                              • ShowWindow.USER32(00000000,00000005), ref: 00402C1A
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: Window$CountCreateDestroyDialogParamShowTick
                                              • String ID:
                                              • API String ID: 2102729457-0
                                              • Opcode ID: c87a5157f8204693ca179b822d2a85440fc20d6be017f85e77c31dbe1d2c93c5
                                              • Instruction ID: df45f881ccb5ca36463c1a09230da8cf23750fca8468dec1cd15007da7f5e5e8
                                              • Opcode Fuzzy Hash: c87a5157f8204693ca179b822d2a85440fc20d6be017f85e77c31dbe1d2c93c5
                                              • Instruction Fuzzy Hash: 22F0F430A09120EBC6716F95FD4C99B7F64E704B157504437F001B55F5D67878829B9D
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • IsWindowVisible.USER32(?), ref: 00404D30
                                              • CallWindowProcA.USER32(?,00000200,?,?), ref: 00404D9E
                                                • Part of subcall function 00403E0A: SendMessageA.USER32(000303FC,00000000,00000000,00000000), ref: 00403E1C
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: Window$CallMessageProcSendVisible
                                              • String ID:
                                              • API String ID: 3748168415-3916222277
                                              • Opcode ID: 498d22ec92de87507460055f31d3341dd140a7d0c04a54d74523ea2b6bf50dd0
                                              • Instruction ID: b16bf2df46199d4e0f4b20eb531931f7d117dfa55111be6f57691eac5a9fa7e0
                                              • Opcode Fuzzy Hash: 498d22ec92de87507460055f31d3341dd140a7d0c04a54d74523ea2b6bf50dd0
                                              • Instruction Fuzzy Hash: 25114F71600218BBDB219F52DC41AAB3B69AF84365F00813FFA04B91E1C37D8D51CFA9
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • lstrlenA.KERNEL32(80000000,C:\Users\user\Desktop,00402C8E,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\WinPcap_4_1_3.exe,C:\Users\user\Desktop\WinPcap_4_1_3.exe,80000000,00000003), ref: 0040554C
                                              • CharPrevA.USER32(80000000,00000000,80000000,C:\Users\user\Desktop,00402C8E,C:\Users\user\Desktop,C:\Users\user\Desktop,C:\Users\user\Desktop\WinPcap_4_1_3.exe,C:\Users\user\Desktop\WinPcap_4_1_3.exe,80000000,00000003), ref: 0040555A
                                              Strings
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: CharPrevlstrlen
                                              • String ID: C:\Users\user\Desktop
                                              • API String ID: 2709904686-3125694417
                                              • Opcode ID: 49376fbf8c9c30057c1bc985cc011eea510fd351d3a644e674ee9e82abf7fe19
                                              • Instruction ID: fca702df0190f5d4796b13fce4c8f5ccfdab60c3fa8ed772e71c257c4247ae30
                                              • Opcode Fuzzy Hash: 49376fbf8c9c30057c1bc985cc011eea510fd351d3a644e674ee9e82abf7fe19
                                              • Instruction Fuzzy Hash: 39D0A772508EB07EE70366149C00B9F7A88CF13340F094462E040A61D4C27C4D418FFD
                                              Uniqueness

                                              Uniqueness Score: -1.00%

                                              APIs
                                              • lstrlenA.KERNEL32(00000000,?,00000000,00000000,00405866,00000000,[Rename],?,?,00000000,000000F1,?), ref: 0040565F
                                              • lstrcmpiA.KERNEL32(00000000,00000000), ref: 00405678
                                              • CharNextA.USER32(00000000,?,?,00000000,000000F1,?), ref: 00405686
                                              • lstrlenA.KERNEL32(00000000,00000000,?,00000000,00000000,00405866,00000000,[Rename],?,?,00000000,000000F1,?), ref: 0040568F
                                              Memory Dump Source
                                              • Source File: 00000000.00000002.2214764472.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                              • Associated: 00000000.00000002.2214750651.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214777874.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000409000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.000000000042B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000434000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214791230.0000000000437000.00000004.00000001.01000000.00000003.sdmpDownload File
                                              • Associated: 00000000.00000002.2214852801.000000000043F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                              Joe Sandbox IDA Plugin
                                              • Snapshot File: hcaresult_0_2_400000_WinPcap_4_1_3.jbxd
                                              Similarity
                                              • API ID: lstrlen$CharNextlstrcmpi
                                              • String ID:
                                              • API String ID: 190613189-0
                                              • Opcode ID: 0108cf067d6f6d80c8ed850288af8a4b3b9133f156f8bdff26d83f0dd252fb59
                                              • Instruction ID: fee4d645b7b415a6dc1afaac75e8b1817c7eae67fc86a6e8a33b60f3285d70db
                                              • Opcode Fuzzy Hash: 0108cf067d6f6d80c8ed850288af8a4b3b9133f156f8bdff26d83f0dd252fb59
                                              • Instruction Fuzzy Hash: 05F0A736309D519AC2125B295C04A6F6A98EF91314B58097AF444F2140E33A9C119BBF
                                              Uniqueness

                                              Uniqueness Score: -1.00%